Author of the publication

A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic.

, , , , , and . ICSOFT, page 234-241. SCITEPRESS, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Industrial IoT Security Monitoring and Test on Fed4Fire+ Platforms., , , , , and . ICTSS, volume 11812 of Lecture Notes in Computer Science, page 270-278. Springer, (2019)Leveraging LTE security with SDN and NFV., , , , , and . ICIIS, page 220-225. IEEE, (2015)A Framework for Security Monitoring of Real IoT Testbeds., , , and . ICSOFT, page 645-652. SCITEPRESS, (2021)Software Defined Monitoring (SDM) for 5G mobile backhaul networks., , , , , , and . LANMAN, page 1-6. IEEE, (2017)Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN., , , , , and . IM, page 594-598. IFIP, (2019)AI4SOAR: A Security Intelligence Tool for Automated Incident Response., , , and . ARES, page 170:1-170:8. ACM, (2024)An advanced approach for modeling and detecting software vulnerabilities., , , , , , and . Inf. Softw. Technol., 54 (9): 997-1013 (2012)The Owner, the Provider and the Subcontractors: How to Handle Accountability and Liability Management for 5G End to End Service., , , , , , , , , and 4 other author(s). ARES, page 68:1-68:7. ACM, (2022)Using 5G to Bring More than just Bits to Homes., , , , , , , , and . BMSB, page 1-8. IEEE, (2020)Towards Content-Centric Control Plane Supporting Efficient Anomaly Detection Functions., , , , and . CNSM, page 1-9. IEEE, (2019)