Monter d'un niveau |
Bellaïche, M., & Gregoire, J.-C. (juin 2009). Source detection of SYN flooding attacks [Communication écrite]. International Conference on Network and Service Security (N2S 2009), Paris, France (6 pages). Lien externe
Boujelben, Y., Girard, A., & Gregoire, J.-C. (2006). A sequential algorithm for constructing delay-constrained multirings for multipoint-to-multipoint communications. Telecommunication Systems - Modeling, Analysis, Design and Management, 31(1), 43-59. Lien externe