Quentin Jacquemart
Quentin Jacquemart
Verified email at unice.fr - Homepage
Cited by
Cited by
Visual analytics for BGP monitoring and prefix hijacking identification
E Biersack, Q Jacquemart, F Fischer, J Fuchs, O Thonnard, G Theodoridis, ...
IEEE Network 26 (6), 33-39, 2012
HEAP: reliable assessment of BGP hijacking attacks
J Schlamp, R Holz, Q Jacquemart, G Carle, EW Biersack
IEEE Journal on Selected Areas in Communications 34 (6), 1849-1861, 2016
A longitudinal study of BGP MOAS prefixes
Q Jacquemart, G Urvoy-Keller, E Biersack
International Workshop on Traffic Monitoring and Analysis, 127-138, 2014
Malicious BGP hijacks: appearances can be deceiving
PA Vervier, Q Jacquemart, J Schlamp, O Thonnard, G Carle, ...
2014 IEEE International Conference on Communications (ICC), 884-889, 2014
Investigating the nature of routing anomalies: Closing in on subprefix hijacking attacks
J Schlamp, R Holz, O Gasser, A Korsten, Q Jacquemart, G Carle, ...
International Workshop on Traffic Monitoring and Analysis, 173-187, 2015
Container-based service chaining: A performance perspective
S Livi, Q Jacquemart, DL Pacheco, G Urvoy-Keller
2016 5th IEEE International Conference on Cloud Networking (Cloudnet), 176-181, 2016
Towards uncovering BGP hijacking attacks
Q Jacquemart
Towards massive consolidation in data centers with seamless
A Segalini, DL Pacheco, Q Jacquemart
2018 18th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2018
Measuring the Amazon Web Services (AWS) WAN Infrastructure
Q Jacquemart, A Vitali, G Urvoy-Keller
Seamless: A service migration cloud architecture for energy saving and memory releasing capabilities
DL Pacheco, Q Jacquemart, A Segalini, M Rifai, M Dione, G Urvoy-Keller
Proceedings of the 2017 Symposium on Cloud Computing, 645-645, 2017
Behind IP prefix overlaps in the BGP routing table
Q Jacquemart, G Urvoy-Keller, E Biersack
International Conference on Passive and Active Network Measurement, 289-301, 2016
Hy-FiX: Fast In-place upgrade of KVM hypervisors
A Segalini, DL Pacheco, G Urvoy-Keller, F Hermenier, Q Jacquemart
Proceedings of the ACM Symposium on Cloud Computing, 485-485, 2019
Inferring the Deployment of Top Domains over Public Clouds using DNS Data
Q Jacquemart, C Pigout, G Urvoy-Keller
2019 Network Traffic Measurement and Analysis Conference (TMA), 57-64, 2019
PRoPHYS: Providing Resilient Path in Hybrid Software Defined Networks
M Rifai, D Pacheco, Q Jacquemart, G Urvoy-Keller
Container-Based Service Chaining: A Performance Perspective
DL Pacheco, G Urvoy-Keller, Q Jacquemart
Demystifying the IP Blackspace
Q Jacquemart, PA Vervier, G Urvoy-Keller, E Biersack
International Symposium on Recent Advances in Intrusion Detection, 111-132, 2015
Déceler les attaques par détournement BGP
Q Jacquemart
Paris, ENST, 2015
An Introduction to
Q Jacquemart
Applied Cryptography
Q Jacquemart
The system can't perform the operation now. Try again later.
Articles 1–19