The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Radu State: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Radu State, Olivier Festor, Isabelle Chrisment
    Context Driven Access Control to SNMP MIB Objects in Multi-homed Environments. [Citation Graph (0, 0)][DBLP]
    DSOM, 2003, pp:169-180 [Conf]
  2. Vincent Cridlig, Olivier Festor, Radu State
    Role-Based Access Control for XML Enabled Management Gateways. [Citation Graph (0, 0)][DBLP]
    DSOM, 2004, pp:183-195 [Conf]
  3. Radu State, Emmanuel Nataf, Olivier Festor
    Managing Concurrent QoS Assured Multicast Sessions Using a Programmable Network Architecture. [Citation Graph (0, 0)][DBLP]
    DSOM, 2000, pp:181-192 [Conf]
  4. Luminita State, Radu State
    And/Or Trees for Knowledge Representation. [Citation Graph (0, 0)][DBLP]
    ECSQARU, 1995, pp:405-411 [Conf]
  5. Radu State, Emmanuel Nataf, Olivier Festor
    A SMIng Based Policy Access Control for SNMPv3. [Citation Graph (0, 0)][DBLP]
    HSNMC, 2003, pp:156-164 [Conf]
  6. Remi Badonnel, Radu State, Olivier Festor
    Monitoring End-to-End Connectivity in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:83-90 [Conf]
  7. Radu State, Guillaume Vivier
    Policy based management of wireless networks. [Citation Graph (0, 0)][DBLP]
    Net-Con, 2002, pp:15-26 [Conf]
  8. Radu State
    Wireless Terminal Management Architectures. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2003, pp:459-462 [Conf]
  9. Vincent Cridlig, Humberto Abdelnur, Jérome Bourdellon, Radu State
    A NetConf Network Management Suite: ENSUITE. [Citation Graph (0, 0)][DBLP]
    IPOM, 2005, pp:152-161 [Conf]
  10. Radu State
    Latent multicast monitoring. [Citation Graph (0, 0)][DBLP]
    ISCC, 2002, pp:947-952 [Conf]
  11. Radu State, Olivier Festor
    Management of Wireless Dynamic Infrastructures. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:1373-1378 [Conf]
  12. Remi Badonnel, Radu State, Olivier Festor
    Fault Monitoring in Ad-Hoc Networks Based on Information Theory. [Citation Graph (0, 0)][DBLP]
    Networking, 2006, pp:427-438 [Conf]
  13. Radu State, Olivier Festor, Emmanuel Nataf
    A Programmable Network Based Approach for Managing Dynamic Virtual Private Networks. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2000, pp:- [Conf]
  14. Claude Chaudet, Olivier Festor, Isabelle Guérin Lassous, Radu State
    A Managed Bandwidth Reservation Protocol for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    SAPIR, 2004, pp:13-20 [Conf]
  15. Remi Badonnel, Radu State, Olivier Festor
    Management of mobile ad hoc networks: information model and probe-based architecture. [Citation Graph (0, 0)][DBLP]
    Int. Journal of Network Management, 2005, v:15, n:5, pp:335-347 [Journal]
  16. Vincent Cridlig, Humberto Abdelnur, Radu State, Olivier Festor
    XBGP-MAN: an XML management architecture for BGP. [Citation Graph (0, 0)][DBLP]
    Int. Journal of Network Management, 2006, v:16, n:4, pp:295-309 [Journal]
  17. Radu State, Olivier Festor, Emmanuel Nataf
    Managing Highly Dynamic Services Using Extended Temporal Information Models. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2002, v:10, n:2, pp:- [Journal]
  18. Remi Badonnel, Radu State, Olivier Festor, Andre Schaff
    A Framework for Optimizing End-to-End Connectivity Degree in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2005, v:13, n:4, pp:479-497 [Journal]
  19. Radu State
    Review of "Network Security Architectures by Sean Convery". [Citation Graph (0, 0)][DBLP]
    ACM Queue, 2005, v:3, n:1, pp:61- [Journal]
  20. Radu State
    Review of "Gray Hat Hacking: The Ethical Hacker's Handbook by Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, and Michael Lester". [Citation Graph (0, 0)][DBLP]
    ACM Queue, 2005, v:3, n:6, pp:60- [Journal]
  21. Radu State
    Review of "Switching to VoIP by Ted Wallingford, " O'Reilly & Associates, 2005, ISBN 0596008686. [Citation Graph (0, 0)][DBLP]
    ACM Queue, 2006, v:4, n:1, pp:62- [Journal]
  22. Radu State
    Review of "Phishing Exposed by Lance James and Joe Stewart, " Syngress Publishing, 2005, ISBN: 159749030X. [Citation Graph (0, 0)][DBLP]
    ACM Queue, 2006, v:4, n:9, pp:50- [Journal]
  23. Radu State
    Review of "Software Security: Building Security In by Gary McGraw, " Addison-Wesley Professional, 2006, ISBN: 0321356705. [Citation Graph (0, 0)][DBLP]
    ACM Queue, 2006, v:4, n:7, pp:44- [Journal]
  24. Radu State
    Review of "Hacking Exposed: Web Applications, 2nd edition by Joel Scambray, Mike Shema, and Caleb Sima, " McGraw-Hill Osborne Media, 2006, ISBN: 0072262990. [Citation Graph (0, 0)][DBLP]
    ACM Queue, 2006, v:4, n:10, pp:49- [Journal]
  25. Radu State
    Review of "Extrusion Detection: Security Monitoring for Internal Intrusions by Richard Bejtlich, " Adddison-Wesley Professional, 2005, ISBN: 0321349962. [Citation Graph (0, 0)][DBLP]
    ACM Queue, 2006, v:4, n:3, pp:42- [Journal]
  26. Radu State
    Review of "Embedded Linux Primer: A Practical Real-world Approach by Christopher Hallinan, " Prentice Hall PTR, 2006, ISBN: 0131679848. [Citation Graph (0, 0)][DBLP]
    ACM Queue, 2007, v:5, n:3, pp:44- [Journal]
  27. Remi Badonnel, Radu State, Olivier Festor
    Self-Organized Monitoring in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 2005, v:30, n:1-3, pp:143-160 [Journal]
  28. Jérôme François, Radu State, Olivier Festor
    Botnets for Scalable Management. [Citation Graph (0, 0)][DBLP]
    DSOM, 2007, pp:1-12 [Conf]
  29. Vincent Cridlig, Radu State, Olivier Festor
    A model for checking consistency in access control policies for network management. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2007, pp:11-19 [Conf]
  30. Remi Badonnel, Radu State, Olivier Festor
    Management of mobile ad-hoc networks: evaluating the network behavior. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2005, pp:17-30 [Conf]
  31. Vincent Cridlig, Radu State, Olivier Festor
    An integrated security framework for XML based management. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2005, pp:587-600 [Conf]
  32. Humberto Abdelnur, Radu State, Isabelle Chrisment, C. Popi
    Assessing the security of VoIP Services. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2007, pp:373-382 [Conf]
  33. Mohamed Nassar, Radu State, Olivier Festor
    VoIP Honeypot Architecture. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2007, pp:109-118 [Conf]
  34. Radu State, K. El-Khazen, Georges Martinez, Guillaume Vivier
    Managing multi-configurable terminals. [Citation Graph (0, 0)][DBLP]
    MWCN, 2002, pp:266-269 [Conf]
  35. Jérôme François, Radu State, Olivier Festor
    Malware Models for Network and Service Management. [Citation Graph (0, 0)][DBLP]
    AIMS, 2007, pp:192-195 [Conf]
  36. Mohamed Nassar, Radu State, Olivier Festor
    IBGP Confederation Provisioning. [Citation Graph (0, 0)][DBLP]
    AIMS, 2007, pp:25-34 [Conf]
  37. Mohamed El Baker Nassar, Radu State, Olivier Festor
    Intrusion detection mechanisms for VoIP applications [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  38. Radu State, Olivier Festor
    Malware: a future framework for device, network and service management. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:3, n:1, pp:51-60 [Journal]

  39. VoIP Malware: Attack Tool & Attack Scenarios. [Citation Graph (, )][DBLP]


  40. Defensive configuration with game theory. [Citation Graph (, )][DBLP]


  41. Advanced Network Fingerprinting. [Citation Graph (, )][DBLP]


  42. Monitoring SIP Traffic Using Support Vector Machines. [Citation Graph (, )][DBLP]


  43. Automated Behavioral Fingerprinting. [Citation Graph (, )][DBLP]


  44. Self Adaptive High Interaction Honeypots Driven by Game Theory. [Citation Graph (, )][DBLP]


  45. An Autonomic Testing Framework for IPv6 Configuration Protocols. [Citation Graph (, )][DBLP]


  46. Mining NetFlow Records for Critical Network Activities. [Citation Graph (, )][DBLP]


  47. FlowRank: ranking NetFlow records. [Citation Graph (, )][DBLP]


  48. Labeled VoIP Data-Set for Intrusion Detection Evaluation. [Citation Graph (, )][DBLP]


  49. Abusing SIP Authentication. [Citation Graph (, )][DBLP]


  50. A VoIP Security Management Architecture. [Citation Graph (, )][DBLP]


  51. Probabilistic Management of Ad-Hoc Networks. [Citation Graph (, )][DBLP]


  52. A Java based implementation of a network level information model for the ATM/frame relay interconnection. [Citation Graph (, )][DBLP]


  53. A distributed management platform for integrated multicast monitoring. [Citation Graph (, )][DBLP]


  54. Towards malware inspired management frameworks. [Citation Graph (, )][DBLP]


  55. An extensible agent toolkit for device management. [Citation Graph (, )][DBLP]


  56. Self-configurable fault monitoring in ad-hoc networks. [Citation Graph (, )][DBLP]


Search in 0.272secs, Finished in 0.275secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002