2024
Intrusion Response Systems for the 5G Networks and Beyond: A New Joint Security-vs-QoS Optimization Approach.
IEEE Trans. Netw. Sci. Eng., 2024
SINDIT: A Framework for Knowledge Graph-Based Digital Twins in Smart Manufacturing.
Proceedings of the Internet of Things. 7th IFIPIoT 2024 International IFIP WG 5.5 Workshops, 2024
Enhancing IoT Security in 6G Networks: AI-Based Intrusion Detection, Penetration Testing, and Blockchain-Based Trust Management (Work-in-Progress Paper).
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the Internet of Things. 7th IFIPIoT 2024 International IFIP WG 5.5 Workshops, 2024
Diagnosis Automation Using Similarity Analysis: Application to Industrial Systems.
Proceedings of the 19th International Conference on Software Technologies, 2024
Smart Assistants for Enhancing System Security and Resilience.
Proceedings of the Communication Papers of the 19th Conference on Computer Science and Intelligence Systems, 2024
AI4SOAR: A Security Intelligence Tool for Automated Incident Response.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
NERO: Advanced Cybersecurity Awareness Ecosystem for SMEs.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
AI-Powered Penetration Testing using Shennina: From Simulation to Validation.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Novel modeling and optimization for joint Cybersecurity-vs-QoS Intrusion Detection Mechanisms in 5G networks.
Comput. Networks, December, 2023
The Role of Machine Learning in Cybersecurity.
DTRAP, 2023
Joint Security-vs-QoS Game Theoretical Optimization for Intrusion Response Mechanisms for Future Network Systems.
CoRR, 2023
A Network Traffic Mutation Based Ontology, and Its Application to 5G Networks.
IEEE Access, 2023
Automated Generation of 5G Fine-Grained Threat Models: A Systematic Approach.
IEEE Access, 2023
Study on Adversarial Attacks Techniques, Learning Methods and Countermeasures: Application to Anomaly Detection.
Proceedings of the 18th International Conference on Software Technologies, 2023
A Resilience Component for a Digital Twin.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
Testing techniques to assess impact and cascading effects.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023
Towards Smarter Security Orchestration and Automatic Response for CPS and IoT.
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023
5G SUCI Catcher: Attack and Detection.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023
The DYNABIC approach to resilience of critical infrastructures.
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
A deep learning anomaly detection framework with explainability and robustness.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
VeriDevOps Software Methodology: Security Verification and Validation for DevOps Practices.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
HTTP/2 Attacks Generation using 5Greplay.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications.
EURASIP J. Wirel. Commun. Netw., 2022
Digital Twin for IoT Environments: A Testing and Simulation Tool.
Proceedings of the Quality of Information and Communications Technology, 2022
Monitoring Approaches for Security and Safety Analysis: Application to a Load Position System.
Proceedings of the 15th IEEE International Conference on Software Testing, 2022
Security Testing as part of Software Quality Assurance: Principles and Challenges.
Proceedings of the 15th IEEE International Conference on Software Testing, 2022
A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic.
Proceedings of the 17th International Conference on Software Technologies, 2022
Joint Security-vs-QoS Framework: Optimizing the Selection of Intrusion Detection Mechanisms in 5G networks.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
A Framework for Security Monitoring of Real IoT Testbeds.
Proceedings of the 16th International Conference on Software Technologies, 2021
VeriDevOps: Automated Protection and Prevention to Meet Security Requirements in DevOps.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021
SANCUS: Multi-layers Vulnerability Management Framework for Cloud-native 5G networks.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
GEIGER: Solution for small businesses to protect themselves against cyber-threats.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
A Threat-Based Cybersecurity Risk Assessment Approach Addressing SME Needs.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Metrics-driven DevSecOps.
Proceedings of the 15th International Conference on Software Technologies, 2020
2019
Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking.
IEEE Trans. Inf. Forensics Secur., 2019
A security monitoring system for internet of things.
Internet Things, 2019
Service level agreement-based GDPR compliance and security assurance in (multi)Cloud-based systems.
IET Softw., 2019
An Orchestrated NDN Virtual Infrastructure Transporting Web Traffic: Design, Implementation, and First Experiments with Real End Users.
,
,
,
,
,
,
,
,
,
,
IEEE Commun. Mag., 2019
Industrial IoT Security Monitoring and Test on Fed4Fire+ Platforms.
Proceedings of the Testing Software and Systems, 2019
Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Towards Content-Centric Control Plane Supporting Efficient Anomaly Detection Functions.
Proceedings of the 15th International Conference on Network and Service Management, 2019
2018
A Security Monitoring Plane for Named Data Networking Deployment.
IEEE Commun. Mag., 2018
A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System.
Comput. J., 2018
Leveraging NFV for the deployment of NDN: Application to HTTP traffic transport.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Towards a security monitoring plane for named data networking and its application against content poisoning attack.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Enhancing Software Development Process Quality based on Metrics Correlation and Suggestion.
Proceedings of the 13th International Conference on Software Technologies, 2018
Smart Measurements and Analysis for Software Quality Enhancement.
Proceedings of the Software Technologies - 13th International Conference, 2018
Implementation of content poisoning attack detection and reaction in virtualized NDN networks.
Proceedings of the 21st Conference on Innovation in Clouds, 2018
2017
An SDN and NFV Use Case: NDN Implementation and Security Monitoring.
Proceedings of the Guide to Security in SDN and NFV, 2017
Multi-cloud Applications Security Monitoring.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
SLA-Based Continuous Security Assurance in Multi-Cloud DevOps.
Proceedings of the International Workshop on Secure Software Engineering in DevOps and Agile Development co-located with the 22nd European Symposium on Research in Computer Security (ESORICS 2017), 2017
A Platform for Security Monitoring of Multi-cloud Applications.
Proceedings of the Perspectives of System Informatics, 2017
Dynamic security assurance in multi-cloud DevOps.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
2016
An approach for deploying and monitoring dynamic security policies.
Comput. Secur., 2016
An Implementation of a QoE Evaluation Technique Including Business Model Parameters.
Proceedings of the 11th International Joint Conference on Software Technologies (ICSOFT 2016) - Volume 2: ICSOFT-PT, Lisbon, Portugal, July 24, 2016
SLA-Driven Monitoring of Multi-cloud Application Components Using the MUSA Framework.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016
Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016
A virtualized and monitored NDN infrastructure featuring a NDN/HTTP gateway.
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 2016
2015
An effective attack detection approach in wireless mesh networks.
Int. J. Space Based Situated Comput., 2015
Dynamic Deployment and Monitoring of Security Policies.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015
Monitoring-based validation of functional and performance aspects of a greedy ant colony optimization protocol.
Proceedings of the 2015 Latin American Network Operations and Management Symposium, 2015
Self-protecting multi-cloud applications.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
QoE Prediction for Multimedia Services: Comparing Fuzzy and Logic Network Approaches.
Int. J. Organ. Collect. Intell., 2014
Evaluating Web Service QoE by Learning Logic Networks.
Proceedings of the WEBIST 2014, 2014
How to Evaluate Trust Using MMT.
Proceedings of the Network and System Security - 8th International Conference, 2014
QoE Estimation for Web Service Selection Using a Fuzzy-Rough Hybrid Expert System.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
2013
The Forth International Workshop on Security Testing (SECTEST 2013).
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013
2012
A systematic approach to integrate common timed security rules within a TEFSM-based system specification.
Inf. Softw. Technol., 2012
2011
VDC-Based Dynamic Code Analysis: Application to C Programs.
J. Internet Serv. Inf. Secur., 2011
Using Testing Techniques for Vulnerability Detection in C Programs.
Proceedings of the Testing Software and Systems, 2011
2010
Timed Extended Invariants for the Passive Testing of Web Services.
Proceedings of the IEEE International Conference on Web Services, 2010
WebMov: A Dedicated Framework for the Modelling and Testing of Web Services Composition.
Proceedings of the IEEE International Conference on Web Services, 2010
Practical Experience Gained from Passive Testing of Web Based Systems.
Proceedings of the Third International Conference on Software Testing, 2010
2009
An Automated Passive Testing Approach for the IMS PoC Service.
Proceedings of the ASE 2009, 2009
A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification.
Proceedings of the 16th Asia-Pacific Software Engineering Conference, 2009
2008
Modeling and Testing Secure Web-Based Systems: Application to an Industrial Case Study.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008
Testing Security Policies for Web Applications.
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008
Security Rules Specification and Analysis Based on Passive Testing.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines.
Proceedings of the 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, 2008
Two Complementary Tools for the Formal Testing of Distributed Systems with Time Constraints.
Proceedings of the 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, 2008
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking.
Proceedings of the Ad-hoc, Mobile and Wireless Networks, 7th International Conference, 2008
2007
A formal approach for testing security rules.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Testing Security Rules with Decomposable Activities.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007
2006
Application of Two Test Generation Tools to an Industrial Case Study.
Proceedings of the Testing of Communicating Systems, 2006
Light Client Management Protocol for Wireless Mesh Networks.
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006