![]() | ANSER, O., FRANCOIS, J., Chrisment, I., & Kondo, D. (2026). TATA: Benchmark NIDS Test Sets Assessment and Targeted Augmentation. In V. Nicomette (Ed.), Computer Security – ESORICS 2025 - 30th European Symposium on Research in Computer Security, Proceedings. Springer Science and Business Media Deutschland GmbH. doi:10.1007/978-3-032-07884-1_2 Peer reviewed |
![]() | LAVAUR, L., & FRANCOIS, J. (2025). WaterLLMarks: In-data User Tracing for Distributed LLMaaS Environments. In Proceedings of the 45th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW). IEEE. Peer reviewed |
![]() | TRESTIOREANU, L. A., SCHEIDT DE CRISTO, F., SHBAIR, W., FRANCOIS, J., Magoni, D., & STATE, R. (2024). To Squelch or not to Squelch: Enabling Improved Message Dissemination on the XRP Ledger. IEEE/IFIP Network Operations and Management Symposium. doi:10.1109/NOMS59830.2024.10575886 Peer reviewed |
![]() | Bergeron, L., FRANCOIS, J., STATE, R., & HILGER, J. (2024). BLU-SynTra: Distinguish Synergies and Trade-offs between Sustainable Development Goals Using Small Language Models. In Proceedings of the Joint Workshop of the 7th Financial Technology and Natural Language Processing, the 5th Knowledge Discovery from Unstructured Data in Financial Services, and the 4th Workshop on Economics and Natural Language Processing. Association for Computational Linguistics (ACL). Peer reviewed |
![]() | Nguyen, D. D. A., Alain, P., Autrel, F., Bouabdallah, A., FRANCOIS, J., & Doyen, G. (2024). How Fast Does Malware Leveraging EternalBlue Propagate? The case of WannaCry and NotPetya. In 2024 IEEE 10th International Conference on Network Softwarization, NetSoft 2024. Institute of Electrical and Electronics Engineers Inc. doi:10.1109/NetSoft60951.2024.10588886 Peer reviewed |
![]() | D'andrea, E., FRANCOIS, J., LAHMADI, A., & Festor, O. (2024). Vulnet: Learning Navigation in an Attack Graph. In 2024 IEEE 10th International Conference on Network Softwarization, NetSoft 2024. Institute of Electrical and Electronics Engineers Inc. doi:10.1109/NetSoft60951.2024.10588918 Peer reviewed |
![]() | Nguyen, D. D. A., Alain, P., Autrel, F., Bouabdallah, A., & FRANCOIS, J. (2024). Intent-Based Attack Mitigation through Opportunistic Synchronization of Micro-Services. In 2024 IEEE 10th International Conference on Network Softwarization, NetSoft 2024. Institute of Electrical and Electronics Engineers Inc. doi:10.1109/NetSoft60951.2024.10588925 Peer reviewed |
![]() | MIRSKY, G., Halpern, Min, Clemm, Strassner, & FRANCOIS, J. (2024). RFC 9544 Precision Availability Metrics (PAMs) for Services Governed by Service Level Objectives (SLOs). (RFC9544). Internet Engineering Task Force (IETF). https://orbilu.uni.lu/handle/10993/63284 |
![]() | Bergeron, L., FRANCOIS, J., STATE, R., & HILGER, J. (2023). ULA, a Bibliometric Method to Identify Sustainable Development Goals using Large Language Models. In 2023 IEEE International Humanitarian Technology Conference, IHTC 2023. Institute of Electrical and Electronics Engineers Inc. doi:10.1109/IHTC58960.2023.10508849 Peer reviewed |
![]() | SHBAIR, W., STEICHEN, M., FRANÇOIS, J., & STATE, R. (2018). Blockchain Orchestration and Experimentation Framework: A Case Study of KYC. In The First IEEE/IFIP International Workshop on Managing and Managed by Blockchain (Man2Block) colocated with IEEE/IFIP NOMS 2018. Peer reviewed |
![]() | MARCHAL, S., FRANÇOIS, J., STATE, R., & ENGEL, T. (December 2014). PhishStorm: Detecting Phishing With Streaming Analytics. IEEE Transactions on Network and Service Management, 11 (December), 458-471. doi:10.1109/TNSM.2014.2377295 Peer Reviewed verified by ORBi |
![]() | MARCHAL, S., FRANÇOIS, J., STATE, R., & ENGEL, T. (2014). PhishScore: Hacking Phishers' Minds. Proceedings of the 10th International Conference on Network and Service Management, 46-54. doi:10.1109/CNSM.2014.7014140 Peer reviewed |
![]() | DOLBERG, L., FRANÇOIS, J., & ENGEL, T. (2013). Multi-dimensional Aggregation for DNS Monitoring'. Proceedings of the 26th Large Installation System Administration Conference (LISA 12). doi:10.1109/LCN.2013.6761271 Peer reviewed |
![]() | GOERGEN, D., CHOLEZ, T., FRANÇOIS, J., & ENGEL, T. (2013). A semantic firewall for Content Centric Networking. In IFIP/IEEE International Symposium on Integrated Network Management (pp. 478 - 484). Peer reviewed |
![]() | GOERGEN, D., CHOLEZ, T., FRANÇOIS, J., & ENGEL, T. (2013). Security monitoring for Content Centric Networking. In Data Privacy Management and Autonomous Spontaneous Security (pp. 274-286). Springer Berlin Heidelberg. doi:10.1007/978-3-642-35890-6_20 Peer reviewed |
![]() | WAGNER, C., FRANÇOIS, J., STATE, R., DULAUNOY, A., ENGEL, T., & Massen, G. (2013). ASMATRA: Ranking ASs Providing Transit Service to Malware Hosters. IFIP/IEEE International Symposium on Integrated Network Management IM2013, 1-9. Peer reviewed |
![]() | MARCHAL, S., FRANÇOIS, J., STATE, R., & ENGEL, T. (2012). Semantic based DNS Forensics. In Proceedings of the IEEE International Workshop on Information Forensics and Security (pp. 91 - 96). IEEE. doi:10.1109/WIFS.2012.6412631 Peer reviewed |
![]() | MARCHAL, S., FRANÇOIS, J., STATE, R., & ENGEL, T. (2012). Proactive Discovery of Phishing Related Domain Names. In Proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses, Amsterdam 12-14 September 2012 (pp. 190-209). Springer Berlin Heidelberg. doi:10.1007/978-3-642-33338-5_10 Peer reviewed |
![]() | MARCHAL, S., FRANÇOIS, J., WAGNER, C., & ENGEL, T. (2012). Semantic Exploration of DNS. In Proceedings of the 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25 2012 (pp. 370-384). Springer Berlin Heidelberg. Peer reviewed |
![]() | MARCHAL, S., FRANÇOIS, J., WAGNER, C., STATE, R., DULAUNOY, A., ENGEL, T., & Festor, O. (2012). DNSSM: A large-scale Passive DNS Security Monitoring Framework. IEEE/IFIP Network Operations and Management Symposium, 988 - 993. doi:10.1109/NOMS.2012.6212019 Peer reviewed |
FRANÇOIS, J., Abdelnur, H. J., STATE, R., & Festor, O. (2010). Machine Learning Techniques for Passive Network Inventory. IEEE Transactions on Network and Service Management, 7 (4), 244 - 257. doi:10.1109/TNSM.2010.1012.0352 Peer Reviewed verified by ORBi |