default search action
Thibault Cholez
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c36]Thibault Cholez, Claudia-Lavinia Ignat:
Sybil Attack Strikes Again: Denying Content Access in IPFS with a Single Computer. ARES 2024: 36:1-36:7 - [c35]Katsuki Isobe, Jean-Philippe Eisenbarth, Daishi Kondo, Thibault Cholez, Hideki Tode:
A Deeper Grasp of Handshake: A Thorough Analysis of Blockchain-based DNS Records. BRAINS 2024: 1-10 - [c34]Bertrand Mathieu, Olivier Dugeon, Joël Roman Ky, Philippe Graff, Thibault Cholez:
Segment Routing for Chaining Micro-Services at Different Programmable Network Levels. ICIN 2024: 171-178 - [c33]Philippe Graff, Xavier Marchal, Thibault Cholez, Bertrand Mathieu, Stéphane Tuffin, Olivier Festor:
Improving Cloud Gaming Traffic QoS: A Comparison Between Class-Based Queuing Policy and L4S. TMA 2024: 1-10 - 2023
- [j5]Xavier Marchal, Philippe Graff, Joël Roman Ky, Thibault Cholez, Stéphane Tuffin, Bertrand Mathieu, Olivier Festor:
An Analysis of Cloud Gaming Platforms Behaviour Under Synthetic Network Constraints and Real Cellular Networks Conditions. J. Netw. Syst. Manag. 31(2): 39 (2023) - [c32]Jean-Philippe Eisenbarth, Thibault Cholez, Olivier Perrin:
Avoiding the 1 TB Storage Wall: Leveraging Ethereum's DHT to Reduce Peer Storage Needs. BSCI 2023: 75-84 - [c31]Joël Roman Ky, Philippe Graff, Bertrand Mathieu, Thibault Cholez:
A Hybrid P4/NFV Architecture for Cloud Gaming Traffic Detection with Unsupervised ML. ISCC 2023: 733-738 - [c30]Philippe Graff, Xavier Marchal, Thibault Cholez, Bertrand Mathieu, Olivier Festor:
Efficient Identification of Cloud Gaming Traffic at the Edge. NOMS 2023: 1-10 - 2022
- [j4]Jean-Philippe Eisenbarth, Thibault Cholez, Olivier Perrin:
Ethereum's Peer-to-Peer Network Monitoring and Sybil Attack Prevention. J. Netw. Syst. Manag. 30(4): 1-26 (2022) - [c29]Juuso Haavisto, Thibault Cholez, Jukka Riekki:
Unleashing GPUs for Network Function Virtualization: an open architecture based on Vulkan and Kubernetes. NOMS 2022: 1-8 - 2021
- [c28]Jean-Philippe Eisenbarth, Thibault Cholez, Olivier Perrin:
A Comprehensive Study of the Bitcoin P2P Network. BRAINS 2021: 105-112 - [c27]Philippe Graff, Xavier Marchal, Thibault Cholez, Stéphane Tuffin, Bertrand Mathieu, Olivier Festor:
An Analysis of Cloud Gaming Platforms Behavior under Different Network Constraints. CNSM 2021: 551-557 - [c26]Jean-Philippe Eisenbarth, Thibault Cholez, Olivier Perrin:
An open measurement dataset on the Bitcoin P2P Network. IM 2021: 643-647 - 2020
- [c25]Pierre-Olivier Brissaud, Jérôme François, Isabelle Chrisment, Thibault Cholez, Olivier Bettan:
Encrypted HTTP/2 Traffic Monitoring: Standing the Test of Time and Space. WIFS 2020: 1-6 - [i3]Wazen M. Shbair, Thibault Cholez, Jérôme François, Isabelle Chrisment:
A Survey of HTTPS Traffic and Services Identification Approaches. CoRR abs/2008.08339 (2020) - [i2]Wazen M. Shbair, Thibault Cholez, Jérôme François, Isabelle Chrisment:
Early Identification of Services in HTTPS Traffic. CoRR abs/2008.08350 (2020)
2010 – 2019
- 2019
- [j3]Guillaume Doyen, Thibault Cholez, Wissam Mallouli, Bertrand Mathieu, Hoang Long Mai, Xavier Marchal, Daishi Kondo, Messaoud Aouadj, Alain Ploix, Edgardo Montes de Oca, Olivier Festor:
An Orchestrated NDN Virtual Infrastructure Transporting Web Traffic: Design, Implementation, and First Experiments with Real End Users. IEEE Commun. Mag. 57(6): 33-39 (2019) - [j2]Pierre-Olivier Brissaud, Jérôme François, Isabelle Chrisment, Thibault Cholez, Olivier Bettan:
Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic. IEEE Trans. Netw. Serv. Manag. 16(3): 842-856 (2019) - 2018
- [c24]Xavier Marchal, Thibault Cholez, Olivier Festor:
μNDN: an orchestrated microservice architecture for named data networking. ICN 2018: 12-23 - [c23]Pierre-Olivier Brissaud, Jérôme François, Isabelle Chrisment, Thibault Cholez, Olivier Bettan:
Passive Monitoring of HTTPS Service Use. CNSM 2018: 219-225 - [c22]Hoang Long Mai, Messaoud Aouadj, Guillaume Doyen, Daishi Kondo, Xavier Marchal, Thibault Cholez, Edgardo Montes de Oca, Wissam Mallouli:
Implementation of content poisoning attack detection and reaction in virtualized NDN networks. ICIN 2018: 1-3 - [c21]Xavier Marchal, Moustapha El Aoun, Bertrand Mathieu, Thibault Cholez, Guillaume Doyen, Wissam Mallouli, Olivier Festor:
Leveraging NFV for the deployment of NDN: Application to HTTP traffic transport. NOMS 2018: 1-5 - 2017
- [c20]Tan N. Nguyen, Xavier Marchal, Guillaume Doyen, Thibault Cholez, Rémi Cogranne:
Content Poisoning in Named Data Networking: Comprehensive characterization of real deployment. IM 2017: 72-80 - [p1]Théo Combe, Wissam Mallouli, Thibault Cholez, Guillaume Doyen, Bertrand Mathieu, Edgardo Montes de Oca:
An SDN and NFV Use Case: NDN Implementation and Security Monitoring. Guide to Security in SDN and NFV 2017: 299-321 - 2016
- [c19]Xavier Marchal, Thibault Cholez, Olivier Festor:
Server-side performance evaluation of NDN. ICN 2016: 148-153 - [c18]Xavier Marchal, Thibault Cholez, Olivier Festor:
PIT matching from unregistered remote faces: a critical NDN vulnerability. ICN 2016: 211-212 - [c17]Xavier Marchal, Moustapha El Aoun, Bertrand Mathieu, Wissam Mallouli, Thibault Cholez, Guillaume Doyen, Patrick Truong, Alain Ploix, Edgardo Montes de Oca:
A virtualized and monitored NDN infrastructure featuring a NDN/HTTP gateway. ICN 2016: 225-226 - [c16]Wazen M. Shbair, Thibault Cholez, Jérôme François, Isabelle Chrisment:
Improving SNI-Based HTTPS Security Monitoring. ICDCS Workshops 2016: 72-77 - [c15]Wazen M. Shbair, Thibault Cholez, Jérôme François, Isabelle Chrisment:
A multi-level framework to identify HTTPS services. NOMS 2016: 240-248 - 2015
- [c14]Bertrand Mathieu, Guillaume Doyen, Wissam Mallouli, Thomas Silverston, Olivier Bettan, François-Xavier Aguessy, Thibault Cholez, Abdelkader Lahmadi, Patrick Truong, Edgardo Montes de Oca:
Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment. ARES 2015: 741-748 - [c13]Juan Pablo Timpanaro, Thibault Cholez, Isabelle Chrisment, Olivier Festor:
Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security. ICISSP 2015: 46-55 - [c12]Wazen M. Shbair, Thibault Cholez, Antoine Goichot, Isabelle Chrisment:
Efficiently bypassing SNI-based HTTPS filtering. IM 2015: 990-995 - 2013
- [j1]Thibault Cholez, Isabelle Chrisment, Olivier Festor, Guillaume Doyen:
Detection and mitigation of localized attacks in a widely deployed P2P network. Peer-to-Peer Netw. Appl. 6(2): 155-174 (2013) - [c11]David Goergen, Thibault Cholez, Jérôme François, Thomas Engel:
A semantic firewall for Content-Centric Networking. IM 2013: 478-484 - [c10]Sarmad Ullah Khan, Thibault Cholez, Thomas Engel, Luciano Lavagno:
A key management scheme for Content Centric Networking. IM 2013: 828-831 - [c9]Jérôme François, Thibault Cholez, Thomas Engel:
CCN traffic optimization for IoT. NOF 2013: 1-5 - 2012
- [c8]David Goergen, Thibault Cholez, Jérôme François, Thomas Engel:
Security Monitoring for Content-Centric Networking. DPM/SETOP 2012: 274-286 - [i1]Raphaël Fournier, Thibault Cholez, Matthieu Latapy, Clémence Magnien, Isabelle Chrisment, Ivan Daniloff, Olivier Festor:
Comparing paedophile activity in different P2P systems. CoRR abs/1206.4167 (2012) - 2011
- [b1]Thibault Cholez:
Supervision des réseaux pair à pair structurés appliquée à la sécurité des contenus. (Monitoring of structured peer-to-peer networks applied to the security of contents). Henri Poincaré University, Nancy, France, 2011 - [c7]Juan Pablo Timpanaro, Thibault Cholez, Isabelle Chrisment, Olivier Festor:
When KAD Meets BitTorrent - Building a Stronger P2P Network. IPDPS Workshops 2011: 1635-1642 - [c6]Juan Pablo Timpanaro, Thibault Cholez, Isabelle Chrisment, Olivier Festor:
BitTorrent's Mainline DHT Security Assessment. NTMS 2011: 1-5 - [c5]Guillaume Montassier, Thibault Cholez, Guillaume Doyen, Rida Khatoun, Isabelle Chrisment, Olivier Festor:
Content pollution quantification in large P2P networks : A measurement study on KAD. Peer-to-Peer Computing 2011: 30-33 - 2010
- [c4]Thibault Cholez, Isabelle Chrisment, Olivier Festor:
Monitoring and Controlling Content Access in KAD. ICC 2010: 1-6 - [c3]Thibault Cholez, Isabelle Chrisment, Olivier Festor:
Efficient DHT attack mitigation through peers' ID distribution. IPDPS Workshops 2010: 1-8
2000 – 2009
- 2009
- [c2]Thibault Cholez, Isabelle Chrisment, Olivier Festor:
Evaluation of Sybil Attacks Protection Schemes in KAD. AIMS 2009: 70-82 - 2008
- [c1]Thibault Cholez, Isabelle Chrisment, Olivier Festor:
A Distributed and Adaptive Revocation Mechanism for P2P Networks. ICN 2008: 290-295
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-21 20:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint