Follow
Edgardo Montes de Oca
Edgardo Montes de Oca
Montimage
Verified email at montimage.com - Homepage
Title
Cited by
Cited by
Year
The role of machine learning in cybersecurity
G Apruzzese, P Laskov, E Montes de Oca, W Mallouli, L Brdalo Rapa, ...
Digital Threats: Research and Practice 4 (1), 1-38, 2023
1762023
SDN and NFV integration in generalized mobile network architecture
J Costa-Requena, JL Santos, VF Guasch, K Ahokas, G Premsankar, ...
2015 European conference on networks and communications (EuCNC), 154-158, 2015
1322015
INSPIRE-5Gplus: Intelligent security and pervasive trust for 5G and beyond networks
J Ortiz, R Sanchez-Iborra, JB Bernabe, A Skarmeta, C Benzaid, T Taleb, ...
Proceedings of the 15th International Conference on Availability …, 2020
572020
Security for future software defined mobile networks
M Liyanage, I Ahmed, M Ylianttila, JL Santos, R Kantola, OL Perez, ...
2015 9th international conference on next generation mobile applications …, 2015
572015
Two complementary tools for the formal testing of distributed systems with time constraints
AR Cavalli, EM De Oca, W Mallouli, M Lallali
2008 12th IEEE/ACM International Symposium on Distributed Simulation and …, 2008
562008
Timed extended invariants for the passive testing of web services
G Morales, S Maag, A Cavalli, W Mallouli, EM De Oca, B Wehbi
2010 IEEE International Conference on Web Services, 592-599, 2010
552010
A security monitoring system for internet of things
V Casola, A De Benedictis, A Riccio, D Rivera, W Mallouli, EM de Oca
Internet of Things 7, 100080, 2019
512019
Enhancing security of software defined mobile networks
M Liyanage, I Ahmed, J Okwuibe, M Ylianttila, H Kabir, JL Santos, ...
IEEE Access 5, 9422-9438, 2017
502017
Events-based security monitoring using MMT tool
B Wehbi, EM de Oca, M Bourdelles
2012 IEEE Fifth International Conference on Software Testing, Verification …, 2012
472012
An advanced approach for modeling and detecting software vulnerabilities
N Shahmehri, A Mammar, EM De Oca, D Byers, A Cavalli, S Ardi, ...
Information and Software Technology 54 (9), 997-1013, 2012
412012
Leveraging LTE security with SDN and NFV
M Liyanage, I Ahmad, M Ylianttila, A Gurtov, AB Abro, EM De Oca
2015 IEEE 10th International Conference on Industrial and Information …, 2015
372015
Reliable detection of interest flooding attack in real deployment of named data networking
T Nguyen, HL Mai, R Cogranne, G Doyen, W Mallouli, L Nguyen, ...
IEEE Transactions on Information Forensics and Security 14 (9), 2470-2485, 2019
362019
A passive conformance testing approach for a manet routing protocol
A Cavalli, S Maag, EM De Oca
Proceedings of the 2009 ACM symposium on Applied Computing, 207-211, 2009
362009
5greplay: A 5g network traffic fuzzer-application to attack injection
Z Salazar, HN Nguyen, W Mallouli, AR Cavalli, E Montes de Oca
Proceedings of the 16th International Conference on Availability …, 2021
352021
Online network traffic security inspection using mmt tool
W Mallouli, B Wehbi, EM de Oca, M Bourdelles
System testing and validation 192, 2012
292012
A security monitoring plane for named data networking deployment
T Nguyen, HL Mai, G Doyen, R Cogranne, W Mallouli, EM De Oca, ...
IEEE Communications Magazine 56 (11), 88-94, 2018
272018
Towards a 5G security architecture: Articulating software-defined security and security as a service
G Blanc, N Kheir, D Ayed, V Lefebvre, EM de Oca, P Bisson
Proceedings of the 13th International Conference on Availability …, 2018
272018
Towards a security monitoring plane for named data networking and its application against content poisoning attack
HL Mai, T Nguyen, G Doyen, R Cogranne, W Mallouli, EM de Oca, ...
NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-9, 2018
272018
Toward deterministic communications in 6G networks: state of the art, open challenges and the way forward
GP Sharma, D Patel, J Sachs, M De Andrade, J Farkas, J Harmatos, ...
IEEE Access 11, 106898-106923, 2023
232023
Software defined security monitoring in 5G networks
M Liyanage, I Ahmad, J Okwuibe, EM de Oca, HL Mai, OL Perez, ...
A comprehensive guide to 5G security, 231-243, 2018
202018
The system can't perform the operation now. Try again later.
Articles 1–20