Monitoring the neighbor discovery protocol F Beck, T Cholez, O Festor, I Chrisment 2007 International Multi-Conference on Computing in the Global Information …, 2007 | 62 | 2007 |
Powering monitoring analytics with elk stack A Lahmadi, F Beck 9th international conference on autonomous infrastructure, management and …, 2015 | 27 | 2015 |
A universal controller to take over a z-wave network L Rouch, J François, F Beck, A Lahmadi Black Hat Europe 2017, 1-9, 2017 | 25 | 2017 |
A platform for the analysis and visualization of network flow data of android environments A Lahmadi, F Beck, E Finickel, O Festor 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 21 | 2015 |
Real-time attack detection on robot cameras: A self-driving car application S Lagraa, M Cailac, S Rivera, F Beck, R State 2019 Third IEEE International Conference on Robotic Computing (IRC), 102-109, 2019 | 15 | 2019 |
Optimizing internet scanning for assessing industrial systems exposure J François, A Lahmadi, V Giannini, D Cupif, F Beck, B Wallrich 2016 International Wireless Communications and Mobile Computing Conference …, 2016 | 14 | 2016 |
Automated and secure IPv6 configuration in enterprise networks F Beck, O Festor, I Chrisment, R Droms 2010 International Conference on Network and Service Management, 64-71, 2010 | 12 | 2010 |
Syscall interception in xen hypervisor F Beck, O Festor | 9 | 2009 |
IPv6 neighbor discovery protocol based OS fingerprinting F Beck, O Festor, I Chrisment Inria, 2007 | 8 | 2007 |
Empirical analysis of Android logs using self-organizing maps E Finickel, A Lahmadi, F Beck, O Festor 2014 IEEE International Conference on Communications (ICC), 1802-1807, 2014 | 7 | 2014 |
A source discovery protocol for asm applications in ssm networks M Hoerdt, F Beck, D Magoni, JJ Pansiot International Conference on Networking, 324-330, 2004 | 6 | 2004 |
Source discovery protocol in ssm network F Beck, M Hoerdt, JJ Pansiot Internet Engineering Task Force,” Internet Draft, 2003 | 6 | 2003 |
HSL: a cyber security research facility for sensitive data experiments F Beck, A Lahmadi, J François 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2021 | 3 | 2021 |
ThreatPredict: from global social and technical big data to cyber threat forecast J François, F Beck, G Mezzour, KM Carley, A Lahmadi, M Ghogho, ... Advanced Technologies for Security Applications: Proceedings of the NATO …, 2020 | 2 | 2020 |
A monitoring approach for safe IPv6 renumbering F Beck, I Chrisment 2006 International Multi-Conference on Computing in the Global Information …, 2006 | 2 | 2006 |
Multi-source communications over SSM networks M Hoerdt, F Beck, JJ Pansiot June 2003. Internet Draft, work in progress, 2003 | 2 | 2003 |
Libemu 1.0 F Beck, M Hoerd Université Louis Pasteur, http://clarinet. u-strasbg. fr/hoerdt/libemu, 0 | 2 | |
NDPMon F Beck http://ndpmon. sourceforge. net/, 0 | 2 | |
Autonomic renumbering in the future iInternet F Beck, I Chrisment, R Droms, O Festor IEEE Communications Magazine 48 (7), 86-92, 2010 | 1 | 2010 |
Automatic IPv4 to IPv6 Transition D1. 2-Network representation and pre-requisites F Beck, I Chrisment, O Festor | 1 | 2009 |