Prof. Dr. Radu State
|
|
||||
| Faculté ou Centre | Interdisciplinary Centre for Security, Reliability and Trust | ||||
| Department | SEDAN | ||||
| Adresse postale |
Université du Luxembourg 29, avenue JF Kennedy L-1855 Luxembourg |
||||
| Bureau sur le campus | JFK Building, E02-203 | ||||
|
|
|||||
| Téléphone | (+352) 46 66 44 5647 | ||||
| Fax | (+352) 46 66 44 5488 | ||||
- Curriculum Vitae
- Main Research Interests
- Responsibilities
- More Publications
- Further Information
- Publications
2010 - Habilitation from the University Nancy (France)
2001 - Ph.D in computer science, INRIA, Nancy (France)
1998 - Master of Science in Engineering, Johns Hopkins University (USA).
1996 - Master of Science in Computer Science, University of Bucarest, (Romania)
Last updated on: 23 oct 2015
- Network security and network managementLarge Scale Security monitoring
- VoIP Security
- Fuzz-testing
- Adaptive security mechanisms
Last updated on: 23 oct 2015
Conference chair/co-chair
- TPC chair (with Henning Schulzrinne) of IPTCOMM - Principles, Systems and Applications of IP Telecommunications), 2008, Heidelberg, Germany.
- TPC chair (with Philippe Owezarski) of IEEE MONAM 2007 Monitoring and Attack Mitigation 2007, Toulouse, France
- TPC chair (with Tom Chen) of the First International Workshop on Cyber-Fraud (Cyber-Fraud), Silicon Valley, 2007. USA.
- TPC chair (with Alexis Bonnecaze and Jean Leneutre) of SAR-SSI 2007 Securité, Architecture, Réseaux 2007, Anency, France
- TPC chair with (Saverio Niccolini) of IEEE VoIPMaSe 2006 (VoIP Management and Security), Vancouver, Canada 2006
- TPC chair (with Sven van der Meer) of the 17 th IEEE/IFIP DSOM (Distributed Systems: Operations and Management), 2006, Dublin, Ireland.
Organization Committee member
- Publication Chair for IEEE/IFIP NOMS 2008: 11 th IEEE/IFIP IEEE/IFIP NOMS 2008 –Network Operation Management Symposium, Bahia, Brazil, 2008.
- Poster Co-Chair for IEEE/IFIP IM 2007: 10 th. IEEE/IFIP International Conference on Integrated Network Management. IM2007, Muenchen, Germany
- Publication Chair for IEEE/IFIP NOMS 2006: the 10th IEEE/IFIP IEEE/IFIP NOMS 2006 –Network Operation Management Symposium, Vancouver, Canada, 2006.
Technical program membership
- Technical program committee member for the 12th International Symposium on Recent Advances in Intrusion Detection, Brittany, France, 2009
- Technical program committee member for the 11 th. IEEE/IFIP International Conference on Integrated Network Management. IM2009, New York, USA
- Technical program committee member for the IPTCOMM (Principles, Systems and Applications of IP Telecommunications), 2009, Atlanta, USA.
- Technical program committee member for the IEEE/IFIP DSOM 2009, the 19 th IEEE/IFIP Workshop on Distributed Systems Management and Operations. November, 2009, Venice, Italy
- Technical program committee member for the 11 th IEEE/IFIP IEEE/IFIP NOM 2008 –Network Operation Management Symposium), Bahia, Brazil, 2008.
- Technical program committee member for the 10 th. IEEE/IFIP International Conference on Integrated Network Management. IM2007, Muenchen, Germany
- Technical program committee member for the IPTCOMM (Principles, Systems and Applications of IP Telecommunications), 2007, New York, USA.
- Technical program committee member for the 10th IEEE/IFIP IEEE/IFIP NOM 2006 –Network Operation Management Symposium), Vancouver, Canada, 2006.
- Technical program committee member for the 9 th. IEEE/IFIP International Conference on Integrated Network Management. IM2005, Nice, France
- Technical program committee member for the IEEE/IFIP DSOM 2005, the 16 th IEEE/IFIP Workshop on Distributed Systems Management and Operations. November, 2005 Barcelona,Spain.
- Technical program committee member for the IEEE/IFIP DSOM 2004, the 15 th IEEE/IFIP Workshop on Distributed Systems Management and Operations. November, 2004 USA.
- Technical program committee member for the 14 th. IEEE/IFIP DSOM 2003, the 14 th. IEEE/IFIP Workshop on Distributed Systems Management and Operations. October 2003, Heidelberg, Germany
- Technical program committee member for SAR2004 -3ème rencontre francophone sur la sécurité et les architectures réseaux. 2004. France. French speaking conference on network security.
- Technical program committee member for SAR2003 -2ème rencontre francophone sur la sécurité et les architectures réseaux. 2003. Nancy, France. French speaking conference on network security.
- Technical program committee member for SAPIR 2005,
- Technical program committee member for AICT 2005.
Last updated on: 23 oct 2015
Sous presse
Blockchain Governance: An Overview and Prediction of Optimal Strategies Using Nash Equilibrium; ; ;
in 3rd AUE International Research Conference (in press)
2021
Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain; ;
in USENIX Security Symposium, Virtual 11-13 August 2021 (2021)
ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts; ; ;
in European Symposium on Security and Privacy, Vienna 7-11 September 2021 (2021, September)
The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts; ; ;
in International Conference on Financial Cryptography and Data Security, Grenada 1-5 March 2021 (2021)
HSM-based Key Management Solution for Ethereum Blockchain; ;
in IEEE International Conference on Blockchain and Cryptocurrency, 3-6 May 2021 (2021, May 03)
2020
Intrusion detection on robot cameras using spatio-temporal autoencoders: A self-driving car application; ; ;
in 91st IEEE Vehicular Technology Conference, VTC Spring 2020, Antwerp, Belgium, May 25-28, 2020 (2020)
A Data Science Approach for Honeypot Detection in Ethereum; ; ;
in 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (2020, August 17)
Working with Deep Generative Models and Tabular Data Imputation; ;
Scientific Conference (2020, July 17)
Minority Class Oversampling for Tabular Data with Deep Generative Models; ;
E-print/Working paper (2020)
Mobile App to SGX Enclave Secure Channel; ; ;
in 2019 IEEE International Symposium on Software Reliability Engineering Workshops (2020, February 13)
Towards Privacy Preserving Data Centric Super App; ; ;
in Carvalho Ota, Fernando Kaway; Meira, Jorge Augusto; Frank, Raphaël; State, Radu (Eds.) 2020 Mediterranean Communication and Computer Networking Conference, Arona 17-19 June 2020 (2020, September 10)
Towards Usable Protection Against Honeypots; ;
in IEEE International Conference on Blockchain and Cryptocurrency, Toronto, Canada 3-6 May 2020 (2020)
Federated Learning For Cyber Security: SOC Collaboration For Malicious URL Detection; ; ;
in IEEE International Conference on Distributed Computing Systems (ICDCS) (2020)
Process mining-based approach for investigating malicious login events;
in IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, April 20-24, 2020 (2020)
Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queries; ; ; ;
in Proceedings of the 15th International Conference on Availability, Reliability and Security (2020, August)
Deep dive into Interledger: Understanding the Interledger ecosystem - Part 4; ;
Learning material (2020)
BlockPGP: A Blockchain-based Framework for PGP Key Servers; ; ; ; ;
in International Journal of Networking and Computing (2020), 10(1), 1-24
2019
Graph-based malicious login events investigation; ; ;
in Amrouche, Faouzi; Lagraa, Sofiane; Kaiafas, Georgios; State, Radu (Eds.) 16th IFIP/IEEE Symposium on Integrated Network and Service Management (IM 2019) (2019)
MQLV: Optimal Policy of Money Management in Retail Banking with Q-Learning; ; ;
in Proceedings of the Fourth Workshop on MIning DAta for financial applicationS (MIDAS 2019) co-located with the 2019 European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD 2019) (2019, September)
Visualization of AE's Training on Credit Card Transactions with Persistent Homology; ; ; ;
in Proceedings of the International Workshop on Applications of Topological Data Analysis In conjunction with ECML PKDD 2019 (2019, September)
PHom-GeM: Persistent Homology for Generative Models; ;
in The 6th Swiss Conference on Data Science (2019)
Predicting Sparse Clients' Actions with CPOPT-Net in the Banking Environment; ;
in 32nd Canadian Conference on Artificial Intelligence Proceedings (2019, May)
Know Your Enemies and Know Yourself in the Real-Time Bidding Function Optimisation; ; ; ; ; ;
in Proceedings of the 19th IEEE International Conference on Data Mining Workshops (ICDMW 2019) (2019)
Time Series Modeling of Market Price in Real-Time Bidding; ; ; ; ;
in 27th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (2019, April)
A Tale of Location-Based User Authentication; ; ;
in IEEE BigComp2019 - The 6th IEEE International Conference on Big Data and Smart Computing (2019)
The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts; ;
in USENIX Security Symposium, Santa Clara, 14-16 August 2019 (2019)
A Proposal for Security Assessment of Trustzone-M based Software;
in 2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE) (2019)
An Experimental Analysis of Fraud Detection Methods in Enterprise Telecommunication Data using Unsupervised Outlier Ensembles; ; ;
in Kaiafas, Georgios; Hammerschmidt, Christian; State, Radu (Eds.) 16th IFIP/IEEE Symposium on Integrated Network and Service Management (IM 2019) (2019)
Auto Semi-supervised Outlier Detection for Malicious Authentication Events; ; ;
in ECML PKDD 2019 Workshops (2019)
Feasibility of Stellar as a Blockchain-based Micropayment System; ;
in Springer SmartBlock 2019 - 2nd International Conference on Smart Blockchain (2019, November)
Blockchain-based Micropayment Systems: Economic Impact; ;
in ACM IDEAS '19 Proceedings of the 23rd International Database Engineering & Applications Symposium (2019)
Lightning Network: A Comparative Review of Transaction Fees and Data Analysis;
in Springer Blockchain and Applications (2019)
Real-time attack detection on robot cameras: A self-driving car application; ; ; ;
in International Conference on Robotic Computing (2019, February)
Standardising smart contracts: Automatically inferring ERC standards; ; ;
in Proceedings of 2019 IEEE International Conference on Blockchain and Cryptocurrency (2019)
Demo: Blockchain for the Simplification and Automation of KYC Result Sharing; ; ;
in IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019) (2019, May 14)
Auto-encoding Robot State against Sensor Spoofing Attacks; ; ;
in International Symposium on Software Reliability Engineering (2019, October)
ROSploit: Cybersecurity tool for ROS; ;
in International Conference on Robotic Computing (2019, February)
ROS-Defender: SDN-based Security Policy Enforcement for Robotic Applications; ; ; ;
in IEEE Workshop on the Internet of Safe Things, Co-located with IEEE Security and Privacy 2019 (2019, May)
BlockZoom: Large-Scale Blockchain Testbed; ; ;
in IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019) (2019, May 14)
Whispering Botnet Command and Control Instructions; ; ;
in 2nd Crypto Valley Conference on Blockchain Technology, Zug 24-26 June 2019 (2019, June 25)
Deep dive into Interledger: Understanding the Interledger ecosystem - Part 3; ;
Learning material (2019)
Deep dive into Interledger: Understanding the Interledger ecosystem - Part 2; ;
Learning material (2019)
Deep dive into Interledger: Understanding the Interledger ecosystem - Part 1; ;
Learning material (2019)
Evaluation of End-To-End Learning for Autonomous Driving: The Good, the Bad and the Ugly; ; ; ;
in 2nd International Conference on Intelligent Autonomous Systems, Singapore, Feb. 28 to Mar. 2, 2019 (2019, March 01)
2018
Generating Multi-Categorical Samples with Generative Adversarial Networks; ;
Scientific Conference (2018, July)
User-Device Authentication in Mobile Banking using APHEN for Paratuck2 Tensor Decomposition; ; ;
in Proceedings of 2018 IEEE International Conference on Data Mining Workshops (ICDMW) (2018)
Non-Negative Paratuck2 Tensor Decomposition Combined to LSTM Network for Smart Contracts Profiling;
in International Journal of Computer & Software Engineering (2018), 3(1),
Non-Negative Paratuck2 Tensor Decomposition Combined to LSTM Network For Smart Contracts Profiling; ;
in Charlier, Jeremy; State, Radu; Hilger, Jean (Eds.) 2018 IEEE International Conference on Big Data and Smart Computing Proceedings (2018, January)
Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts; ;
in 34th Annual Computer Security Applications Conference (ACSAC ’18), San Juan, Puerto Rico, USA, December 3-7, 2018 (2018, December)
Recycling Smart Contracts: Compression of the Ethereum Blockchain.; ;
in Proceedings of 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS) 2018 (2018, February)
Monitoring the transaction selection policy of Bitcoin mining pools; ;
in NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium (2018)
On the Reduction of Biases in Big Data Sets for the Detection of Irregular Power Usage; ; ;
in Proceedings 13th International FLINS Conference on Data Science and Knowledge Engineering for Sensing Decision Support (FLINS 2018) (2018)
Impact of Biases in Big Data; ;
in Proceedings of the 26th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN 2018) (2018)
Detecting Malicious Authentication Events Trustfully; ; ;
in Kaiafas, Georgios; Varisteas, Georgios; Lagraa, Sofiane; State, Radu (Eds.) IEEE/IFIP Network Operations and Management Symposium, 23-27 April 2018, Taipei, Taiwan Cognitive Management in a Cyber World (2018)
Towards a Management Plane for Smart Contracts: Ethereum Case Study; ; ;
in NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium (2018)
Knowledge Discovery Approach from Blockchain, Crypto-currencies, and Financial Stock Exchanges; ;
Poster (2018, August 20)
Visualizing the Learning Progress of Self-Driving Cars; ; ;
in 21st International Conference on Intelligent Transportation Systems (2018, November 02)
Visual emulation for Ethereum's virtual machine; ; ;
in NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium (2018, July 09)
Blockchain Orchestration and Experimentation Framework: A Case Study of KYC; ; ;
in The First IEEE/IFIP International Workshop on Managing and Managed by Blockchain (Man2Block) colocated with IEEE/IFIP NOMS 2018 (2018)
Blockchain-Based, Decentralized Access Control for IPFS; ; ; ;
in The 2018 IEEE International Conference on Blockchain (Blockchain-2018) (2018, July 30)
Distributed C++-Python embedding for fast predictions and fast prototyping; ;
in Proceedings of the Second Workshop on Distributed Infrastructures for Deep Learning (2018)
BlockPGP: A Blockchain-based Framework for PGP Key Servers; ;
in The Sixth International Symposium on Computing and Networking (2018, November 28)
A Blockchain-Based PKI Management Framework; ; ; ;
in The First IEEE/IFIP International Workshop on Managing and Managed by Blockchain (Man2Block) colocated with IEEE/IFIP NOMS 2018, Tapei, Tawain 23-27 April 2018 (2018)
2017
Recurrent Dynamical Projection for Time series-based Fraud detection;
in ICANN 2017, Part II, LNCS 10614 (2017)
Rule Compilation in Multi-Tenant Networks; ; ; ; ;
in Rule Compilation in Multi-Tenant Networks (2017, May 18)
Finding Suspicious Activities in Financial Transactions and Distributed Ledgers; ; ;
in Proceedings of the 17th IEEE International Conference on Data Mining Workshops (ICDMW 2017) (2017)
Profiling Smart Contracts Interactions Tensor Decomposition and Graph Mining.; ; ;
in Proceedings of the Second Workshop on MIning DAta for financial applicationS (MIDAS 2017) co-located with the 2017 European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD 2017), Skopje, Macedonia, September 18, 2017. (2017, September)
Modeling Smart Contracts Activities: A Tensor based Approach; ;
in Charlier, Jeremy; State, Radu; Hilger, Jean (Eds.) Proceedings of 2017 Future Technologies Conference (FTC), 29-30 November 2017, Vancouver, Canada (2017, November)
Improving Real-Time Bidding Using a Constrained Markov Decision Process; ; ; ; ;
in Proceedings of the 13th International Conference on Advanced Data Mining and Applications (2017, November)
On non-parametric models for detecting outages in the mobile network; ; ;
in Integrated Network and Service Management 2017 (2017, May)
Your Moves, Your Device: Establishing Behavior Profiles Using Tensors; ;
in Advanced Data Mining and Applications - 13th International Conference, ADMA 2017 (2017, November)
Query-able Kafka: An agile data analytics pipeline for mobile wireless networks; ;
in Proceedings of the 43rd International Conference on Very Large Data Bases 2017 (2017, August), 10
Confirmation Delay Prediction of Transactions in the Bitcoin Network; ;
in Lecture Notes in Electrical Engineering (2017)
Identifying Irregular Power Usage by Turning Predictions into Holographic Spatial Visualizations; ; ; ; ; ;
in Proceedings of the 17th IEEE International Conference on Data Mining Workshops (ICDMW 2017) (2017)
The Top 10 Topics in Machine Learning Revisited: A Quantitative Meta-Study; ; ; ; ; ; ;
in Proceedings of the 25th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN 2017) (2017)
Introduction to Detection of Non-Technical Losses using Data Analytics; ; ;
Scientific Conference (2017, September)
The Challenge of Non-Technical Loss Detection using Artificial Intelligence: A Survey; ; ; ;
in International Journal of Computational Intelligence Systems (2017), 10(1), 760-775
Is Big Data Sufficient for a Reliable Detection of Non-Technical Losses?; ; ; ; ;
in Proceedings of the 19th International Conference on Intelligent System Applications to Power Systems (ISAP 2017) (2017, September)
Detecting and predicting outages in mobile networks with log data.; ; ; ; ;
in IEEE International Conference on Communications, ICC 2017 (2017, May)
Optimising Packet Forwarding in Multi-Tenant Networks using Rule Compilation; ; ; ; ;
in Optimising Packet Forwarding in Multi-Tenant Networks using Rule Compilation (2017, November)
BotGM: Unsupervised Graph Mining to Detect Botnets in Traffic Flows; ; ; ; ;
in CSNet 2017 Conference Proceedings (2017)
Distilling Provider-Independent Data for General Detection of Non-Technical Losses; ; ; ; ; ;
in Power and Energy Conference, Illinois 23-24 February 2017 (2017)
Automated labeling of unknown contracts in Ethereum; ; ; ;
in Computer Communication and Networks (ICCCN), 2017 26th International Conference on (2017)
Advanced Interest Flooding Attacks in Named-Data Networking; ; ; ;
Scientific Conference (2017, October 30)
ChainGuard - A Firewall for Blockchain Applications using SDN with OpenFlow; ;
in ChainGuard - A Firewall for Blockchain Applications using SDN with OpenFlow (2017)
2016
Behavior Profiling for Mobile Advertising; ; ;
in Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (2016, December)
Large-Scale Detection of Non-Technical Losses in Imbalanced Data Sets; ; ; ; ; ;
in Proceedings of the Seventh IEEE Conference on Innovative Smart Grid Technologies (ISGT 2016) (2016)
Neighborhood Features Help Detecting Non-Technical Losses in Big Data Sets; ; ; ; ; ;
in Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing Applications and Technologies (BDCAT 2016) (2016)
Deep Learning on Big Data Sets in the Cloud with Apache Spark and Google TensorFlow;
Scientific Conference (2016, December 09)
Compiling packet forwarding rules for switch pipelined architecture; ; ; ;
in IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications (2016, July 26)
Interpreting Finite Automata for Sequential Data; ; ;
in Interpretable Machine Learning for Complex Systems: NIPS 2016 workshop proceedings (2016)
NDN.p4: Programming Information-Centric data-planes; ; ;
in Proceedings of the IEEE International Workshop on Open-Source Software Networking at NetSoft2016 (2016)
2015
Exploring IoT Protocols Through the Information-Centric Networking's Lens; ;
in Intelligent Mechanisms for Network Configuration and Security (2015, June)
2014
Empirical assessment of machine learning-based malware detectors for Android: Measuring the Gap between In-the-Lab and In-the-Wild Validation Scenarios; ; ; ; ;
in Empirical Software Engineering (2014)
Large-scale Machine Learning-based Malware Detection: Confronting the "10-fold Cross Validation" Scheme with Reality; ; ; ; ;
in Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (2014, March)
A Forensic Analysis of Android Malware -- How is Malware Written and How It Could Be Detected?; ; ; ; ;
in Proceedings of the 2014 IEEE 38th Annual Computer Software and Applications Conference (2014, July)
Implications and Detection of DoS Attacks in OpenFlow-based Networks; ;
in 2014 IEEE Global Communications Conference (2014)
Using opcode-sequences to detect malicious Android applications; ; ;
in IEEE International Conference on Communications, ICC 2014, Sydney Australia, June 10-14, 2014 (2014, June)
PhishStorm: Detecting Phishing With Streaming Analytics; ; ;
in IEEE Transactions on Network and Service Management (2014), 11(December), 458-471
PhishScore: Hacking Phishers' Minds; ; ;
in Proceedings of the 10th International Conference on Network and Service Management (2014, November)
A Big Data Architecture for Large Scale Security Monitoring; ; ;
in Proceedings of the 3rd IEEE Congress on Big Data (2014, July)
2013
Of maps and costs: Aggregating large-scale broadband measurements for the Application Layer Traffic Optimization (ALTO) protocol; ;
Presentation (2013, October 15)
Identifying abnormal pattern in cellular communication flows; ; ;
in Proceedings of IPTComm 2013 (2013, October)
Aggregating large-scale measurements for Application Layer Traffic Optimization (ALTO) Protocol; ;
Scientific Conference (2013, July)
Automated Source Code Extension for Debugging of OpenFlow based Networks; ; ;
in Proc. 9th International Conference on Network and Service Management (CNSM) (2013, October)
Classification of Log Files with Limited Labeled Data; ;
in Proceedings of IPTComm 2013 (2013, October)
Advanced Detection Tool for PDF Threats; ; ;
in Proceedings of the sixth International Workshop on Autonomous and Spontaneous Security, RHUL, Egham, U.K., 12th-13th September 2013 (2013, September 13)
ASMATRA: Ranking ASs Providing Transit Service to Malware Hosters; ; ; ; ;
in IFIP/IEEE International Symposium on Integrated Network Management IM2013 (2013)
2012
A Distance-Based Method to Detect Anomalous Attributes in Log Files; ;
in Proceedings of IEEE/IFIP NOMS 2012 (2012, April)
Semantic based DNS Forensics; ; ;
in Proceedings of the IEEE International Workshop on Information Forensics and Security (2012, December)
Proactive Discovery of Phishing Related Domain Names; ; ;
in Proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses, Amsterdam 12-14 September 2012 (2012, September)
DNSSM: A large-scale Passive DNS Security Monitoring Framework; ; ; ; ; ;
in IEEE/IFIP Network Operations and Management Symposium (2012, April)
Instant Degradation of Anonymity in Low-Latency Anonymisation Systems; ;
in Sadre, Ramin; Novotny, Jiri; Celeda, Pavel; Waldburger, Martin; Stiller, Burkhard (Eds.) Dependable Networks and Services, LNCS 7279 (2012)
2011
Detection of Abnormal Behaviour in a Surveillance Environment Using Control Charts; ; ;
in 8th IEEE International Conference on Advanced Video and Signal-Based Surveillance, 2011 (2011)
Comparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance; ; ;
in Ninth Australasian Information Security Conference (2011)
Measuring anonymity using network coordinate systems; ;
in International Symposium on Communications and Information Technologies (ISCIT), 2011 (2011)
2010
An Autonomic Testing Framework for IPv6 Configuration Protocols; ; ;
in Lecture Notes in Computer Science 6155 (2010)
Machine Learning Techniques for Passive Network Inventory; ; ;
in IEEE Transactions on Network and Service Management (2010), 7(4), 244-257
2009
Defensive configuration with game theory; ;
in The 11th IFIP/IEEE International Symposium on Integrated Network Management (2009)
| URL: https://wwwfr.uni.lu/snt/people/radu_state | Date: lundi 11 octobre 2021 16:28:10 |

