Edgardo Montes de Oca
Edgardo Montes de Oca
Verified email at - Homepage
Cited by
Cited by
SDN and NFV integration in generalized mobile network architecture
J Costa-Requena, JL Santos, VF Guasch, K Ahokas, G Premsankar, ...
2015 European conference on networks and communications (EuCNC), 154-158, 2015
Two complementary tools for the formal testing of distributed systems with time constraints
AR Cavalli, EM De Oca, W Mallouli, M Lallali
2008 12th IEEE/ACM International Symposium on Distributed Simulation and …, 2008
The role of machine learning in cybersecurity
G Apruzzese, P Laskov, E Montes de Oca, W Mallouli, L Brdalo Rapa, ...
Digital Threats: Research and Practice 4 (1), 1-38, 2023
Timed extended invariants for the passive testing of web services
G Morales, S Maag, A Cavalli, W Mallouli, EM De Oca, B Wehbi
2010 IEEE International Conference on Web Services, 592-599, 2010
Security for future software defined mobile networks
M Liyanage, I Ahmed, M Ylianttila, JL Santos, R Kantola, OL Perez, ...
2015 9th international conference on next generation mobile applications …, 2015
Events-based security monitoring using MMT tool
B Wehbi, EM de Oca, M Bourdelles
2012 IEEE Fifth International Conference on Software Testing, Verification …, 2012
INSPIRE-5Gplus: Intelligent security and pervasive trust for 5G and beyond networks
J Ortiz, R Sanchez-Iborra, JB Bernabe, A Skarmeta, C Benzaid, T Taleb, ...
Proceedings of the 15th International Conference on Availability …, 2020
Enhancing security of software defined mobile networks
M Liyanage, I Ahmed, J Okwuibe, M Ylianttila, H Kabir, JL Santos, ...
IEEE Access 5, 9422-9438, 2017
A security monitoring system for internet of things
V Casola, A De Benedictis, A Riccio, D Rivera, W Mallouli, EM de Oca
Internet of Things 7, 100080, 2019
An advanced approach for modeling and detecting software vulnerabilities
N Shahmehri, A Mammar, EM De Oca, D Byers, A Cavalli, S Ardi, ...
Information and Software Technology 54 (9), 997-1013, 2012
A passive conformance testing approach for a manet routing protocol
A Cavalli, S Maag, EM De Oca
Proceedings of the 2009 ACM symposium on Applied Computing, 207-211, 2009
Leveraging LTE security with SDN and NFV
M Liyanage, I Ahmad, M Ylianttila, A Gurtov, AB Abro, EM De Oca
2015 IEEE 10th International Conference on Industrial and Information …, 2015
Reliable detection of interest flooding attack in real deployment of named data networking
T Nguyen, HL Mai, R Cogranne, G Doyen, W Mallouli, L Nguyen, ...
IEEE Transactions on Information Forensics and Security 14 (9), 2470-2485, 2019
Online network traffic security inspection using mmt tool
W Mallouli, B Wehbi, EM de Oca, M Bourdelles
System testing and validation 192, 2012
A security monitoring plane for named data networking deployment
T Nguyen, HL Mai, G Doyen, R Cogranne, W Mallouli, EM De Oca, ...
IEEE Communications Magazine 56 (11), 88-94, 2018
Towards a security monitoring plane for named data networking and its application against content poisoning attack
HL Mai, T Nguyen, G Doyen, R Cogranne, W Mallouli, EM de Oca, ...
NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-9, 2018
Towards a 5G security architecture: Articulating software-defined security and security as a service
G Blanc, N Kheir, D Ayed, V Lefebvre, EM de Oca, P Bisson
Proceedings of the 13th International Conference on Availability …, 2018
5greplay: A 5g network traffic fuzzer-application to attack injection
Z Salazar, HN Nguyen, W Mallouli, AR Cavalli, E Montes de Oca
Proceedings of the 16th International Conference on Availability …, 2021
Software defined security monitoring in 5G networks
M Liyanage, I Ahmad, J Okwuibe, EM de Oca, HL Mai, OL Perez, ...
A comprehensive guide to 5G security, 231-243, 2018
Software defined monitoring (sdm) for 5g mobile backhaul networks
M Liyanage, J Okwuibe, I Ahmed, M Ylianttila, OL Pérez, MU Itzazelaia, ...
2017 IEEE International Symposium on Local and Metropolitan Area Networks …, 2017
The system can't perform the operation now. Try again later.
Articles 1–20