Rank correlation for low-rate ddos attack detection: An empirical evaluation, I. J. Network Security, vol.18, issue.3, pp.474-480, 2016. ,
Discovery of policy anomalies in distributed firewalls, Proceedings of the Twenty-third Annual Joint Conference of the IEEE Computer and Communications, 2004. ,
Vericon: Towards Verifying Controller Programs in SoftwareDefined Networks, Proc. 35th ACM SIGPLAN Intl. Conf. Programming Language Design (PLDI'14), pp.282-293, 2014. ,
Routing Metrics Used for Path Calculation in Low-Power and Lossy Networks, RFC, vol.6551, 2012. ,
,
, , 2008.
Detecting early worm propagation through packet matching, USC/Information Sciences Institute, 2004. ,
Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of, IP Traffic Flow Information. RFC, vol.5101, 2008. ,
,
The birth of model checking, 25 Years of Model Checking, vol.5000, pp.1-26, 2008. ,
Idle port scanning and noninterference analysis of network protocol stacks using model checking, Proceedings of the 19th USENIX Conference on Security, pp.17-17, 2010. ,
Automated verification techniques for probabilistic systems, Formal Methods for Eternal Networked Software Systems (SFM'11), vol.6659, pp.53-113, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00648037
, Languages for Software-Defined Networks. In: Software Technology Group, 2016.
Frenetic, a Network Programming Language, Proceedings of the 16th ACM SIGPLAN International Conference on Functional Programming, 2011. ,
An empirical comparison of botnet detection methods, Comput. Secur, vol.45, pp.100-123, 2014. ,
Internet Architecture Board: Internet Denial-ofService Considerations, RFC, vol.4732, 2006. ,
Behavioral and Dynamic Security Functions Chaining for Android Devices, Proceedings of the 11th IFIP/IEEE/ACM SIGCOMM International Conference on Network and Service Management (CNSM'15, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01231173
Towards Cloud Based Compositions of Security Functions for Mobile Devices, IFIP/IEEE International Symposium on Integrated Network Management (IM'15, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01093041
Kinetic: Verifiable Dynamic Network Control, Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation (NSDI'15, 2015. ,
A platform for the analysis and visualization of network flow data of android environments ,
URL : https://hal.archives-ouvertes.fr/hal-01242911
, IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015.
, Internet Users' Glossary. RFC 1392, 1993.
Automated verification of security chains in software-defined networks with Synaptic, Proceedings of the 3rd IEEE Conference on Network Softwarization (NetSoft'17, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01630806
Towards generation of SDN policies for protecting android environments based on automata learning, Proceedings of the 16th Network Operations and Management Symposium, 2018. ,
Flow-based intrusion detection, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-01529782