Search the dblp DataBase
Radu State :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Radu State , Olivier Festor , Isabelle Chrisment Context Driven Access Control to SNMP MIB Objects in Multi-homed Environments. [Citation Graph (0, 0)][DBLP ] DSOM, 2003, pp:169-180 [Conf ] Vincent Cridlig , Olivier Festor , Radu State Role-Based Access Control for XML Enabled Management Gateways. [Citation Graph (0, 0)][DBLP ] DSOM, 2004, pp:183-195 [Conf ] Radu State , Emmanuel Nataf , Olivier Festor Managing Concurrent QoS Assured Multicast Sessions Using a Programmable Network Architecture. [Citation Graph (0, 0)][DBLP ] DSOM, 2000, pp:181-192 [Conf ] Luminita State , Radu State And/Or Trees for Knowledge Representation. [Citation Graph (0, 0)][DBLP ] ECSQARU, 1995, pp:405-411 [Conf ] Radu State , Emmanuel Nataf , Olivier Festor A SMIng Based Policy Access Control for SNMPv3. [Citation Graph (0, 0)][DBLP ] HSNMC, 2003, pp:156-164 [Conf ] Remi Badonnel , Radu State , Olivier Festor Monitoring End-to-End Connectivity in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:83-90 [Conf ] Radu State , Guillaume Vivier Policy based management of wireless networks. [Citation Graph (0, 0)][DBLP ] Net-Con, 2002, pp:15-26 [Conf ] Radu State Wireless Terminal Management Architectures. [Citation Graph (0, 0)][DBLP ] Integrated Network Management, 2003, pp:459-462 [Conf ] Vincent Cridlig , Humberto Abdelnur , Jérome Bourdellon , Radu State A NetConf Network Management Suite: ENSUITE. [Citation Graph (0, 0)][DBLP ] IPOM, 2005, pp:152-161 [Conf ] Radu State Latent multicast monitoring. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:947-952 [Conf ] Radu State , Olivier Festor Management of Wireless Dynamic Infrastructures. [Citation Graph (0, 0)][DBLP ] ISCC, 2003, pp:1373-1378 [Conf ] Remi Badonnel , Radu State , Olivier Festor Fault Monitoring in Ad-Hoc Networks Based on Information Theory. [Citation Graph (0, 0)][DBLP ] Networking, 2006, pp:427-438 [Conf ] Radu State , Olivier Festor , Emmanuel Nataf A Programmable Network Based Approach for Managing Dynamic Virtual Private Networks. [Citation Graph (0, 0)][DBLP ] PDPTA, 2000, pp:- [Conf ] Claude Chaudet , Olivier Festor , Isabelle Guérin Lassous , Radu State A Managed Bandwidth Reservation Protocol for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] SAPIR, 2004, pp:13-20 [Conf ] Remi Badonnel , Radu State , Olivier Festor Management of mobile ad hoc networks: information model and probe-based architecture. [Citation Graph (0, 0)][DBLP ] Int. Journal of Network Management, 2005, v:15, n:5, pp:335-347 [Journal ] Vincent Cridlig , Humberto Abdelnur , Radu State , Olivier Festor XBGP-MAN: an XML management architecture for BGP. [Citation Graph (0, 0)][DBLP ] Int. Journal of Network Management, 2006, v:16, n:4, pp:295-309 [Journal ] Radu State , Olivier Festor , Emmanuel Nataf Managing Highly Dynamic Services Using Extended Temporal Information Models. [Citation Graph (0, 0)][DBLP ] J. Network Syst. Manage., 2002, v:10, n:2, pp:- [Journal ] Remi Badonnel , Radu State , Olivier Festor , Andre Schaff A Framework for Optimizing End-to-End Connectivity Degree in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] J. Network Syst. Manage., 2005, v:13, n:4, pp:479-497 [Journal ] Radu State Review of "Network Security Architectures by Sean Convery". [Citation Graph (0, 0)][DBLP ] ACM Queue, 2005, v:3, n:1, pp:61- [Journal ] Radu State Review of "Gray Hat Hacking: The Ethical Hacker's Handbook by Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, and Michael Lester". [Citation Graph (0, 0)][DBLP ] ACM Queue, 2005, v:3, n:6, pp:60- [Journal ] Radu State Review of "Switching to VoIP by Ted Wallingford, " O'Reilly & Associates, 2005, ISBN 0596008686. [Citation Graph (0, 0)][DBLP ] ACM Queue, 2006, v:4, n:1, pp:62- [Journal ] Radu State Review of "Phishing Exposed by Lance James and Joe Stewart, " Syngress Publishing, 2005, ISBN: 159749030X. [Citation Graph (0, 0)][DBLP ] ACM Queue, 2006, v:4, n:9, pp:50- [Journal ] Radu State Review of "Software Security: Building Security In by Gary McGraw, " Addison-Wesley Professional, 2006, ISBN: 0321356705. [Citation Graph (0, 0)][DBLP ] ACM Queue, 2006, v:4, n:7, pp:44- [Journal ] Radu State Review of "Hacking Exposed: Web Applications, 2nd edition by Joel Scambray, Mike Shema, and Caleb Sima, " McGraw-Hill Osborne Media, 2006, ISBN: 0072262990. [Citation Graph (0, 0)][DBLP ] ACM Queue, 2006, v:4, n:10, pp:49- [Journal ] Radu State Review of "Extrusion Detection: Security Monitoring for Internal Intrusions by Richard Bejtlich, " Adddison-Wesley Professional, 2005, ISBN: 0321349962. [Citation Graph (0, 0)][DBLP ] ACM Queue, 2006, v:4, n:3, pp:42- [Journal ] Radu State Review of "Embedded Linux Primer: A Practical Real-world Approach by Christopher Hallinan, " Prentice Hall PTR, 2006, ISBN: 0131679848. [Citation Graph (0, 0)][DBLP ] ACM Queue, 2007, v:5, n:3, pp:44- [Journal ] Remi Badonnel , Radu State , Olivier Festor Self-Organized Monitoring in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] Telecommunication Systems, 2005, v:30, n:1-3, pp:143-160 [Journal ] Jérôme François , Radu State , Olivier Festor Botnets for Scalable Management. [Citation Graph (0, 0)][DBLP ] DSOM, 2007, pp:1-12 [Conf ] Vincent Cridlig , Radu State , Olivier Festor A model for checking consistency in access control policies for network management. [Citation Graph (0, 0)][DBLP ] Integrated Network Management, 2007, pp:11-19 [Conf ] Remi Badonnel , Radu State , Olivier Festor Management of mobile ad-hoc networks: evaluating the network behavior. [Citation Graph (0, 0)][DBLP ] Integrated Network Management, 2005, pp:17-30 [Conf ] Vincent Cridlig , Radu State , Olivier Festor An integrated security framework for XML based management. [Citation Graph (0, 0)][DBLP ] Integrated Network Management, 2005, pp:587-600 [Conf ] Humberto Abdelnur , Radu State , Isabelle Chrisment , C. Popi Assessing the security of VoIP Services. [Citation Graph (0, 0)][DBLP ] Integrated Network Management, 2007, pp:373-382 [Conf ] Mohamed Nassar , Radu State , Olivier Festor VoIP Honeypot Architecture. [Citation Graph (0, 0)][DBLP ] Integrated Network Management, 2007, pp:109-118 [Conf ] Radu State , K. El-Khazen , Georges Martinez , Guillaume Vivier Managing multi-configurable terminals. [Citation Graph (0, 0)][DBLP ] MWCN, 2002, pp:266-269 [Conf ] Jérôme François , Radu State , Olivier Festor Malware Models for Network and Service Management. [Citation Graph (0, 0)][DBLP ] AIMS, 2007, pp:192-195 [Conf ] Mohamed Nassar , Radu State , Olivier Festor IBGP Confederation Provisioning. [Citation Graph (0, 0)][DBLP ] AIMS, 2007, pp:25-34 [Conf ] Mohamed El Baker Nassar , Radu State , Olivier Festor Intrusion detection mechanisms for VoIP applications [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] Radu State , Olivier Festor Malware: a future framework for device, network and service management. [Citation Graph (0, 0)][DBLP ] Journal in Computer Virology, 2007, v:3, n:1, pp:51-60 [Journal ] VoIP Malware: Attack Tool & Attack Scenarios. [Citation Graph (, )][DBLP ] Defensive configuration with game theory. [Citation Graph (, )][DBLP ] Advanced Network Fingerprinting. [Citation Graph (, )][DBLP ] Monitoring SIP Traffic Using Support Vector Machines. [Citation Graph (, )][DBLP ] Automated Behavioral Fingerprinting. [Citation Graph (, )][DBLP ] Self Adaptive High Interaction Honeypots Driven by Game Theory. [Citation Graph (, )][DBLP ] An Autonomic Testing Framework for IPv6 Configuration Protocols. [Citation Graph (, )][DBLP ] Mining NetFlow Records for Critical Network Activities. [Citation Graph (, )][DBLP ] FlowRank: ranking NetFlow records. [Citation Graph (, )][DBLP ] Labeled VoIP Data-Set for Intrusion Detection Evaluation. [Citation Graph (, )][DBLP ] Abusing SIP Authentication. [Citation Graph (, )][DBLP ] A VoIP Security Management Architecture. [Citation Graph (, )][DBLP ] Probabilistic Management of Ad-Hoc Networks. [Citation Graph (, )][DBLP ] A Java based implementation of a network level information model for the ATM/frame relay interconnection. [Citation Graph (, )][DBLP ] A distributed management platform for integrated multicast monitoring. [Citation Graph (, )][DBLP ] Towards malware inspired management frameworks. [Citation Graph (, )][DBLP ] An extensible agent toolkit for device management. [Citation Graph (, )][DBLP ] Self-configurable fault monitoring in ad-hoc networks. [Citation Graph (, )][DBLP ] Search in 0.272secs, Finished in 0.275secs