The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Olivier Festor: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Abdelkader Lahmadi, Laurent Andrey, Olivier Festor
    On the Impact of Management on the Performance of a Managed System: A JMX-Based Management Case Study. [Citation Graph (0, 0)][DBLP]
    DSOM, 2005, pp:24-35 [Conf]
  2. Abdelkader Lahmadi, Laurent Andrey, Olivier Festor
    On Delays in Management Frameworks: Metrics, Models and Analysis. [Citation Graph (0, 0)][DBLP]
    DSOM, 2006, pp:13-24 [Conf]
  3. Radu State, Olivier Festor, Isabelle Chrisment
    Context Driven Access Control to SNMP MIB Objects in Multi-homed Environments. [Citation Graph (0, 0)][DBLP]
    DSOM, 2003, pp:169-180 [Conf]
  4. Vincent Cridlig, Olivier Festor, Radu State
    Role-Based Access Control for XML Enabled Management Gateways. [Citation Graph (0, 0)][DBLP]
    DSOM, 2004, pp:183-195 [Conf]
  5. Radu State, Emmanuel Nataf, Olivier Festor
    Managing Concurrent QoS Assured Multicast Sessions Using a Programmable Network Architecture. [Citation Graph (0, 0)][DBLP]
    DSOM, 2000, pp:181-192 [Conf]
  6. Guillaume Doyen, Emmanuel Nataf, Olivier Festor
    A Hierarchical Architecture for a Distributed Management of P2P Networks and Services. [Citation Graph (0, 0)][DBLP]
    DSOM, 2005, pp:257-268 [Conf]
  7. Radu State, Emmanuel Nataf, Olivier Festor
    A SMIng Based Policy Access Control for SNMPv3. [Citation Graph (0, 0)][DBLP]
    HSNMC, 2003, pp:156-164 [Conf]
  8. Remi Badonnel, Radu State, Olivier Festor
    Monitoring End-to-End Connectivity in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:83-90 [Conf]
  9. Mohamed Salah Bouassida, Isabelle Chrisment, Olivier Festor
    Efficient Group Key Management Protocol in MANETs using the Multipoint Relaying Technique. [Citation Graph (0, 0)][DBLP]
    ICN/ICONS/MCL, 2006, pp:64- [Conf]
  10. Guillaume Doyen, Olivier Festor, Emmanuel Nataf
    A CIM Extension for Peer-to-Peer Network and Service Management. [Citation Graph (0, 0)][DBLP]
    ICT, 2004, pp:801-810 [Conf]
  11. Olivier Festor
    MODE: a development environment for managed objects based on formal methods. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 1995, pp:616-628 [Conf]
  12. Olivier Festor, Georg Zörntlein
    Formal Description of Managed Object Behavior - A Rule Based Approach. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 1993, pp:45-58 [Conf]
  13. Emmanuel Nataf, Olivier Festor, Laurent Andrey
    RelMan: A GRM-based Relationship Manager. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 1997, pp:661-672 [Conf]
  14. Emmanuel Nataf, Olivier Festor, Guillaume Doyen
    An SMIng-centric Proxy Agent for Integrated Monitoring and Provisioning. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2003, pp:491-503 [Conf]
  15. Hassen Sallay, Olivier Festor
    A Highly Distributed Dynamic IP Multicast Accounting and Management Framework. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2003, pp:45-58 [Conf]
  16. Radu State, Olivier Festor
    Management of Wireless Dynamic Infrastructures. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:1373-1378 [Conf]
  17. Guillaume Doyen, Emmanuel Nataf, Olivier Festor
    Management of Peer-to-Peer Networks Applied to Instant Messaging. [Citation Graph (0, 0)][DBLP]
    MMNS, 2003, pp:449-461 [Conf]
  18. Guillaume Doyen, Emmanuel Nataf, Olivier Festor
    A Performance-Oriented Management Information Model for the Chord Peer-to-Peer Framework. [Citation Graph (0, 0)][DBLP]
    MMNS, 2004, pp:200-212 [Conf]
  19. Mohamed Salah Bouassida, Isabelle Chrisment, Olivier Festor
    An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2004, pp:725-742 [Conf]
  20. Mohamed Salah Bouassida, Isabelle Chrisment, Olivier Festor
    Efficient Clustering for Multicast Key Distribution in MANETs. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2005, pp:138-153 [Conf]
  21. Remi Badonnel, Radu State, Olivier Festor
    Fault Monitoring in Ad-Hoc Networks Based on Information Theory. [Citation Graph (0, 0)][DBLP]
    Networking, 2006, pp:427-438 [Conf]
  22. Radu State, Olivier Festor, Emmanuel Nataf
    A Programmable Network Based Approach for Managing Dynamic Virtual Private Networks. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2000, pp:- [Conf]
  23. Claude Chaudet, Olivier Festor, Isabelle Guérin Lassous, Radu State
    A Managed Bandwidth Reservation Protocol for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    SAPIR, 2004, pp:13-20 [Conf]
  24. Samir Tata, Laurent Andrey, Olivier Festor
    A practical experience on validating GDMO-based information models with SDL'88 and SDL'92. [Citation Graph (0, 0)][DBLP]
    SDL Forum, 1997, pp:367-0 [Conf]
  25. Remi Badonnel, Radu State, Olivier Festor
    Management of mobile ad hoc networks: information model and probe-based architecture. [Citation Graph (0, 0)][DBLP]
    Int. Journal of Network Management, 2005, v:15, n:5, pp:335-347 [Journal]
  26. Vincent Cridlig, Humberto Abdelnur, Radu State, Olivier Festor
    XBGP-MAN: an XML management architecture for BGP. [Citation Graph (0, 0)][DBLP]
    Int. Journal of Network Management, 2006, v:16, n:4, pp:295-309 [Journal]
  27. George Pavlou, Olivier Festor
    Management Information Model Engineering. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 1998, v:6, n:3, pp:- [Journal]
  28. Aiko Pras, Olivier Festor
    Internet Services: Management Beyond the ElementA Report on DSOM'2001. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2002, v:10, n:1, pp:- [Journal]
  29. Radu State, Olivier Festor, Emmanuel Nataf
    Managing Highly Dynamic Services Using Extended Temporal Information Models. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2002, v:10, n:2, pp:- [Journal]
  30. Remi Badonnel, Radu State, Olivier Festor, Andre Schaff
    A Framework for Optimizing End-to-End Connectivity Degree in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2005, v:13, n:4, pp:479-497 [Journal]
  31. Alexander Clemm, Olivier Festor, Aiko Pras
    Managing New Networked Worlds - A Report on IM 2005. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2005, v:13, n:4, pp:499-502 [Journal]
  32. Alexander Clemm, Olivier Festor, Aiko Pras
    Managing New Networked Worlds - A Report on IM 2005. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2005, v:13, n:3, pp:351-354 [Journal]
  33. Remi Badonnel, Radu State, Olivier Festor
    Self-Organized Monitoring in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 2005, v:30, n:1-3, pp:143-160 [Journal]
  34. Jérôme François, Radu State, Olivier Festor
    Botnets for Scalable Management. [Citation Graph (0, 0)][DBLP]
    DSOM, 2007, pp:1-12 [Conf]
  35. Vincent Cridlig, Radu State, Olivier Festor
    A model for checking consistency in access control policies for network management. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2007, pp:11-19 [Conf]
  36. Remi Badonnel, Radu State, Olivier Festor
    Management of mobile ad-hoc networks: evaluating the network behavior. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2005, pp:17-30 [Conf]
  37. Vincent Cridlig, Radu State, Olivier Festor
    An integrated security framework for XML based management. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2005, pp:587-600 [Conf]
  38. Mohamed Nassar, Radu State, Olivier Festor
    VoIP Honeypot Architecture. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2007, pp:109-118 [Conf]
  39. Jérôme François, Radu State, Olivier Festor
    Malware Models for Network and Service Management. [Citation Graph (0, 0)][DBLP]
    AIMS, 2007, pp:192-195 [Conf]
  40. Abdelkader Lahmadi, Laurent Andrey, Olivier Festor
    Modeling and Performance Evaluation of the Network and Service Management Plane. [Citation Graph (0, 0)][DBLP]
    AIMS, 2007, pp:156-159 [Conf]
  41. Abdelkader Lahmadi, Anca Ghitescu, Laurent Andrey, Olivier Festor
    On the Impact of Management Instrumentation Models on Web Server Performance: A JMX Case Study. [Citation Graph (0, 0)][DBLP]
    AIMS, 2007, pp:1-12 [Conf]
  42. Mohamed Nassar, Radu State, Olivier Festor
    IBGP Confederation Provisioning. [Citation Graph (0, 0)][DBLP]
    AIMS, 2007, pp:25-34 [Conf]
  43. Mohamed El Baker Nassar, Radu State, Olivier Festor
    Intrusion detection mechanisms for VoIP applications [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  44. Radu State, Olivier Festor
    Malware: a future framework for device, network and service management. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:3, n:1, pp:51-60 [Journal]

  45. VoIP Malware: Attack Tool & Attack Scenarios. [Citation Graph (, )][DBLP]


  46. A Distributed and Adaptive Revocation Mechanism for P2P Networks. [Citation Graph (, )][DBLP]


  47. Design and Validation of an Analytical Model to Evaluate Monitoring Frameworks Limits. [Citation Graph (, )][DBLP]


  48. SecSip: A stateful firewall for SIP-based networks. [Citation Graph (, )][DBLP]


  49. Monitoring and counter-profiling for Voice over IP networks and services. [Citation Graph (, )][DBLP]


  50. Performance of network and service monitoring frameworks. [Citation Graph (, )][DBLP]


  51. Ontological Configuration Management for Wireless Mesh Routers. [Citation Graph (, )][DBLP]


  52. Advanced Network Fingerprinting. [Citation Graph (, )][DBLP]


  53. Monitoring SIP Traffic Using Support Vector Machines. [Citation Graph (, )][DBLP]


  54. Automated Behavioral Fingerprinting. [Citation Graph (, )][DBLP]


  55. Flow Monitoring in Wireless MESH Networks. [Citation Graph (, )][DBLP]


  56. Managing Risks at Runtime in VoIP Networks and Services. [Citation Graph (, )][DBLP]


  57. Evaluation of Sybil Attacks Protection Schemes in KAD. [Citation Graph (, )][DBLP]


  58. Labeled VoIP Data-Set for Intrusion Detection Evaluation. [Citation Graph (, )][DBLP]


  59. A VoIP Security Management Architecture. [Citation Graph (, )][DBLP]


  60. Probabilistic Management of Ad-Hoc Networks. [Citation Graph (, )][DBLP]


  61. A Java based implementation of a network level information model for the ATM/frame relay interconnection. [Citation Graph (, )][DBLP]


  62. COJ: a free CMIS compliant Java API and its various implementations. [Citation Graph (, )][DBLP]


  63. A distributed management platform for integrated multicast monitoring. [Citation Graph (, )][DBLP]


  64. A hierarchical topology discovery service for IPv6 networks. [Citation Graph (, )][DBLP]


  65. A scheme for dynamic monitoring and logging of topology information in Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  66. Towards malware inspired management frameworks. [Citation Graph (, )][DBLP]


  67. An extensible agent toolkit for device management. [Citation Graph (, )][DBLP]


  68. WiMFlow: a distributed, self-adaptive architecture for flow monitoring in Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  69. Automated runtime risk management for voice over IP networks and services. [Citation Graph (, )][DBLP]


  70. VeTo: An exploit prevention language from known vulnerabilities in SIP services. [Citation Graph (, )][DBLP]


  71. End-to-end YANG-based configuration management. [Citation Graph (, )][DBLP]


  72. Self-configurable fault monitoring in ad-hoc networks. [Citation Graph (, )][DBLP]


  73. SecSip: A Stateful Firewall for SIP-based Networks [Citation Graph (, )][DBLP]


  74. Performance of Network and Service Monitoring Frameworks [Citation Graph (, )][DBLP]


  75. jYang : A YANG parser in java [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002