Остановите войну!
for scientists:
default search action
Romain Fontugne
- > Home > Persons > Romain Fontugne
Publications
- 2024
- [c47]Malte Tashiro, Romain Fontugne, Kensuke Fukuda:
Following the Data Trail: An Analysis of IXP Dependencies. PAM (2) 2024: 199-227 - 2019
- [c34]Romain Fontugne, Esteban Bautista, Colin Petrie, Yutaro Nomura, Patrice Abry, Paulo Gonçalves, Kensuke Fukuda, Emile Aben:
BGP Zombies: An Analysis of Beacons Stuck Routes. PAM 2019: 197-209 - 2017
- [j7]Romain Fontugne, Patrice Abry, Kensuke Fukuda, Darryl Veitch, Kenjiro Cho, Pierre Borgnat, Herwig Wendt:
Scaling in Internet Traffic: A 14 Year and 3 Day Longitudinal Study, With Multiscale Analyses and Random Projections. IEEE/ACM Trans. Netw. 25(4): 2152-2165 (2017) - [c23]Johan Mazel, Romain Fontugne, Kensuke Fukuda:
Profiling internet scanners: Spatiotemporal structures and measurement ethics. TMA 2017: 1-9 - [i4]Romain Fontugne, Patrice Abry, Kensuke Fukuda, Darryl Veitch, Kenjiro Cho, Pierre Borgnat, Herwig Wendt:
Scaling in Internet Traffic: a 14 year and 3 day longitudinal study, with multiscale analyses and random projections. CoRR abs/1703.02005 (2017) - 2016
- [c20]Jordan Frécon, Romain Fontugne, Gustavo Didier, Nelly Pustelnik, Kensuke Fukuda, Patrice Abry:
Non-linear regression for bivariate self-similarity identification - application to anomaly detection in Internet traffic based on a joint scaling analysis of packet and byte counts. ICASSP 2016: 4184-4188 - [c19]Johan Mazel, Romain Fontugne, Kensuke Fukuda:
Identifying Coordination of Network Scans Using Probed Address Structure. TMA 2016 - 2015
- [j6]Johan Mazel, Pedro Casas, Romain Fontugne, Kensuke Fukuda, Philippe Owezarski:
Hunting attacks in the dark: clustering and correlation analysis for unsupervised anomaly detection. Int. J. Netw. Manag. 25(5): 283-305 (2015) - [c18]Romain Fontugne, Patrice Abry, Kensuke Fukuda, Pierre Borgnat, Johan Mazel, Herwig Wendt, Darryl Veitch:
Random projection and multiscale wavelet leader based anomaly detection and address identification in internet traffic. ICASSP 2015: 5530-5534 - [c17]Romain Fontugne, Johan Mazel, Kensuke Fukuda:
An empirical mixture model for large-scale RTT measurements. INFOCOM 2015: 2470-2478 - 2014
- [c16]Jianxing Chen, Romain Fontugne, Akira Kato, Kensuke Fukuda:
Clustering Spam Campaigns with Fuzzy Hashing. AINTEC 2014: 66 - [c14]Romain Fontugne, Johan Mazel, Kensuke Fukuda:
Hashdoop: A MapReduce framework for network anomaly detection. INFOCOM Workshops 2014: 494-499 - [c13]Johan Mazel, Romain Fontugne, Kensuke Fukuda:
A taxonomy of anomalies in backbone network traffic. IWCMC 2014: 30-36 - [c12]Johan Mazel, Romain Fontugne, Kensuke Fukuda:
Visual comparison of network anomaly detectors with chord diagrams. SAC 2014: 473-480 - 2013
- [j5]Yoshiki Kanda, Romain Fontugne, Kensuke Fukuda, Toshiharu Sugawara:
ADMIRE: Anomaly detection method using entropy-based PCA with three-step sketches. Comput. Commun. 36(5): 575-588 (2013) - [c10]Youngjoon Won, Romain Fontugne, Kenjiro Cho, Hiroshi Esaki, Kensuke Fukuda:
Nine years of observing traffic anomalies: Trending analysis in backbone networks. IM 2013: 636-642 - [c9]Romain Fontugne, Jorge Ortiz, Nicolas Tremblay, Pierre Borgnat, Patrick Flandrin, Kensuke Fukuda, David E. Culler, Hiroshi Esaki:
Strip, bind, and search: a method for identifying abnormal energy consumption in buildings. IPSN 2013: 129-140 - 2012
- [c8]Johan Mazel, Hiroshi Esaki, Romain Fontugne, Kensuke Fukuda:
Improving an SVD-based combination strategy of anomaly detectors for traffic labelling. AINTEC 2012: 69-76 - 2011
- [j3]Romain Fontugne, Toshio Hirotsu, Kensuke Fukuda:
A Visualization Tool for Exploring Multi-scale Network Traffic Anomalies. J. Networks 6(4): 577-586 (2011) - [c7]Romain Fontugne, Kenjiro Cho, Youngjoon Won, Kensuke Fukuda:
Disasters seen through Flickr cameras. SWID@CoNEXT 2011: 5:1-5:10 - [c6]Romain Fontugne, Kensuke Fukuda:
A Hough-transform-based anomaly detector with an adaptive time interval. SAC 2011: 471-477 - 2010
- [j2]Romain Fontugne, Yosuke Himura, Kensuke Fukuda:
Evaluation of Anomaly Detection Method Based on Pattern Recognition. IEICE Trans. Commun. 93-B(2): 328-335 (2010) - [j1]Guillaume Dewaele, Yosuke Himura, Pierre Borgnat, Kensuke Fukuda, Patrice Abry, Olivier J. J. Michel, Romain Fontugne, Kenjiro Cho, Hiroshi Esaki:
Unsupervised host behavior classification from connection patterns. Int. J. Netw. Manag. 20(5): 317-337 (2010) - [c5]Romain Fontugne, Pierre Borgnat, Patrice Abry, Kensuke Fukuda:
MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking. CoNEXT 2010: 8 - [c4]Kensuke Fukuda, Romain Fontugne:
Estimating Speed of Scanning Activities with a Hough Transform. ICC 2010: 1-5 - [c3]Romain Fontugne, Pierre Borgnat, Patrice Abry, Kensuke Fukuda:
Uncovering Relations between Traffic Classifiers and Anomaly Detectors via Graph Theory. TMA 2010: 101-114 - 2009
- [c2]Romain Fontugne, Pierre Borgnat, Patrice Abry, Kensuke Fukuda:
Towards systematic traffic annotation. StudentWorkshop@CoNEXT 2009: 15-16 - 2008
- [c1]Romain Fontugne, Toshio Hirotsu, Kensuke Fukuda:
An image processing approach to traffic anomaly detection. AINTEC 2008: 17-26
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 01:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint