default search action
Rémi Badonnel
Person information
- affiliation: LORIA, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Mohamed Oulaaffart, Rémi Badonnel, Olivier Festor:
C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services. J. Netw. Syst. Manag. 32(1): 21 (2024) - [j23]Sara Ricci, Simon Parker, Jan Jerabek, Yianna Danidou, Argyro Chatzopoulou, Remi Badonnel, Imre Lendak, Vladimir Janout:
Understanding Cybersecurity Education Gaps in Europe. IEEE Trans. Educ. 67(2): 190-201 (2024) - 2022
- [b2]Rémi Badonnel:
Managing Security for the Cyber-Space - From Smart Monitoring to Automated Configuration. (Gestion de la Sécurité pour le Cyber-Espace - Du Monitorage Intelligent à la Configuration Automatique). University of Lorraine, Nancy, France, 2022 - [j22]Rémi Badonnel, Carol J. Fung, Sandra Scott-Hayward, Qi Li, Fulvio Valenza, Cristian Hesselman:
Guest Editors Introduction: Special Section on Recent Advances in Network Security Management. IEEE Trans. Netw. Serv. Manag. 19(3): 2251-2254 (2022) - [c55]Sara Ricci, Marek Sikora, Simon Parker, Imre Lendak, Yianna Danidou, Argyro Chatzopoulou, Remi Badonnel, Donatas Alksnys:
Job Adverts Analyzer for Cybersecurity Skills Needs Evaluation. ARES 2022: 84:1-84:10 - [c54]Mohamed Oulaaffart, Rémi Badonnel, Olivier Festor:
CMSec: A Vulnerability Prevention Tool for Supporting Migrations in Cloud Composite Services. CloudNet 2022: 267-271 - [c53]Mohamed Oulaaffart, Remi Badonnel, Christophe Bianco:
An Automated SMT-based Security Framework for Supporting Migrations in Cloud Composite Services. NOMS 2022: 1-9 - 2021
- [j21]Nur Zincir-Heywood, Rémi Badonnel:
CNSM 2019 special issue: Embracing the new wave of artificial intelligence. Int. J. Netw. Manag. 31(1) (2021) - [j20]Adrien Hemmer, Mohamed Abderrahim, Rémi Badonnel, Jérôme François, Isabelle Chrisment:
Comparative Assessment of Process Mining for Supporting IoT Predictive Security. IEEE Trans. Netw. Serv. Manag. 18(1): 1092-1103 (2021) - [j19]Rémi Badonnel, Carol J. Fung, Sandra Scott-Hayward, Qi Li, Jie Zhang, Cristian Hesselman:
Guest Editors' Introduction: Special Issue on Latest Developments for Security Management of Networks and Services. IEEE Trans. Netw. Serv. Manag. 18(2): 1120-1124 (2021) - [c52]Sara Ricci, Vladimir Janout, Simon Parker, Jan Jerabek, Jan Hajny, Argyro Chatzopoulou, Remi Badonnel:
PESTLE Analysis of Cybersecurity Education. ARES 2021: 142:1-142:8 - [c51]Adrien Hemmer, Mohamed Abderrahim, Remi Badonnel, Isabelle Chrisment:
An Ensemble Learning-Based Architecture for Security Detection in IoT Infrastructures. CNSM 2021: 180-186 - [c50]Mohamed Oulaaffart, Remi Badonnel, Olivier Festor:
Towards Automating Security Enhancement for Cloud Services. IM 2021: 692-696 - 2020
- [j18]Maxime Compastié, Rémi Badonnel, Olivier Festor, Ruan He:
From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models. Comput. Secur. 97: 101905 (2020) - [j17]Rémi Badonnel, Carol J. Fung, Qi Li, Sandra Scott-Hayward:
Guest Editorial: Special Section on Cybersecurity Techniques for Managing Networked Systems. IEEE Trans. Netw. Serv. Manag. 17(1): 12-14 (2020) - [c49]Adrien Hemmer, Rémi Badonnel, Isabelle Chrisment:
A Process Mining Approach for Supporting IoT Predictive Security. NOMS 2020: 1-9 - [c48]Adrien Hemmer, Rémi Badonnel, Jérôme François, Isabelle Chrisment:
A Process Mining Tool for Supporting IoT Security. NOMS 2020: 1-2
2010 – 2019
- 2019
- [c47]Nicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz:
Automated Factorization of Security Chains in Software-Defined Networks. IM 2019: 374-380 - [c46]Nicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz:
A Tool Suite for the Automated Synthesis of Security Function Chains. IM 2019: 716-717 - [c45]Maxime Compastié, Rémi Badonnel, Olivier Festor, Ruan He:
A TOSCA-Oriented Software-Defined Security Approach for Unikernel-Based Protected Clouds. NetSoft 2019: 151-159 - [c44]Alexandru Vulpe, Ali Paikan, Razvan Craciunescu, Pouyan Ziafati, Sofoklis A. Kyriazakos, Adrien Hemmer, Remi Badonnel:
IoT Security Approaches in Social Robots for Ambient Assisted Living Scenarios. WPMC 2019: 1-6 - [e5]Hanan Lutfiyya, Yixin Diao, Nur Zincir-Heywood, Rémi Badonnel, Edmundo R. M. Madeira:
15th International Conference on Network and Service Management, CNSM 2019, Halifax, NS, Canada, October 21-25, 2019. IEEE 2019, ISBN 978-3-903176-24-9 [contents] - 2018
- [j16]Nicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz:
Rule-Based Synthesis of Chains of Security Functions for Software-Defined Networks. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 76 (2018) - [j15]Jeroen van der Hooft, Maxim Claeys, Niels Bouten, Tim Wauters, Jürgen Schönwälder, Aiko Pras, Burkhard Stiller, Marinos Charalambides, Rémi Badonnel, Joan Serrat, Carlos Raniery Paula dos Santos, Filip De Turck:
Updated Taxonomy for the Network and Service Management Research Field. J. Netw. Syst. Manag. 26(3): 790-808 (2018) - [j14]Remi Badonnel, Robert Koch, Martin Drasar, Aiko Pras, Volker Eiseler, Lars Stiemert, Sebastian Seeber, Daphné Tuncer, Marinos Charalambides, Gabi Dreo Rodosek:
Report on the 10th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2016) - Management and Security in the Age of Hyperconnectivity. J. Netw. Syst. Manag. 26(4): 1101-1109 (2018) - [c43]Maxime Compastié, Remi Badonnel, Olivier Festor, Ruan He:
Demo: On-the-fly generation of unikernels for software-defined security in cloud infrastructures. NOMS 2018: 1-2 - [c42]Maxime Compastié, Remi Badonnel, Olivier Festor, Ruan He, Mohamed Kassi-Lahlou:
Unikernel-based approach for software-defined security in cloud infrastructures. NOMS 2018: 1-7 - [c41]Nicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz:
Synaptic: A formal checker for SDN-based security policies. NOMS 2018: 1-2 - [c40]Nicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz:
Generation of SDN policies for protecting android environments based on automata learning. NOMS 2018: 1-7 - 2017
- [j13]Filip De Turck, Joon-Myung Kang, Hyunseung Choo, Myung-Sup Kim, Baek-Young Choi, Remi Badonnel, James Won-Ki Hong:
Softwarization of networks, clouds, and internet of things. Int. J. Netw. Manag. 27(2) (2017) - [j12]Rémi Badonnel, Kazuhiko Kinoshita, Daphné Tuncer, Sejun Song:
Special Issue on management of SDN/NFV-based systems. Int. J. Netw. Manag. 27(6) (2017) - [j11]Anthéa Mayzaud, Rémi Badonnel, Isabelle Chrisment:
A Distributed Monitoring Strategy for Detecting Version Number Attacks in RPL-Based Networks. IEEE Trans. Netw. Serv. Manag. 14(2): 472-486 (2017) - [c39]Maxime Compastié, Rémi Badonnel, Olivier Festor, Ruan He, Mohamed Kassi-Lahlou:
Towards a Software-Defined Security Framework for Supporting Distributed Cloud. AIMS 2017: 47-61 - [c38]Nicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz:
Automated verification of security chains in software-defined networks with synaptic. NetSoft 2017: 1-9 - [e4]Daphné Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller:
Security of Networks and Services in an All-Connected World - 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings. Lecture Notes in Computer Science 10356, Springer 2017, ISBN 978-3-319-60773-3 [contents] - 2016
- [j10]Anthéa Mayzaud, Remi Badonnel, Isabelle Chrisment:
A Taxonomy of Attacks in RPL-based Internet of Things. Int. J. Netw. Secur. 18(3): 459-473 (2016) - [c37]Sebastian Seeber, Gabi Dreo Rodosek, Gaëtan Hurel, Rémi Badonnel:
Analysis and Evaluation of OpenFlow Message Usage for Security Applications. AIMS 2016: 84-97 - [c36]Maxime Compastié, Remi Badonnel, Olivier Festor, Ruan He, Mohamed Kassi-Lahlou:
A Software-Defined Security Strategy for Supporting Autonomic Security Enforcement in Distributed Cloud. CloudCom 2016: 464-467 - [c35]Anthéa Mayzaud, Remi Badonnel, Isabelle Chrisment:
Detecting version number attacks in RPL-based networks using a distributed monitoring architecture. CNSM 2016: 127-135 - [c34]Anthéa Mayzaud, Anuj Sehgal, Remi Badonnel, Isabelle Chrisment, Jürgen Schönwälder:
Using the RPL protocol for supporting passive monitoring in the Internet of Things. NOMS 2016: 366-374 - [e3]Rémi Badonnel, Robert Koch, Aiko Pras, Martin Drasar, Burkhard Stiller:
Management and Security in the Age of Hyperconnectivity - 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings. Lecture Notes in Computer Science 9701, Springer 2016, ISBN 978-3-319-39813-6 [contents] - 2015
- [j9]Anthéa Mayzaud, Anuj Sehgal, Remi Badonnel, Isabelle Chrisment, Jürgen Schönwälder:
Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks. Int. J. Netw. Manag. 25(5): 320-339 (2015) - [j8]Oussema Dabbebi, Remi Badonnel, Olivier Festor:
An Online Risk Management Strategy for VoIP Enterprise Infrastructures. J. Netw. Syst. Manag. 23(1): 137-162 (2015) - [c33]Gaetan Hurel, Remi Badonnel, Abdelkader Lahmadi, Olivier Festor:
Behavioral and dynamic security functions chaining for Android devices. CNSM 2015: 57-63 - [c32]Martín Barrère, Gustavo Betarte, Víctor Codocedo, Marcelo Rodríguez, Hernán Astudillo, Marcelo Aliquintuy, Javier Baliosian, Remi Badonnel, Olivier Festor, Carlos Raniery Paula dos Santos, Jéferson Campos Nobre, Lisandro Zambenedetti Granville, Amedeo Napoli:
Machine-assisted Cyber Threat Analysis Using Conceptual Knowledge Discovery. FCA4AI@IJCAI 2015: 75-86 - [c31]Gaetan Hurel, Remi Badonnel, Abdelkader Lahmadi, Olivier Festor:
Towards cloud-based compositions of security functions for mobile devices. IM 2015: 578-584 - [e2]Remi Badonnel, Jin Xiao, Shingo Ata, Filip De Turck, Voicu Groza, Carlos Raniery Paula dos Santos:
IFIP/IEEE International Symposium on Integrated Network Management, IM 2015, Ottawa, ON, Canada, 11-15 May, 2015. IEEE 2015, ISBN 978-3-901882-76-0 [contents] - 2014
- [j7]Martín Barrère, Remi Badonnel, Olivier Festor:
Vulnerability Assessment in Autonomic Networks and Services: A Survey. IEEE Commun. Surv. Tutorials 16(2): 988-1004 (2014) - [j6]Oussema Dabbebi, Remi Badonnel, Olivier Festor:
Leveraging countermeasures as a service for VoIP security in the cloud. Int. J. Netw. Manag. 24(1): 70-84 (2014) - [c30]Gaëtan Hurel, Remi Badonnel, Abdelkader Lahmadi, Olivier Festor:
Outsourcing Mobile Security in the Cloud. AIMS 2014: 69-73 - [c29]Anthéa Mayzaud, Anuj Sehgal, Remi Badonnel, Isabelle Chrisment, Jürgen Schönwälder:
A Study of RPL DODAG Version Attacks. AIMS 2014: 92-104 - [c28]Anuj Sehgal, Anthéa Mayzaud, Remi Badonnel, Isabelle Chrisment, Jürgen Schönwälder:
Addressing DODAG inconsistency attacks in RPL networks. GIIS 2014: 1-8 - [c27]Martín Barrère, Remi Badonnel, Olivier Festor:
A SAT-based autonomous strategy for security vulnerability management. NOMS 2014: 1-9 - 2013
- [c26]Anthéa Mayzaud, Remi Badonnel, Isabelle Chrisment:
Monitoring and Security for the Internet of Things. AIMS 2013: 37-40 - [c25]Martín Barrère, Gaetan Hurel, Remi Badonnel, Olivier Festor:
A probabilistic cost-efficient approach for mobile security assessment. CNSM 2013: 235-242 - [c24]Martín Barrère, Remi Badonnel, Olivier Festor:
Improving present security through the detection of past hidden vulnerable states. IM 2013: 471-477 - [c23]Martín Barrère, Gaetan Hurel, Remi Badonnel, Olivier Festor:
Ovaldroid: An OVAL-based vulnerability assessment framework for Android. IM 2013: 1074-1075 - 2012
- [c22]Martín Barrère, Remi Badonnel, Olivier Festor:
Collaborative remediation of configuration vulnerabilities in autonomic networks and systems. CNSM 2012: 357-363 - [c21]Oussema Dabbebi, Remi Badonnel, Olivier Festor:
A trust-based strategy for addressing residual attacks in the RELOAD architecture. ICC 2012: 1053-1058 - [c20]Oussema Dabbebi, Remi Badonnel, Olivier Festor:
Dynamic exposure control in P2PSIP networks. NOMS 2012: 261-268 - [c19]Martín Barrère, Remi Badonnel, Olivier Festor:
Towards the assessment of distributed vulnerabilities in autonomic networks and systems. NOMS 2012: 335-342 - [c18]Martín Barrère, Gaetan Hurel, Remi Badonnel, Olivier Festor:
Increasing Android Security Using a Lightweight OVAL-Based Vulnerability Assessment Framework. SafeConfig 2012: 41-58 - 2011
- [c17]Oussema Dabbebi, Remi Badonnel, Olivier Festor:
Econometric Feedback for Runtime Risk Management in VoIP Architectures. AIMS 2011: 26-37 - [c16]Martín Barrère, Remi Badonnel, Olivier Festor:
Towards Vulnerability Prevention in Autonomic Networks and Systems. AIMS 2011: 65-68 - [c15]Martín Barrère, Remi Badonnel, Olivier Festor:
Supporting vulnerability awareness in autonomic networks and systems with OVAL. CNSM 2011: 1-8 - [c14]Oussema Dabbebi, Remi Badonnel, Olivier Festor:
A broad-spectrum strategy for runtime risk management in VoIP enterprise architectures. Integrated Network Management 2011: 478-484 - [e1]Isabelle Chrisment, Alva L. Couch, Remi Badonnel, Martin Waldburger:
Managing the Dynamics of Networks and Services - 5th International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2011, Nancy, France, June 13-17, 2011. Proceedings. Lecture Notes in Computer Science 6734, Springer 2011, ISBN 978-3-642-21483-7 [contents] - 2010
- [c13]Oussema Dabbebi, Remi Badonnel, Olivier Festor:
Managing Risks at Runtime in VoIP Networks and Services. AIMS 2010: 89-92 - [c12]Mohamed Nassar, Oussema Dabbebi, Remi Badonnel, Olivier Festor:
Risk management in VoIP infrastructures using support vector machines. CNSM 2010: 48-55 - [c11]Oussema Dabbebi, Remi Badonnel, Olivier Festor:
Automated runtime risk management for voice over IP networks and services. NOMS 2010: 57-64
2000 – 2009
- 2009
- [c10]Remi Badonnel, Olivier Festor, Khaled Hamlaoui:
Monitoring and counter-profiling for Voice over IP networks and services. Integrated Network Management 2009: 267-274 - 2008
- [j5]Remi Badonnel, Radu State, Olivier Festor:
Self-configurable fault monitoring in ad-hoc networks. Ad Hoc Networks 6(3): 458-473 (2008) - [c9]Ustun Yildiz, Remi Badonnel, Claude Godart:
On Service Orchestration in Mobile Computing Environments. IEEE SCC (2) 2008: 545-548 - [c8]Remi Badonnel, Mark Burgess:
Service Load Balancing with Autonomic Servers: Reversing the Decision Making Process. AIMS 2008: 92-104 - [c7]Remi Badonnel, Mark Burgess:
Dynamic pull-based load balancing for autonomic servers. NOMS 2008: 751-754 - 2007
- [j4]Remi Badonnel, Radu State, Olivier Festor:
A Probabilistic Approach for Managing Mobile Ad-Hoc Networks. IEEE Trans. Netw. Serv. Manag. 4(1): 39-50 (2007) - [c6]Remi Badonnel, Mark Burgess:
Fault Detection in Autonomic Networks Using the Concept of Promised Cooperation. DSOM 2007: 62-73 - 2006
- [b1]Rémi Badonnel:
Supervision des Réseaux et Services Ad-Hoc. (Management of Ad-Hoc Networks and Services). Henri Poincaré University, Nancy, France, 2006 - [c5]Remi Badonnel, Radu State, Olivier Festor:
Fault Monitoring in Ad-Hoc Networks Based on Information Theory. Networking 2006: 427-438 - [c4]Remi Badonnel, Radu State, Olivier Festor:
Probabilistic Management of Ad-Hoc Networks. NOMS 2006: 339-350 - 2005
- [j3]Remi Badonnel, Radu State, Olivier Festor:
Management of mobile ad hoc networks: information model and probe-based architecture. Int. J. Netw. Manag. 15(5): 335-347 (2005) - [j2]Remi Badonnel, Radu State, Olivier Festor, André Schaff:
A Framework for Optimizing End-to-End Connectivity Degree in Mobile Ad-Hoc Networks. J. Netw. Syst. Manag. 13(4): 479-497 (2005) - [j1]Remi Badonnel, Radu State, Olivier Festor:
Self-Organized Monitoring in Ad-Hoc Networks. Telecommun. Syst. 30(1-3): 143-160 (2005) - [c3]Remi Badonnel, Radu State, Olivier Festor:
Monitoring End-to-End Connectivity in Mobile Ad-Hoc Networks. ICN (2) 2005: 83-90 - [c2]Remi Badonnel, Radu State, Olivier Festor:
Management of mobile ad-hoc networks: evaluating the network behavior. Integrated Network Management 2005: 17-30 - 2004
- [c1]Alexander Keller, Remi Badonnel:
Automating the Provisioning of Application Services with the BPEL4WS Workflow Language. DSOM 2004: 15-27
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-16 00:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint