default search action
Benoit Donnet
Person information
- affiliation: Université de Liège, Belgium
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c67]Géraldine Brieven, Valentin Baum, Benoit Donnet:
Tartare: Automatic Generation of C Pointer Statements and Feedback. ACE 2024: 192-201 - [c66]Justin Iurman, Benoit Donnet:
Implementing and Evaluating Ioam Integrity Protection. ANRW 2024 - [c65]Florian Dekinder, Eric Vyncke, Benoit Donnet:
Poster: Evaluating Dual-Stack Content Delivery Within Websites. CoNEXT 2024: 25-26 - [c64]Géraldine Brieven, Lev Malcev, Benoit Donnet:
Practicing Abstraction Skills Through Diagrammatic Reasoning Over CAFÉ 2.0. EDUCON 2024: 1-10 - [c63]Vincent Jacquot, Nada Hammad, Benoit Donnet:
Efficient and Reliable Service Detection on Bitcoin. ICBC 2024: 512-520 - [c62]Loïc Champagne, Benoit Donnet:
Smoothie: Efficient and Flexible Load-Balancing in Data Center. NOMS 2024: 1-7 - [c61]Maxime Letemple, Gaulthier Gain, Sami Ben Mariem, Laurent Mathy, Benoit Donnet:
$v\text{TNT}$: Unikernels for Efficient and Flexible Internet Probing. TMA 2024: 1-4 - [c60]Emilien Wansart, Maxime Goffart, Justin Iurman, Benoit Donnet:
MSTG: A Flexible and Scalable Microservices Infrastructure Generator. TMA 2024: 1-4 - [i13]Emilien Wansart, Maxime Goffart, Justin Iurman, Benoit Donnet:
MSTG: A Flexible and Scalable Microservices Infrastructure Generator. CoRR abs/2404.13665 (2024) - [i12]Maxime Letemple, Gaulthier Gain, Sami Ben Mariem, Laurent Mathy, Benoit Donnet:
uTNT: Unikernels for Efficient and Flexible Internet Probing. CoRR abs/2405.04036 (2024) - 2023
- [c59]Tom Piron, Luigi Iannone, Benoit Donnet:
Implementation and Evaluation of LISP Publish/Subscribe. 6GNet 2023: 1-4 - [c58]Vincent Jacquot, Benoit Donnet:
Chaussette: A Symbolic Verification of Bitcoin Scripts. ESORICS Workshops (1) 2023: 359-375 - [c57]Géraldine Brieven, Simon Liénardy, Lev Malcev, Benoit Donnet:
Graphical Loop Invariant Based Programming. FMTea 2023: 17-33 - [i11]Géraldine Brieven, Lev Malcev, Benoit Donnet:
Training Students' Abstraction Skills Around a CAFÉ 2.0. CoRR abs/2309.09562 (2023) - [i10]Eric Vyncke, Benoit Donnet, Justin Iurman:
Attribution of Internet Probes. RFC 9511: 1-10 (2023) - 2022
- [c56]Maxime Piraux, Louis Navarre, Nicolas Rybowski, Olivier Bonaventure, Benoit Donnet:
Revealing the evolution of a cloud provider through its network weather map. IMC 2022: 298-304 - [c55]Raphaël Léas, Justin Iurman, Eric Vyncke, Benoit Donnet:
Measuring IPv6 extension headers survivability with James. IMC 2022: 746-747 - [c54]Emeline Marechal, Yining Shao, Marc Bruyère, Benoit Donnet:
A first-look at segment routing deployment in a large european ISP. IMC 2022: 748-749 - [c53]Korian Edeline, Thomas Carlisi, Justin Iurman, Benoit Claise, Benoit Donnet:
Towards a Closed-Looped Automation for Service Assurance with the DxAgent. NetSoft 2022: 67-72 - [c52]Emeline Marechal, Pascal Mérindol, Benoit Donnet:
ISP Probing Reduction with Anaximander. PAM 2022: 441-469 - 2021
- [j19]Mattias Gabriel, Luigi Iannone, Benoit Donnet:
Lisp Mapping System as DoS Amplification Vector. IEEE Netw. Lett. 3(1): 36-39 (2021) - [j18]Emeline Marechal, Benoit Donnet:
Targeted Attack through Network Fingerprinting. J. Cyber Secur. Mobil. 10(2): 347-376 (2021) - [c51]Justin Iurman, Frank Brockners, Benoit Donnet:
Towards cross-layer telemetry. ANRW 2021: 15-21 - [c50]Pedro Casas, Matteo Romiti, Peter Holzer, Sami Ben Mariem, Benoit Donnet, Bernhard Haslhofer:
Where is the Light(ning) in the Taproot Dawn? Unveiling the Bitcoin Lightning (IP) Network. CloudNet 2021: 87-90 - [c49]Florentin Rochet, Emery Assogba, Maxime Piraux, Korian Edeline, Benoit Donnet, Olivier Bonaventure:
TCPLS: modern transport services with TCP and TLS. CoNEXT 2021: 45-59 - [c48]Jean-François Grailet, Benoit Donnet:
Travelling Without Moving: Discovering Neighborhood Adjacencies. TMA 2021 - 2020
- [j17]Justin Iurman, Benoit Donnet:
Ipv6 In-Situ Operations, Administration, and Maintenance. Softw. Impacts 6: 100036 (2020) - [j16]Jean-Romain Luttringer, Yves Vanaubel, Pascal Mérindol, Jean-Jacques Pansiot, Benoit Donnet:
Let There Be Light: Revealing Hidden MPLS Tunnels With TNT. IEEE Trans. Netw. Serv. Manag. 17(2): 1239-1253 (2020) - [j15]Jean-François Grailet, Benoit Donnet:
Virtual Insanity: Linear Subnet Discovery. IEEE Trans. Netw. Serv. Manag. 17(2): 1268-1281 (2020) - [c47]Simon Liénardy, Laurent Leduc, Dominique Verpoorten, Benoit Donnet:
Café: Automatic Correction and Feedback of Programming Challenges for a CS1 Course. ACE 2020: 95-104 - [c46]Korian Edeline, Benoit Donnet:
Evaluating the Impact of Path Brokenness on TCP Options. ANRW 2020: 38-44 - [c45]Emeline Marechal, Benoit Donnet:
Network Fingerprinting: Routers under Attack. EuroS&P Workshops 2020: 594-599 - [c44]Simon Liénardy, Benoit Donnet:
GameCode: Choose your Own Problem Solving Path. ICER 2020: 306 - [c43]Sami Ben Mariem, Pedro Casas, Matteo Romiti, Benoit Donnet, Rainer Stütz, Bernhard Haslhofer:
All that Glitters is not Bitcoin - Unveiling the Centralized Nature of the BTC (IP) Network. NOMS 2020: 1-9 - [i9]Sami Ben Mariem, Pedro Casas, Matteo Romiti, Benoit Donnet, Rainer Stütz, Bernhard Haslhofer:
All that Glitters is not Bitcoin - Unveiling the Centralized Nature of the BTC (IP) Network. CoRR abs/2001.09105 (2020)
2010 – 2019
- 2019
- [c42]Korian Edeline, Justin Iurman, Cyril Soldani, Benoit Donnet:
mmb: flexible high-speed userspace middleboxes. ANRW 2019: 62-68 - [c41]Yves Vanaubel, Jean-Romain Luttringer, Pascal Mérindol, Jean-Jacques Pansiot, Benoit Donnet:
TNT, Watch me Explode: A Light in the Dark for Revealing MPLS Tunnels. TMA 2019: 65-72 - [c40]Jean-François Grailet, Benoit Donnet:
Revisiting Subnet Inference WISE-ly. TMA 2019: 73-80 - [c39]Korian Edeline, Benoit Donnet:
A Bottom-Up Investigation of the Transport-Layer Ossification. TMA 2019: 169-176 - [c38]Raffaele Zullo, Antonio Pescapè, Korian Edeline, Benoit Donnet:
Hic Sunt Proxies: Unveiling Proxy Phenomena in Mobile Networks. TMA 2019: 227-232 - [i8]Yves Vanaubel, Jean-Romain Luttringer, Pascal Mérindol, Jean-Jacques Pansiot, Benoit Donnet:
TNT, Watch me Explode: A Light in the Dark for Revealing MPLS Tunnels. CoRR abs/1901.10156 (2019) - [i7]Korian Edeline, Justin Iurman, Cyril Soldani, Benoit Donnet:
mmb: Flexible High-Speed Userspace Middleboxes. CoRR abs/1904.11277 (2019) - [i6]Justin Iurman, Benoit Donnet, Frank Brockners:
Implementation of IOAM for IPv6 in the Linux Kernel. CoRR abs/1908.07240 (2019) - 2017
- [c37]Korian Edeline, Mirja Kühlewind, Brian Trammell, Benoit Donnet:
copycat: Testing Differential Treatment of New Transport Protocols in the Wild. ANRW 2017: 13-19 - [c36]Yves Vanaubel, Pascal Mérindol, Jean-Jacques Pansiot, Benoit Donnet:
Through the wormhole: tracking invisible MPLS tunnels. Internet Measurement Conference 2017: 29-42 - [c35]Sarah Wassermann, Pedro Casas, Thibaut Cuvelier, Benoit Donnet:
NETPerfTrace: Predicting Internet Path Dynamics and Performance with Machine Learning. Big-DAMA@SIGCOMM 2017: 31-36 - [c34]Korian Edeline, Benoit Donnet:
A First Look at the Prevalence and Persistence of Middleboxes in the Wild. ITC 2017: 161-168 - [c33]Jean-François Grailet, Benoit Donnet:
Towards a renewed alias resolution with space search reduction and IP fingerprinting. TMA 2017: 1-9 - [c32]Raffaele Zullo, Antonio Pescapè, Korian Edeline, Benoit Donnet:
Hic sunt NATs: Uncovering address translation with a smart traceroute. TMA 2017: 1-6 - 2016
- [c31]Simon Liénardy, Benoit Donnet:
Towards a Multipath TCP Aware Load Balancer. ANRW 2016: 13-15 - [c30]Stephan Neuhaus, Roman Muntener, Korian Edeline, Benoit Donnet, Elio Gubser:
Towards an Observatory for Network Transparency Research. ANRW 2016: 71-73 - [c29]Sarah Wassermann, Pedro Casas, Benoit Donnet, Guy Leduc, Marco Mellia:
On the Analysis of Internet Paths with DisNETPerf, a Distributed Paths Performance Analyzer. LCN Workshops 2016: 72-79 - [c28]Yue Li, Damien Saucez, Luigi Iannone, Benoit Donnet:
Stability and Consistency of the LISP Pull Routing Architecture. LCN Workshops 2016: 96-103 - [c27]Yves Vanaubel, Pascal Mérindol, Jean-Jacques Pansiot, Benoit Donnet:
A Brief History of MPLS Usage in IPv6. PAM 2016: 359-370 - [c26]Jean-François Grailet, Fabien Tarissan, Benoit Donnet:
TreeNET: Discovering and Connecting Subnets. TMA 2016 - [c25]Gabriel Dávila Revelo, Mauricio Anderson Ricci, Benoit Donnet, J. Ignacio Alvarez-Hamelin:
Unveiling the MPLS Structure on Internet Topology. TMA 2016 - [i5]Korian Edeline, Mirja Kühlewind, Brian Trammell, Emile Aben, Benoit Donnet:
Using UDP for Internet Transport Evolution. CoRR abs/1612.07816 (2016) - 2015
- [c24]Yves Vanaubel, Pascal Mérindol, Jean-Jacques Pansiot, Benoit Donnet:
MPLS Under the Microscope: Revealing Actual Transit Path Diversity. Internet Measurement Conference 2015: 49-62 - [c23]Korian Edeline, Benoit Donnet:
Towards a middlebox policy taxonomy: Path impairments. INFOCOM Workshops 2015: 402-407 - [c22]Valentin Thirion, Korian Edeline, Benoit Donnet:
Tracking Middleboxes in the Mobile World with TraceboxAndroid. TMA 2015: 79-91 - 2014
- [c21]Luca Cittadini, Stefano Vissicchio, Benoit Donnet:
On the quality of BGP route collectors for iBGP policy inference. Networking 2014: 1-9 - [c20]Florin Coras, Damien Saucez, Luigi Iannone, Benoit Donnet:
On the performance of the LISP beta network. Networking 2014: 1-9 - 2013
- [j14]Damien Saucez, Luigi Iannone, Benoit Donnet:
A first measurement look at the deployment and evolution of thelocator/id separation protocol. Comput. Commun. Rev. 43(2): 37-43 (2013) - [j13]Mohamed Ali Kâafar, Shlomo Berkovsky, Benoit Donnet:
On the potential of recommendation technologies for efficient content delivery networks. Comput. Commun. Rev. 43(3): 74-77 (2013) - [j12]Fabien Tarissan, Bruno Quoitin, Pascal Mérindol, Benoit Donnet, Jean-Jacques Pansiot, Matthieu Latapy:
Towards a bipartite graph modeling of the internet topology. Comput. Networks 57(11): 2331-2347 (2013) - [c19]Gregory Detal, Benjamin Hesmans, Olivier Bonaventure, Yves Vanaubel, Benoit Donnet:
Revealing middlebox interference with tracebox. Internet Measurement Conference 2013: 1-8 - [c18]Yves Vanaubel, Jean-Jacques Pansiot, Pascal Mérindol, Benoit Donnet:
Network fingerprinting: TTL-based router signatures. Internet Measurement Conference 2013: 369-376 - [p1]Benoit Donnet:
Internet Topology Discovery. Data Traffic Monitoring and Analysis 2013: 44-81 - 2012
- [j11]Benoit Donnet, Matthew J. Luckie, Pascal Mérindol, Jean-Jacques Pansiot:
Revealing MPLS tunnels obscured from traceroute. Comput. Commun. Rev. 42(2): 87-93 (2012) - [j10]Benoit Donnet, Bamba Gueye, Mohamed Ali Kâafar:
Path similarity evaluation using Bloom filters. Comput. Networks 56(2): 858-869 (2012) - [c17]Pietro Marchetta, Pascal Mérindol, Benoit Donnet, Antonio Pescapè, Jean-Jacques Pansiot:
Quantifying and mitigating IGMP filtering in topology discovery. GLOBECOM 2012: 1871-1876 - [c16]Damien Saucez, Benoit Donnet:
On the Dynamics of Locators in LISP. Networking (1) 2012: 385-396 - 2011
- [j9]Ingmar Poese, Steve Uhlig, Mohamed Ali Kâafar, Benoit Donnet, Bamba Gueye:
IP geolocation databases: unreliable? Comput. Commun. Rev. 41(2): 53-56 (2011) - [j8]Pietro Marchetta, Pascal Mérindol, Benoit Donnet, Antonio Pescapè, Jean-Jacques Pansiot:
Topology Discovery at the Router Level: A New Hybrid Tool Targeting ISP Networks. IEEE J. Sel. Areas Commun. 29(9): 1776-1787 (2011) - [c15]Pascal Mérindol, Benoit Donnet, Jean-Jacques Pansiot, Matthew J. Luckie, Young Hyun:
MERLIN: MEasure the router level of the INternet. NGI 2011: 1-8 - 2010
- [j7]kc claffy, Emile Aben, Jordan Augé, Robert Beverly, Fabián E. Bustamante, Benoit Donnet, Timur Friedman, Marina Fomenkov, Péter Hága, Matthew J. Luckie, Yuval Shavitt:
The 2nd workshop on active internet measurements (AIMS-2) report. Comput. Commun. Rev. 40(5): 53-58 (2010) - [j6]Benoit Donnet, Bruno Baynat, Timur Friedman:
Improving retouched Bloom filter for trading off selected false positives against false negatives. Comput. Networks 54(18): 3373-3387 (2010) - [j5]Benoit Donnet, Bamba Gueye, Mohamed Ali Kâafar:
A Survey on Network Coordinates Systems, Design, and Security. IEEE Commun. Surv. Tutorials 12(4): 488-503 (2010) - [c14]Pascal Mérindol, Benoit Donnet, Olivier Bonaventure, Jean-Jacques Pansiot:
On the impact of layer-2 on node degree distribution. Internet Measurement Conference 2010: 179-191 - [c13]Jean-Jacques Pansiot, Pascal Mérindol, Benoit Donnet, Olivier Bonaventure:
Extracting Intra-domain Topology from mrinfo Probing. PAM 2010: 81-90
2000 – 2009
- 2009
- [c12]Pascal Mérindol, Virginie Van den Schrieck, Benoit Donnet, Olivier Bonaventure, Jean-Jacques Pansiot:
Quantifying ases multiconnectivity using multicast information. Internet Measurement Conference 2009: 370-376 - [c11]Benoit Donnet:
Incentives for BGP Guided IP-Level Topology Discovery. TMA 2009: 101-108 - [c10]Kenji Masui, Benoit Donnet:
DTS: A Decentralized Tracing System. TMA 2009: 126-134 - [c9]Damien Saucez, Benoit Donnet, Olivier Bonaventure:
On the Impact of Clustering on Measurement Reduction. Networking 2009: 835-846 - 2008
- [j4]Benoit Donnet, Olivier Bonaventure:
On BGP communities. Comput. Commun. Rev. 38(2): 55-59 (2008) - 2007
- [j3]Benoit Donnet, Timur Friedman:
Internet topology discovery: A survey. IEEE Commun. Surv. Tutorials 9(1-4): 56-69 (2007) - [j2]Salim Nahle, Luigi Iannone, Benoit Donnet, Naceur Malouch:
On the construction of wimax mesh tree. IEEE Commun. Lett. 11(12): 967-969 (2007) - [c8]Damien Saucez, Benoit Donnet, Olivier Bonaventure:
Implementation and preliminary evaluation of an ISP-driven informed path selection. CoNEXT 2007: 45 - [c7]Damien Saucez, Benoit Donnet, Olivier Bonaventure:
A Reputation-Based Approach for Securing Vivaldi Embedding System. EUNICE 2007: 78-85 - [c6]Benoit Donnet, Bradley Huffaker, Timur Friedman, Kimberly C. Claffy:
Increasing the Coverage of a Cooperative Internet Topology Discovery Algorithm. Networking 2007: 738-748 - 2006
- [j1]Benoit Donnet, Philippe Raoult, Timur Friedman, Mark Crovella:
Deployment of an Algorithm for Large-Scale Topology Discovery. IEEE J. Sel. Areas Commun. 24(12): 2210-2220 (2006) - [c5]Benoit Donnet, Bruno Baynat, Timur Friedman:
Retouched bloom filters: allowing networked applications to trade off selected false positives against false negatives. CoNEXT 2006: 13 - [c4]Benoit Donnet, Bradley Huffaker, Timur Friedman, Kimberly C. Claffy:
Evaluation of a Large-Scale Topology Discovery Algorithm. IPOM 2006: 193-204 - [i4]Benoit Donnet, Bradley Huffaker, Timur Friedman, Kimberly C. Claffy:
Implementation and Deployment of a Distributed Network Topology Discovery Algorithm. CoRR abs/cs/0603062 (2006) - [i3]Benoit Donnet, Philippe Raoult, Timur Friedman:
Efficient Route Tracing from a Single Source. CoRR abs/cs/0605133 (2006) - [i2]Benoit Donnet, Bruno Baynat, Timur Friedman:
Retouched Bloom Filters: Allowing Networked Applications to Flexibly Trade Off False Positives Against False Negatives. CoRR abs/cs/0607038 (2006) - 2005
- [c3]Benoit Donnet, Timur Friedman:
Topology Discovery Using an Address Prefix Based Stopping Rule. EUNICE 2005: 119-130 - [c2]Benoit Donnet, Timur Friedman, Mark Crovella:
Improved Algorithms for Network Topology Discovery. PAM 2005: 149-162 - [c1]Benoit Donnet, Philippe Raoult, Timur Friedman, Mark Crovella:
Efficient algorithms for large-scale topology discovery. SIGMETRICS 2005: 327-338 - 2004
- [i1]Benoit Donnet, Philippe Raoult, Timur Friedman, Mark Crovella:
Efficient Algorithms for Large-Scale Topology Discovery. CoRR cs.NI/0411013 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint