{"id":13,"date":"2015-06-15T10:26:53","date_gmt":"2015-06-15T08:26:53","guid":{"rendered":"http:\/\/members.loria.fr\/thierrygartiser\/?page_id=13"},"modified":"2016-09-03T19:25:48","modified_gmt":"2016-09-03T17:25:48","slug":"publications","status":"publish","type":"page","link":"https:\/\/members.loria.fr\/ALahmadi\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<p>   <!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD XHTML 1.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/xhtml1\/DTD\/xhtml1-transitional.dtd\"> <html xmlns='http:\/\/www.w3.org\/1999\/xhtml' xml:lang='fr' lang='fr'> <head> <meta name=\"robots\" content=\"noindex, nofollow\" \/> <meta http-equiv=\"content-type\" content= \"text\/html;charset=UTF-8\" \/> <meta http-equiv=\"Content-Language\" content=\"fr\" \/> <link rel=\"stylesheet\" type=\"text\/css\" href=\"..\/css\/VisuGen.css\" \/> <link rel=\"stylesheet\" type=\"text\/css\" href=\"https:\/\/haltools.inria.fr\/\/css\/VisuRubriqueEncadre.css\" \/> <!-- Piwik haltools.inria.fr--> <script type=\"text\/javascript\">   var _paq = _paq || [];   _paq.push(['trackPageView']);   _paq.push(['enableLinkTracking']);   (function() {     var u=\"\/\/piwik.inria.fr\/\";     _paq.push(['setTrackerUrl', u+'piwik.php']);     _paq.push(['setSiteId', 25]);     var d=document, g=d.createElement('script'), s=d.getElementsByTagName('script')[0];     g.type='text\/javascript'; g.async=true; g.defer=true; g.src=u+'piwik.js'; s.parentNode.insertBefore(g,s);   })(); <\/script> <noscript><\/p>\n<p><img decoding=\"async\" src=\"\/\/piwik.inria.fr\/piwik.php?idsite=25\" style=\"border:0;\" alt=\"\" \/><\/p>\n<p><\/noscript> <!-- End Piwik Code -->  <title>Publications HAL de  Abdelkader Lahmadi<\/title> <\/head> <body> <\/p>\n<div id=\"res_script\">\n<p class='Rubrique'>2026<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-05500820v1\" target=\"_blank\" >Multi-Taxonomy Vulnerability Classification with Hierarchically Finetuned Language Models<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Franco Terranova, Sana Rekbi, Abdelkader Lahmadi, Isabelle Chrisment<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>To appear at DIMVA 2026 &#8211; Conference on Detection of Intrusions and Malware and Vulnerability Assessment<\/i>, Jul 2026, Chania, Crete, Greece<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-05500820\/file\/Multi_Taxonomy_Vulnerability_Classification_with_Hierarchically_Finetuned_Language_Models.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05500820\/file\/Multi_Taxonomy_Vulnerability_Classification_with_Hierarchically_Finetuned_Language_Models.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05500820\/file\/Multi_Taxonomy_Vulnerability_Classification_with_Hierarchically_Finetuned_Language_Models.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05500820v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-05589750v1\" target=\"_blank\" >CauseRL: Reinforcement Learning-based Random Walks for Root Cause Analysis in Microservices<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jhon Sebastian Rojas Rodriguez, Abdelkader Lahmadi, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>41st ACM\/SIGAPP Symposium On Applied Computing<\/i>, Mar 2026, Thessaloniki, Greece. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3748522.3779836\">&#x27E8;10.1145\/3748522.3779836&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1145\/3748522.3779836\" target=\"_blank\" >10.1145\/3748522.3779836<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-05589750\/file\/CauseRL.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-05589750\/file\/CauseRL.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-05589750\/file\/CauseRL.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-05589750v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2025<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-05398965v1\" target=\"_blank\" >Leveraging Reinforcement Learning for Traffic Engineering in Programmable Networks: A Survey<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Santiago R\u00edos-Guiral, Abdelkader Lahmadi, Juan F.Botero, Sergio A Guti\u00e9rrez<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Communications Surveys and Tutorials, IEEE Communications Society<\/i>, 2025, pp.1 &#8211; 1. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/comst.2025.3632870\">&#x27E8;10.1109\/comst.2025.3632870&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/comst.2025.3632870\" target=\"_blank\" >10.1109\/comst.2025.3632870<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-05398965\/file\/TE_Leveraging_RL_HAL.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-05398965\/file\/TE_Leveraging_RL_HAL.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-05398965\/file\/TE_Leveraging_RL_HAL.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-05398965v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-05327868v1\" target=\"_blank\" >Deep Reinforcement Learning for In-Network Placement of ACL Rules Under Constraints<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Wafik Zahwa, Abdelkader Lahmadi, Micha\u00ebl Rusinowitch, Mondher Ayadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>CNSM 2025 &#8211; 21st International Conference on Network and Service Management<\/i>, Oct 2025, Bologne, Italy<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-05327868\/file\/cnsm-1.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-05327868\/file\/cnsm-1.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-05327868\/file\/cnsm-1.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-05327868v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-05182437v1\" target=\"_blank\" >Scalable and Generalizable RL Agents for Attack Path Discovery via Continuous Invariant Spaces<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Franco Terranova, Abdelkader Lahmadi, Isabelle Chrisment<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>2025 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)<\/i>, Oct 2025, Gold Coast, Australia. pp.440-457, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/RAID67961.2025.00029\">&#x27E8;10.1109\/RAID67961.2025.00029&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/RAID67961.2025.00029\" target=\"_blank\" >10.1109\/RAID67961.2025.00029<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-05182437\/file\/Scalable_and_Generalizable_RL_Agents_for_Attack_Path_Discovery_via_Continuous_Invariant_Spaces.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05182437\/file\/Scalable_and_Generalizable_RL_Agents_for_Attack_Path_Discovery_via_Continuous_Invariant_Spaces.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05182437\/file\/Scalable_and_Generalizable_RL_Agents_for_Attack_Path_Discovery_via_Continuous_Invariant_Spaces.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05182437v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-05157729v1\" target=\"_blank\" >Assessing 5G Connectivity for Urbanloop: a Pod-based Autonomous Railway Transport System<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Runbo Su, Abdelkader Lahmadi, Ye-Qiong Song, Jean-Philippe Mangeot<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>2025 IEEE 102nd Vehicular Technology Conference<\/i>, IEEE Vehicular Technology Society, Oct 2025, Chengdu, China<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-05157729\/file\/vtc_final_rs.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05157729\/file\/vtc_final_rs.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05157729\/file\/vtc_final_rs.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05157729v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-05351162v1\" target=\"_blank\" >ROSCA: Robust and Scalable Security Alert Correlation and Prioritisation using the MITRE ATT&amp;CK Framework<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">R\u00e9mi Garcia, Abdelkader Lahmadi, Pierre-Fran\u00e7ois Gimenez, Charles Sala<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>WATCH 2025 &#8211; First International Workshop on Analytics, Telemetry, and Cybersecurity for HPCC (High Performance Computing and Communications)<\/i>, Oct 2025, Taipei, Taiwan. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3733826.3762680\">&#x27E8;10.1145\/3733826.3762680&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1145\/3733826.3762680\" target=\"_blank\" >10.1145\/3733826.3762680<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-05351162\/file\/ROSCA_alerts_correlation_paper.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-05351162\/file\/ROSCA_alerts_correlation_paper.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-05351162\/file\/ROSCA_alerts_correlation_paper.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-05351162v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-05343924v2\" target=\"_blank\" >LLM-Driven Causal Discovery for Monitoring Metrics in Computing Continuum Systems: A Comparative Study<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Ahmad Atwi, Abdelkader Lahmadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>LCN 2025 &#8211; IEEE 50th Conference on Local Computer Networks<\/i>, Oct 2025, Sydney, Australia. pp.1-8, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/LCN65610.2025.11146314\">&#x27E8;10.1109\/LCN65610.2025.11146314&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/LCN65610.2025.11146314\" target=\"_blank\" >10.1109\/LCN65610.2025.11146314<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-05343924\/file\/LLM_driven_Causal_Discovery_for_Monitoring_Metrics_in_Computing_Continuum_Systems__a_Comparative_Study.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05343924\/file\/LLM_driven_Causal_Discovery_for_Monitoring_Metrics_in_Computing_Continuum_Systems__a_Comparative_Study.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05343924\/file\/LLM_driven_Causal_Discovery_for_Monitoring_Metrics_in_Computing_Continuum_Systems__a_Comparative_Study.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05343924v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-05349650v1\" target=\"_blank\" >LLM-CVX: A Benchmarking Framework for Assessing the Offensive Potential of LLMs in Exploiting CVEs<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Mohamed Amine El Yagouby, Abdelkader Lahmadi, Mehdi Zakroum, Olivier Festor, Mounir Ghogho<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>AISec 2025 &#8211; 18 th ACM Workshop on Artificial Intelligence and Security<\/i>, Association for Computing Machinery, Oct 2025, Taipei, Taiwan. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3733799.3762978\">&#x27E8;10.1145\/3733799.3762978&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1145\/3733799.3762978\" target=\"_blank\" >10.1145\/3733799.3762978<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-05349650\/file\/aisec25-17.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-05349650\/file\/aisec25-17.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-05349650\/file\/aisec25-17.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-05349650v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-05349594v2\" target=\"_blank\" >Reconfiguration of Distributed Cooperative Microgrid Control Systems via Deep Reinforcement Learning to Mitigate Synchronization Attacks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Aur\u00e9lie Kpoze, Abdelkader Lahmadi, Mingxiao Ma, Isabelle Chrisment, Jules Degila, Arnaud Ahouandjinou<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>2025 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)<\/i>, Sep 2025, North York, Canada. pp.1-7, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/SmartGridComm65349.2025.11204592\">&#x27E8;10.1109\/SmartGridComm65349.2025.11204592&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/SmartGridComm65349.2025.11204592\" target=\"_blank\" >10.1109\/SmartGridComm65349.2025.11204592<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-05349594\/file\/Reconfiguration_of_Distributed_Cooperative_Microgrid_Control_Systems_via_Deep_Reinforcement_Learning_to_Mitigate_Synchronization_Attacks.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05349594\/file\/Reconfiguration_of_Distributed_Cooperative_Microgrid_Control_Systems_via_Deep_Reinforcement_Learning_to_Mitigate_Synchronization_Attacks.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05349594\/file\/Reconfiguration_of_Distributed_Cooperative_Microgrid_Control_Systems_via_Deep_Reinforcement_Learning_to_Mitigate_Synchronization_Attacks.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05349594v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-05219367v1\" target=\"_blank\" >RAID: Root cause Anomaly Identification and Diagnosis<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jo\u00ebl Roman Ky, Bertrand Mathieu, Abdelkader Lahmadi, Minqi Wang, Nicolas Marrot, Raouf Boutaba<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ECML PKDD 2025 &#8211; European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases<\/i>, Sep 2025, Porto (Portugal), Portugal. pp.438-455, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-662-72243-5_25\">&#x27E8;10.1007\/978-3-662-72243-5_25&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-662-72243-5_25\" target=\"_blank\" >10.1007\/978-3-662-72243-5_25<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-05219367\/file\/preprint_ecml_pkdd_2025_ads_265.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05219367\/file\/preprint_ecml_pkdd_2025_ads_265.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05219367\/file\/preprint_ecml_pkdd_2025_ads_265.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05219367v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-05213688v1\" target=\"_blank\" >Evaluating LLMs Efficiency Using Successive Attempts on Binary-Outcome Tasks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Mohamed Amine El Yagouby, Abdelkader Lahmadi, Mehdi Zakroum, Olivier Festor, Mounir Ghogho<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>CORIA-TALN-RJCRI-RECITAL 2025<\/i>, Association pour le Traitement Automatique des Langues (ATALA), Jun 2025, Marseille, France. pp.120-126<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-05213688\/file\/paper_act.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05213688\/file\/paper_act.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05213688\/file\/paper_act.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05213688v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Habilitation \u00e0 diriger des recherches<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.univ-lorraine.fr\/tel-04984019v1\" target=\"_blank\" >Contributions to the Monitoring and Security of Networked Systems<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">Networking and Internet Architecture [cs.NI]. Universit\u00e9 de Lorraine (UL), 2025<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Habilitation \u00e0 diriger des recherches<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.univ-lorraine.fr\/tel-04984019\/file\/HDR_LAHMADI-Mars_2025.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.univ-lorraine.fr\/tel-04984019\/file\/HDR_LAHMADI-Mars_2025.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.univ-lorraine.fr\/tel-04984019\/file\/HDR_LAHMADI-Mars_2025.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.univ-lorraine.fr\/tel-04984019v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2024<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-04881349v1\" target=\"_blank\" >CATS: Contrastive learning for Anomaly detection in Time Series<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jo\u00ebl Roman Ky, Bertrand Mathieu, Abdelkader Lahmadi, Raouf Boutaba<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>2024 IEEE International Conference on Big Data (Big Data)<\/i>, IEEE, Dec 2024, Washinghton DC, United States. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/BigData62323.2024.10825476\">&#x27E8;10.1109\/BigData62323.2024.10825476&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/BigData62323.2024.10825476\" target=\"_blank\" >10.1109\/BigData62323.2024.10825476<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-04881349\/file\/BigD393_3498.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04881349\/file\/BigD393_3498.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04881349\/file\/BigD393_3498.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04881349v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-04878851v1\" target=\"_blank\" >In-Band ARP-based Man-in-the-Middle Attack Detection Using P4 Programmable Switches<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Christian Garz\u00f3n, Abdelkader Lahmadi, Jaime Vergara, Alex\u00e1nder Leal, Juan Felipe Botero<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>2024 IEEE Latin-American Conference on Communications (LATINCOM)<\/i>, Nov 2024, Medellin, Colombia. pp.1-6, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/LATINCOM62985.2024.10770688\">&#x27E8;10.1109\/LATINCOM62985.2024.10770688&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/LATINCOM62985.2024.10770688\" target=\"_blank\" >10.1109\/LATINCOM62985.2024.10770688<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-04878851\/file\/latincom24.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-04878851\/file\/latincom24.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-04878851\/file\/latincom24.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-04878851v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-04662428v1\" target=\"_blank\" >Leveraging Deep Reinforcement Learning for Cyber-Attack Paths Prediction: Formulation, Generalization, and Evaluation<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Franco Terranova, Abdelkader Lahmadi, Isabelle Chrisment<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>The 27th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2024)<\/i>, Sep 2024, Padua, Italy. pp.1-16, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3678890.3678902\">&#x27E8;10.1145\/3678890.3678902&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1145\/3678890.3678902\" target=\"_blank\" >10.1145\/3678890.3678902<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-04662428\/file\/Leveraging_Deep_Reinforcement_Learning_for_Cyber_Attack_Paths_Prediction__Formulation__Generalization__and_Evaluation.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04662428\/file\/Leveraging_Deep_Reinforcement_Learning_for_Cyber_Attack_Paths_Prediction__Formulation__Generalization__and_Evaluation.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04662428\/file\/Leveraging_Deep_Reinforcement_Learning_for_Cyber_Attack_Paths_Prediction__Formulation__Generalization__and_Evaluation.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04662428v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-04709268v1\" target=\"_blank\" >SDN-Based Reconfiguration of Distributed and Cooperative Microgrid Control Systems for Mitigating Synchronization Attacks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Aur\u00e9lie Kpoze, Abdelkader Lahmadi, Isabelle Chrisment, Jules Degila<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>IEEE International Conference on Cyber Security and Resilience (CSR 2024)<\/i>, Sep 2024, London, France. pp.789-794, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CSR61664.2024.10679389\">&#x27E8;10.1109\/CSR61664.2024.10679389&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/CSR61664.2024.10679389\" target=\"_blank\" >10.1109\/CSR61664.2024.10679389<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-04709268\/file\/SDN_Based_Reconfiguration_of_Distributed_Cooperative_Microgrid_Control_Systems_for_Mitigating_Synchronization_Attacks__1_.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-04709268\/file\/SDN_Based_Reconfiguration_of_Distributed_Cooperative_Microgrid_Control_Systems_for_Mitigating_Synchronization_Attacks__1_.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-04709268\/file\/SDN_Based_Reconfiguration_of_Distributed_Cooperative_Microgrid_Control_Systems_for_Mitigating_Synchronization_Attacks__1_.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-04709268v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-04703877v1\" target=\"_blank\" >In-Network ACL Rules Placement using Deep Reinforcement Learning<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Wafik Zahwa, Abdelkader Lahmadi, Michael Rusinowitch, Mondher Ayadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>2024 IEEE International Mediterranean Conference on Communications and Networking (MeditCom)<\/i>, Jul 2024, Madrid, Spain. pp.341-346, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/MeditCom61057.2024.10621188\">&#x27E8;10.1109\/MeditCom61057.2024.10621188&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/MeditCom61057.2024.10621188\" target=\"_blank\" >10.1109\/MeditCom61057.2024.10621188<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-04703877\/file\/papier_wafik_Meditcom.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-04703877\/file\/papier_wafik_Meditcom.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-04703877\/file\/papier_wafik_Meditcom.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-04703877v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-04782284v1\" target=\"_blank\" >Vulnet: Learning Navigation in an Attack Graph<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Enzo d&rsquo;Andr\u00e9a, J\u00e9r\u00f4me Fran\u00e7ois, Abdelkader Lahmadi, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>2024 IEEE 10th International Conference on Network Softwarization (NetSoft)<\/i>, Jun 2024, Saint Louis, MO, United States. pp.393-398, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NetSoft60951.2024.10588918\">&#x27E8;10.1109\/NetSoft60951.2024.10588918&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/NetSoft60951.2024.10588918\" target=\"_blank\" >10.1109\/NetSoft60951.2024.10588918<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-04782284\/file\/secsoft24.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04782284\/file\/secsoft24.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04782284\/file\/secsoft24.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04782284v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-04703920v1\" target=\"_blank\" >SDN-based Mitigation of Synchronization Attacks on Distributed and Cooperative Controls in Microgrid<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Aur\u00e9lie Kpoze, Abdelkader Lahmadi, Isabelle Chrisment, Jules Degila<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>NOMS 2024-2024 IEEE Network Operations and Management Symposium<\/i>, May 2024, Seoul, South Korea. pp.1-3, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NOMS59830.2024.10575853\">&#x27E8;10.1109\/NOMS59830.2024.10575853&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/NOMS59830.2024.10575853\" target=\"_blank\" >10.1109\/NOMS59830.2024.10575853<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-04703920\/file\/Demo_paper_SDN_Microgrid_Mitigation.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-04703920\/file\/Demo_paper_SDN_Microgrid_Mitigation.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-04703920\/file\/Demo_paper_SDN_Microgrid_Mitigation.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-04703920v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-04602391v1\" target=\"_blank\" >An Empirical Study of Ransomware Vulnerabilities Descriptions<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Claudia Lanza, Abdelkader Lahmadi, Fabian Osmond<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>10th International Conference on Information Systems Security and Privacy<\/i>, Feb 2024, Rome, Italy. pp.146-153, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0012378700003648\">&#x27E8;10.5220\/0012378700003648&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.5220\/0012378700003648\" target=\"_blank\" >10.5220\/0012378700003648<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-04602391\/file\/ICISSP_2024_89_CR.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-04602391\/file\/ICISSP_2024_89_CR.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-04602391\/file\/ICISSP_2024_89_CR.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-04602391v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Books<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-04704329v1\" target=\"_blank\" >Ransomware Analysis: Knowledge Extraction and Classification for Advanced Cyber Threat Intelligence<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Claudia Lanza, Abdelkader Lahmadi, J\u00e9r\u00f4me Fran\u00e7ois<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">CRC Press, 1, pp.112, 2024, 9781003528999. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1201\/9781003528999\">&#x27E8;10.1201\/9781003528999&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Books<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1201\/9781003528999\" target=\"_blank\" >10.1201\/9781003528999<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-04704329v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Poster communications<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-04462876v1\" target=\"_blank\" >Deep Reinforcement Learning for Automated Cyber-Attack Path Prediction in Communication Networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Franco Terranova, Abdelkader Lahmadi, Isabelle Chrisment<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Geilo Winter School 2024 &#8211; Graphs and Applications<\/i>, Jan 2024, Geilo, Norway<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Poster communications<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-04462876\/file\/Poster.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04462876\/file\/Poster.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04462876\/file\/Poster.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04462876v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2023<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-04160235v1\" target=\"_blank\" >ML Models for Detecting QoE Degradation in Low-Latency Applications: A Cloud-Gaming Case Study<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jo\u00ebl Roman Ky, Bertrand Mathieu, Abdelkader Lahmadi, Raouf Boutaba<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>IEEE Transactions on Network and Service Management<\/i>, 2023, pp.1-1. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/TNSM.2023.3293806\">&#x27E8;10.1109\/TNSM.2023.3293806&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/TNSM.2023.3293806\" target=\"_blank\" >10.1109\/TNSM.2023.3293806<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-04160235\/file\/FINAL%20VERSION.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04160235\/file\/FINAL%20VERSION.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04160235\/file\/FINAL%20VERSION.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04160235v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-04364309v1\" target=\"_blank\" >An Experimental Study of Denial of Service Attacks on a 5G COTS Hardware<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Karim Baccar, Abdelkader Lahmadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>2023 7th Cyber Security in Networking Conference (CSNet)<\/i>, Oct 2023, Montreal, Canada. pp.12-18, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CSNet59123.2023.10339752\">&#x27E8;10.1109\/CSNet59123.2023.10339752&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/CSNet59123.2023.10339752\" target=\"_blank\" >10.1109\/CSNet59123.2023.10339752<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-04364309\/file\/CSNET_2023.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-04364309\/file\/CSNET_2023.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-04364309\/file\/CSNET_2023.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-04364309v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-04236850v1\" target=\"_blank\" >Automated Placement of In-Network ACL Rules<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Wafik Zahwa, Abdelkader Lahmadi, Michael Rusinowitch, Mondher Ayadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>2023 IEEE 9th International Conference on Network Softwarization (NetSoft)<\/i>, Jun 2023, Madrid, Spain. pp.486-491, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NetSoft57336.2023.10175436\">&#x27E8;10.1109\/NetSoft57336.2023.10175436&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/NetSoft57336.2023.10175436\" target=\"_blank\" >10.1109\/NetSoft57336.2023.10175436<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-04236850\/file\/netadata_v2.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-04236850\/file\/netadata_v2.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-04236850\/file\/netadata_v2.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-04236850v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-04364306v1\" target=\"_blank\" >An Experimental Testbed for 5G Network Security Assessment<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Karim Baccar, Abdelkader Lahmadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>NOMS 2023 IEEE\/IFIP Network Operations and Management Symposium<\/i>, May 2023, Miami, United States. pp.1-6, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NOMS56928.2023.10154283\">&#x27E8;10.1109\/NOMS56928.2023.10154283&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/NOMS56928.2023.10154283\" target=\"_blank\" >10.1109\/NOMS56928.2023.10154283<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-04364306\/file\/NOMS_2023.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-04364306\/file\/NOMS_2023.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-04364306\/file\/NOMS_2023.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-04364306v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2022<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03850763v1\" target=\"_blank\" >Benchmarking of lightweight cryptographic algorithms for wireless IoT networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Soline Blanc, Abdelkader Lahmadi, K\u00e9vin Le Gouguec, Marine Minier, Lama Sleem<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Wireless Networks<\/i>, 2022, 28 (8), pp.3453-3476. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s11276-022-03046-1\">&#x27E8;10.1007\/s11276-022-03046-1&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/s11276-022-03046-1\" target=\"_blank\" >10.1007\/s11276-022-03046-1<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-03850763v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-03884367v1\" target=\"_blank\" >Assessing Unsupervised Machine Learning solutions for Anomaly Detection in Cloud Gaming Sessions<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Joel Ky, Bertrand Mathieu, Abdelkader Lahmadi, Raouf Boutaba<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>2022 18th International Conference on Network and Service Management (CNSM)<\/i>, Oct 2022, Thessaloniki, Greece. pp.367-373, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.23919\/CNSM55787.2022.9964533\">&#x27E8;10.23919\/CNSM55787.2022.9964533&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.23919\/CNSM55787.2022.9964533\" target=\"_blank\" >10.23919\/CNSM55787.2022.9964533<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-03884367\/file\/2022187297.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03884367\/file\/2022187297.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03884367\/file\/2022187297.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03884367v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03850745v1\" target=\"_blank\" >Automatically Distributing and Updating In-Network Management Rules for Software Defined Networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Ahmad Abboud, Remi Garcia, Abdelkader Lahmadi, Micha\u00ebl Rusinowitch, Adel Bouhoula, Mondher Ayadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium<\/i>, Apr 2022, Budapest, Hungary. pp.1-9, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NOMS54207.2022.9789807\">&#x27E8;10.1109\/NOMS54207.2022.9789807&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/NOMS54207.2022.9789807\" target=\"_blank\" >10.1109\/NOMS54207.2022.9789807<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-03850745v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Patents<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03902223v1\" target=\"_blank\" >Computer-implemented method for testing the cybersecurity of a target environment<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, J\u00e9r\u00f4me Fran\u00e7ois, Fr\u00e9d\u00e9ric Beck<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">France, Patent n\u00b0 : WO2022023671A1. 2022<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Patents<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-03902223v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Poster communications<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-03878114v1\" target=\"_blank\" >Characterization and troubleshooting of cloud gaming applications on mobile networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jo\u00ebl Roman Ky, Bertrand Mathieu, Abdelkader Lahmadi, Raouf Boutaba<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Network Traffic Measurement and Analysis Conference (TMA 2022)<\/i>, Jun 2022, Enschede, Netherlands<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Poster communications<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-03878114\/file\/TMA_poster.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03878114\/file\/TMA_poster.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03878114\/file\/TMA_poster.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03878114v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2021<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03409798v1\" target=\"_blank\" >Reinforcement and deep reinforcement learning for wireless Internet of Things: A survey<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Mohamed Said Frikha, Sonia Mettali Gammar, Abdelkader Lahmadi, Laurent Andrey<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Computer Communications<\/i>, 2021, 178, pp.98-113. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.comcom.2021.07.014\">&#x27E8;10.1016\/j.comcom.2021.07.014&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1016\/j.comcom.2021.07.014\" target=\"_blank\" >10.1016\/j.comcom.2021.07.014<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-03409798\/file\/Reinforcement_and_deep_reinforcement_learning_for_wireless_Internet_of_Things__A_survey.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-03409798\/file\/Reinforcement_and_deep_reinforcement_learning_for_wireless_Internet_of_Things__A_survey.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-03409798\/file\/Reinforcement_and_deep_reinforcement_learning_for_wireless_Internet_of_Things__A_survey.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-03409798v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03506409v1\" target=\"_blank\" >Multi-Attribute Monitoring for Anomaly Detection: a Reinforcement Learning Approach based on Unsupervised Reward<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Mohamed Said Frikha, Sonia Mettali Gammar, Abdelkader Lahmadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>PEMWN 2021 &#8211; 10th IFIP International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks<\/i>, Nov 2021, Waterloo, Canada<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-03506409\/file\/PEWMN.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-03506409\/file\/PEWMN.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-03506409\/file\/PEWMN.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-03506409v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03245054v1\" target=\"_blank\" >HSL: a Cyber Security Research Facility for Sensitive Data Experiments<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Fr\u00e9d\u00e9ric Beck, Abdelkader Lahmadi, J\u00e9r\u00f4me Fran\u00e7ois<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>DISSECT &#8211; 7th IEEE\/IFIP Workshop on Security for Emerging Distributed Network Technologies<\/i>, May 2021, Bordeaux, France<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-03245054\/file\/2021033815.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-03245054\/file\/2021033815.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-03245054\/file\/2021033815.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-03245054v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Book sections<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03518390v1\" target=\"_blank\" >Automated Orchestration of Security Chains Driven by Process Learning<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Nicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning<\/i>, Wiley, 2021, 978-1-119-67550-1. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1002\/9781119675525.ch12\">&#x27E8;10.1002\/9781119675525.ch12&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Book sections<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1002\/9781119675525.ch12\" target=\"_blank\" >10.1002\/9781119675525.ch12<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-03518390\/file\/chapter.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-03518390\/file\/chapter.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-03518390\/file\/chapter.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-03518390v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Master thesis<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03951196v3\" target=\"_blank\" >Automated mapping of CVE vulnerabilties to MITRE ATT&#038;CK Framework<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Karim Baccar, Abdelkader Lahmadi, Fr\u00e9d\u00e9ric Beck<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">Computer Science [cs]. 2021<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Master thesis<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-03951196\/file\/mitre_attack_mapping.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-03951196\/file\/mitre_attack_mapping.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-03951196\/file\/mitre_attack_mapping.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-03951196v3\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Documents associated with scientific events<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03363567v1\" target=\"_blank\" >Practical security analysis of IoT devices<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Fr\u00e9d\u00e9ric Beck<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>IFIP\/IEEE International Symposium on Integrated Network Management<\/i>, May 2021, Bordeaux, France<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Documents associated with scientific events<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-03363567v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='Rubrique'>2020<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03036350v1\" target=\"_blank\" >Efficient Distribution of Security Policy Filtering Rules in Software Defined Networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Ahmad Abboud, R\u00e9mi Garcia, Abdelkader Lahmadi, Micha\u00ebl Rusinowitch, Adel Bouhoula<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>NCA 2020 &#8211; 19th IEEE International Symposium on Network Computing and Applications<\/i>, Nov 2020, Online conference, France<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-03036350\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-03036350\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-03036350\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-03036350v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03088227v1\" target=\"_blank\" >Management plane for differential privacy preservation through smart contracts<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Nida Khan, Abdelkader Lahmadi, Zsofia Kr\u00e4ussl, Radu State<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>AICCSA 2020 &#8211; 17th ACS\/IEEE International Conference on Computer Systems and Applications<\/i>, Nov 2020, Antalya \/ Virtual, Turkey<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-03088227\/file\/Khan_differentialprivacy.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-03088227\/file\/Khan_differentialprivacy.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-03088227\/file\/Khan_differentialprivacy.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-03088227v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-02980094v1\" target=\"_blank\" >Leveraging Reinforcement Learning for Adaptive Monitoring of Low-Power IoT Networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Mohamed Said Frikha, Abdelkader Lahmadi, Sonia Mettali Gammar, Laurent Andrey<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>The 16th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob2020)<\/i>, Oct 2020, Thessaloniki (Virtual), Greece<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-02980094\/file\/Adaptive%20Polling%20for%20Monitoring%20Low-Power%20IoT%20Networks%20using%20Reinforcement%20Learning.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02980094\/file\/Adaptive%20Polling%20for%20Monitoring%20Low-Power%20IoT%20Networks%20using%20Reinforcement%20Learning.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02980094\/file\/Adaptive%20Polling%20for%20Monitoring%20Low-Power%20IoT%20Networks%20using%20Reinforcement%20Learning.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-02980094v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-02948407v1\" target=\"_blank\" >MitM Attack Detection in BLE Networks using Reconstruction and Classification Machine Learning Techniques<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Alexis Duque, Nathan Heraief, Julien Francq<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>MLCS 2020 &#8211; 2nd Workshop on Machine Learning for Cybersecurity<\/i>, Sep 2020, Ghent, Belgium. pp.1-16<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-02948407\/file\/ml-ble-mlcs2020-CR.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02948407\/file\/ml-ble-mlcs2020-CR.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02948407\/file\/ml-ble-mlcs2020-CR.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-02948407v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-02980115v1\" target=\"_blank\" >Detecting a Stealthy Attack in Distributed Control for Microgrids using Machine Learning Algorithms<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Mingxiao Ma, Abdelkader Lahmadi, Isabelle Chrisment<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>3rd IEEE International Conference on Industrial Cyber-Physical Systems (ICPS)<\/i>, Jun 2020, Tampere (online), Finland<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-02980115\/file\/paper_icps2020-revision.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02980115\/file\/paper_icps2020-revision.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02980115\/file\/paper_icps2020-revision.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-02980115v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-02547097v1\" target=\"_blank\" >Double Mask: An efficient rule encoding for Software Defined Networking<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Ahmad Abboud, Abdelkader Lahmadi, Michael Rusinowitch, Miguel Couceiro, Adel Bouhoula, Mondher Ayadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ICIN 2020 &#8211; 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops<\/i>, Feb 2020, Paris, France. pp.186&#8211;193<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-02547097\/file\/1570605208.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02547097\/file\/1570605208.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02547097\/file\/1570605208.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02547097v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Book sections<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03036928v1\" target=\"_blank\" >ThreatPredict: From Global Social and Technical Big Data to Cyber Threat Forecast<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">J\u00e9r\u00f4me Fran\u00e7ois, Fr\u00e9d\u00e9ric Beck, Ghita Mezzour, Kathleen M Carley, Abdelkader Lahmadi, Mounir Ghogho, Abdellah Houmz, Hicham Hammouchi, Mehdi Zakroum, Narjisse Nejjari, Othmane Cherqi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Advanced Technologies for Security Applications<\/i>, Springer, pp.45-54, 2020, Advanced Technologies for Security Applications. Proceedings of the NATO Science for Peace and Security &lsquo;Cluster Workshop on Advanced Technologies, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-94-024-2021-0_5\">&#x27E8;10.1007\/978-94-024-2021-0_5&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Book sections<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-94-024-2021-0_5\" target=\"_blank\" >10.1007\/978-94-024-2021-0_5<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-03036928\/file\/TPspringer2019_full_hal.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-03036928\/file\/TPspringer2019_full_hal.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-03036928\/file\/TPspringer2019_full_hal.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-03036928v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Poster communications<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03036292v1\" target=\"_blank\" >R2-D2: Filter Rule set Decomposition and Distribution in Software Defined Networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Ahmad Abboud, R\u00e9mi Garcia, Abdelkader Lahmadi, Micha\u00ebl Rusinowitch, Adel Bouhoula<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>CNSM 2020 &#8211; 16th International Conference on Network and Service Management<\/i>, Nov 2020, Izmir\/Virtual, Turkey<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Poster communications<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-03036292\/file\/poster.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-03036292\/file\/poster.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-03036292\/file\/poster.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-03036292v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2019<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-02393632v1\" target=\"_blank\" >Using Information Centric Networking in Internet of Things: A Survey<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Dorra Mars, Sonia Mettali Gammar, Abdelkader Lahmadi, Leila Azouz Saidane<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Wireless Personal Communications<\/i>, 2019, 105 (1), pp.87-103. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s11277-018-6104-8\">&#x27E8;10.1007\/s11277-018-6104-8&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/s11277-018-6104-8\" target=\"_blank\" >10.1007\/s11277-018-6104-8<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-02393632\/file\/Using_Information_Centric_Networking_in_Internet_of_Things__A_survey__2_.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02393632\/file\/Using_Information_Centric_Networking_in_Internet_of_Things__A_survey__2_.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02393632\/file\/Using_Information_Centric_Networking_in_Internet_of_Things__A_survey__2_.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-02393632v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-02397981v1\" target=\"_blank\" >Rule-Based Synthesis of Chains of Security Functions for Software-Defined Networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Nicolas Schnepf, R\u00e9mi Badonnel, Abdelkader Lahmadi, Stephan Merz<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Electronic Communications of the EASST<\/i>, 2019, 076, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.14279\/tuj.eceasst.76.1075.1042\">&#x27E8;10.14279\/tuj.eceasst.76.1075.1042&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.14279\/tuj.eceasst.76.1075.1042\" target=\"_blank\" >10.14279\/tuj.eceasst.76.1075.1042<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-02397981\/file\/hal.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02397981\/file\/hal.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02397981\/file\/hal.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-02397981v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-02403616v1\" target=\"_blank\" >SPONGE: Software-Defined Traffic Engineering to Absorb Influx of Network Traffic<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Beno\u00eet Henry, Shihabur Rahman Chowdhury, Abdelkader Lahmadi, Romain Aza\u00efs, J\u00e9r\u00f4me Fran\u00e7ois, Raouf Boutaba<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>LCN 2019 &#8211; 44th IEEE Conference on Local Computer Networks<\/i>, Oct 2019, Osnabr\u00fcck, Germany<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-02403616\/file\/sponge_lcn_19.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02403616\/file\/sponge_lcn_19.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02403616\/file\/sponge_lcn_19.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02403616v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-02389307v1\" target=\"_blank\" >Demonstration of Synchronization Attacks on Distributed and Cooperative Control in Microgrids<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Mingxiao Ma, Abdelkader Lahmadi, Isabelle Chrisment<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>IM 2019 &#8211; The 16th IFIP\/IEEE Symposium on Integrated Network and Service Management<\/i>, Apr 2019, Washington DC, United States<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-02389307\/file\/IM_2019_main_paper%20%281%29.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02389307\/file\/IM_2019_main_paper%20%281%29.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02389307\/file\/IM_2019_main_paper%20%281%29.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02389307v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-02111656v1\" target=\"_blank\" >Automated Factorization of Security Chains in Software-Defined Networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Nicolas Schnepf, R\u00e9mi Badonnel, Abdelkader Lahmadi, Stephan Merz<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>IFIP\/IEEE IM 2019 &#8211; IFIP\/IEEE International Symposium on Integrated Network Management<\/i>, Apr 2019, Washington, United States<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-02111656\/file\/camera-ready.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02111656\/file\/camera-ready.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02111656\/file\/camera-ready.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-02111656v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-02111658v1\" target=\"_blank\" >A Tool Suite for the Automated Synthesis of Security Function Chains<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Nicolas Schnepf, R\u00e9mi Badonnel, Abdelkader Lahmadi, Stephan Merz<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>IFIP\/IEEE IM 2019 &#8211; IFIP\/IEEE International Symposium on Integrated Network Management<\/i>, Apr 2019, Washington, United States<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-02111658\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02111658\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02111658\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-02111658v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Poster communications<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-02393008v1\" target=\"_blank\" >Minimizing Range Rules for Packet Filtering Using a Double Mask Representation<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Ahmad Abboud, Abdelkader Lahmadi, Micha\u00ebl Rusinowitch, Miguel Couceiro, Adel Bouhoula<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>IFIP Networking 2019<\/i>, May 2019, Varsovie, Poland<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Poster communications<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-02393008\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02393008\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02393008\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-02393008v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Preprints, Working Papers, &#8230;<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-02102225v4\" target=\"_blank\" >Minimizing Range Rules for Packet Filtering Using Double Mask Representation<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Ahmad Abboud, Abdelkader Lahmadi, Micha\u00ebl Rusinowitch, Miguel Couceiro, Adel Bouhoula, Saif El Hakk Awainia, Mondher Ayadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">2019<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Preprints, Working Papers, &#8230;<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-02102225\/file\/Double%20Mask%20General%20Version.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02102225\/file\/Double%20Mask%20General%20Version.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02102225\/file\/Double%20Mask%20General%20Version.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-02102225v4\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2018<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01947984v1\" target=\"_blank\" >Exploratory Data Analysis of a Network Telescope Traffic and Prediction of Port Probing Rates<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Mehdi Zakroum, Abdellah Houmz, Mounir Ghogho, Ghita Mezzour, Abdelkader Lahmadi, Jerome Francois, Mohammed El Koutbi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ISI 2018 &#8211; IEEE Intelligence and Security Informatics<\/i>, Nov 2018, Miami, United States<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01947984\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01947984\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01947984\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01947984v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01870771v1\" target=\"_blank\" >On the Impact of Synchronization Attacks on Distributed and Cooperative Control in Microgrid Systems<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Mingxiao Ma, Abdelkader Lahmadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids<\/i>, Oct 2018, Aalborg, Denmark<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01870771\/file\/Papier_Mingxiao_MA_SGC.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01870771\/file\/Papier_Mingxiao_MA_SGC.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01870771\/file\/Papier_Mingxiao_MA_SGC.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01870771v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01892423v1\" target=\"_blank\" >Rule-Based Synthesis of Chains of Security Functions for Software-Defined Networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Nicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>AVOCS 2018 &#8211; 18th International Workshop on Automated Verification of Critical Systems<\/i>, Jul 2018, Oxford, United Kingdom<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01892423\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01892423\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01892423\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01892423v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01892390v1\" target=\"_blank\" >Generation of SDN policies for protecting Android environments based on automata learning<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Nicolas Schnepf, R\u00e9mi Badonnel, Abdelkader Lahmadi, Stephan Merz<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>NOMS 2018 &#8211; IEEE\/IFIP Network Operations and Management Symposium<\/i>, Apr 2018, Taipei, Taiwan. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NOMS.2018.8406153\">&#x27E8;10.1109\/NOMS.2018.8406153&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/NOMS.2018.8406153\" target=\"_blank\" >10.1109\/NOMS.2018.8406153<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01892390\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01892390\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01892390\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01892390v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01892397v1\" target=\"_blank\" >Synaptic: A formal checker for SDN-based security policies<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Nicolas Schnepf, R\u00e9mi Badonnel, Abdelkader Lahmadi, Stephan Merz<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>NOMS 2018 &#8211; IEEE\/IFIP Network Operations and Management Symposium<\/i>, Apr 2018, Taipei, Taiwan. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NOMS.2018.8406122\">&#x27E8;10.1109\/NOMS.2018.8406122&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/NOMS.2018.8406122\" target=\"_blank\" >10.1109\/NOMS.2018.8406122<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01892397\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01892397\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01892397\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01892397v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01935669v1\" target=\"_blank\" >Towards a management plane for smart contracts: Ethereum case study<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Nida Khan, Abdelkader Lahmadi, J\u00e9r\u00f4me Fran\u00e7ois, Radu State<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>NOMS 2018 &#8211; IEEE\/IFIP Network Operations and Management Symposium<\/i>, Apr 2018, Taipei, Taiwan. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NOMS.2018.8406326\">&#x27E8;10.1109\/NOMS.2018.8406326&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/NOMS.2018.8406326\" target=\"_blank\" >10.1109\/NOMS.2018.8406326<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-01935669v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01935664v1\" target=\"_blank\" >Internet-Wide Scanners Classification using Gaussian Mixture and Hidden Markov Models<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Giulia de Santis, Abdelkader Lahmadi, J\u00e9r\u00f4me Fran\u00e7ois, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>NTMS 2018 &#8211; 9th IFIP International Conference on New Technologies, Mobility and Security<\/i>, Feb 2018, Paris, France<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01935664\/file\/NTMS2018.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01935664\/file\/NTMS2018.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01935664\/file\/NTMS2018.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01935664v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Documents associated with scientific events<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01943543v1\" target=\"_blank\" >Security Analysis of Internet of Things Devices: Hands-on lab<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Fr\u00e9d\u00e9ric Beck<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>AIMS 2018 &#8211; 12th International Conference on Autonomous Infrastructure, Management and Security<\/i>, Jun 2018, Munich, Germany<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Documents associated with scientific events<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01943543\/file\/cours_IoT_Security_slides.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01943543\/file\/cours_IoT_Security_slides.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01943543\/file\/cours_IoT_Security_slides.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01943543v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01948512v1\" target=\"_blank\" >Verifying Security Requirements of an IoT device using SCUBA Tool Suite<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Fr\u00e9d\u00e9ric Beck, J\u00e9r\u00f4me Fran\u00e7ois, Thomas Lacour, Abdelkader Lahmadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Contract] Inria Nancy &#8211; Grand Est (Villers-l\u00e8s-Nancy, France); In collaboration with Red Alert Labs. 2018<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-01948512v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='Rubrique'>2017<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01684569v1\" target=\"_blank\" >A Universal Controller to Take Over a Z-Wave Network<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Lo\u00efc Rouch, J\u00e9r\u00f4me Fran\u00e7ois, Fr\u00e9d\u00e9ric Beck, Abdelkader Lahmadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Black Hat Europe 2017<\/i>, Dec 2017, London, United Kingdom. pp.1-9<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01684569\/file\/paper.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01684569\/file\/paper.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01684569\/file\/paper.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01684569v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-02460272v1\" target=\"_blank\" >HuMa: A Multi-layer Framework for Threat Analysis in a Heterogeneous Log Environment<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Julio Navarro, V\u00e9ronique Legrand, Sofiane Lagraa, J\u00e9r\u00f4me Fran\u00e7ois, Abdelkader Lahmadi, Giulia de Santis, Olivier Festor, Nadira Lammari, Fay\u00e7al Hamdi, Aline Deruyver, Quentin Goux, Morgan Allard, Pierre Parrend<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>10th international symposium on foundations and practice of security<\/i>, Oct 2017, Nancy, France. pp.144-159, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-75650-9_10\">&#x27E8;10.1007\/978-3-319-75650-9_10&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-319-75650-9_10\" target=\"_blank\" >10.1007\/978-3-319-75650-9_10<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-02460272\/file\/huma.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02460272\/file\/huma.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02460272\/file\/huma.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-02460272v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01636480v1\" target=\"_blank\" >BotGM: Unsupervised Graph Mining to Detect Botnets in Traffic Flows<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Sofiane Lagraa, Jerome Francois, Abdelkader Lahmadi, Marine Minier, Christian Hammerschmidt, Radu State<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>CSNet 2017 &#8211; 1st Cyber Security in Networking Conference<\/i>, Oct 2017, Rio de Janeiro, Brazil<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01636480\/file\/botgm-csnet.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01636480\/file\/botgm-csnet.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01636480\/file\/botgm-csnet.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01636480v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01630806v1\" target=\"_blank\" >Automated Verification of Security Chains in Software-Defined Networks with Synaptic<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Nicolas Schnepf, R\u00e9mi Badonnel, Abdelkader Lahmadi, Stephan Merz<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>NetSoft 2017 &#8211; IEEE Conference on Network Softwarization<\/i>, Jul 2017, Bologna, Italy. 9pp., <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NETSOFT.2017.8004195\">&#x27E8;10.1109\/NETSOFT.2017.8004195&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/NETSOFT.2017.8004195\" target=\"_blank\" >10.1109\/NETSOFT.2017.8004195<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01630806\/file\/camera-ready.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01630806\/file\/camera-ready.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01630806\/file\/camera-ready.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01630806v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2016<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01403950v1\" target=\"_blank\" >Topological Analysis and Visualisation of Network Monitoring Data: Darknet case study<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Marc Coudriau, Abdelkader Lahmadi, Jerome Francois<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>8th IEEE International Workshop on Information Forensics and Security &#8211; WIFS 2016<\/i>, Dec 2016, Abu Dhabi, United Arab Emirates<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01403950\/file\/wifs16.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01403950\/file\/wifs16.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01403950\/file\/wifs16.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01403950v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01404127v1\" target=\"_blank\" >Modeling of IP scanning activities with Hidden Markov Models: Darknet case study<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Giulia de Santis, Abdelkader Lahmadi, Jerome Francois, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>8th IFIP International Conference on New Technologies, Mobility and Security<\/i>, Nov 2016, Larnaca, Cyprus<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01404127\/file\/NTMS2016.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01404127\/file\/NTMS2016.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01404127\/file\/NTMS2016.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01404127v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01371674v1\" target=\"_blank\" >Optimizing Internet Scanning for Assessing Industrial Systems Exposure<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">J\u00e9r\u00f4me Fran\u00e7ois, Abdelkader Lahmadi, Valentin Giannini, Damien Cupif, Fr\u00e9d\u00e9ric Beck, Bertrand Wallrich<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>7th International Workshop on TRaffic Analysis and Characterization<\/i>, Sep 2016, Paphos, Cyprus. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/IWCMC.2016.7577111\">&#x27E8;10.1109\/IWCMC.2016.7577111&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/IWCMC.2016.7577111\" target=\"_blank\" >10.1109\/IWCMC.2016.7577111<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01371674\/file\/trac2016CR.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01371674\/file\/trac2016CR.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01371674\/file\/trac2016CR.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01371674v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Other publications<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01406267v1\" target=\"_blank\" >IPv6 DOTS Signal Option<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jerome Francois, Abdelkader Lahmadi, Marco Davids, Giovane M. Moura<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">2016<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Other publications<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-01406267v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='Rubrique'>2015<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01231173v1\" target=\"_blank\" >Behavioral and Dynamic Security Functions Chaining For Android Devices<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Ga\u00ebtan Hurel, R\u00e9mi Badonnel, Abdelkader Lahmadi, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>11th IFIP\/IEEE\/In Assoc. with ACM SIGCOMM International Conference on Network and Service Management (CNSM 2015)<\/i>, Nov 2015, Barcelone, France<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01231173\/file\/camera_ready.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01231173\/file\/camera_ready.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01231173\/file\/camera_ready.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01231173v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01238048v1\" target=\"_blank\" >Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Mathieu Bertrand, Guillaume Doyen, Wissam Mallouli, Thomas Silverston, Olivier Bettan, Fran\u00e7ois-Xavier Aguessy, Thibault Cholez, Abdelkader Lahmadi, Patrick Truong, Edgardo Montes de Oca<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>The First International Workshop on Security Testing and Monitoring: STAM 2015<\/i>, International Conference on Availability, Reliability and Security (ARES), Aug 2015, Toulouse, France. pp.741 &#8211; 748, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ARES.2015.71\">&#x27E8;10.1109\/ARES.2015.71&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/ARES.2015.71\" target=\"_blank\" >10.1109\/ARES.2015.71<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01238048\/file\/STAM15-Monitoring-Securing-new-VNF.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01238048\/file\/STAM15-Monitoring-Securing-new-VNF.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01238048\/file\/STAM15-Monitoring-Securing-new-VNF.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01238048v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01241042v1\" target=\"_blank\" >Extracting Markov Chain Models from Protocol Execution Traces for End to End Delay Evaluation in Wireless Sensor Networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Francois Despaux, Ye-Qiong Song, Abdelkader Lahmadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>IEEE WFCS 2015<\/i>, May 2015, Mallorca, Spain. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/WFCS.2015.7160562\">&#x27E8;10.1109\/WFCS.2015.7160562&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/WFCS.2015.7160562\" target=\"_blank\" >10.1109\/WFCS.2015.7160562<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01241042\/file\/wfcs_2015.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01241042\/file\/wfcs_2015.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01241042\/file\/wfcs_2015.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01241042v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01093041v2\" target=\"_blank\" >Towards Cloud-Based Compositions of Security Functions For Mobile Devices<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Ga\u00ebtan Hurel, R\u00e9mi Badonnel, Abdelkader Lahmadi, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>IFIP\/IEEE International Symposium on Integrated Network Management (IM&rsquo;15)<\/i>, May 2015, Ottawa, Canada. pp.6<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-01093041v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Other publications<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00879567v3\" target=\"_blank\" >Extending IP Flow-Based Network Monitoring with Location Information<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Olivier Festor, Abdelkader Lahmadi, Rick Hofstede, Aiko Pras<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">2015<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Other publications<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00879567\/file\/draft-irtf-nmrg-location-ipfix-05.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00879567\/file\/draft-irtf-nmrg-location-ipfix-05.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00879567\/file\/draft-irtf-nmrg-location-ipfix-05.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00879567v3\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Poster communications<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01242911v1\" target=\"_blank\" >A platform for the analysis and visualization of network flow data of android environments<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Frederic Beck, Eric Finickel, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>IFIP\/IEEE International Symposium on Integrated Network Management (IM)<\/i>, May 2015, Ottawa, Canada. 2015, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/INM.2015.7140443\">&#x27E8;10.1109\/INM.2015.7140443&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Poster communications<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/INM.2015.7140443\" target=\"_blank\" >10.1109\/INM.2015.7140443<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01242911\/file\/PID3569851.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01242911\/file\/PID3569851.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01242911\/file\/PID3569851.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01242911v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Documents associated with scientific events<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01212015v1\" target=\"_blank\" >Powering Monitoring Analytics with ELK stack<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Fr\u00e9d\u00e9ric Beck<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>9th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2015)<\/i>, Jun 2015, Ghent, Belgium. 9th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2015), 2015<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Documents associated with scientific events<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01212015\/file\/slides-ELK.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01212015\/file\/slides-ELK.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01212015\/file\/slides-ELK.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01212015v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2014<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01092239v1\" target=\"_blank\" >Outsourcing Mobile Security in the Cloud<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Ga\u00ebtan Hurel, R\u00e9mi Badonnel, Abdelkader Lahmadi, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS)<\/i>, Jun 2014, Brno, Czech Republic. pp.69-73, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-662-43862-6_9\">&#x27E8;10.1007\/978-3-662-43862-6_9&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-662-43862-6_9\" target=\"_blank\" >10.1007\/978-3-662-43862-6_9<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01092239\/file\/Outsourcing_Mobsec_In_Cloud.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01092239\/file\/Outsourcing_Mobsec_In_Cloud.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01092239\/file\/Outsourcing_Mobsec_In_Cloud.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01092239v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01093729v1\" target=\"_blank\" >Towards performance analysis of wireless sensor networks using Process Mining Techniques<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Francois Despaux, Ye-Qiong Song, Abdelkader Lahmadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ISCC<\/i>, Jun 2014, Mad\u00e8re, Portugal. pp.1 &#8211; 7, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ISCC.2014.6912522\">&#x27E8;10.1109\/ISCC.2014.6912522&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/ISCC.2014.6912522\" target=\"_blank\" >10.1109\/ISCC.2014.6912522<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01093729\/file\/ISCC2014.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01093729\/file\/ISCC2014.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01093729\/file\/ISCC2014.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01093729v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01092011v1\" target=\"_blank\" >Empirical analysis of Android logs using self-organizing maps<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Eric Finickel, Abdelkader Lahmadi, Frederic Beck, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ICC 2014 : IEEE International Conference on Communications<\/i>, Jun 2014, Sydney, Australia. pp.1802 &#8211; 1807, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICC.2014.6883584\">&#x27E8;10.1109\/ICC.2014.6883584&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/ICC.2014.6883584\" target=\"_blank\" >10.1109\/ICC.2014.6883584<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01092011\/file\/ICC14_CSSMA.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01092011\/file\/ICC14_CSSMA.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01092011\/file\/ICC14_CSSMA.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01092011v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01093736v1\" target=\"_blank\" >Modelling and Performance Analysis of Wireless Sensor Networks Using Process Mining Techniques: ContikiMAC Use Case<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Francois Despaux, Ye-Qiong Song, Abdelkader Lahmadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>DCOSS 2014<\/i>, May 2014, Marina del Rey, United States. pp.1 &#8211; 8, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/DCOSS.2014.20\">&#x27E8;10.1109\/DCOSS.2014.20&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/DCOSS.2014.20\" target=\"_blank\" >10.1109\/DCOSS.2014.20<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01093736\/file\/dcoss2014.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01093736\/file\/dcoss2014.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01093736\/file\/dcoss2014.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01093736v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01092025v1\" target=\"_blank\" >Named data aggregation in wireless sensor networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Younes Abid, Bilel Saadallah, Abdelkader Lahmadi, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>IEEE Network Operations and Management Symposium (NOMS), 2014<\/i>, May 2014, cracovie, Poland. pp.1 &#8211; 8, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NOMS.2014.6838364\">&#x27E8;10.1109\/NOMS.2014.6838364&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/NOMS.2014.6838364\" target=\"_blank\" >10.1109\/NOMS.2014.6838364<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01092025\/file\/iot_ccn.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01092025\/file\/iot_ccn.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01092025\/file\/iot_ccn.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01092025v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2013<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00877466v1\" target=\"_blank\" >Measurement-based Analysis of the Effect of Duty Cycle in IEEE 802.15.4 MAC Performance<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Francois Despaux, Ye-Qiong Song, Abdelkader Lahmadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>CSCPS &#8211; 1st International Workshop on Compressive Sensing in Cyber-Physical Systems &#8211; 2013<\/i>, Oct 2013, Hangzhou, China<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00877466\/file\/new_CSCPS13.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00877466\/file\/new_CSCPS13.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00877466\/file\/new_CSCPS13.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00877466v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00879550v1\" target=\"_blank\" >Efficient Distributed Monitoring in 6LoWPAN Networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Alexandre Boeglin, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>CNSM &#8211; 9th International Conference on Network and Service Management &#8211; 2013<\/i>, University of Z\u00fcrich, Oct 2013, Zurich, Switzerland<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00879550\/file\/CNSM_WSN_Monitoring.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00879550\/file\/CNSM_WSN_Monitoring.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00879550\/file\/CNSM_WSN_Monitoring.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00879550v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00877452v1\" target=\"_blank\" >On the Gap Between Mathematical Modeling and Measurement Analysis for Performance Evaluation of the 802.15.4 MAC Protocol<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Francois Despaux, Ye-Qiong Song, Abdelkader Lahmadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>RTN &#8211; 12th International Workshop on Real-Time Networks &#8211; 2013<\/i>, Jul 2013, Paris, France<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00877452\/file\/RTN2013.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00877452\/file\/RTN2013.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00877452\/file\/RTN2013.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00877452v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00879614v1\" target=\"_blank\" >Vers une d\u00e9tection automatique des applications malveillantes dans les environnements Android<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Eric Finickel, Abdelkader Lahmadi, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>UbiMob &#8211; 9\u00e8mes journ\u00e9es francophones Mobilit\u00e9 et Ubiquit\u00e9 &#8211; 2013<\/i>, Jun 2013, Nancy, France<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00879614\/file\/Finickel_ubimob2013.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00879614\/file\/Finickel_ubimob2013.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00879614\/file\/Finickel_ubimob2013.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00879614v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00929838v1\" target=\"_blank\" >CrowdOut: un service de crowdsourcing pour la s\u00e9curit\u00e9 routi\u00e8re dans les villes num\u00e9riques<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Elian Aubry, Thomas Silverston, Abdelkader Lahmadi, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Ubimob 2013<\/i>, Jun 2013, Nancy, France<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00929838\/file\/CrowdOut_ubimob2013_VF.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00929838\/file\/CrowdOut_ubimob2013_VF.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00929838\/file\/CrowdOut_ubimob2013_VF.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00929838v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Other publications<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00926198v1\" target=\"_blank\" >First Year Report on Automated Configuration and Repair (Deliverable D6.1, Flamingo NoE)<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Rodosek Gabi Dreo, Anth\u00e9a Mayzaud, Abdelkader Lahmadi, R\u00e9mi Badonnel, Hurel Gaetan<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">2013<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Other publications<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-00926198v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00920828v1\" target=\"_blank\" >An Experimental Testbed and Methodology for Security Analysis of SCADA Systems<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Bernardo Lamas, Ayoub Soury, Bilel Saadallah, Abdelkader Lahmadi, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Technical Report] RT-0443, INRIA. 2013, pp.89<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00920828\/file\/RT-443.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00920828\/file\/RT-443.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00920828\/file\/RT-443.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00920828v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2012<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00746977v1\" target=\"_blank\" >A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice Over IP Services<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>IEEE Transactions on Network and Service Management<\/i>, 2012, 9 (2), pp.114-127. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/TNSM.2012.011812.110125\">&#x27E8;10.1109\/TNSM.2012.011812.110125&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/TNSM.2012.011812.110125\" target=\"_blank\" >10.1109\/TNSM.2012.011812.110125<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00746977\/file\/etnsm_lahmadi.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00746977\/file\/etnsm_lahmadi.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00746977\/file\/etnsm_lahmadi.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00746977v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00745243v1\" target=\"_blank\" >Combining Analytical and Simulation Approaches for Estimating End-to-End Delay in Multi-hop Wireless Networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Francois Despaux, Ye-Qiong Song, Abdelkader Lahmadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>IEEE workshop WiSARN, in conjunction with IEEE 8th International Conference on Distributed Computing in Sensor Systems (DCOSS2012)<\/i>, IEE, May 2012, Hangzhou, China. pp.317-322<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00745243\/file\/WiSARN2012-Despaux.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00745243\/file\/WiSARN2012-Despaux.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00745243\/file\/WiSARN2012-Despaux.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00745243v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00747010v1\" target=\"_blank\" >A Testing Framework for Discovering Vulnerabilities in 6LoWPAN Networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, C\u00e9sar Bernardini, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>IEEE workshop WiSARN, in conjunction with IEEE 8th International Conference on Distributed Computing in Sensor Systems (DCOSS2012)<\/i>, May 2012, Hangzhou, China<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00747010\/file\/wisarn2012.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00747010\/file\/wisarn2012.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00747010\/file\/wisarn2012.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00747010v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00747002v1\" target=\"_blank\" >Routing based Roles Assignment for Monitoring 6LowPAN Networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Laurent Ciarletta, Alexandre Boeglin, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Third International Conference on Communications and Networking (ComNet)<\/i>, Mar 2012, Hammamet, Tunisia. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ComNet.2012.6217745\">&#x27E8;10.1109\/ComNet.2012.6217745&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/ComNet.2012.6217745\" target=\"_blank\" >10.1109\/ComNet.2012.6217745<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00747002\/file\/PID2194919.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00747002\/file\/PID2194919.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00747002\/file\/PID2194919.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00747002v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Other publications<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00747053v1\" target=\"_blank\" >Information Elements for device location in IPFIX<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Olivier Festor, Abdelkader Lahmadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">2012<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Other publications<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00747053\/file\/draft-irtf-nmrg-location-ipfix-00.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00747053\/file\/draft-irtf-nmrg-location-ipfix-00.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00747053\/file\/draft-irtf-nmrg-location-ipfix-00.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00747053v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Poster communications<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00747041v1\" target=\"_blank\" >CCNx in Every Sensor<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Bilel Saadallah, Abdelkader Lahmadi, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>CCNx Community Meeting &#8211; 2012<\/i>, Sep 2012, INRIA Sophia Antipolis, France<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Poster communications<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00747041\/file\/poster_CCNX.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00747041\/file\/poster_CCNX.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00747041\/file\/poster_CCNX.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00747041v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00755482v1\" target=\"_blank\" >CCNx for Contiki: implementation details<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Bilel Saadallah, Abdelkader Lahmadi, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Technical Report] RT-0432, INRIA. 2012, pp.52<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00755482\/file\/RT-432.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00755482\/file\/RT-432.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00755482\/file\/RT-432.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00755482v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2011<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00594861v1\" target=\"_blank\" >SecSIP : un environnement de protection pour la voix sur IP<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Techniques de l&rsquo;Ing\u00e9nieur<\/i>, 2011, INNOVATION, IN 130<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00594861v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00594854v1\" target=\"_blank\" >Hinky: Defending Against Text-based Message Spam on Smartphones<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Laurent Delosi\u00e8re, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>IEEE International Conference on Communications ICC2011<\/i>, Jun 2011, Kyoto, Japan<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00594854\/file\/ICC2011.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00594854\/file\/ICC2011.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00594854\/file\/ICC2011.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00594854v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00586832v1\" target=\"_blank\" >G\u00e9n\u00e9ration automatique de politiques de s\u00e9curit\u00e9 pour SecSIP<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>CFIP 2011 &#8211; Colloque Francophone sur l Ing\u00e9nierie des Protocoles<\/i>, UTC, May 2011, Sainte Maxime, France<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00586832\/file\/paper_15.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00586832\/file\/paper_15.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00586832\/file\/paper_15.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00586832v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00595825v1\" target=\"_blank\" >YANG-Based Configuration Modeling &#8211; The SecSIP IPS Case Study<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Emmanuel Nataf, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>IFIP\/IEEE International Symposium on Integrated Network Management<\/i>, May 2011, Dublin, Ireland<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00595825\/file\/APSession-Veto31-01.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00595825\/file\/APSession-Veto31-01.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00595825\/file\/APSession-Veto31-01.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00595825v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Master thesis<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00645949v1\" target=\"_blank\" >Mise en oeuvre d&rsquo;une couche de communication CCN pour les r\u00e9seaux de capteurs sans fil<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Bilel Saadallah, Abdelkader Lahmadi, Festor Olivier<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">R\u00e9seaux et t\u00e9l\u00e9communications [cs.NI]. 2011<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Master thesis<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-00645949v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00645913v1\" target=\"_blank\" >VeTo: reference manual<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] RT-7816, 2011, pp.51<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00645913\/file\/RR-7816.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00645913\/file\/RR-7816.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00645913\/file\/RR-7816.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00645913v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00645948v1\" target=\"_blank\" >Development of a fuzzing tool for the 6LoWPAN protocol<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">C\u00e9sar Bernardini, Abdelkader Lahmadi, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Technical Report] RR-7817, 2011, pp.50<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00645948\/file\/RT-7817.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00645948\/file\/RT-7817.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00645948\/file\/RT-7817.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00645948v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2010<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00591103v1\" target=\"_blank\" >Informatique et soci\u00e9t\u00e9 : S\u00e9curiser les t\u00e9l\u00e9phones portables : entretien avec Olivier Festor et Abdelkader Lahmadi<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Festor Olivier, Abdelkader Lahmadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Les Cahiers de l&rsquo;INRIA &#8211; La Recherche<\/i>, 2010, Dieu et la science : pourquoi la religion est inutile pour expliquer l&rsquo;Univers, 447 d\u00e9cembre 2010<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00591103\/file\/Securiser_les_telephones_portables.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00591103\/file\/Securiser_les_telephones_portables.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00591103\/file\/Securiser_les_telephones_portables.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00591103v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00544976v1\" target=\"_blank\" >VeTo: An Exploit Prevention Language from Known Vulnerabilities in SIP Services<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>IEEE\/IFIP Network Operations and Management Symposium &#8211; NOMS 2010<\/i>, Apr 2010, Osaka, Japan. pp.216-223, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NOMS.2010.5488464\">&#x27E8;10.1109\/NOMS.2010.5488464&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/NOMS.2010.5488464\" target=\"_blank\" >10.1109\/NOMS.2010.5488464<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00544976\/file\/PID1075963.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00544976\/file\/PID1075963.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00544976\/file\/PID1075963.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00544976v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00524247v1\" target=\"_blank\" >SecSIP Technical Documentation<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Alexandre Boeglin, Abdelkader Lahmadi, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Technical Report] RT-0393, INRIA. 2010, pp.24<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00524247\/file\/RT-0393.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00524247\/file\/RT-0393.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00524247\/file\/RT-0393.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00524247v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00547831v1\" target=\"_blank\" >SecSIP User Documentation<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Alexandre Boeglin, Abdelkader Lahmadi, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Technical Report] RT-0394, INRIA. 2010, pp.25<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00547831\/file\/RT-0394.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00547831\/file\/RT-0394.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00547831\/file\/RT-0394.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00547831v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2009<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00404847v1\" target=\"_blank\" >Caract\u00e9ristiques des d\u00e9lais dans les applications de supervision de r\u00e9seaux et de services<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Laurent Andrey, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Revue des Sciences et Technologies de l&rsquo;Information &#8211; S\u00e9rie TSI : Technique et Science Informatiques<\/i>, 2009, Supervision et s\u00e9curit\u00e9 dans les grands r\u00e9seaux, 28 (4\/2009), pp.479 &#8211; 502<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00404847\/file\/tsi08.lahmadi.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00404847\/file\/tsi08.lahmadi.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00404847\/file\/tsi08.lahmadi.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00404847v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00432582v1\" target=\"_blank\" >Survey of SNMP performance analysis studies<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Laurent Andrey, Olivier Festor, Abdelkader Lahmadi, Aiko Pras, J\u00fcrgen Sch\u00f6nw\u00e4lder<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>International Journal of Network Management<\/i>, 2009, 19 (6), pp.527-548. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1002\/nem.729\">&#x27E8;10.1002\/nem.729&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1002\/nem.729\" target=\"_blank\" >10.1002\/nem.729<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00432582v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00404856v1\" target=\"_blank\" >Performance of Network and Service Monitoring Frameworks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Laurent Andrey, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>11th IFIP\/IEEE International Symposium on Integrated Network Management &#8211; IM 2009<\/i>, May 2009, Long Island, United States<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00404856\/file\/im09.phd.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00404856\/file\/im09.phd.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00404856\/file\/im09.phd.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00404856v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00404853v1\" target=\"_blank\" >SecSip: A Stateful Firewall for SIP-based Networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>11th IFIP\/IEEE International Symposium on Integrated Network Management &#8211; IM 2009<\/i>, May 2009, Long Island, United States<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00404853\/file\/im09.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00404853\/file\/im09.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00404853\/file\/im09.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00404853v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00404862v1\" target=\"_blank\" >Design and Validation of an Analytical Model to Evaluate Monitoring Frameworks Limits<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Laurent Andrey, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>The Eighth International Conference on Networks &#8211; ICN 2009<\/i>, Mar 2009, Cancun, Mexico<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00404862\/file\/icn09_highres.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00404862\/file\/icn09_highres.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00404862\/file\/icn09_highres.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00404862v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2008<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00337569v1\" target=\"_blank\" >Caract\u00e9risation de la variation des d\u00e9lais dans les applications de supervision de r\u00e9seaux et de services<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Laurent Andrey, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>9\u00e8mes Journ\u00e9es Doctorales En Informatique et R\u00e9seaux &#8211; JDIR&rsquo;08<\/i>, Jan 2008, Villeneuve d&rsquo;Ascq, France<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00337569\/file\/jdir08.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00337569\/file\/jdir08.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00337569\/file\/jdir08.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00337569v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00337570v1\" target=\"_blank\" >Design and Development of a Stateful Firewall for SIP-based Networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] 2008<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00337570v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='Rubrique'>2007<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00190899v1\" target=\"_blank\" >Un mod\u00e8le analytique pour l&rsquo;\u00e9valuation de la supervision de r\u00e9seaux et de services<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Laurent Andrey, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>8\u00e8me Colloque Francophone de Gestion de R\u00e9seaux et de Services &#8211; GRES 2007<\/i>, Nov 2007, Hammamet, Tunisie<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00190899v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00169007v1\" target=\"_blank\" >On the Impact of Management Instrumentation Models on Web Server Performance: A JMX Case Study<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Olivier Festor, Laurent Andrey<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Inter-Domain Management, First International Conference on Autonomous Infrastructure, Management and Security<\/i>, Jun 2007, Oslo, Norway. pp.1-12, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-540-72986-0_1\">&#x27E8;10.1007\/978-3-540-72986-0_1&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-540-72986-0_1\" target=\"_blank\" >10.1007\/978-3-540-72986-0_1<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00169007v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00169010v1\" target=\"_blank\" >Modeling and Performance Evaluation of the Network and Service Management Plane<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Laurent Andrey, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Inter-Domain Management &#8211; First International Conference on Autonomous Infrastructure, Management and Security<\/i>, Jun 2007, Oslo, Norway. pp.156-159, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-540-72986-0_14\">&#x27E8;10.1007\/978-3-540-72986-0_14&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-540-72986-0_14\" target=\"_blank\" >10.1007\/978-3-540-72986-0_14<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00169010v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Theses<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/theses.hal.science\/tel-00208049v1\" target=\"_blank\" >Performance Evaluation of the Network and Service Management Plane<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">R\u00e9seaux et t\u00e9l\u00e9communications [cs.NI]. Universit\u00e9 Nancy II, 2007. Fran\u00e7ais. <a target=\"_blank\" href=\"https:\/\/www.theses.fr\/\">&#x27E8;NNT : &#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Theses<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/theses.hal.science\/tel-00208049\/file\/theseLahmadi07.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/theses.hal.science\/tel-00208049\/file\/theseLahmadi07.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/theses.hal.science\/tel-00208049\/file\/theseLahmadi07.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/theses.hal.science\/tel-00208049v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2006<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00105550v1\" target=\"_blank\" >Evaluation du passage \u00e0 l&rsquo;\u00e9chelle des syst\u00e8mes de gestion : m\u00e9triques et mod\u00e8les<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Laurent Andrey, Olivier Festor, Abdelkader Lahmadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Colloque Francophone sur l&rsquo;Ing\u00e9nierie des Protocoles &#8211; CFIP 2006<\/i>, Eric Fleury and Farouk Kamoun, Oct 2006, Tozeur\/Tunisia<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00105550\/file\/CFIP-ID-48.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00105550\/file\/CFIP-ID-48.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00105550\/file\/CFIP-ID-48.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00105550v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00105535v1\" target=\"_blank\" >On Delays in Management Frameworks: Metrics, Models and Analysis<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Laurent Andrey, Abdelkader Lahmadi, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>17th IFIP\/IEEE International Workshop on Distributed Systems: Operations and Management &#8211; DSOM 2006<\/i>, Oct 2006, Dublin\/Ireland<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00105535v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00090144v1\" target=\"_blank\" >Une approche de benchmarking des pratiques de gestion bas\u00e9es sur un middleware JMX pour les services et les applications<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Laurent Andrey, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Nouvelles Technologies de la R\u00e9partion &#8211; NOTERE 2006<\/i>, LAAS-CNRS et l&rsquo;ENSICA, Jun 2006, Toulouse\/France, pp.145-151<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00090144\/file\/notere-cr.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00090144\/file\/notere-cr.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00090144\/file\/notere-cr.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00090144v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2005<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00000587v1\" target=\"_blank\" >On the Impact of Management on the Performance of a Managed System: A JMX-Based Management Case Study<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Laurent Andrey, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>16th IFIP\/IEEE International Workshop on Distributed Systems: Operations and Management &#8211; Management of Ambient Networks &#8211; DSOM 2005<\/i>, Universitat Polit\u00e8cnica de Catalunya, Oct 2005, Barcelona\/Spain, pp.24&#8211;35, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/11568285\">&#x27E8;10.1007\/11568285&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/11568285\" target=\"_blank\" >10.1007\/11568285<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00000587v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00000596v1\" target=\"_blank\" >Balade : diffusion multicast s\u00e9curis\u00e9e d&rsquo;un flux multim\u00e9dia multi-sources s\u00e9quentielles dans un environnement ad hoc<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Mohamed Salah Bouassida, Adrien Bruneton, Abdelkader Lahmadi, Isabelle Chrisment, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Colloque Francophone sur l&rsquo;Ing\u00e9nierie des Protocoles &#8211; CFIP 2005<\/i>, Mar 2005, Bordeaux\/France, pp.531&#8211;546<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00000596v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00000346v1\" target=\"_blank\" >Performances et r\u00e9sistance au facteur d&rsquo;\u00e9chelle d&rsquo;un agent de supervision bas\u00e9 sur JMX : M\u00e9thodologie et premiers r\u00e9sultats<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Laurent Andrey, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Colloque GRES 2005 : Gestion de REseaux et de Services<\/i>, Equipe SIERA \/ IRIT, Toulouse, France, Feb 2005, Luchon, France, pp.269-282<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00000346v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00000871v1\" target=\"_blank\" >Synth\u00e8se et analyse des crit\u00e8res d&rsquo;\u00e9valuation de performance des architectures de gestion<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Laurent Andrey, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Contrat] RNRT-AMARILLO-L2.1.1, 2005, pp.50<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00000871v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00070409v1\" target=\"_blank\" >\u00c9valuation de performance des architectures de gestion de r\u00e9seaux : \u00e9tat de l&rsquo;art et perspectives<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Laurent Andrey, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Rapport de recherche] RR-5598, INRIA. 2005, pp.50<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00070409\/file\/RR-5598.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00070409\/file\/RR-5598.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00070409\/file\/RR-5598.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00070409v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00000872v1\" target=\"_blank\" >Extension des crit\u00e8res \u00e0 la gestion par d\u00e9l\u00e9gation : application \u00e0 JMX &#038; \u00e9valuation de l&rsquo;approche<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Laurent Andrey, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Contract] RNRT-AMARILLO-L.2.1.2, 2005<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00000872v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00000657v1\" target=\"_blank\" >A JMX benchmark<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Laurent Andrey, Abdelkader Lahmadi, Julien Delove<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Technical Report] 2005<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00000657\/file\/jmx-bench-techreport.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00000657\/file\/jmx-bench-techreport.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00000657\/file\/jmx-bench-techreport.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00000657v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2004<\/p>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00070690v1\" target=\"_blank\" >Diffusion multicast s\u00e9curis\u00e9e dans un environnement Ad-Hoc (1 vers n s\u00e9quentiel)<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Mohamed Salah Bouassida, Abdelkader Lahmadi, Isabelle Chrisment, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Rapport de recherche] RR-5310, INRIA. 2004, pp.47<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00070690\/file\/RR-5310.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00070690\/file\/RR-5310.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00070690\/file\/RR-5310.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00070690v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00069888v1\" target=\"_blank\" >Extension of a network monitoring tool with IPv6 features (Ntop)<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] RT-0292, INRIA. 2004, pp.25<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00069888\/file\/RT-0292.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00069888\/file\/RT-0292.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00069888\/file\/RT-0292.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00069888v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2003<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00107646v1\" target=\"_blank\" >Extension de l&rsquo;architecture active AMAM pour le support des services de s\u00e9curit\u00e9 multicast<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Hassen Sallay, Abdelkader Lahmadi, Olivier Festor, Isabelle Chrisment<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Colloque Francophone sur la Gestion de R\u00e9seaux Et de Services &#8211; GRES&rsquo;2003<\/i>, Feb 2003, Fortaleza, Ceara, Br\u00e9sil, 13 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00107646\/file\/A03-R-072.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00107646\/file\/A03-R-072.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00107646\/file\/A03-R-072.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00107646v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099798v1\" target=\"_blank\" >Evaluation des impl\u00e9mentations IPsec pour IPv6: int\u00e9rop\u00e9rabilit\u00e9 et performances<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Isabelle Astic, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>2\u00e8me Rencontre Francophone sur S\u00e9curit\u00e9 et Architecture R\u00e9seaux &#8211; SAR&rsquo;2003<\/i>, 2003, Nancy, France<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00099798v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099818v1\" target=\"_blank\" >Impact sur les performances de la s\u00e9curisation d&rsquo;IPv6 par IPsec dans un r\u00e9seau Gigabit<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Contrat] A03-R-097 || lahmadi03c, 2003, 26 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00099818v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099750v1\" target=\"_blank\" >Etude et tests d&rsquo;interop\u00e9rabilit\u00e9 des diff\u00e9rentes impl\u00e9mentations d&rsquo;IPsec sous IPv6<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Isabelle Astic, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Contrat] A03-R-031 || lahmadi03a, 2003, 34 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00099750v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='Rubrique'>2002<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099434v1\" target=\"_blank\" >A Secure SSM Architecture<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Ghassan Chaddoud, Isabelle Chrisment, Abdelkader Lahmadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>IEEE International Conference on Networks &#8211; ICON&rsquo;2002<\/i>, Aug 2002, Singapore, 13 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00099434\/file\/A02-R-154.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00099434\/file\/A02-R-154.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00099434\/file\/A02-R-154.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00099434v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100800v1\" target=\"_blank\" >S-SSM : S\u00e9curisation d&rsquo;une architecture SSM<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Ghassan Chaddoud, Isabelle Chrisment, Abdelkader Lahmadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Colloque Francophone sur l&rsquo;Ing\u00e9nierie des Protocoles &#8211; CFIP&rsquo;2002<\/i>, May 2002, Montr\u00e9al, Canada, 14 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100800v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00071177v1\" target=\"_blank\" >Using COPS for managing Active Network Nodes<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Olivier Festor<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Technical Report] RT-0270, INRIA. 2002, pp.30<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00071177\/file\/RT-0270.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00071177\/file\/RT-0270.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00071177\/file\/RT-0270.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00071177v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2001<\/p>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100705v1\" target=\"_blank\" >Impl\u00e9mentation d&rsquo;un prototype du protocole Baal<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdelkader Lahmadi, Ghassan Chaddoud, Isabelle Chrisment<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Interne] A01-R-393 || lahmadi01a, 2001, 31 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100705v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl><\/div>\n<p> <\/body> <\/html> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>               var _paq = _paq || [];   _paq.push([&lsquo;trackPageView&rsquo;]);   _paq.push([&lsquo;enableLinkTracking&rsquo;]);   (function() {     var u=\u00a0\u00bb\/\/piwik.inria.fr\/\u00a0\u00bb;     _paq.push([&lsquo;setTrackerUrl&rsquo;, u+&rsquo;piwik.php&rsquo;]);     _paq.push([&lsquo;setSiteId&rsquo;, 25]);     var d=document, g=d.createElement(&lsquo;script&rsquo;), s=d.getElementsByTagName(&lsquo;script&rsquo;)[0];     g.type=&rsquo;text\/javascript&rsquo;; g.async=true; g.defer=true; g.src=u+&rsquo;piwik.js&rsquo;; s.parentNode.insertBefore(g,s);   })();  <\/p>\n<p><img decoding=\"async\" src=\"\/\/piwik.inria.fr\/piwik.php?idsite=25\" style=\"border:0;\" alt=\"\" \/><\/p>\n<p>   Publications HAL de  Abdelkader Lahmadi   <\/p>\n<p class='Rubrique'>2026<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<p>titre<br \/>\n<a href=\"https:\/\/hal.science\/hal-05500820v1\" target=\"_blank\">Multi-Taxonomy Vulnerability Classification with Hierarchically Finetuned Language Models<\/a><br \/>\nauteur<br \/>\nFranco Terranova, Sana Rekbi, Abdelkader Lahmadi, Isabelle Chrisment<br \/>\narticle<br \/>\n<i>To appear at DIMVA 2026 &#8211; Conference on Detection of Intrusions and Malware and Vulnerability Assessment<\/i>, Jul 2026, Chania, Crete, Greece<br \/>\ntypdoc<br \/>\nConference papers<br \/>\nAcc\u00e8s au texte int\u00e9gral et bibtex<br \/>\n <a href=\"https:\/\/hal.science\/hal-05500820\/file\/Multi_Taxonomy_Vulnerability_Classification_with_Hierarchically_Finetuned_Language_Models.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05500820\/file\/Multi_Taxonomy_Vulnerability_Classification_with_Hierarchically_Finetuned_Language_Models.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05500820\/file\/Multi_Taxonomy_Vulnerability_Classification_with_Hierarchically_Finetuned_Language_Models.pdf\" \/><\/a> <a href=\"https:\/\/hal.science\/hal-05500820v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/p>\n<p>titre<br \/>\n<a href=\"https:\/\/inria.hal.science\/hal-05589750v1\" target=\"_blank\">CauseRL: Reinforcement Learning-based Random Walks for Root Cause Analysis in Microservices<\/a><br \/>\nauteur<br \/>\nJhon Sebastian Rojas Rodriguez, <\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-fullwidth.php","meta":{"footnotes":""},"class_list":["post-13","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/members.loria.fr\/ALahmadi\/wp-json\/wp\/v2\/pages\/13","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/members.loria.fr\/ALahmadi\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/members.loria.fr\/ALahmadi\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/ALahmadi\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/ALahmadi\/wp-json\/wp\/v2\/comments?post=13"}],"version-history":[{"count":25,"href":"https:\/\/members.loria.fr\/ALahmadi\/wp-json\/wp\/v2\/pages\/13\/revisions"}],"predecessor-version":[{"id":290,"href":"https:\/\/members.loria.fr\/ALahmadi\/wp-json\/wp\/v2\/pages\/13\/revisions\/290"}],"wp:attachment":[{"href":"https:\/\/members.loria.fr\/ALahmadi\/wp-json\/wp\/v2\/media?parent=13"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}