Rida KHATOUN
Professor in Cybersecurity
Cybersecurity & Cryptography [C2] team, INFRES department, TELECOM Paris

Research Résumé E-mail Students Teaching

Research

  • RESEARCH TEAM

    • Cybersecurity & Cryptography [C2] research team, INFRES department at Telecom Paris.
  • GENERAL RESEARCH INTERESTS

    • Networks cybersecurity
    • Intrusion and attacks detection
    • Wireless networks cybersecurity
    • Distributed Denial of Service (DDoS) attacks detection

Education

  • 2020: HDR (Habilitation à Diriger des Recherches), Sorbonne University (Sorbonne Université), France
  • 2008: Ph.D thesis in cybersecurity from University of Technolgy of Troyes (UTT), France
  • 2004: Master (DEA) in networking from University of Technolgy of Troyes (UTT), France
  • 2003: Engineering degree in telecommunications, Lebanon
  • 1998: High school diploma in sciences, Lebanon

Teaching

  • Telecom Paris: 2014 - Present

    • Internet networks security: protocols, attacks and detection mechanisms.
  • Shanghai Jiao Tong University (SJTU), China : 2016 - Present
  • University of Technology of Troyes (UTT): 2005-2014

    • Internet networks security: principles of network security, cryptography, security protocols, DDoS attacks, wireless network security
    • Voice over IP: VoIP architecture and protocols.
    • Basics of networks: functions, protocols, TCP/IP, ATM.
    • Service quA.ty networks and interconnection: QoS mechanisms.
    • QuA.ty assurance and control: statistics and probability.
  • Sino European School of Technology of Shanghai University (UTSEUS), China : 2009 - 2013

    • Network architecture and internet applications: basics of networks, functions, protocols, TCP/IP.

Publications & Presentations

  • My publications: my google scholar h-index

    • 2023

      • A. Mustapha, R. Khatoun, S. Zeadally, F. Chbib, A. Fadlallah, W. Fahs, A. El Attar, "Detecting DDoS attacks using adversarial neural network", Computers & Security journal, Volume 127, 2023, 103117, ISSN 0167-4048.

      • A. Boudermine, R. Khatoun, J-H Choyer, "Dynamic logic-based attack graph for risk assessment in complex computer systems", Computer Networks journal, Volume 228, 2023, 109730, ISSN 1389-1286.

    • 2022

      • B. Hammi, M. Y. Idir and R. Khatoun, "A machine learning based approach for the detection of sybil attacks in C-ITS," 2022 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS), Takamatsu, Japan, 2022, pp. 1-4.

      • S. Y. Kim, D. Goncharskyi, P. Gu, A. Serhrouchni, R. Khatoun, F. Nait-Abdesselam, J-J Grund,"TLS Early Data Resistance to Replay Attacks in Wireless Internet of Things," GLOBECOM 2022 - 2022 IEEE Global Communications Conference, Rio de Janeiro, Brazil, 2022, pp. 3539-3544.

      • A. El Attar, A. Fadlallah, F. Chbib and R. Khatoun, "Unsupervised Learning Algorithms for Denial of Service Detection in Vehicular Networks," 2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Maldives, Maldives, 2022, pp. 1-7.

      • I. Zaytoun, W. Fahs, A. Mokdad, R. Khatoun and F. Chbib, "Road Traffic Prediction based on Feed Forward and Radial Basis Function Neural Network," 2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Maldives, Maldives, 2022, pp. 1-7.

      • D.Goncharskyi, S. Kim, A. Serhrouchni, P. Gu, R. Khatoun and J.Hachem. Delay Measurement of 0-RTT Transport Layer Security (TLS) Handshake Protocol. In the International Conference on Control, Decision and Information Technologies (CoDIT’2022), Istanbul, Turkey, 17-20 May, 2022.

      • B. Hammi, M-Y IDIR, S. Zeadally, R. Khatoun, J. Nebhen. Is it really easy to detect Sybil attacks in C-ITS environments: a position paper", in IEEE Transactions on Intelligent Transportation Systems, 2022.

      • B. Hammi, S. Zeadally, R. Khatoun, J. Nebhen. Survey on smart homes: Vulnerabilities, risks, and countermeasures, in Journal of Computers & Security, Volume 117, June 2022.

      • F. Chbib, W. Fahs, J. Haydar, L. Khoukhi, R. Khatoun. A Cross Layered Scheme for Multichannel and Reactive Routing in VANET", to appear in Transactions on Emerging Telecommunications Technologies.

      • A. Boudermine, R. Khatoun, J-H. Choyer. Attack Graph-based Solution for Vulnerabilities Impact Assessment in Dynamic Environment. 5th edition of Conference on Cloud and Internet of Things CIoT-2022, Marrakech, Morocco, March 28-30, 2022.

    • 2021

      • F. Chbib, W. Fahs, J. Haydar, L. Khoukhi, R. Khatoun. IEEE 802.11p Performance Enhancement based on Markov Chain and Neural Networks for Safety Applications. Annals of Telecommunications journal, 2021.

      • P. Gu, D. Zhong, C. Hua, F. Nait-Abdesselam, A. Serhrouchni and R. Khatoun. Scaling A Blockchain System For 5G-based Vehicular Networks Using Heuristic Sharding. Accepted in IEEE GLOBECOM 2021, December 7 - 11, in Madrid, Spain.

    • 2020

      • B. Hammi, S. Zeadally, H. Labiod, R. Khatoun, Y. Begriche and L. Khoukhi. A Secure Multipath Reactive Protocol for Routing in IoT and HANETs. Ad Hoc Networks journal, Volume 103,102118, ISSN 1570-8705, 2020.

      • J. Cassou-Mounat, H. Labiod, R. Khatoun. Simulation of Cyberattacks in ITS-G5 Systems. 15th International Workshop, Nets4Cars/Nets4Trains/Nets4Aircraft 2020, Bordeaux, France, November 16-17, 2020.

      • P. Gu, C. Hua, W. Xu, R. Khatoun, Yue Wu, A. Serhrouchni. Control Channel Anti-Jamming in Vehicular Networks via Cooperative Relay Beamforming. IEEE Internet of Things Journal. PP. 1-1. 10.1109/JIOT.2020.2973753.

      • F. Chbib, W. Fahs, J. Haydar, L. Khoukhi, R. Khatoun . Source Fabrication Detection Model based on Key-value Variables in Reactive Protocols of VANET. International Journal of Circuits, Systems and Signal Processing, Pages : 959-965, E-ISSN : 1998-4464, Volume 14, 2020.

      • B. Hammi, A. Fayad, R. Khatoun, S. Zeadally, Y. Begriche. A lightweight ECC-based authentication scheme for Internet of Things (IoT), in IEEE Systems Journal, doi: 10.1109/JSYST.2020.2970167, 2020.

      • F. Chbib, L. Khoukhi, W. Fahs, J. Haydar and R. Khatoun, "A Cross-Layered Interference in Multichannel MAC of VANET," 2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech), pp. 1-6, November 24 - 26, 2020.

      • Y. Begriche, R. Khatoun, A. Rachini and L. Khoukhi, "A Reputation System Using a Bayesian Statistical Filter in Vehicular Networks," 2020 Sixth International Conference on Mobile And Secure Services (MobiSecServ), Miami Beach, FL, USA, 2020, pp. 1-7.

    • 2019

      • A. Fayad, R. Khatoun, B. Hammi, A. Serhrouchni. A Blockchain-based Lightweight Authentication Solution for IoT. In the 3rd Cyber Security in Networking Conference, Quito, Ecuador. Oct 23, 2019 - Oct 25, 2019.

      • R. Khatoun, D. Menezes Ferrazani Mattos, O C. Muniz Bandeira Duarte. Cybersecurity in networking. Annales des Télécommunications 74(3-4): 123-124 (2019)

      • B. Hammi, S. Zeadally, R. Khatoun. An empirical investigation of botnet as a service for cyberattacks. Trans. Emerging Telecommunications Technologies 30(3) (2019)

      • R. Khatoun, Y. Begriche, L. Khoukhi. A statistical detection mechanism for node misbehaviours in wireless mesh networks. IJAHUC 31(1): 23-35 (2019)

      • F. Chbib, L. Khoukhi, W. Fahs, R. Khatoun, J. Haydar. Wave Performance Analysis and Enhancement for Safety Applications in Vehicular Networks. NTMS 2019: 1-7

    • 2018

      • P. Gu, C. Hua, R. Khatoun, Y. Wu, and A. Serhrouchni, “Cooperative Anti-Jamming Relaying for Control Channel Jamming in Vehicular Networks,” in IEEE Transactions on Vehicular Technology, vol.67, no. 8, pp. 7033-7046, Aug.2018.

      • B. Hammi, R. Khatoun, S. Zeadally, A. Fayad, L. Khoukhi, "Internet of Things (IoT) Technologies for Smart Cities", in IET Networks journal,Volume 7, Issue 1, p. 1 –13, January 2018.

      • Z. Zhong, I. Hamchaoui, A. Ferrieux, R. Khatoun and A. Serhrouchni, "CDBE: A cooperative way to improve end-to-end congestion control in mobile network," 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Limassol, Cyprus, 2018, pp. 216-223.

      • P. Gu, C. Hua, Y. Wu, R. Khatoun and A. Serhrouchni. "Cooperative Relay Beamforming for Control Channel Jamming in Vehicular Networks". In the the 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt 2018), May 7 to 11, 2018 in Shanghai, China.

      • A. Fayad, B. Hammi and R. Khatoun, "An adaptive authentication and authorization scheme for IoT’s gateways: a blockchain based approach," 2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC), Shanghai, China, 2018, pp. 1-7

      • M. Rmayti, Y. Begriche, R. Khatoun, L. Khoukhi and Mammeri. Graph-Based Wormhole Attack Detection in Mobile Ad hoc Networks (MANETs). In the fourth Conference On Mobile And Secure Services (MobiSecServ 2018), Miami, USA, 24-25 February 2018.

      • Z. Zhong, I. Hamchaoui, R. Khatoun and A. Serhrouchni, "Performance evaluation of CQIC and TCP BBR in mobile network," 2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), Paris, 2018, pp. 1-5.

      • Z. Zhong, I. Hamchaoui and R. Khatoun, "Perils of using CQIC in LTE network and a quick fix with delayed ACK," 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, 2018, pp. 1-2.

    • 2017

      • L. Pang, X. Chen, Y. Shi, Z. Xue, R. Khatoun. Localization of multiple jamming attackers in vehicular ad hoc network. International Journal of Distributed Sensor Networks, volume 13, issue 8, 2017

      • M. Rmayti, R. Khatoun, Y. Begriche and D. Gaïti. A Stochastic Approach for Packet Dropping Attacks Detection in Mobile Ad hoc Networks. Journal of Computer Networks, 2017.

      • R. Khatoun and S. Zeadally, "Cybersecurity and Privacy Solutions in Smart Cities". IEEE Communications Magazine, Volume: 55, Issue: 3, pp 51-59, March 2017.

      • J. Dromard, R. Khatoun, L. Khoukhi and Y. Begriche. Towards combining Admission Control and Link Scheduling in 802.11-based Wireless Mesh Networks. Telecommunication Systems journal, 2017

      • P. Gu, C. Hua, Y. Wu, R. Khatoun and A. Serhrouchni. "Cooperative Anti-Jamming Relaying for Control Channel Jamming in Vehicular Networks". In the the IEEE GLOBECOM 2017. Singapore, December 4-8, 2017.

      • B. Hammi, J-P Monteuuis, H. Labiod, R. Khatoun and A. Serhrouchni. “Using Butterfly Keys: a Performance Study of Pseudonym Certificates Requests in C-ITS”. In the Cyber Security in Networking Conference (CSNET’2017), Rio de Janeiro, Brazil, October 18 - 20, 2017

      • P. Gu, R. Khatoun, Y. Begriche and A. Serhrouchni, “Support Vector Machine (SVM) Based Sybil Attack Detection in Vehicular Networks”. Accepted in the Wireless Networks of the IEEE WCNC 2017 conference, San Francisco, USA, March 19-22, 2017.

      • P. Gu, R. Khatoun, Y. Begriche and A. Serhrouchni, “k-Nearest Neighbours Classification Based Sybil Attack Detection in Vehicular Networks”. Accepted in the MobiSecServ 2017 - Third Conference On Mobile And Secure Services, FL 33141, USA, 11-12 February 2017.

    • 2016

      • R. Khatoun and S. Zeadally, "Smart Cities: Basic Concepts, Architectural Issues, and Research Opportunities". Communications of the ACM (CACM) journal, Volume 59, Issue 8, Pages 46-57, August 2016.

      • J. Monteuuis, J. Huor, E-S Daniel and R. Khatoun. Security of the Intelligent Transportation Systems (ITS), to appear in the Multi-System & Internet Security Cookbook (MISC), November 2016.

      • P. Gu, R. Khatoun, Y. Begriche and A. Serhrouchni, "Vehicle Driving Pattern Based Sybil Attack Detection", accepted in the 14th IEEE International Conference on Smart City (SmartCity 2016), Sydney, Australia Dec. 12-14, 2016.

      • B. Hammi, M-C. Rahal and R. Khatoun. "Clustering methods comparison : application to source based detection of botclouds". The second International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC'2016). Paris, France, July 18-19,2016.

    • 2015

      • R. Khatoun, Y. Begriche, J. Dromard, L. Khoukhi and A. Serhrouchni. A Statistical Trust System in Wireless Mesh Networks, Annals of Telecommunications journal, Volume 70, Issue 11-12, December 2015.

      • M. Vasseur, R. Khatoun, A. Serhrouchni. Marquage des paquets IP pour la traçabilité sur Internet. International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distribued Systems (NTDS). 22-24 July 2015, Paris, France.

      • R. Khatoun, R. Doulami, P. Gu, L. Khoukhi, A. Serhrouchni. A Reputation System for Detection of Black Hole Attack in Vehicular Networking. International Conference on Security of Smart cities, Industrial Control System and Communications (SSIC 2015), 5-7 August 2015, Shanghai, China.

      • M. Bazm, R. Khatoun, Y. Begriche, L. Khoukhi, X. Chen, A. Serhrouchni. Malicious virtual machines detection through a clustering approach. International Conference of Cloud Computing Technologies and Applications (CloudTech’2015). June 2-4, 2015. Marrakesh, Morocco.

      • M. Vasseur, X. Chen, R. Khatoun, A. Serhrouchni. Survey on Packet Marking Fields and Information for IP Traceback. International Conference on Security of Smart cities, Industrial Control System and Communications (SSIC 2015), 5-7 August 2015, Shanghai, China.

      • B. Hammi., G. Doyen, R. Khatoun. A Collaborative Approach for a Source based Detection of Botclouds. Accepted in the IFIP/IEEE Integrated Network Management Symposium (IM 2015), short paper 4 pages. Ottawa, Canada, May 2015.

    • 2014

      • T. Cholez, G. Doyen, I. Chrisment, R. Khatoun and O. Festor. Faiblesses de l'identification dans les espaces numériques ouverts de partage de contenus : le cas des réseaux pair à pair. Book chapter in 'Enseignement, préservation et diffusion des identités numériques'. Hermès – Lavoisier. 2014.

      • J. Monteuuis , J. Huor, M. Hofmann, V. Beauvisage and R. Khatoun. Génération automatique de règles Snort pour la détection des réseaux Fast-Flux. Multi-System & Internet Security Cookbook (MISC), number 76, December 2014.

      • M. Rmayti, Y. Begriche, R. Khatoun, L. Khoukhi and D. Gaïti. Denial of Service attacks detection in MANETs using Bayesian classifiers. The 21st IEEE Symposium on Communications and Vehicular Technology (IEEE SCVT 2014). Delft, Netherlands, November 10, 2014.

      • A. El Attar, R. Khatoun and M. Lemercier. A Gaussian mixture model for dynamic detection of abnormal behavior in smartphone applications. The IEEE Global Information Infrastructure and Networking Symposium (GIIS 2014). Montreal, Canada, September 15-18, 2014.

      • M. Rmayti, R. Khatoun, Y. Begriche, L. Khoukhi and D. Gaïti. Denial of Service attacks detection in MANETs using statistical models. Short paper in the IEEE Global Information Infrastructure and Networking Symposium (GIIS 2014). Montreal, Canada, September 15-18, 2014.

      • M. Rmayti, Y. Begriche, R. Khatoun, L. Khoukhi, Chen X. and D. Gaïti. Détection des attaques Wormhole dans les réseaux MANETs en utilisant la théorie des graphes. 10ième édition du colloque francophone sur la gestion de réseaux et de services (GRES'2014). Paris, France, 1 - 3 Décembre, 2014.

      • B. Hammi, G. Doyen and R. Khatoun. Toward a source detection of botclouds: a PCA-based approach. The 8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS 2014).Brno, Czech Republic, June 30 - July 3, 2014.

      • A. El Attar, R. Khatoun and M. Lemercier. Trimming approach of robust clustering for smartphone behavioral analysis. Short paper in the 12th IEEE International Conference on Embedded and Ubiquitous Computing (EUC 2014). Milan, Italy, 26 - 28 August, 2014.

      • J. Dromard, R. Khatoun and L. Khoukhi. Adaptive CUSUM algorithm to detect mA.cious behaviors in wireless Mesh networks. The 8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS 2014). Brno, Czech Republic. June 30 - July 3, 2014.

      • A. El attar, R. Khatoun and M. Lemercier. Clustering-based anomaly detection for smartphone applications. The 6th IEEE/IFIP International Workshop on Management of the Future Internet, 4 pages, Krakow, Poland. May 5-9, 2014.

      • A. El Attar, R. Khatoun and M. Lemercier. Robust Clustering methods for detecting smartphone’s abnormal behavior. The IEEE Wireless Communications and Networking Conference (WCNC). Istanbul, Turkey. 6-9 April, 2014.

      • B. Hammi., R. Khatoun and G. Doyen. A factorial space for a system-based detection of botcloud activity. The Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS'2014), 5 pages. Dubai, UAE. M.h 30th - April 2nd, 2014.

      • B. Hammi, G. Doyen and R. Khatoun. Understanding Botclouds from a system perspective: a Principal Component Analysis. The 14th IEEE/IFIP Network Operations and Management Symposium (NOMS 2014), 8 pages. Krakow, POLAND. 5- 9 May 2014.

    • 2013

      • J. Dromard, R. Khatoun and L. Khoukhi. An efficient admission control model based on dynamic link scheduling in wireless Mesh network. EURASIP Journal on Wireless Communications and Networking, http://jwcn.eurasipjournals.com/content/2013/1/288, 2013.

      • A. EL Attar, R. Khatoun and M. Lemercier. Diagnosing smartphone’s abnormal behavior through robust outlier detection methods. The 4th Global Information Infrastructure and Networking Symposium(GIIS'2013), 3 p. Trento Italy, 28-31 October 2013.

      • B. Hammi, R. Khatoun and G. Doyen. Caractérisation des attaques DDoS générées par un Botcloud. 8ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR SSI), 1 p. Mont de Marsan - Landes, France, 16-18 septembre 2013.

      • J. Dromard, R. Khatoun and L. Khoukhi. A watchdog extension scheme considering packet loss for a reputation system in wireless Mesh network. The 20 th International Conference on Telecommunication (ICT 2013),5 p. Casablanca, Morocco, 6-8 May 2013.

      • J. Dromard, R. Khatoun and L. Khoukhi. An admission control scheme based on transmissions scheduling for wireless Mesh networks. The 8th IEEE International Workshop on the Performance Analysis and Enhancement of Wireless Networks (PAEWN-2013). Barcelona, Spain, 25-28 M.h 2013.

      • V. Lemoine, C. Perez, M. Lemercier, P. Vitard, V. Bensoussan, A. Corpel, R. Khatoun and B. Birregah. Protection des infrastructures informatiques des entreprises face à la cybercriminA.té. Workshop Interdisciplinaire sur la Sécurité Globale (WISG 2013). Troyes, France, 22-23 Janvier 2013.

    • 2012

      • R. Khatoun, L. Khoukhi, A. Nabet, D. Gaïti. ASRoP : Ad hoc Secure Routing Protocol. International Journal of Wireless & Mobile Networks (IJWMN), 0975 4679, p. 1-20. vol.4 2012.

      • J. Dromard, L. Khoukhi and R. Khatoun. An admission control scheme based on links' activity scheduling for wireless Mesh networks. The 11th International Conference on Ad Hoc Networks and Wireless. Belgrade, Serbia. 9-11 July 2012.

    • 2011

      • G. Montassier, T. Cholez, G. Doyen, R. Khatoun, I. Chrisment and O. Festor. Content pollution quantification in large P2P networks: a measurement study on KAD. The 11th IEEE International Conference on Peer-to-Peer Computing. Kyoto, Japan, 31 August-2 September 2011.

      • A. Nabet, R. Khatoun, L. Khoukhi, J. Dromard and D. Gaïti. Towards secure route discovery protocol in MANET's. Global Information Infrastructure Symposium (GIIS 2011). Da Nang, Vietnam, 4-6 August 2011.

      • T. Cholez, C. Hénard, I. Chrisment, O. Festor, G. Doyen and R. Khatoun. Détection de pairs suspects dans le réseau pair à pair KAD. SAR-SSI'2011, La Rochelle - France, 18-21 Mai 2011.

    • 2010

      • L. Khoukhi, S. Cherkaoui, R. Khatoun and D. Gaïti. Management of rescue and relief operations using wireless Mobile Ad Hoc technology. The International Journal of Next-Generation Networks, vol. 2, n° 3, p. 119- 132. September 2010.

    • 2009

      • I. Ullah, G. Doyen, R. Khatoun and D. Gaïti. A decentralized approach to make application layer multicast systems dynamics-aware. 10èmes Journées Doctorales en Informatique et Réseaux (JDIR'09). Belfort, France, 2-4 February 2009.

    • 2008

      • R. Khatoun, D. Gaïti, L. Merghem-Boulahia and A. Serhouchni. Optimisation de la détection d’intrusions en utilisant le préprocesseur Global SPADE. REE. Revue de l'electricite et de l'electronique. 9(79), 88–93. Societe de l'Electricite, de l'Electronique et des Technologies de l'Information et de la Communication (SEE), 2008.

      • T. Bullot, R. Khatoun, L. Hugues, D. Gaïti and L. Merghem-Boulahia. A situatedness based knowledge plane for autonomic networking. ACM International Journal of Network Management, special issue on NGN, Vol. 18 N. 2, pp. 171-193, M.h/April 2008.

      • R. Khatoun, R. Saad, G. Doyen, A. Serhrouchni and D. Gaïti. DecentrA.zed alerts correlation approach for DDoS intrusion detection. The second International Conference on New Technologies, Mobility and Security (NTMS'2008). Tangier, Morocco, 5 - 7 November, 2008.

    • 2007

      • R. Khatoun, D. Gaïti, L. Merghem-Boulahia and A. Serhrouchni. Optimizing intrusion detection using global SPADE preprocessor. International Conference on Risks and Security of Internet and Systems (CRiSIS 2007), Marrakech, Morocco, 02-05 July 2007.

      • R. Khatoun, D. Gaïti, L. Merghem-Boulahia and A. Serhrouchni. Snort-OO: improving intrusion detection performance by Snort cooperation. The 4th International Workshop on Management of Ubiquitous Communication and Services (MUCS'2007) as part of the 10th IFIP/IEEE International Symposium on Integrated Network Management (IM'2007). Munich, Germany, 25 May 2007.
  • ORAL COMMUNICATIONS

    • Keynote Speech on “Cyber Security for Cooperative Intelligent Transportation Systems (C-ITS)” in the Fourth International Conference on Mobile and Secure Services (MobiSecServ), ), Miami, USA, 24-25 February 2018.

    • G. Doyen, A.Ploix, M. Lemercier and R. Khatoun. Towards a generic environment for the large-scale evaluation of peer-to-peer protocols. In Networking and Electronic Commerce Research Conference 2008. Lake Garda, Italy. 25- 28 September, 2008.

    • R. Khatoun, R. Saad, G. Doyen, D. Gaïti, L. Merghem-Boulahia and A. Serhouchni. A cooperative agent approach based on a peer-to-peer model for DDoS attacks detection and reaction. Networking and Electronic Commerce Research Conference (NAEC 2008). Riva Del Garda, Italy, 25-28 September, 2008.

    • R. Khatoun, L. Merghem-Boulahia and D. Gaïti. Autonomic platform for security management. The autonomic platform day. Paris, France. 29 September 2009.

    • R. Khatoun, D. Gaïti, L. Merghem-Boulahia and A. Sehrouchni. Une nouvelle arme contre les attaques de déni de service distribuées (DDoS). 22ème Congrès DNAC : De Nouvelles Architectures pour les Communications. Paris, France. December 2008.

Useful Cyber Security Links

Contact

  • E-mail: rida.khatoun@telecom-paris.fr
  • Phone: +33 1 75 31 98 38
  • Address: Telecom Paris, 19 Place Marguerite Perey, 91120 Palaiseau, France


You are the visitor:


Developed by Rida KHATOUN