Peer-reviewed journal articles indexed in international databases

  1. Tan Nguyen, Hoang Long Mai, Rémi Cogranne, Guillaume Doyen, Wissam Mallouli, Luong Nguyen, Moustapha El Aoun, Edgardo Montes de Oca, Olivier Festor,
    Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking.
    IEEE Transactions on Information Forensics and Security TBA(TBA), 1–16.
    IEEE, 2019.
  2. Tan Nguyen, Hoang Long Mai, Guillaume Doyen, Rémi Cogranne, Wissam Mallouli, Edgardo Montes-de-oca, Olivier Festor,
    A Security Monitoring Plane for Named Data Networking Deployment.
    IEEE Communications Magazine (CommMag), Feature topic on Information-Centric Networking Security 56(11), 88 – 94.
    IEEE, 2018.

Proceedings articles indexed in international databases

  1. Hoang Long Mai, Tan Nguyen, Guillaume Doyen, Rémi Cogranne, Wissam Mallouli, Edgardo Montes de Oca, Olivier Festor,
    Towards a Security Monitoring Plane for Named Data Networking: Application to Content Poisoning Attack.
    IEEE/IFIP Network Operations and Management Symposium (NOMS 2018), 1–8.
    IEEE/IFIP, 2018.
  2. Hoang Long Mai, Messaoud Aouadj, Guillaume Doyen, Daishi Kondo, Xavier Marchal, Thibault Cholez, Edgardo Montes de Oca, Wissam Mallouli,
    Implementation of Content Poisoning Attack Detection and Reaction in Virtualized NDN Networks.
    21st Conference on Innovation in Clouds, Internet and Networks - ICIN 2018 (demo paper).
    IEEE, 2018.
  3. Xavier Marchal, Moustapha El Aoun, Bertrand Mathieu, Wissam Mallouli, Thibulat Cholez, Guillaume Doyen, Patrick Truong, Alain Ploix, Edagardo Montes de Oca,
    A virtualized and monitored NDN infrastructure featuring a NDN/HTTP gateway.
    3rd ACM conference on Information-centric Networking - ICN 2016 (demo paper), 225–226.
    ACM, 2016.
  4. Bertrand Mathieu, Guillaume Doyen, Wissam Mallouli, Thomas Silverston, Olivier Bettan, François-Xavier Aguessy, Thibault Cholez, Abdelkader Lahmadi, Patrick Truong, Edgardo Montes de Oca,
    Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment.
    The First International Workshop on Security Testing And Monitoring – STAM in conjunction the 10th International Conference on Availability, Reliability and Security, 741–748.
    IEEE, 2015.

Scientific books (or chapters)

  1. Théo Combe, Wissam Mallouli, Thibault Cholez, Guillaume Doyen, Bertrand Mathieu, and Edgardo Montes de Oca,
    A SDN and NFV use-case: NDN implementation and security monitoring.
    Guide to Security in SDN and NFV - Challenges, Opportunities, and Applications, 299–321.
    Springer, 2017.