Wissam Mallouli
Orcid: 0000-0003-2548-6628
According to our database1,
Wissam Mallouli
authored at least 85 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Intrusion Response Systems for the 5G Networks and Beyond: A New Joint Security-vs-QoS Optimization Approach.
IEEE Trans. Netw. Sci. Eng., 2024
Proceedings of the 19th International Conference on Software Technologies, 2024
Proceedings of the Communication Papers of the 19th Conference on Computer Science and Intelligence Systems, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Novel modeling and optimization for joint Cybersecurity-vs-QoS Intrusion Detection Mechanisms in 5G networks.
Comput. Networks, December, 2023
Joint Security-vs-QoS Game Theoretical Optimization for Intrusion Response Mechanisms for Future Network Systems.
CoRR, 2023
IEEE Access, 2023
IEEE Access, 2023
Study on Adversarial Attacks Techniques, Learning Methods and Countermeasures: Application to Anomaly Detection.
Proceedings of the 18th International Conference on Software Technologies, 2023
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
VeriDevOps Software Methodology: Security Verification and Validation for DevOps Practices.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications.
EURASIP J. Wirel. Commun. Netw., 2022
Proceedings of the Quality of Information and Communications Technology, 2022
Monitoring Approaches for Security and Safety Analysis: Application to a Load Position System.
Proceedings of the 15th IEEE International Conference on Software Testing, 2022
Proceedings of the 15th IEEE International Conference on Software Testing, 2022
A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic.
Proceedings of the 17th International Conference on Software Technologies, 2022
Joint Security-vs-QoS Framework: Optimizing the Selection of Intrusion Detection Mechanisms in 5G networks.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Proceedings of the 16th International Conference on Software Technologies, 2021
VeriDevOps: Automated Protection and Prevention to Meet Security Requirements in DevOps.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021
SANCUS: Multi-layers Vulnerability Management Framework for Cloud-native 5G networks.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Proceedings of the 15th International Conference on Software Technologies, 2020
2019
Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking.
IEEE Trans. Inf. Forensics Secur., 2019
Service level agreement-based GDPR compliance and security assurance in (multi)Cloud-based systems.
IET Softw., 2019
An Orchestrated NDN Virtual Infrastructure Transporting Web Traffic: Design, Implementation, and First Experiments with Real End Users.
IEEE Commun. Mag., 2019
Proceedings of the Testing Software and Systems, 2019
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Towards Content-Centric Control Plane Supporting Efficient Anomaly Detection Functions.
Proceedings of the 15th International Conference on Network and Service Management, 2019
2018
IEEE Commun. Mag., 2018
A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System.
Comput. J., 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Towards a security monitoring plane for named data networking and its application against content poisoning attack.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Enhancing Software Development Process Quality based on Metrics Correlation and Suggestion.
Proceedings of the 13th International Conference on Software Technologies, 2018
Proceedings of the Software Technologies - 13th International Conference, 2018
Implementation of content poisoning attack detection and reaction in virtualized NDN networks.
Proceedings of the 21st Conference on Innovation in Clouds, 2018
2017
Proceedings of the Guide to Security in SDN and NFV, 2017
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Proceedings of the International Workshop on Secure Software Engineering in DevOps and Agile Development co-located with the 22nd European Symposium on Research in Computer Security (ESORICS 2017), 2017
Proceedings of the Perspectives of System Informatics, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
2016
Comput. Secur., 2016
Proceedings of the 11th International Joint Conference on Software Technologies (ICSOFT 2016) - Volume 2: ICSOFT-PT, Lisbon, Portugal, July 24, 2016
SLA-Driven Monitoring of Multi-cloud Application Components Using the MUSA Framework.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016
Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 2016
2015
Int. J. Space Based Situated Comput., 2015
Proceedings of the Trust, Privacy and Security in Digital Business, 2015
Monitoring-based validation of functional and performance aspects of a greedy ant colony optimization protocol.
Proceedings of the 2015 Latin American Network Operations and Management Symposium, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
QoE Prediction for Multimedia Services: Comparing Fuzzy and Logic Network Approaches.
Int. J. Organ. Collect. Intell., 2014
Proceedings of the WEBIST 2014, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
2013
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013
2012
A systematic approach to integrate common timed security rules within a TEFSM-based system specification.
Inf. Softw. Technol., 2012
2011
J. Internet Serv. Inf. Secur., 2011
Proceedings of the Testing Software and Systems, 2011
2010
Proceedings of the IEEE International Conference on Web Services, 2010
WebMov: A Dedicated Framework for the Modelling and Testing of Web Services Composition.
Proceedings of the IEEE International Conference on Web Services, 2010
Proceedings of the Third International Conference on Software Testing, 2010
2009
Proceedings of the ASE 2009, 2009
A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification.
Proceedings of the 16th Asia-Pacific Software Engineering Conference, 2009
2008
Modeling and Testing Secure Web-Based Systems: Application to an Industrial Case Study.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines.
Proceedings of the 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, 2008
Two Complementary Tools for the Formal Testing of Distributed Systems with Time Constraints.
Proceedings of the 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, 2008
Proceedings of the Ad-hoc, Mobile and Wireless Networks, 7th International Conference, 2008
2007
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007
2006
Proceedings of the Testing of Communicating Systems, 2006
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006