Wissam Mallouli

Orcid: 0000-0003-2548-6628

According to our database1, Wissam Mallouli authored at least 85 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Intrusion Response Systems for the 5G Networks and Beyond: A New Joint Security-vs-QoS Optimization Approach.
IEEE Trans. Netw. Sci. Eng., 2024

Diagnosis Automation Using Similarity Analysis: Application to Industrial Systems.
Proceedings of the 19th International Conference on Software Technologies, 2024

Smart Assistants for Enhancing System Security and Resilience.
Proceedings of the Communication Papers of the 19th Conference on Computer Science and Intelligence Systems, 2024

AI4SOAR: A Security Intelligence Tool for Automated Incident Response.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

NERO: Advanced Cybersecurity Awareness Ecosystem for SMEs.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

AI-Powered Penetration Testing using Shennina: From Simulation to Validation.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Novel modeling and optimization for joint Cybersecurity-vs-QoS Intrusion Detection Mechanisms in 5G networks.
Comput. Networks, December, 2023

The Role of Machine Learning in Cybersecurity.
DTRAP, 2023

Joint Security-vs-QoS Game Theoretical Optimization for Intrusion Response Mechanisms for Future Network Systems.
CoRR, 2023

A Network Traffic Mutation Based Ontology, and Its Application to 5G Networks.
IEEE Access, 2023

Automated Generation of 5G Fine-Grained Threat Models: A Systematic Approach.
IEEE Access, 2023

Study on Adversarial Attacks Techniques, Learning Methods and Countermeasures: Application to Anomaly Detection.
Proceedings of the 18th International Conference on Software Technologies, 2023

A Resilience Component for a Digital Twin.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

Testing techniques to assess impact and cascading effects.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023

Towards Smarter Security Orchestration and Automatic Response for CPS and IoT.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023

5G SUCI Catcher: Attack and Detection.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023

The DYNABIC approach to resilience of critical infrastructures.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

A deep learning anomaly detection framework with explainability and robustness.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

VeriDevOps Software Methodology: Security Verification and Validation for DevOps Practices.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

HTTP/2 Attacks Generation using 5Greplay.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications.
EURASIP J. Wirel. Commun. Netw., 2022

Digital Twin for IoT Environments: A Testing and Simulation Tool.
Proceedings of the Quality of Information and Communications Technology, 2022

Monitoring Approaches for Security and Safety Analysis: Application to a Load Position System.
Proceedings of the 15th IEEE International Conference on Software Testing, 2022

Security Testing as part of Software Quality Assurance: Principles and Challenges.
Proceedings of the 15th IEEE International Conference on Software Testing, 2022

A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic.
Proceedings of the 17th International Conference on Software Technologies, 2022

Joint Security-vs-QoS Framework: Optimizing the Selection of Intrusion Detection Mechanisms in 5G networks.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
A Framework for Security Monitoring of Real IoT Testbeds.
Proceedings of the 16th International Conference on Software Technologies, 2021

VeriDevOps: Automated Protection and Prevention to Meet Security Requirements in DevOps.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

SANCUS: Multi-layers Vulnerability Management Framework for Cloud-native 5G networks.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

GEIGER: Solution for small businesses to protect themselves against cyber-threats.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

A Threat-Based Cybersecurity Risk Assessment Approach Addressing SME Needs.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Metrics-driven DevSecOps.
Proceedings of the 15th International Conference on Software Technologies, 2020

2019
Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking.
IEEE Trans. Inf. Forensics Secur., 2019

A security monitoring system for internet of things.
Internet Things, 2019

Service level agreement-based GDPR compliance and security assurance in (multi)Cloud-based systems.
IET Softw., 2019

An Orchestrated NDN Virtual Infrastructure Transporting Web Traffic: Design, Implementation, and First Experiments with Real End Users.
IEEE Commun. Mag., 2019

Industrial IoT Security Monitoring and Test on Fed4Fire+ Platforms.
Proceedings of the Testing Software and Systems, 2019

Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Towards Content-Centric Control Plane Supporting Efficient Anomaly Detection Functions.
Proceedings of the 15th International Conference on Network and Service Management, 2019

2018
A Security Monitoring Plane for Named Data Networking Deployment.
IEEE Commun. Mag., 2018

A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System.
Comput. J., 2018

Leveraging NFV for the deployment of NDN: Application to HTTP traffic transport.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Towards a security monitoring plane for named data networking and its application against content poisoning attack.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Enhancing Software Development Process Quality based on Metrics Correlation and Suggestion.
Proceedings of the 13th International Conference on Software Technologies, 2018

Smart Measurements and Analysis for Software Quality Enhancement.
Proceedings of the Software Technologies - 13th International Conference, 2018

Implementation of content poisoning attack detection and reaction in virtualized NDN networks.
Proceedings of the 21st Conference on Innovation in Clouds, 2018

2017
An SDN and NFV Use Case: NDN Implementation and Security Monitoring.
Proceedings of the Guide to Security in SDN and NFV, 2017

Multi-cloud Applications Security Monitoring.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

SLA-Based Continuous Security Assurance in Multi-Cloud DevOps.
Proceedings of the International Workshop on Secure Software Engineering in DevOps and Agile Development co-located with the 22nd European Symposium on Research in Computer Security (ESORICS 2017), 2017

A Platform for Security Monitoring of Multi-cloud Applications.
Proceedings of the Perspectives of System Informatics, 2017

Dynamic security assurance in multi-cloud DevOps.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
An approach for deploying and monitoring dynamic security policies.
Comput. Secur., 2016

An Implementation of a QoE Evaluation Technique Including Business Model Parameters.
Proceedings of the 11th International Joint Conference on Software Technologies (ICSOFT 2016) - Volume 2: ICSOFT-PT, Lisbon, Portugal, July 24, 2016

SLA-Driven Monitoring of Multi-cloud Application Components Using the MUSA Framework.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016

Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016

A virtualized and monitored NDN infrastructure featuring a NDN/HTTP gateway.
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 2016

2015
An effective attack detection approach in wireless mesh networks.
Int. J. Space Based Situated Comput., 2015

Dynamic Deployment and Monitoring of Security Policies.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Monitoring-based validation of functional and performance aspects of a greedy ant colony optimization protocol.
Proceedings of the 2015 Latin American Network Operations and Management Symposium, 2015

Self-protecting multi-cloud applications.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
QoE Prediction for Multimedia Services: Comparing Fuzzy and Logic Network Approaches.
Int. J. Organ. Collect. Intell., 2014

Evaluating Web Service QoE by Learning Logic Networks.
Proceedings of the WEBIST 2014, 2014

How to Evaluate Trust Using MMT.
Proceedings of the Network and System Security - 8th International Conference, 2014

QoE Estimation for Web Service Selection Using a Fuzzy-Rough Hybrid Expert System.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
The Forth International Workshop on Security Testing (SECTEST 2013).
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

2012
A systematic approach to integrate common timed security rules within a TEFSM-based system specification.
Inf. Softw. Technol., 2012

2011
VDC-Based Dynamic Code Analysis: Application to C Programs.
J. Internet Serv. Inf. Secur., 2011

Using Testing Techniques for Vulnerability Detection in C Programs.
Proceedings of the Testing Software and Systems, 2011

2010
Timed Extended Invariants for the Passive Testing of Web Services.
Proceedings of the IEEE International Conference on Web Services, 2010

WebMov: A Dedicated Framework for the Modelling and Testing of Web Services Composition.
Proceedings of the IEEE International Conference on Web Services, 2010

Practical Experience Gained from Passive Testing of Web Based Systems.
Proceedings of the Third International Conference on Software Testing, 2010

2009
An Automated Passive Testing Approach for the IMS PoC Service.
Proceedings of the ASE 2009, 2009

A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification.
Proceedings of the 16th Asia-Pacific Software Engineering Conference, 2009

2008
Modeling and Testing Secure Web-Based Systems: Application to an Industrial Case Study.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

Testing Security Policies for Web Applications.
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008

Security Rules Specification and Analysis Based on Passive Testing.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines.
Proceedings of the 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, 2008

Two Complementary Tools for the Formal Testing of Distributed Systems with Time Constraints.
Proceedings of the 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, 2008

Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking.
Proceedings of the Ad-hoc, Mobile and Wireless Networks, 7th International Conference, 2008

2007
A formal approach for testing security rules.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Testing Security Rules with Decomposable Activities.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

2006
Application of Two Test Generation Tools to an Industrial Case Study.
Proceedings of the Testing of Communicating Systems, 2006

Light Client Management Protocol for Wireless Mesh Networks.
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006


  Loading...