The role of machine learning in cybersecurity G Apruzzese, P Laskov, E Montes de Oca, W Mallouli, L Brdalo Rapa, ... Digital Threats: Research and Practice 4 (1), 1-38, 2023 | 176 | 2023 |
SDN and NFV integration in generalized mobile network architecture J Costa-Requena, JL Santos, VF Guasch, K Ahokas, G Premsankar, ... 2015 European conference on networks and communications (EuCNC), 154-158, 2015 | 132 | 2015 |
INSPIRE-5Gplus: Intelligent security and pervasive trust for 5G and beyond networks J Ortiz, R Sanchez-Iborra, JB Bernabe, A Skarmeta, C Benzaid, T Taleb, ... Proceedings of the 15th International Conference on Availability …, 2020 | 57 | 2020 |
Security for future software defined mobile networks M Liyanage, I Ahmed, M Ylianttila, JL Santos, R Kantola, OL Perez, ... 2015 9th international conference on next generation mobile applications …, 2015 | 57 | 2015 |
Two complementary tools for the formal testing of distributed systems with time constraints AR Cavalli, EM De Oca, W Mallouli, M Lallali 2008 12th IEEE/ACM International Symposium on Distributed Simulation and …, 2008 | 56 | 2008 |
Timed extended invariants for the passive testing of web services G Morales, S Maag, A Cavalli, W Mallouli, EM De Oca, B Wehbi 2010 IEEE International Conference on Web Services, 592-599, 2010 | 55 | 2010 |
A security monitoring system for internet of things V Casola, A De Benedictis, A Riccio, D Rivera, W Mallouli, EM de Oca Internet of Things 7, 100080, 2019 | 51 | 2019 |
Enhancing security of software defined mobile networks M Liyanage, I Ahmed, J Okwuibe, M Ylianttila, H Kabir, JL Santos, ... IEEE Access 5, 9422-9438, 2017 | 50 | 2017 |
Events-based security monitoring using MMT tool B Wehbi, EM de Oca, M Bourdelles 2012 IEEE Fifth International Conference on Software Testing, Verification …, 2012 | 47 | 2012 |
An advanced approach for modeling and detecting software vulnerabilities N Shahmehri, A Mammar, EM De Oca, D Byers, A Cavalli, S Ardi, ... Information and Software Technology 54 (9), 997-1013, 2012 | 41 | 2012 |
Leveraging LTE security with SDN and NFV M Liyanage, I Ahmad, M Ylianttila, A Gurtov, AB Abro, EM De Oca 2015 IEEE 10th International Conference on Industrial and Information …, 2015 | 37 | 2015 |
Reliable detection of interest flooding attack in real deployment of named data networking T Nguyen, HL Mai, R Cogranne, G Doyen, W Mallouli, L Nguyen, ... IEEE Transactions on Information Forensics and Security 14 (9), 2470-2485, 2019 | 36 | 2019 |
A passive conformance testing approach for a manet routing protocol A Cavalli, S Maag, EM De Oca Proceedings of the 2009 ACM symposium on Applied Computing, 207-211, 2009 | 36 | 2009 |
5greplay: A 5g network traffic fuzzer-application to attack injection Z Salazar, HN Nguyen, W Mallouli, AR Cavalli, E Montes de Oca Proceedings of the 16th International Conference on Availability …, 2021 | 35 | 2021 |
Online network traffic security inspection using mmt tool W Mallouli, B Wehbi, EM de Oca, M Bourdelles System testing and validation 192, 2012 | 29 | 2012 |
A security monitoring plane for named data networking deployment T Nguyen, HL Mai, G Doyen, R Cogranne, W Mallouli, EM De Oca, ... IEEE Communications Magazine 56 (11), 88-94, 2018 | 27 | 2018 |
Towards a 5G security architecture: Articulating software-defined security and security as a service G Blanc, N Kheir, D Ayed, V Lefebvre, EM de Oca, P Bisson Proceedings of the 13th International Conference on Availability …, 2018 | 27 | 2018 |
Towards a security monitoring plane for named data networking and its application against content poisoning attack HL Mai, T Nguyen, G Doyen, R Cogranne, W Mallouli, EM de Oca, ... NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-9, 2018 | 27 | 2018 |
Toward deterministic communications in 6G networks: state of the art, open challenges and the way forward GP Sharma, D Patel, J Sachs, M De Andrade, J Farkas, J Harmatos, ... IEEE Access 11, 106898-106923, 2023 | 23 | 2023 |
Software defined security monitoring in 5G networks M Liyanage, I Ahmad, J Okwuibe, EM de Oca, HL Mai, OL Perez, ... A comprehensive guide to 5G security, 231-243, 2018 | 20 | 2018 |