default search action
Mathieu Bouet
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j13]Agathe Blaise, Mathieu Bouet, Vania Conan, Stefano Secci:
Group anomaly detection in mobile app usages: A spatiotemporal convex hull methodology. Comput. Networks 216: 109277 (2022) - 2020
- [j12]Agathe Blaise, Mathieu Bouet, Vania Conan, Stefano Secci:
Detection of zero-day attacks: An unsupervised port-based approach. Comput. Networks 180: 107391 (2020) - [j11]Agathe Blaise, Mathieu Bouet, Vania Conan, Stefano Secci:
Botnet Fingerprinting: A Frequency Distributions Scheme for Lightweight Bot Detection. IEEE Trans. Netw. Serv. Manag. 17(3): 1701-1714 (2020) - [c48]Agathe Blaise, Mathieu Bouet, Vania Conan, Stefano Secci:
BotFP: FingerPrints Clustering for Bot Detection. NOMS 2020: 1-7
2010 – 2019
- 2019
- [j10]Marco Casazza, Mathieu Bouet, Stefano Secci:
Availability-driven NFV orchestration. Comput. Networks 155: 47-61 (2019) - [j9]Filippo Rebecchi, Julien Boite, Pierre-Alexis Nardin, Mathieu Bouet, Vania Conan:
DDoS protection with stateful software-defined networking. Int. J. Netw. Manag. 29(1) (2019) - [j8]Adrien Wion, Mathieu Bouet, Luigi Iannone, Vania Conan:
Change in Continuity: Chaining Services With an Augmented IGP. IEEE Trans. Netw. Serv. Manag. 16(4): 1332-1344 (2019) - [c47]Agathe Blaise, Mathieu Bouet, Stefano Secci, Vania Conan:
Split and Merge: Detecting Unknown Botnets. IM 2019: 153-161 - [c46]Adrien Wion, Mathieu Bouet, Luigi Iannone, Vania Conan:
Finding Next Service Hop with NFV-Routers. INFOCOM Workshops 2019: 1017-1018 - [c45]Adrien Wion, Mathieu Bouet, Luigi Iannone, Vania Conan:
Let there be Chaining: How to Augment your IGP to Chain your Services. Networking 2019: 1-9 - [c44]Adrien Wion, Mathieu Bouet, Luigi Iannone, Vania Conan:
Distributed Function Chaining with Anycast Routing. SOSR 2019: 91-97 - 2018
- [j7]Meihui Gao, Bernardetta Addis, Mathieu Bouet, Stefano Secci:
Optimal orchestration of virtual network functions. Comput. Networks 142: 108-127 (2018) - [j6]Mathieu Bouet, Vania Conan:
Mobile Edge Computing Resources Optimization: A Geo-Clustering Approach. IEEE Trans. Netw. Serv. Manag. 15(2): 787-796 (2018) - [c43]Dallal Belabed, Mathieu Bouet, Vania Conan:
Centralized Defense Using Smart Routing Against Link-Flooding Attacks. CSNet 2018: 1-8 - [c42]Rubén Solozabal, Aitor Sanchoyerto, Miren Cava, Bego Blanco, Hicham Khalife, Mathieu Bouet, Damien Lavaux, Emmanouil Kafetzakis:
Providing Mission-Critical Services over 5G Radio Access Network. AIAI 2018: 520-530 - [i5]Adrien Wion, Mathieu Bouet, Luigi Iannone, Vania Conan:
Distributed Function Chaining with Anycast Routing. CoRR abs/1810.03355 (2018) - 2017
- [c41]Nicolas Tastevin, Mathis Obadia, Mathieu Bouet:
A graph approach to placement of Service Functions Chains. IM 2017: 134-141 - [c40]Julien Boite, Pierre-Alexis Nardin, Filippo Rebecchi, Mathieu Bouet, Vania Conan:
Statesec: Stateful monitoring for DDoS protection in software defined networks. NetSoft 2017: 1-9 - [c39]Filippo Rebecchi, Julien Boite, Pierre-Alexis Nardin, Mathieu Bouet, Vania Conan:
Traffic monitoring and DDoS detection using stateful SDN. NetSoft 2017: 1-2 - [c38]Marco Casazza, Pierre Fouilhoux, Mathieu Bouet, Stefano Secci:
Securing virtual network function placement with high availability guarantees. Networking 2017: 1-9 - [c37]Mathieu Bouet, Vania Conan:
Geo-partitioning of MEC Resources. MECOMM@SIGCOMM 2017: 43-48 - [i4]Marco Casazza, Pierre Fouilhoux, Mathieu Bouet, Stefano Secci:
Securing Virtual Network Function Placement with High Availability Guarantees. CoRR abs/1701.07993 (2017) - [i3]Meihui Gao, Bernardetta Addis, Mathieu Bouet, Stefano Secci:
Optimal Orchestration of Virtual Network Functions. CoRR abs/1706.04762 (2017) - 2016
- [c36]Valentin Del Piccolo, Ahmed Amamou, Bruno Vidalenc, Mathieu Bouet, Kamel Haddadou:
Design and Analysis of a TRILL - OpenFlow Bridge. GLOBECOM 2016: 1-6 - [c35]Kevin Phemius, Jawad Seddar, Mathieu Bouet, Hicham Khalife, Vania Conan:
Bringing SDN to the edge of tactical networks. MILCOM 2016: 1047-1052 - [c34]François Reynaud, François-Xavier Aguessy, Olivier Bettan, Mathieu Bouet, Vania Conan:
Attacks against Network Functions Virtualization and Software-Defined Networking: State-of-the-art. NetSoft 2016: 471-476 - [c33]Mathis Obadia, Jean-Louis Rougier, Luigi Iannone, Vania Conan, Mathieu Bouet:
Revisiting NFV orchestration with routing games. NFV-SDN 2016: 107-113 - [c32]Nicolas Tastevin, Mathieu Bouet:
Characterizing and modeling the distance of mobile calls: A metropolitan case study. PIMRC 2016: 1-6 - [c31]Roberto Bifulco, Julien Boite, Mathieu Bouet, Fabian Schneider:
Improving SDN with InSPired Switches. SOSR 2016: 11 - [c30]Ghada Moualla, Thierry Turletti, Mathieu Bouet, Damien Saucez:
On the Necessity of Accounting for Resiliency in SFC. PROCON@ITC 2016: 13-15 - [c29]Mathis Obadia, Mathieu Bouet, Vania Conan, Luigi Iannone, Jean-Louis Rougier:
Elastic Network Service Provisioning with VNF Auctioning. ITC 2016: 340-348 - [i2]Mathieu Bouet, Vania Conan, Hicham Khalife, Kevin Phemius, Jawad Seddar:
MUREN: delivering edge services in joint SDN-SDR multi-radio nodes. CoRR abs/1606.00994 (2016) - 2015
- [j5]Mathieu Bouet, Jérémie Leguay, Théo Combe, Vania Conan:
Cost-based placement of vDPI functions in NFV infrastructures. Int. J. Netw. Manag. 25(6): 490-506 (2015) - [c28]Mathieu Bouet, Mario Lopez-Ramos, Emmanuel Dotaro, Hélia Pouyllau:
Criticality-aware service composition for cloud and network brokerage. CloudNet 2015: 100-105 - [c27]Bernardetta Addis, Dallal Belabed, Mathieu Bouet, Stefano Secci:
Virtual network functions placement and routing optimization. CloudNet 2015: 171-177 - [c26]Mathieu Bouet, Jérémie Leguay, Vania Conan:
Cost-based placement of vDPI functions in NFV infrastructures. NetSoft 2015: 1-9 - [c25]Mathis Obadia, Mathieu Bouet, Jean-Louis Rougier, Luigi Iannone:
A greedy approach for minimizing SDN control overhead. NetSoft 2015: 1-5 - 2014
- [c24]Mathieu Bouet, Kevin Phemius, Jérémie Leguay:
Distributed SDN for Mission-Critical Networks. MILCOM 2014: 942-948 - [c23]Mathis Obadia, Mathieu Bouet, Jeremie Leguay, Kevin Phemius, Luigi Iannone:
Failover mechanisms for distributed SDN controllers. NOF 2014: 1-6 - [c22]Kevin Phemius, Mathieu Bouet, Jeremie Leguay:
DISCO: Distributed SDN controllers in a multi-domain environment. NOMS 2014: 1-2 - [c21]Kevin Phemius, Mathieu Bouet, Jeremie Leguay:
DISCO: Distributed multi-domain SDN controllers. NOMS 2014: 1-4 - 2013
- [j4]Kostas Tsagkaris, Gérard Nguengang, Aristi Galani, Imen Grida Ben Yahia, Majid Ghader, Alexandros Kaloxylos, Markus Gruber, Apostolos Kousaridas, Mathieu Bouet, Stylianos Georgoulas, Aimilia Bantouna, Nancy Alonistioti, Panagiotis Demestichas:
A survey of autonomic networking architectures: towards a Unified Management Framework. Int. J. Netw. Manag. 23(6): 402-423 (2013) - [c20]Kevin Phemius, Mathieu Bouet:
Monitoring latency with OpenFlow. CNSM 2013: 122-125 - [c19]Mathieu Bouet, Julien Boite, Jeremie Leguay, Vania Conan:
Differentiating link state advertizements to optimize control overhead in overlay networks. ICC 2013: 2277-2282 - [c18]Kevin Phemius, Mathieu Bouet:
OpenFlow: Why latency does matter. IM 2013: 680-683 - [c17]Mathieu Bouet, Jeremie Leguay, Vania Conan:
Cost-Based Placement of Virtualized Deep Packet Inspection Functions in SDN. MILCOM 2013: 992-997 - [i1]Kevin Phemius, Mathieu Bouet, Jeremie Leguay:
DISCO: Distributed Multi-domain SDN Controllers. CoRR abs/1308.6138 (2013) - 2012
- [j3]Mathieu Bouet, Gérard Nguengang, Vania Conan, Apostolos Kousaridas, Panagiotis Spapis, Nancy Alonistioti:
Embedding cognition in wireless network management: an experimental perspective. IEEE Commun. Mag. 50(12): 150-160 (2012) - [c16]Kevin Phemius, Mathieu Bouet:
Implementing OpenFlow-based resilient network services. CloudNet 2012: 212-214 - [c15]Kostas Tsagkaris, Aristi Galani, Panagiotis Demestichas, Gérard Nguengang, Mathieu Bouet, Imen Grida Ben Yahia, Christian Destré, Samir Ghamri-Doudane, Laurent Ciavaglia:
Designing the core components of an operator-driven, framework for unifying autonomic network and service management. Future Network & Mobile Summit 2012: 1-8 - [c14]Kostas Tsagkaris, Aristi Galani, Panagiotis Demestichas, Imen Grida Ben Yahia, Christian Destré, Gérard Nguengang, Mathieu Bouet, Samir Ghamri-Doudane, Laurent Ciavaglia:
Identifying standardization opportunities of an operator-driven, framework for unifying autonomic network and service management. ICC 2012: 6921-6925 - [c13]Julien Boite, Vania Conan, Gérard Nguengang, Mathieu Bouet, Alain Ploix, Dominique Gaïti:
Scaling end-to-end measurements in heterogeneous wireless mesh networks. Q2SWinet 2012: 1-8 - 2011
- [c12]Urlan Barros, Mathieu Bouet, Aldri Luiz dos Santos, Michele Nogueira:
Assessing RoQ attacks on MANETs over aware and unaware TPC techniques. CNSM 2011: 1-5 - [c11]David P. Wagner, Jens Mödeker, Mathieu Bouet, Gérard Nguengang, Robin Schaffer:
Cognitive management of procotol composition enhanced Future Internet elements. Future Network & Mobile Summit 2011: 1-8 - [c10]Kostas Tsagkaris, Panagiotis Vlacheas, Aimilia Bantouna, Panagiotis Demestichas, Gérard Nguengang, Mathieu Bouet, Laurent Ciavaglia, Pierre Peloso, Imen Grida Ben Yahia, Christian Destré:
Operator-driven framework for establishing and unifying autonomic network and service management solutions. GLOBECOM Workshops 2011: 684-689 - [c9]Mathieu Bouet, Maurice Israël:
INSPIRE Ontology Handler: Automatically building and managing a knowledge base for Critical Information Infrastructure protection. Integrated Network Management 2011: 694-697 - 2010
- [j2]Mathieu Bouet, Guy Pujolle:
RFID in eHealth systems: applications, challenges, and perspectives. Ann. des Télécommunications 65(9-10): 497-503 (2010) - [c8]Khalifa Toumi, Mouna Ayari, Leïla Azouz Saïdane, Mathieu Bouet, Guy Pujolle:
HAT: HIP Address Translation protocol for Hybrid RFID/IP Internet of Things communication. ICWUS 2010: 13-19
2000 – 2009
- 2009
- [j1]Mathieu Bouet, Guy Pujolle:
L-VIRT: Range-free 3-D localization of RFID tags based on topological constraints. Comput. Commun. 32(13-14): 1485-1494 (2009) - [c7]Mathieu Bouet, Guy Pujolle:
L-VIRT: A 3-D Range-Free Localization Method for RFID Tags Based on Virtual Landmarks and Mobile Readers. CCNC 2009: 1-5 - [c6]Mathieu Bouet, Shahab Gashti, Guy Pujolle:
An energy-aware autonomic architecture for localization in ubiquitous networks. WCNC 2009: 2868-2872 - 2008
- [c5]Pascal Urien, Dorice Nyami, Simon Elrharbi, Hervé Chabanne, Thomas Icart, Cyrille Pepin, Mathieu Bouet, Daniel de Oliveira Cunha, Vincent Guyot, Guy Pujolle, Eric Gressier-Soudan, Jean-Ferdy Susini:
HIP Tags Privacy Architecture. ICSNC 2008: 179-184 - [c4]Mathieu Bouet, Guy Pujolle:
3-D Localization Schemes of RFID Tags with Static and Mobile Readers. Networking 2008: 112-123 - [c3]Mathieu Bouet, Guy Pujolle:
A range-free 3-D localization method for RFID tags based on virtual landmarks. PIMRC 2008: 1-5 - [c2]Mathieu Bouet, Aldri L. dos Santos:
RFID tags: Positioning principles and localization techniques. Wireless Days 2008: 1-5 - [c1]Pascal Urien, Simon Elrharbi, Dorice Nyamy, Hervé Chabanne, Thomas Icart, Cyrille Pepin, Mathieu Bouet, Daniel de Oliveira Cunha, Vincent Guyot, Patrice Krzanik, Jean-Ferdinand Susini:
HIP-tags, a new paradigm for the Internet Of Things. Wireless Days 2008: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint