Follow
Romaric Ludinard
Title
Cited by
Cited by
Year
Peercube: A hypercube-based p2p overlay robust against collusion and churn
E Anceaume, R Ludinard, A Ravoaja, F Brasileiro
2008 Second IEEE International Conference on Self-Adaptive and Self …, 2008
692008
Safety analysis of Bitcoin improvement proposals
E Anceaume, T Lajoie-Mazenc, R Ludinard, B Sericola
2016 IEEE 15th international symposium on network computing and applications …, 2016
522016
Blockchain abstract data type
E Anceaume, A Del Pozzo, R Ludinard, M Potop-Butucaru, ...
The 31st ACM Symposium on Parallelism in Algorithms and Architectures, 349-358, 2019
422019
Dissecting bitcoin blockchain: Empirical analysis of bitcoin network (2009–2020)
P Nerurkar, D Patel, Y Busnel, R Ludinard, S Kumari, MK Khan
Journal of Network and Computer Applications 177, 102940, 2021
322021
Bitcoin a distributed shared register
E Anceaume, R Ludinard, M Potop-Butucaru, F Tronel
International Symposium on Stabilization, Safety, and Security of …, 2017
282017
Supervised learning model for identifying illegal activities in Bitcoin
P Nerurkar, S Bhirud, D Patel, R Ludinard, Y Busnel, S Kumari
Applied Intelligence 51 (6), 3824-3843, 2021
182021
Sycomore: A permissionless distributed ledger that self-adapts to transactions demand
E Anceaume, A Guellier, R Ludinard, B Sericola
2018 IEEE 17th International Symposium on Network Computing and Applications …, 2018
162018
Detecting attacks against data in web applications
R Ludinard, E Totel, F Tronel, V Nicomette, M Kaâniche, E Alata, R Akrout, ...
2012 7th International Conference on Risks and Security of Internet and …, 2012
142012
Anomaly characterization in large scale networks
E Anceaume, Y Busnel, E Le Merrer, R Ludinard, JL Marchand, ...
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
102014
Modeling and evaluating targeted attacks in large scale dynamic systems
E Anceaume, B Sericola, R Ludinard, F Tronel
2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011
92011
Analytic study of the impact of churn in cluster-based structured P2P overlays
E Anceaume, R Ludinard, B Sericola
2010 IEEE International Conference on Communications, 1-5, 2010
92010
StakeCube: Combining Sharding and Proof-of-Stake to Build Fork-Free Secure Permissionless Distributed Ledgers
A Durand, E Anceaume, R Ludinard
International Conference on Networked Systems, 148-165, 2019
82019
Markov Chains Competing for Transitions: Application to Large-Scale Distributed Systems
E Anceaume, F Castella, R Ludinard, B Sericola
Methodology and Computing in Applied Probability 15 (2), 305-332, 2013
82013
Fixme: A self-organizing isolated anomaly detection architecture for large scale distributed systems
E Anceaume, EL Merrer, R Ludinard, B Sericola, G Straub
International Conference On Principles Of Distributed Systems, 1-15, 2012
82012
Performance evaluation of large-scale dynamic systems
E Anceaume, R Ludinard, B Sericola
ACM SIGMETRICS Performance Evaluation Review 39 (4), 108-117, 2012
82012
Analytical study of adversarial strategies in cluster-based overlays
E Anceaume, F Brasileiro, R Ludinard, B Sericola, F Tronel
2009 International Conference on Parallel and Distributed Computing …, 2009
82009
Detecting illicit entities in bitcoin using supervised learning of ensemble decision trees
P Nerurkar, Y Busnel, R Ludinard, K Shah, S Bhirud, D Patel
Proceedings of the 2020 10th international conference on information …, 2020
72020
Dependability evaluation of cluster-based distributed systems
E Anceaume, F Brasileiro, R Ludinard, B Sericola, F Tronel
International Journal of Foundations of Computer Science 22 (05), 1123-1142, 2011
72011
Performance evaluation of a peer-to-peer backup system using buffering at the edge
AM Kermarrec, E Le Merrer, N Le Scouarnec, R Ludinard, P Maillé, ...
Computer communications 52, 71-81, 2014
52014
Sensor self-location with ftm measurements
J Henry, N Montavont, Y Busnel, R Ludinard, I Hrasko
2020 16th International Conference on Wireless and Mobile Computing …, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20