default search action
Olivier Festor
- > Home > Persons > Olivier Festor
Publications
- 2024
- [j39]Mohamed Oulaaffart, Rémi Badonnel, Olivier Festor:
C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services. J. Netw. Syst. Manag. 32(1): 21 (2024) - 2022
- [c154]Mohamed Oulaaffart, Rémi Badonnel, Olivier Festor:
CMSec: A Vulnerability Prevention Tool for Supporting Migrations in Cloud Composite Services. CloudNet 2022: 267-271 - 2021
- [c148]Mohamed Oulaaffart, Remi Badonnel, Olivier Festor:
Towards Automating Security Enhancement for Cloud Services. IM 2021: 692-696 - 2020
- [j36]Maxime Compastié
, Rémi Badonnel, Olivier Festor
, Ruan He:
From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models. Comput. Secur. 97: 101905 (2020) - 2019
- [c143]Maxime Compastié
, Rémi Badonnel, Olivier Festor
, Ruan He:
A TOSCA-Oriented Software-Defined Security Approach for Unikernel-Based Protected Clouds. NetSoft 2019: 151-159 - 2018
- [c141]Maxime Compastié
, Remi Badonnel, Olivier Festor
, Ruan He:
Demo: On-the-fly generation of unikernels for software-defined security in cloud infrastructures. NOMS 2018: 1-2 - [c140]Maxime Compastié
, Remi Badonnel, Olivier Festor
, Ruan He, Mohamed Kassi-Lahlou:
Unikernel-based approach for software-defined security in cloud infrastructures. NOMS 2018: 1-7 - 2017
- [c134]Maxime Compastié
, Rémi Badonnel, Olivier Festor
, Ruan He, Mohamed Kassi-Lahlou:
Towards a Software-Defined Security Framework for Supporting Distributed Cloud. AIMS 2017: 47-61 - 2016
- [c128]Maxime Compastié
, Remi Badonnel, Olivier Festor
, Ruan He, Mohamed Kassi-Lahlou:
A Software-Defined Security Strategy for Supporting Autonomic Security Enforcement in Distributed Cloud. CloudCom 2016: 464-467 - 2015
- [j32]Oussema Dabbebi, Remi Badonnel, Olivier Festor
:
An Online Risk Management Strategy for VoIP Enterprise Infrastructures. J. Netw. Syst. Manag. 23(1): 137-162 (2015) - [c124]Gaetan Hurel, Remi Badonnel, Abdelkader Lahmadi, Olivier Festor:
Behavioral and dynamic security functions chaining for Android devices. CNSM 2015: 57-63 - [c121]Martín Barrère, Gustavo Betarte, Víctor Codocedo, Marcelo Rodríguez, Hernán Astudillo, Marcelo Aliquintuy, Javier Baliosian, Remi Badonnel, Olivier Festor, Carlos Raniery Paula dos Santos, Jéferson Campos Nobre, Lisandro Zambenedetti Granville, Amedeo Napoli:
Machine-assisted Cyber Threat Analysis Using Conceptual Knowledge Discovery. FCA4AI@IJCAI 2015: 75-86 - [c120]Gaetan Hurel, Remi Badonnel, Abdelkader Lahmadi, Olivier Festor:
Towards cloud-based compositions of security functions for mobile devices. IM 2015: 578-584 - 2014
- [j31]Martín Barrère
, Remi Badonnel, Olivier Festor
:
Vulnerability Assessment in Autonomic Networks and Services: A Survey. IEEE Commun. Surv. Tutorials 16(2): 988-1004 (2014) - [j30]Oussema Dabbebi, Remi Badonnel, Olivier Festor
:
Leveraging countermeasures as a service for VoIP security in the cloud. Int. J. Netw. Manag. 24(1): 70-84 (2014) - [c118]Gaëtan Hurel, Remi Badonnel, Abdelkader Lahmadi, Olivier Festor
:
Outsourcing Mobile Security in the Cloud. AIMS 2014: 69-73 - [c111]Martín Barrère
, Remi Badonnel, Olivier Festor:
A SAT-based autonomous strategy for security vulnerability management. NOMS 2014: 1-9 - 2013
- [c106]Martín Barrère
, Gaetan Hurel, Remi Badonnel, Olivier Festor:
A probabilistic cost-efficient approach for mobile security assessment. CNSM 2013: 235-242 - [c103]Martín Barrère, Remi Badonnel, Olivier Festor:
Improving present security through the detection of past hidden vulnerable states. IM 2013: 471-477 - [c102]Martín Barrère, Gaetan Hurel, Remi Badonnel, Olivier Festor:
Ovaldroid: An OVAL-based vulnerability assessment framework for Android. IM 2013: 1074-1075 - 2012
- [c98]Martín Barrère, Remi Badonnel, Olivier Festor:
Collaborative remediation of configuration vulnerabilities in autonomic networks and systems. CNSM 2012: 357-363 - [c94]Oussema Dabbebi, Remi Badonnel, Olivier Festor:
A trust-based strategy for addressing residual attacks in the RELOAD architecture. ICC 2012: 1053-1058 - [c93]Oussema Dabbebi, Remi Badonnel, Olivier Festor:
Dynamic exposure control in P2PSIP networks. NOMS 2012: 261-268 - [c92]Martín Barrère
, Remi Badonnel, Olivier Festor
:
Towards the assessment of distributed vulnerabilities in autonomic networks and systems. NOMS 2012: 335-342 - [c89]Martín Barrère
, Gaetan Hurel, Remi Badonnel, Olivier Festor:
Increasing Android Security Using a Lightweight OVAL-Based Vulnerability Assessment Framework. SafeConfig 2012: 41-58 - 2011
- [c87]Oussema Dabbebi, Remi Badonnel, Olivier Festor
:
Econometric Feedback for Runtime Risk Management in VoIP Architectures. AIMS 2011: 26-37 - [c86]Martín Barrère
, Remi Badonnel, Olivier Festor
:
Towards Vulnerability Prevention in Autonomic Networks and Systems. AIMS 2011: 65-68 - [c85]Martín Barrère, Remi Badonnel, Olivier Festor:
Supporting vulnerability awareness in autonomic networks and systems with OVAL. CNSM 2011: 1-8 - [c80]Oussema Dabbebi, Remi Badonnel, Olivier Festor:
A broad-spectrum strategy for runtime risk management in VoIP enterprise architectures. Integrated Network Management 2011: 478-484 - 2010
- [c74]Oussema Dabbebi, Remi Badonnel, Olivier Festor
:
Managing Risks at Runtime in VoIP Networks and Services. AIMS 2010: 89-92 - [c72]Mohamed Nassar
, Oussema Dabbebi, Remi Badonnel, Olivier Festor:
Risk management in VoIP infrastructures using support vector machines. CNSM 2010: 48-55 - [c65]Oussema Dabbebi, Remi Badonnel, Olivier Festor:
Automated runtime risk management for voice over IP networks and services. NOMS 2010: 57-64 - 2009
- [c54]Remi Badonnel, Olivier Festor, Khaled Hamlaoui:
Monitoring and counter-profiling for Voice over IP networks and services. Integrated Network Management 2009: 267-274 - 2008
- [j19]Remi Badonnel, Radu State, Olivier Festor
:
Self-configurable fault monitoring in ad-hoc networks. Ad Hoc Networks 6(3): 458-473 (2008) - 2007
- [j15]Remi Badonnel, Radu State, Olivier Festor
:
A Probabilistic Approach for Managing Mobile Ad-Hoc Networks. IEEE Trans. Netw. Serv. Manag. 4(1): 39-50 (2007) - 2006
- [c35]Remi Badonnel, Radu State, Olivier Festor
:
Fault Monitoring in Ad-Hoc Networks Based on Information Theory. Networking 2006: 427-438 - [c34]Remi Badonnel, Radu State, Olivier Festor:
Probabilistic Management of Ad-Hoc Networks. NOMS 2006: 339-350 - 2005
- [j10]Remi Badonnel, Radu State, Olivier Festor:
Management of mobile ad hoc networks: information model and probe-based architecture. Int. J. Netw. Manag. 15(5): 335-347 (2005) - [j8]Remi Badonnel, Radu State, Olivier Festor, André Schaff:
A Framework for Optimizing End-to-End Connectivity Degree in Mobile Ad-Hoc Networks. J. Netw. Syst. Manag. 13(4): 479-497 (2005) - [j6]Remi Badonnel, Radu State, Olivier Festor:
Self-Organized Monitoring in Ad-Hoc Networks. Telecommun. Syst. 30(1-3): 143-160 (2005) - [c30]Remi Badonnel, Radu State, Olivier Festor:
Monitoring End-to-End Connectivity in Mobile Ad-Hoc Networks. ICN (2) 2005: 83-90 - [c28]Remi Badonnel, Radu State, Olivier Festor:
Management of mobile ad-hoc networks: evaluating the network behavior. Integrated Network Management 2005: 17-30
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-28 23:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint