Author of the publication

A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic.

, , , , , and . ICSOFT, page 234-241. SCITEPRESS, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Intelligent Tunneling Framework for Always Best Connected Support in Network Mobility (NEMO)., and . WCNC, page 3021-3026. IEEE, (2008)A Network Traffic Mutation Based Ontology, and Its Application to 5G Networks., , , , , and . IEEE Access, (2023)Assessing the Threats Targeting Low Latency Traffic: the Case of L4S., , , , , and . CNSM, page 544-550. IEEE, (2021)Formal Verification of Coordination Systems' Requirements - A Case Study on the European Train Control System., and . SEKE, page 393-396. Knowledge Systems Institute Graduate School, (2014)HTTP/2 Attacks Generation using 5Greplay., , , , and . ARES, page 138:1-138:7. ACM, (2023)Enhancements for Simultaneous Access in Network-based Localized Mobility Management., and . PIMRC, page 1-5. IEEE, (2007)Scalable proxy mobile IPv6 for heterogeneous wireless networks., and . Mobility Conference, page 64. ACM, (2008)Passive conformance testing of service choreographies., , and . SAC, page 1528-1535. ACM, (2012)Online Verification of Value-Passing Choreographies through Property-Oriented Passive Testing., , and . HASE, page 106-113. IEEE Computer Society, (2012)Analyse der Wundinfektionen eines grossen herz- und gefässchirurgischen Krankengutes und die Bewertung von Massnahmen zu ihrer Verhütung. Uni Leipzig, (1975)