Named data networking, ACM SIGCOMM Computer Communication Review, vol.44, issue.3, pp.66-73, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01182997
Security, privacy, and access control in informationcentric networking: A survey, IEEE Communications Surveys & Tutorials, 2017. ,
An optimal statistical test for robust detection against interest flooding attacks in ccn, IFIP/IEEE IM, pp.252-260, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-02272229
Detection of Interest flooding attacks in named data networking using hypothesis testing, IEEE WIFS, pp.1-6, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-02272998
On the Readiness of NDN for a Secure Deployment: The Case of Pending Interest Table, IFIP AIMS, pp.98-110, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01632732
Content Poisoning in Named Data Networking: Comprehensive characterization of real deployment, IFIP/IEEE IM, pp.72-80, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01652328
Towards a Security Monitoring Plane for Named Data Networking and its Application against Content Poisoning Attack, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-02274867
A survey of information-centric networking, IEEE Communications Magazine, vol.50, issue.7, pp.26-36, 2012. ,
Interest flooding attack and countermeasures in Named Data Networking, IFIP Networking Conference, pp.1-9, 2013. ,
Poseidon: Mitigating interest flooding DDoS attacks in named data networking, IEEE LCN, pp.630-638, 2013. ,
Detecting and mitigating interest flooding attacks in content-centric network, Security and Communication Networks, vol.7, pp.685-699, 2014. ,
Mitigating Poisoned Content with Forwarding Strategy, INFOCOM WKSHPS, pp.164-169, 2016. ,
Needle in a Haystack: Mitigating Content Poisoning in Named-Data Networking, NDSS Workshop SENT, 2014. ,
Efficient Content Verification in Named Data Networking, ACM ICN, pp.109-116, 2015. ,
Adaptive forwarding in named data networking, ACM SIGCOMM computer communication review, vol.42, issue.3, pp.62-67, 2012. ,