default search action
Abdelkader Lahmadi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c64]Aurélie Kpoze, Abdelkader Lahmadi, Isabelle Chrisment, Jules Degila:
SDN-Based Reconfiguration of Distributed and Cooperative Microgrid Control Systems for Mitigating Synchronization Attacks. CSR 2024: 789-794 - [c63]Claudia Lanza, Abdelkader Lahmadi, Fabian Osmond:
An Empirical Study of Ransomware Vulnerabilities Descriptions. ICISSP 2024: 146-153 - [c62]Christian Garzón, Abdelkader Lahmadi, Jaime Vergara, Alexander Leal, Juan Felipe Botero:
In-Band ARP-based Man-in-the-Middle Attack Detection Using P4 Programmable Switches. LATINCOM 2024: 1-6 - [c61]Wafik Zahwa, Abdelkader Lahmadi, Michaël Rusinowitch, Mondher Ayadi:
In-Network ACL Rules Placement using Deep Reinforcement Learning. MeditCom 2024: 341-346 - [c60]Enzo d'Andréa, Jérôme François, Abdelkader Lahmadi, Olivier Festor:
Vulnet: Learning Navigation in an Attack Graph. NetSoft 2024: 393-398 - [c59]Aurélie Kpoze, Abdelkader Lahmadi, Isabelle Chrisment, Jules Degila:
SDN-based Mitigation of Synchronization Attacks on Distributed and Cooperative Controls in Microgrid. NOMS 2024: 1-3 - [c58]Franco Terranova, Abdelkader Lahmadi, Isabelle Chrisment:
Leveraging Deep Reinforcement Learning for Cyber-Attack Paths Prediction: Formulation, Generalization, and Evaluation. RAID 2024: 1-16 - 2023
- [j10]Joël Roman Ky, Bertrand Mathieu, Abdelkader Lahmadi, Raouf Boutaba:
ML Models for Detecting QoE Degradation in Low-Latency Applications: A Cloud-Gaming Case Study. IEEE Trans. Netw. Serv. Manag. 20(3): 2295-2308 (2023) - [c57]Wafik Zahwa, Abdelkader Lahmadi, Michaël Rusinowitch, Mondher Ayadi:
Automated Placement of In-Network ACL Rules. NetSoft 2023: 486-491 - [c56]Karim Baccar, Abdelkader Lahmadi:
An Experimental Testbed for 5G Network Security Assessment. NOMS 2023: 1-6 - 2022
- [j9]Abdelkader Lahmadi, Emmanuel Bertin, Ruidong Li:
BRAINS 2020 special issue: Blockchain research and applications for innovative networks and services. Int. J. Netw. Manag. 32(2) (2022) - [j8]Soline Blanc, Abdelkader Lahmadi, Kévin Le Gouguec, Marine Minier, Lama Sleem:
Benchmarking of lightweight cryptographic algorithms for wireless IoT networks. Wirel. Networks 28(8): 3453-3476 (2022) - [c55]Joël Roman Ky, Bertrand Mathieu, Abdelkader Lahmadi, Raouf Boutaba:
Assessing Unsupervised Machine Learning solutions for Anomaly Detection in Cloud Gaming Sessions. CNSM 2022: 367-373 - [c54]Ahmad Abboud, Rémi Garcia, Abdelkader Lahmadi, Michaël Rusinowitch, Adel Bouhoula, Mondher Ayadi:
Automatically Distributing and Updating In-Network Management Rules for Software Defined Networks. NOMS 2022: 1-9 - 2021
- [j7]Mohamed Said Frikha, Sonia Mettali Gammar, Abdelkader Lahmadi, Laurent Andrey:
Reinforcement and deep reinforcement learning for wireless Internet of Things: A survey. Comput. Commun. 178: 98-113 (2021) - [c53]Frédéric Beck, Abdelkader Lahmadi, Jérôme François:
HSL: a Cyber Security Research Facility for Sensitive Data Experiments. IM 2021: 956-961 - [c52]Mohamed Said Frikha, Sonia Mettali Gammar, Abdelkader Lahmadi:
Multi-Attribute Monitoring for Anomaly Detection: a Reinforcement Learning Approach based on Unsupervised Reward. PEMWN 2021: 1-6 - [e1]Toufik Ahmed, Olivier Festor, Yacine Ghamri-Doudane, Joon-Myung Kang, Alberto E. Schaeffer Filho, Abdelkader Lahmadi, Edmundo R. M. Madeira:
17th IFIP/IEEE International Symposium on Integrated Network Management, IM 2021, Bordeaux, France, May 17-21, 2021. IEEE 2021, ISBN 978-3-903176-32-4 [contents] - 2020
- [c51]Nida Khan, Abdelkader Lahmadi, Zsófia Kräussl, Radu State:
Management Plane for Differential Privacy Preservation Through Smart Contracts. AICCSA 2020: 1-8 - [c50]Ahmad Abboud, Rémi Garcia, Abdelkader Lahmadi, Michaël Rusinowitch, Adel Bouhoula:
R2-D2: Filter Rule set Decomposition and Distribution in Software Defined Networks. CNSM 2020: 1-4 - [c49]Ahmad Abboud, Abdelkader Lahmadi, Michaël Rusinowitch, Miguel Couceiro, Adel Bouhoula, Mondher Avadi:
Double Mask: An Efficient Rule Encoding for Software Defined Networking. ICIN 2020: 186-193 - [c48]Mingxiao Ma, Abdelkader Lahmadi, Isabelle Chrisment:
Detecting a Stealthy Attack in Distributed Control for Microgrids using Machine Learning Algorithms. ICPS 2020: 143-148 - [c47]Ahmad Abboud, Rémi Garcia, Abdelkader Lahmadi, Michaël Rusinowitch, Adel Bouhoula:
Efficient Distribution of Security Policy Filtering Rules in Software Defined Networks. NCA 2020: 1-10 - [c46]Abdelkader Lahmadi, Alexis Duque, Nathan Heraief, Julien Francq:
MitM Attack Detection in BLE Networks Using Reconstruction and Classification Machine Learning Techniques. PKDD/ECML Workshops 2020: 149-164 - [c45]Mohamed Said Frikha, Abdelkader Lahmadi, Sonia Mettali Gammar, Laurent Andrey:
Leveraging Reinforcement Learning for Adaptive Monitoring of Low-Power IoT Networks. WiMob 2020: 1-6
2010 – 2019
- 2019
- [j6]Dorra Mars, Sonia Mettali Gammar, Abdelkader Lahmadi, Leïla Azouz Saïdane:
Using Information Centric Networking in Internet of Things: A Survey. Wirel. Pers. Commun. 105(1): 87-103 (2019) - [c44]Nicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz:
Automated Factorization of Security Chains in Software-Defined Networks. IM 2019: 374-380 - [c43]Nicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz:
A Tool Suite for the Automated Synthesis of Security Function Chains. IM 2019: 716-717 - [c42]Mingxiao Ma, Abdelkader Lahmadi, Isabelle Chrisment:
Demonstration of Synchronization Attacks on Distributed and Cooperative Control in Microgrids. IM 2019: 727-728 - [c41]Benoit Henry, Shihabur Rahman Chowdhury, Abdelkader Lahmadi, Romain Azaïs, Jérôme François, Raouf Boutaba:
SPONGE: Software-Defined Traffic Engineering to Absorb Influx of Network Traffic. LCN 2019: 193-201 - [c40]Ahmad Abboud, Abdelkader Lahmadi, Michaël Rusinowitch, Miguel Couceiro, Adel Bouhoula:
Poster : Minimizing range rules for packet filtering using a double mask representation. Networking 2019: 1-2 - 2018
- [j5]Nicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz:
Rule-Based Synthesis of Chains of Security Functions for Software-Defined Networks. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 76 (2018) - [c39]Mehdi Zakroum, Abdellah Houmz, Mounir Ghogho, Ghita Mezzour, Abdelkader Lahmadi, Jérôme François, Mohammed El Koutbi:
Exploratory Data Analysis of a Network Telescope Traffic and Prediction of Port Probing Rates. ISI 2018: 175-180 - [c38]Nida Khan, Abdelkader Lahmadi, Jérôme François, Radu State:
Towards a management plane for smart contracts: Ethereum case study. NOMS 2018: 1-6 - [c37]Nicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz:
Synaptic: A formal checker for SDN-based security policies. NOMS 2018: 1-2 - [c36]Nicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz:
Generation of SDN policies for protecting android environments based on automata learning. NOMS 2018: 1-7 - [c35]Giulia De Santis, Abdelkader Lahmadi, Jérôme François, Olivier Festor:
Internet-Wide Scanners Classification using Gaussian Mixture and Hidden Markov Models. NTMS 2018: 1-5 - [c34]Mingxiao Ma, Abdelkader Lahmadi:
On the Impact of Synchronization Attacks on Distributed and Cooperative Control in Microgrid Systems. SmartGridComm 2018: 1-6 - [i3]Mehdi Zakroum, Abdellah Houmz, Mounir Ghogho, Ghita Mezzour, Abdelkader Lahmadi, Jérôme François, Mohammed El Koutbi:
Exploratory Data Analysis of a Network Telescope Traffic and Prediction of Port Probing Rates. CoRR abs/1812.09790 (2018) - 2017
- [c33]Sofiane Lagraa, Jérôme François, Abdelkader Lahmadi, Marine Miner, Christian A. Hammerschmidt, Radu State:
BotGM: Unsupervised graph mining to detect botnets in traffic flows. CSNet 2017: 1-8 - [c32]Julio Navarro, Véronique Legrand, Sofiane Lagraa, Jérôme François, Abdelkader Lahmadi, Giulia De Santis, Olivier Festor, Nadira Lammari, Fayçal Hamdi, Aline Deruyver, Quentin Goux, Morgan Allard, Pierre Parrend:
HuMa: A Multi-layer Framework for Threat Analysis in a Heterogeneous Log Environment. FPS 2017: 144-159 - [c31]Nicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz:
Automated verification of security chains in software-defined networks with synaptic. NetSoft 2017: 1-9 - 2016
- [c30]Jérôme François, Abdelkader Lahmadi, Valentín Giannini, Damien Cupif, Frédéric Beck, Bertrand Wallrich:
Optimizing internet scanning for assessing industrial systems exposure. IWCMC 2016: 516-522 - [c29]Giulia De Santis, Abdelkader Lahmadi, Jérôme François, Olivier Festor:
Modeling of IP Scanning Activities with Hidden Markov Models: Darknet Case Study. NTMS 2016: 1-5 - [c28]Marc Coudriau, Abdelkader Lahmadi, Jérôme François:
Topological analysis and visualisation of network monitoring data: Darknet case study. WIFS 2016: 1-6 - 2015
- [c27]Bertrand Mathieu, Guillaume Doyen, Wissam Mallouli, Thomas Silverston, Olivier Bettan, François-Xavier Aguessy, Thibault Cholez, Abdelkader Lahmadi, Patrick Truong, Edgardo Montes de Oca:
Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment. ARES 2015: 741-748 - [c26]Gaetan Hurel, Remi Badonnel, Abdelkader Lahmadi, Olivier Festor:
Behavioral and dynamic security functions chaining for Android devices. CNSM 2015: 57-63 - [c25]Gaetan Hurel, Remi Badonnel, Abdelkader Lahmadi, Olivier Festor:
Towards cloud-based compositions of security functions for mobile devices. IM 2015: 578-584 - [c24]Abdelkader Lahmadi, Frédéric Beck, Eric Finickel, Olivier Festor:
A platform for the analysis and visualization of network flow data of android environments. IM 2015: 1129-1130 - [c23]Francois Despaux, Yeqiong Song, Abdelkader Lahmadi:
Extracting Markov chain models from protocol execution traces for end to end delay evaluation in wireless sensor networks. WFCS 2015: 1-8 - 2014
- [c22]Gaëtan Hurel, Remi Badonnel, Abdelkader Lahmadi, Olivier Festor:
Outsourcing Mobile Security in the Cloud. AIMS 2014: 69-73 - [c21]Francois Despaux, Ye-Qiong Song, Abdelkader Lahmadi:
Modelling and Performance Analysis of Wireless Sensor Networks Using Process Mining Techniques: ContikiMAC Use Case. DCOSS 2014: 225-232 - [c20]Eric Finickel, Abdelkader Lahmadi, Frédéric Beck, Olivier Festor:
Empirical analysis of Android logs using self-organizing maps. ICC 2014: 1802-1807 - [c19]Francois Despaux, Ye-Qiong Song, Abdelkader Lahmadi:
Towards performance analysis of wireless sensor networks using Process Mining Techniques. ISCC 2014: 1-7 - [c18]Younes Abid, Bilel Saadallah, Abdelkader Lahmadi, Olivier Festor:
Named data aggregation in wireless sensor networks. NOMS 2014: 1-8 - [c17]Elian Aubry, Thomas Silverston, Abdelkader Lahmadi, Olivier Festor:
CrowdOut: A mobile crowdsourcing service for road safety in digital cities. PerCom Workshops 2014: 86-91 - 2013
- [c16]Abdelkader Lahmadi, Alexandre Boeglin, Olivier Festor:
Efficient distributed monitoring in 6LoWPAN networks. CNSM 2013: 268-276 - [c15]Francois Despaux, Ye-Qiong Song, Abdelkader Lahmadi:
Measurement-based Analysis of the Effect of Duty Cycle in IEEE 802.15.4 MAC Performance. MASS 2013: 620-626 - 2012
- [j4]Abdelkader Lahmadi, Olivier Festor:
A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice over IP Services. IEEE Trans. Netw. Serv. Manag. 9(2): 114-127 (2012) - [c14]Abdelkader Lahmadi, Laurent Ciarletta, Alexandre Boeglin, Olivier Festor:
Routing based roles assignment for monitoring 6LowPAN networks. COMNET 2012: 1-8 - [c13]Francois Despaux, Ye-Qiong Song, Abdelkader Lahmadi:
Combining Analytical and Simulation Approaches for Estimating End-to-End Delay in Multi-hop Wireless Networks. DCOSS 2012: 317-322 - [c12]Abdelkader Lahmadi, César Brandin, Olivier Festor:
A Testing Framework for Discovering Vulnerabilities in 6LoWPAN Networks. DCOSS 2012: 335-340 - 2011
- [c11]Abdelkader Lahmadi, Laurent Delosières, Olivier Festor:
Hinky: Defending against Text-Based Message Spam on Smartphones. ICC 2011: 1-5 - [c10]Abdelkader Lahmadi, Emmanuel Nataf, Olivier Festor:
YANG-based configuration modeling - The SecSIP IPS case study -. Integrated Network Management 2011: 800-811 - 2010
- [c9]Abdelkader Lahmadi, Olivier Festor:
VeTo: An exploit prevention language from known vulnerabilities in SIP services. NOMS 2010: 216-223
2000 – 2009
- 2009
- [j3]Laurent Andrey, Olivier Festor, Abdelkader Lahmadi, Aiko Pras, Jürgen Schönwälder:
Survey of SNMP performance analysis studies. Int. J. Netw. Manag. 19(6): 527-548 (2009) - [j2]Abdelkader Lahmadi, Laurent Andrey, Olivier Festor:
Caractérisation des délais dans les applications de supervision de réseaux et de services. Tech. Sci. Informatiques 28(4): 479-502 (2009) - [c8]Abdelkader Lahmadi, Laurent Andrey, Olivier Festor:
Design and Validation of an Analytical Model to Evaluate Monitoring Frameworks Limits. ICN 2009: 397-402 - [c7]Abdelkader Lahmadi, Olivier Festor:
SecSip: A stateful firewall for SIP-based networks. Integrated Network Management 2009: 172-179 - [c6]Abdelkader Lahmadi, Laurent Andrey, Olivier Festor:
Performance of network and service monitoring frameworks. Integrated Network Management 2009: 815-820 - [i2]Abdelkader Lahmadi, Olivier Festor:
SecSip: A Stateful Firewall for SIP-based Networks. CoRR abs/0907.3045 (2009) - [i1]Abdelkader Lahmadi, Laurent Andrey, Olivier Festor:
Performance of Network and Service Monitoring Frameworks. CoRR abs/0907.3047 (2009) - 2007
- [b1]Abdelkader Lahmadi:
Performances des fonctions et architectures de supervision de réseaux et de services. (Performance Evaluation of the Network and Service Management Plane). Nancy 2 University, France, 2007 - [c5]Abdelkader Lahmadi, Anca Ghitescu, Laurent Andrey, Olivier Festor:
On the Impact of Management Instrumentation Models on Web Server Performance: A JMX Case Study. AIMS 2007: 1-12 - [c4]Abdelkader Lahmadi, Laurent Andrey, Olivier Festor:
Modeling and Performance Evaluation of the Network and Service Management Plane. AIMS 2007: 156-159 - 2006
- [c3]Abdelkader Lahmadi, Laurent Andrey, Olivier Festor:
On Delays in Management Frameworks: Metrics, Models and Analysis. DSOM 2006: 13-24 - 2005
- [c2]Abdelkader Lahmadi, Laurent Andrey, Olivier Festor:
On the Impact of Management on the Performance of a Managed System: A JMX-Based Management Case Study. DSOM 2005: 24-35 - 2004
- [j1]Yann Adam, Bruno Fillinger, Isabelle Astic, Abdelkader Lahmadi, Patrick Brigant:
Deployment and test of IPv6 services in the VTHD network. IEEE Commun. Mag. 42(1): 98-104 (2004) - 2002
- [c1]Ghassan Chaddoud, Isabelle Chrisment, Abdelkader Lahmadi:
A secure SSM architecture. ICON 2002: 343-348
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-17 21:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint