Radu State
Title
Cited by
Cited by
Year
BotTrack: tracking botnets using NetFlow and PageRank
J François, S Wang, R State, T Engel
NETWORKING 2011, 1-14, 2011
1312011
Malware behaviour analysis
G Wagener, R State, A Dulaunoy
Journal in computer virology 4 (4), 279-287, 2008
1152008
A big data architecture for large scale security monitoring
S Marchal, X Jiang, R State, T Engel
2014 IEEE International Congress on Big Data, 56-63, 2014
1022014
BotCloud: Detecting botnets using MapReduce
J Francois, S Wang, W Bronzi, R State, T Engel
Information Forensics and Security (WIFS), 2011 IEEE International Workshop …, 2011
922011
Intrusion detection mechanisms for VoIP applications
M Nassar, R State, O Festor
3rd Annual VoIP Security Workshop, Berlin, Germany 179, 2006
86*2006
Phishstorm: Detecting phishing with streaming analytics
S Marchal, J François, R State, T Engel
IEEE Transactions on Network and Service Management 11 (4), 458-471, 2014
742014
KiF: a stateful SIP fuzzer
HJ Abdelnur, R State, O Festor
Proceedings of the 1st international conference on Principles, systems and …, 2007
702007
Monitoring SIP Traffic Using Support Vector Machines
M Nassar, R State, O Festor
Recent Advances in Intrusion Detection, 311-330, 2008
692008
The challenge of non-technical loss detection using artificial intelligence: A survey
P Glauner, JA Meira, P Valtchev, R State, F Bettinger
arXiv preprint arXiv:1606.00626, 2016
672016
Machine learning approach for IP-flow record anomaly detection
C Wagner, J François, R State, T Engel
NETWORKING 2011, 28-39, 2011
59*2011
Holistic VoIP intrusion detection and prevention system
M Nassar, S Niccolini, R State, T Ewald
Proceedings of the 1st international conference on Principles, systems and …, 2007
532007
Self Adaptive High Interaction Honeypots Driven by Game Theory
G Wagener, R State, A Dulaunoy, T Engel
492009
Management of mobile ad hoc networks: information model and probe‐based architecture
R Badonnel, R State, O Festor
International Journal of Network Management 15 (5), 335-347, 2005
462005
A Forensic Analysis of Android Malware--How is Malware Written and How it Could Be Detected?
K Allix, Q Jerome, TF Bissyandé, J Klein, R State, Y Le Traon
2014 IEEE 38th Annual Computer Software and Applications Conference, 384-393, 2014
412014
Proactive Discovery of Phishing Related Domain Names
TE Samuel Marchal, Jerome Fran ̧cois, Radu State
RAID'12 Proceedings of the 15th international conference on Research in …, 2012
38*2012
Proactive discovery of phishing related domain names
S Marchal, J François, R State, T Engel
Research in Attacks, Intrusions, and Defenses, 190-209, 2012
382012
Voip Honeypot Architecture
M Nassar, R State, O Festor
Integrated Network Management, 2007. IM'07. 10th IFIP/IEEE International …, 2007
362007
Using opcode-sequences to detect malicious Android applications
Q Jerome, K Allix, R State, T Engel
2014 IEEE International Conference on Communications (ICC), 914-919, 2014
352014
Abusing SIP authentication
H Abdelnur, T Avanesov, R State, M Rusinowitch
Journal of Information Assurance and Security 4 (4), 311-318, 2009
342009
Abusing SIP authentication
H Abdelnur, T Avanesov, M Rusinowitch, R State
Information Assurance and Security, 2008. ISIAS'08. Fourth International …, 2008
342008
The system can't perform the operation now. Try again later.
Articles 1–20