Jung, T., Martin, S., Nassar, M., Ernst, D., & Leduc, G. (February 2013). Outbound SPIT Filter with Optimal Performance Guarantees. Computer Networks, 57 (7), 1630–1643. doi:10.1016/j.comnet.2013.02.013 Peer Reviewed verified by ORBi |
Jung, T., Martin, S., Ernst, D., & Leduc, G. (2012). Contextual Multi-armed Bandits for the Prevention of Spam in VoIP Networks. ORBi-University of Liège. https://orbi.uliege.be/handle/2268/115524. |
Martin, S., Chiarello, L., & Leduc, G. (2012). DISco: a Distributed Information Store for Network Challenges and Their Outcome. In J. Keeney & J. Serrat (Eds.), 5th International workshop on Distributed Autonomous Network Management Systems (pp. 6). doi:10.1109/NOMS.2012.6212055 Peer reviewed |
Martin, S., Chiarello, L., & Leduc, G. (2012). DISco: a Distributed Information Store for network Challenges and their Outcome. (arXiv:1201.3073v1). arXiv. https://orbi.uliege.be/handle/2268/110541 |
Jung, T., Martin, S., Ernst, D., & Leduc, G. (2012). Contextual Multi-armed Bandits for Web Server Defense. In A. Hussein (Ed.), Proceedings of 2012 International Joint Conference on Neural Networks (IJCNN) (pp. 8). IEEE. doi:10.1109/IJCNN.2012.6252760 Peer reviewed |
Jung, T., Martin, S., Ernst, D., & Leduc, G. (2012). SPRT for SPIT: Using the Sequential Probability Ratio Test for Spam in VoIP Prevention. In Proc. of 6th International Conference on Autonomous Infrastructure, Management and Security. Springer Berlin. doi:10.1007/978-3-642-30633-4 Peer reviewed |
Nassar, M. A., Martin, S., Leduc, G., & Festor, O. (2011). Using Decision Trees for Generating Adaptive SPIT Signatures. In Proc. of the 4th International Conference on Security of Information and Networks (SIN 2011). ACM. doi:10.1145/2070425.2070431 Peer reviewed |
Sifalakis, M., Tschudin, C., Martin, S., Ferreira, L., & Correia, L. (2011). A Generic Service Interface for Cloud Networks. In F. Leymann, I. Ivanov, ... M. van Sinderen (Eds.), CLOSER. Noordwijkerhout, Netherlands: ScitePress. Peer reviewed |
Martin, S., & Leduc, G. (October 2009). A Practical Bytecode Interpreter for Programmable Routers on Network Processor. Computer Networks, 53 (15), 2740-2751. doi:10.1016/j.comnet.2009.06.007 Peer Reviewed verified by ORBi |
Martin, S., & Leduc, G. (2009). Interpreted Active Packets for Ephemeral State Processing Routers. Lecture Notes in Computer Science, 4388, 156-167. doi:10.1007/978-3-642-00972-3_13 Peer reviewed |
Martin, S. (2007). WASP : Lightweight Programmable Ephemeral State on Routers to Support End-to-End Applications [Doctoral thesis, Université de Liège]. ORBi-University of Liège. https://orbi.uliege.be/handle/2268/314993 |
Martin, S., & Leduc, G. (2007). Ephemeral State Assisted Discovery of Peer-to-peer Networks. In R. Boutaba, M. Brunner, ... S. Schmid (Eds.), 1st IEEE Workshop on Autonomic Communications and Network Management (pp. 9-16). Peer reviewed |
Martin, S., & Leduc, G. (May 2005). An active platform as middleware for services and communities discovery. Lecture Notes in Computer Science, 3516, 237-245. doi:10.1007/11428862_33 Peer reviewed |
François, J.-M., Leduc, G., & Martin, S. (2004). Learning movement patterns in mobile networks: a generic method. In European Wireless 2004 (pp. 128-134). Peer reviewed |
Martin, S., & Leduc, G. (2004). A dynamic neighbourhood discovery protocol for active overlay networks. Lecture Notes in Computer Science, 2982, 151-162. doi:10.1007/978-3-540-24715-9_14 Peer reviewed |
François, J.-M., Leduc, G., & Martin, S. (2003). Evaluation d'une méthode de prédiction des déplacements de terminaux dans les réseaux mobiles. In Ingénierie des protocoles - Réseaux mobiles et ad hoc, qualité de service, test et validation (pp. 189-202). France: Hermès Lavoisier. Peer reviewed |
Reinbold, P., Martin, S., Bonaventure, O., & Leduc, G. (2003). Module de garantie de transmission. In ARTHUR - Manuel d'informatisation des urgences (pp. 128-147). Belgium: Presses universitaires de Louvain. |
Martin, S., & Leduc, G. (December 2002). RADAR: Ring-based adaptive discovery of active neighbour routers. Lecture Notes in Computer Science, 2546, 62-73. doi:10.1007/3-540-36199-5_5 Peer reviewed |