Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Fabrice Le Fessant"'
Publikováno v:
ACM Transactions on Autonomous and Adaptive Systems. 7:1-14
Availability of applications or devices is known to be one of the most critical variables impacting the performances of software systems. We study in this article the problem of finding peers matching a given availability pattern in a peer-to-peer (P
Autor:
Pietro Abate, Roberto Di Cosmo, Louis Gesbert, Fabrice Le Fessant, Ralf Treinen, Stefano Zacchiroli
Publikováno v:
2015 IEEE/ACM 12th Working Conference on Mining Software Repositories.
Autor:
Fabrice Le Fessant, Jean-Marie Thomas
Le peer-to-peer s'inscrit dans l'évolution naturelle de l'Internet. Il réunit des millions d'internautes au sein de réseaux de collaboration et de partage, et mutualise leurs ressources de façon distribuée et décentralisée. Dépoussiérant la
Autor:
Esther Palomar, Cigdem Sengul, Aline Carneiro Viana, Fabrice Le Fessant, Antonis Papadimitriou
Publikováno v:
Computer Communications
Computer Communications, 2012, 35 (2), pp.234-248. ⟨10.1016/j.comcom.2011.09.005⟩
Computer Communications, Elsevier, 2012, 35 (2), pp.234-248. ⟨10.1016/j.comcom.2011.09.005⟩
Computer Communications, 2012, 35 (2), pp.234-248. ⟨10.1016/j.comcom.2011.09.005⟩
Computer Communications, Elsevier, 2012, 35 (2), pp.234-248. ⟨10.1016/j.comcom.2011.09.005⟩
International audience; This work focuses on: (1) understanding the impact of selective forwarding attacks on tree-based routing topologies in wireless sensor networks (WSNs), and (2) investigating cryptography-based strategies to limit network degra
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::971fdf108cad39a6aa74e1f62bb6b8b0
https://radar.brookes.ac.uk/radar/items/11b64a2a-11a6-01df-4c63-a8385a8615f4/1/
https://radar.brookes.ac.uk/radar/items/11b64a2a-11a6-01df-4c63-a8385a8615f4/1/
Publikováno v:
SECON
This paper studies source location anonymity in a large monitoring wireless sensor network with a single data collector, and under a global attack. The qualifier ”global” indicates the capability of the eavesdropper (attacker) to capture all netw
Publikováno v:
PerCom Workshops
We propose an efficient scheme for generating fake network traffic to disguise the real event notification in the presence of a global eavesdropper, which is especially relevant for the quality of service in delay-intolerant applications monitoring r
Publikováno v:
3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'10)
3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'10), Usenix, Apr 2010, San Jose, CA, United States
HAL
3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'10), Usenix, Apr 2010, San Jose, CA, United States
HAL
International audience; This paper presents a set of exploits an adversary can use to continuously spy on most BitTorrent users of the Internet from a single machine and for a long period of time. Using these exploits for a period of 103 days, we col
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::42086d7f378de1f5f8d3cf1caf3f170a
https://hal.inria.fr/inria-00470324/file/bt_privacy_LEET10.pdf
https://hal.inria.fr/inria-00470324/file/bt_privacy_LEET10.pdf
Publikováno v:
CISS
We introduce a trusted self-organized network infrastructure for running anonymous P2P applications, which leverages real-life social links and the basic need for privacy that each individual converts into a carefully built structure dubbed Personal
Publikováno v:
5th Workshop on Secure Network Protocols (NPSec)
5th Workshop on Secure Network Protocols (NPSec), Oct 2009, Princeton, United States
5th Workshop on Secure Network Protocols (NPSec), Oct 2009, Princeton, United States
International audience; This work introduces two new cryptographic protocols of different complexity and strength in limiting network degradation caused by sinkhole attacks on tree-based routing topologies in Wireless Sensor Networks (WSNs). The main
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1feb5196006661cc2bef3b9c48c6eee3
https://hal.inria.fr/inria-00429440
https://hal.inria.fr/inria-00429440
Autor:
Samuel Bernard, Fabrice Le Fessant
Publikováno v:
International Workshop on Data Management in Peer-to-Peer Systems (Damap'09)
International Workshop on Data Management in Peer-to-Peer Systems (Damap'09), Mar 2009, Saint-Petersburg, Russia. pp.26-33, ⟨10.1145/1698790.1698797⟩
EDBT/ICDT Workshops
International Workshop on Data Management in Peer-to-Peer Systems (Damap'09), Mar 2009, Saint-Petersburg, Russia. pp.26-33, ⟨10.1145/1698790.1698797⟩
EDBT/ICDT Workshops
International audience; In this paper, we study the viability of a peer-to-peer backup system on nowadays internet connections. In particular, we show that peer lifetime estimation can be used to reduce the maintenance cost of peer-to-peer backup. Pr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::05479ec851a77409b6185c77e060996a
https://inria.hal.science/inria-00432752
https://inria.hal.science/inria-00432752