


default search action
Guillaume Doyen
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Hichem Magnouche
, Guillaume Doyen, Caroline Prodhon:
A Fair Sharing Approach for Micro-Services Function Chains Placement in Ultra-Low Latency Services. IEEE Trans. Netw. Serv. Manag. 21(1): 20-34 (2024) - [c47]Virgil Hamici-Aubert
, Julien Saint-Martin
, Renzo E. Navas
, Georgios Z. Papadopoulos
, Guillaume Doyen
, Xavier Lagrange
:
Leveraging Overshadowing for Time-Delay Attacks in 4G/5G Cellular Networks: An Empirical Assessment. ARES 2024: 91:1-91:10 - [c46]Do Duc Anh Nguyen
, Pierre Alain, Fabien Autrel, Ahmed Bouabdallah, Jérôme François, Guillaume Doyen:
How Fast Does Malware Leveraging EternalBlue Propagate? The case of WannaCry and NotPetya. NetSoft 2024: 399-404 - [c45]Van-Tien Nguyen, Renzo E. Navas, Guillaume Doyen:
Lightweight Security for IoT Systems leveraging Moving Target Defense and Intrusion Detection. NOMS 2024: 1-6 - 2023
- [j12]Marius Letourneau, Guillaume Doyen, Rémi Cogranne, Bertrand Mathieu:
A Comprehensive Characterization of Threats Targeting Low-Latency Services: The Case of L4S. J. Netw. Syst. Manag. 31(1): 19 (2023) - [j11]Alexander Clemm, Raouf Boutaba, Guillaume Doyen, Bertrand Mathieu, Mohamed Faten Zhani
:
High-Precision, Predictable and Low-Latency Networking. J. Netw. Syst. Manag. 31(4): 75 (2023) - [c44]Hichem Magnouche, Guillaume Doyen, Caroline Prodhon:
A Lightweight Heuristic for Micro-Services Placement and Chaining in Low Latency Services. CNSM 2023: 1-9 - [c43]Do Duc Anh Nguyen
, Fabien Autrel, Ahmed Bouabdallah, Guillaume Doyen:
A Robust Approach for the Detection and Prevention of Conflicts in I2NSF Security Policies. NOMS 2023: 1-7 - [c42]Huu Nghia Nguyen, Bertrand Mathieu, Marius Letourneau, Guillaume Doyen, Stéphane Tuffin
, Edgardo Montes de Oca:
A Comprehensive P4-based Monitoring Framework for L4S leveraging In-band Network Telemetry. NOMS 2023: 1-6 - 2022
- [c41]Hichem Magnouche, Guillaume Doyen, Caroline Prodhon:
Leveraging Micro-Services for Ultra-Low Latency: An optimization Model for Service Function Chains Placement. NetSoft 2022: 198-206 - 2021
- [c40]Marius Letourneau, Kouame Boris N'Djore, Guillaume Doyen, Bertrand Mathieu, Rémi Cogranne, Huu Nghia Nguyen:
Assessing the Threats Targeting Low Latency Traffic: the Case of L4S. CNSM 2021: 544-550
2010 – 2019
- 2019
- [j10]Guillaume Doyen, Thibault Cholez, Wissam Mallouli, Bertrand Mathieu, Hoang Long Mai, Xavier Marchal, Daishi Kondo, Messaoud Aouadj, Alain Ploix, Edgardo Montes de Oca
, Olivier Festor
:
An Orchestrated NDN Virtual Infrastructure Transporting Web Traffic: Design, Implementation, and First Experiments with Real End Users. IEEE Commun. Mag. 57(6): 33-39 (2019) - [j9]Tan N. Nguyen, Hoang Long Mai, Rémi Cogranne
, Guillaume Doyen, Wissam Mallouli, Luong Nguyen
, Moustapha El Aoun, Edgardo Montes de Oca
, Olivier Festor
:
Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking. IEEE Trans. Inf. Forensics Secur. 14(9): 2470-2485 (2019) - [c39]Hoang Long Mai, Guillaume Doyen, Wissam Mallouli, Edgardo Montes de Oca
, Olivier Festor
:
Towards Content-Centric Control Plane Supporting Efficient Anomaly Detection Functions. CNSM 2019: 1-9 - [c38]Hoang Long Mai, Messaoud Aouadj, Guillaume Doyen, Wissam Mallouli, Edgardo Montes de Oca, Olivier Festor:
Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN. IM 2019: 594-598 - 2018
- [j8]Tan N. Nguyen, Hoang Long Mai, Guillaume Doyen, Rémi Cogranne
, Wissam Mallouli, Edgardo Montes de Oca, Olivier Festor
:
A Security Monitoring Plane for Named Data Networking Deployment. IEEE Commun. Mag. 56(11): 88-94 (2018) - [j7]Rémi Cogranne
, Guillaume Doyen, Nisrine Ghadban, Badis Hammi
:
Detecting Botclouds at Large Scale: A Decentralized and Robust Detection Method for Multi-Tenant Virtualized Environments. IEEE Trans. Netw. Serv. Manag. 15(1): 68-82 (2018) - [c37]Hoang Long Mai, Messaoud Aouadj, Guillaume Doyen, Daishi Kondo, Xavier Marchal, Thibault Cholez, Edgardo Montes de Oca, Wissam Mallouli:
Implementation of content poisoning attack detection and reaction in virtualized NDN networks. ICIN 2018: 1-3 - [c36]Hoang Long Mai, Tan N. Nguyen, Guillaume Doyen, Rémi Cogranne
, Wissam Mallouli, Edgardo Montes de Oca, Olivier Festor
:
Towards a security monitoring plane for named data networking and its application against content poisoning attack. NOMS 2018: 1-9 - [c35]Xavier Marchal, Moustapha El Aoun, Bertrand Mathieu, Thibault Cholez, Guillaume Doyen, Wissam Mallouli, Olivier Festor
:
Leveraging NFV for the deployment of NDN: Application to HTTP traffic transport. NOMS 2018: 1-5 - 2017
- [c34]Tan N. Nguyen, Xavier Marchal, Guillaume Doyen, Thibault Cholez, Rémi Cogranne
:
Content Poisoning in Named Data Networking: Comprehensive characterization of real deployment. IM 2017: 72-80 - [c33]Nisrine Ghadban, Rémi Cogranne
, Guillaume Doyen:
A decentralized approach for adaptive workload estimation in virtualized environments. IM 2017: 1186-1194 - [p1]Théo Combe, Wissam Mallouli, Thibault Cholez, Guillaume Doyen, Bertrand Mathieu, Edgardo Montes de Oca:
An SDN and NFV Use Case: NDN Implementation and Security Monitoring. Guide to Security in SDN and NFV 2017: 299-321 - 2016
- [c32]Xavier Marchal, Moustapha El Aoun, Bertrand Mathieu, Wissam Mallouli, Thibault Cholez, Guillaume Doyen, Patrick Truong, Alain Ploix, Edgardo Montes de Oca
:
A virtualized and monitored NDN infrastructure featuring a NDN/HTTP gateway. ICN 2016: 225-226 - [c31]Hoang Long Mai, Ngoc Tan Nguyen, Guillaume Doyen, Alain Ploix, Rémi Cogranne
:
On the Readiness of NDN for a Secure Deployment: The Case of Pending Interest Table. AIMS 2016: 98-110 - 2015
- [j6]Anna Sperotto
, Guillaume Doyen, Steven Latré, Marinos Charalambides
, Jeroen Famaey
, Petr Velan
, Pavel Celeda
:
Report on the 8th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2014) - Monitoring and Securing Virtualized Networks and Services. J. Netw. Syst. Manag. 23(3): 794-802 (2015) - [c30]Bertrand Mathieu, Guillaume Doyen, Wissam Mallouli, Thomas Silverston, Olivier Bettan, François-Xavier Aguessy, Thibault Cholez, Abdelkader Lahmadi, Patrick Truong, Edgardo Montes de Oca
:
Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment. ARES 2015: 741-748 - [c29]Tan N. Nguyen, Rémi Cogranne
, Guillaume Doyen:
An optimal statistical test for robust detection against interest flooding attacks in CCN. IM 2015: 252-260 - [c28]Badis Hammi
, Guillaume Doyen, Rida Khatoun:
A collaborative approach for a source based detection of botclouds. IM 2015: 906-909 - [c27]Tan N. Nguyen, Rémi Cogranne
, Guillaume Doyen, Florent Retraint:
Detection of interest flooding attacks in Named Data Networking using hypothesis testing. WIFS 2015: 1-6 - 2014
- [j5]Rafik Makhloufi, Guillaume Doyen, Grégory Bonnet, Dominique Gaïti:
A survey and performance evaluation of decentralized aggregation schemes for autonomic management. Int. J. Netw. Manag. 24(6): 469-498 (2014) - [j4]Guillaume Doyen, Martin Waldburger, Anna Sperotto
, Pavel Celeda
, Juan-Luis Gorricho, Thomas Schaaf, Joan Serrat:
Report on the 7th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2013): Emerging Management Mechanisms for the Future Internet. J. Netw. Syst. Manag. 22(2): 289-296 (2014) - [c26]Badis Hammi
, Guillaume Doyen, Rida Khatoun:
Toward a Source Detection of Botclouds: A PCA-Based Approach. AIMS 2014: 105-117 - [c25]Badis Hammi
, Guillaume Doyen, Rida Khatoun:
Understanding botclouds from a system perspective: A principal component analysis. NOMS 2014: 1-9 - [c24]Badis Hammi
, Rida Khatoun, Guillaume Doyen:
A Factorial Space for a System-Based Detection of Botcloud Activity. NTMS 2014: 1-5 - [e2]Anna Sperotto, Guillaume Doyen, Steven Latré, Marinos Charalambides, Burkhard Stiller:
Monitoring and Securing Virtualized Networks and Services - 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 - July 3, 2014. Proceedings. Lecture Notes in Computer Science 8508, Springer 2014, ISBN 978-3-662-43861-9 [contents] - 2013
- [j3]Thibault Cholez, Isabelle Chrisment, Olivier Festor
, Guillaume Doyen:
Detection and mitigation of localized attacks in a widely deployed P2P network. Peer-to-Peer Netw. Appl. 6(2): 155-174 (2013) - [c23]Ihsan Ullah, Guillaume Doyen, Dominique Gaïti:
Towards user-aware Peer-to-Peer live video streaming systems. IM 2013: 920-926 - [c22]Ihsan Ullah, Grégory Bonnet, Guillaume Doyen, Dominique Gaïti:
Toward user-classified P2P IPTV systems: A persona-based approach. IM 2013: 1187-1190 - [e1]Guillaume Doyen, Martin Waldburger, Pavel Celeda
, Anna Sperotto
, Burkhard Stiller:
Emerging Management Mechanisms for the Future Internet - 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013. Proceedings. Lecture Notes in Computer Science 7943, Springer 2013, ISBN 978-3-642-38997-9 [contents] - 2012
- [j2]Ihsan Ullah, Guillaume Doyen, Grégory Bonnet
, Dominique Gaïti:
A Survey and Synthesis of User Behavior Measurements in P2P Streaming Systems. IEEE Commun. Surv. Tutorials 14(3): 734-749 (2012) - [j1]Ihsan Ullah, Guillaume Doyen, Grégory Bonnet, Dominique Gaïti:
A Bayesian approach for user aware peer-to-peer video streaming systems. Signal Process. Image Commun. 27(5): 438-456 (2012) - [c21]Ihsan Ullah, Guillaume Doyen, Grégory Bonnet, Dominique Gaïti:
An autonomous topology management framework for QoS enabled P2P video streaming systems. CNSM 2012: 126-134 - [c20]Frédéric Merle, Aurélien Bénel
, Guillaume Doyen, Dominique Gaïti:
Decentralized documents authoring system for decentralized teamwork: matching architecture with organizational structure. GROUP 2012: 117-120 - [c19]Rafik Makhloufi, Guillaume Doyen, Grégory Bonnet
, Dominique Gaïti:
SAAM: A self-adaptive aggregation mechanism for autonomous management systems. NOMS 2012: 667-670 - 2011
- [c18]Rafik Makhloufi, Guillaume Doyen, Grégory Bonnet, Dominique Gaïti:
Impact of Dynamics on Situated and Global Aggregation Schemes. AIMS 2011: 148-159 - [c17]Rafik Makhloufi, Guillaume Doyen, Grégory Bonnet, Dominique Gaïti:
Towards self-adaptive management frameworks: The case of aggregated information monitoring. CNSM 2011: 1-5 - [c16]Ihsan Ullah, Guillaume Doyen, Grégory Bonnet
, Dominique Gaïti:
User behavior anticipation in P2P live video streaming systems through a Bayesian network. Integrated Network Management 2011: 337-344 - [c15]Rafik Makhloufi, Guillaume Doyen, Grégory Bonnet
, Dominique Gaïti:
Situated vs. global aggregation schemes for autonomous management systems. Integrated Network Management 2011: 1135-1139 - [c14]Grégory Bonnet
, Ihsan Ullah, Guillaume Doyen, Lionel Fillatre, Dominique Gaïti, Igor V. Nikiforov
:
A Semi-Markovian Individual Model of Users for P2P Video Streaming Applications. NTMS 2011: 1-5 - [c13]Guillaume Montassier, Thibault Cholez, Guillaume Doyen, Rida Khatoun, Isabelle Chrisment, Olivier Festor
:
Content pollution quantification in large P2P networks : A measurement study on KAD. Peer-to-Peer Computing 2011: 30-33 - 2010
- [c12]Ihsan Ullah, Grégory Bonnet, Guillaume Doyen, Dominique Gaïti:
Modeling User Behavior in P2P Live Video Streaming Systems through a Bayesian Network. AIMS 2010: 2-13 - [c11]Rafik Makhloufi, Grégory Bonnet, Guillaume Doyen, Dominique Gaïti:
Towards a P2P-Based Deployment of Network Management Information. AIMS 2010: 26-37 - [c10]Grégory Bonnet, Guillaume Doyen:
Coopération entre systèmes multi-agents appliquée au contrôle de trafic sur les réseaux pair-à-pair (présentation courte). JFSMA 2010: 183-192
2000 – 2009
- 2009
- [c9]Rafik Makhloufi, Grégory Bonnet, Guillaume Doyen, Dominique Gaïti:
Decentralized Aggregation Protocols in Peer-to-Peer Networks: A Survey. MACE 2009: 111-116 - [c8]Ihsan Ullah, Grégory Bonnet, Guillaume Doyen, Dominique Gaïti:
Improving Performance of ALM Systems with Bayesian Estimation of Peers Dynamics. MMNS 2009: 157-169 - 2008
- [c7]Rida Khatoun, Guillaume Doyen, Dominique Gaïti, Radwane Saad, Ahmed Serhrouchni:
Decentralized Alerts Correlation Approach for DDoS Intrusion Detection. NTMS 2008: 1-5 - 2005
- [b1]Guillaume Doyen:
Supervision des réseaux et services pair à pair. (Management of peer-to-peer networks and services). Henri Poincaré University, Nancy, France, 2005 - [c6]Guillaume Doyen, Emmanuel Nataf, Olivier Festor:
A Hierarchical Architecture for a Distributed Management of P2P Networks and Services. DSOM 2005: 257-268 - [c5]Guillaume Doyen, Emmanuel Nataf, Olivier Festor:
Performance Management of Peer-to-Peer Distributed Hash Tables. EUNICE 2005: 233-246 - 2004
- [c4]Guillaume Doyen, Olivier Festor, Emmanuel Nataf:
A CIM Extension for Peer-to-Peer Network and Service Management. ICT 2004: 801-810 - [c3]Guillaume Doyen, Emmanuel Nataf, Olivier Festor:
A Performance-Oriented Management Information Model for the Chord Peer-to-Peer Framework. MMNS 2004: 200-212 - 2003
- [c2]Emmanuel Nataf, Olivier Festor, Guillaume Doyen:
An SMIng-centric Proxy Agent for Integrated Monitoring and Provisioning. Integrated Network Management 2003: 491-503 - [c1]Guillaume Doyen, Emmanuel Nataf, Olivier Festor:
Management of Peer-to-Peer Networks Applied to Instant Messaging. MMNS 2003: 449-461
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint