Zobrazeno 1 - 10
of 70
pro vyhledávání: '"Wissam Mallouli"'
Publikováno v:
IEEE Access, Vol 11, Pp 129788-129804 (2023)
Fifth-generation technology standard for broadband cellular networks, 5G, delivers a significant increase in data speeds and capacity, as well as new capabilities such as higher energy efficiency, lower latency, and the ability to connect a large num
Externí odkaz:
https://doaj.org/article/a262b60cb1c14253a53b80d45e46d9b2
Autor:
Zujany Salazar, Fatiha Zaidi, Huu-Nghia Nguyen, Wissam Mallouli, Ana Rosa Cavalli, Edgardo Montes De Oca
Publikováno v:
IEEE Access, Vol 11, Pp 43925-43944 (2023)
This paper presents an ontology based on mutation techniques for the modelling of cybersecurity attacks and its application to 5G networks. Main concepts of network protocols, mutation operators, flow of network packets and network traffic are introd
Externí odkaz:
https://doaj.org/article/6419c5961a5c4791907ca196882ef631
Autor:
George Amponis, Panagiotis Radoglou-Grammatikis, Thomas Lagkas, Wissam Mallouli, Ana Cavalli, Dimitris Klonidis, Evangelos Markakis, Panagiotis Sarigiannidis
Publikováno v:
EURASIP Journal on Wireless Communications and Networking, Vol 2022, Iss 1, Pp 1-27 (2022)
Abstract The modern communications landscape requires reliable, high-speed, high-throughput and secure links and sessions between user equipment instances and the data network. The 5G core implements the newly defined 3GPP network architecture enabli
Externí odkaz:
https://doaj.org/article/cdf8c73ef3804c16b3a30675599e278e
Autor:
Arash Bozorgchenani, Charilaos C. Zarakovitis, Su Fong Chien, Heng Siong Lim, Qiang Ni, Antonios Gouglidis, Wissam Mallouli
Publikováno v:
Proceedings of the 17th International Conference on Availability, Reliability and Security.
Autor:
Zujany Salazar, Fatiha Zaidi, Wissam Mallouli, Ana Cavalli, Huu Nguyen, Edgardo Montes De Oca
Publikováno v:
Proceedings of the 17th International Conference on Software Technologies
International Conference on Software and Data Technologies
International Conference on Software and Data Technologies, University of Fribourg, Switzerland ; University of Twente, Netherlands ; Wroclaw University of Economics and Business, Poland and Macquarie University, Sydney, Australia, Jul 2022, Lisbonne, Portugal. pp.P. 234-241, ⟨10.5220/0011319000003266⟩
International Conference on Software and Data Technologies
International Conference on Software and Data Technologies, University of Fribourg, Switzerland ; University of Twente, Netherlands ; Wroclaw University of Economics and Business, Poland and Macquarie University, Sydney, Australia, Jul 2022, Lisbonne, Portugal. pp.P. 234-241, ⟨10.5220/0011319000003266⟩
International audience; We present a formal approach based on mutation techniques for the modelling of cybersecurity attacks and its application to 5G networks. We introduce formal definitions of the main concepts of network protocols, mutation opera
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0900426adced24eba8c33220759558b7
https://hal.science/hal-04007862
https://hal.science/hal-04007862
Autor:
Zujany Salazar, Ana Rosa Cavalli, Wissam Mallouli, Filip Sebek, Fatiha Zaidi, Monika Ewa Rakoczy
Publikováno v:
2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW).
Autor:
Wissam Mallouli
Publikováno v:
2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW).
Publikováno v:
Communications in Computer and Information Science ISBN: 9783031141782
QUATIC 2022: 15th International Conference on the Quality of Information and Communications Technology
15th International Conference Quality of Information and Communications Technology (QUATIC 2022)
15th International Conference Quality of Information and Communications Technology (QUATIC 2022), Sep 2022, Talavera de la Reina, Spain. pp.205-219, ⟨10.1007/978-3-031-14179-9_14⟩
QUATIC 2022: 15th International Conference on the Quality of Information and Communications Technology
15th International Conference Quality of Information and Communications Technology (QUATIC 2022)
15th International Conference Quality of Information and Communications Technology (QUATIC 2022), Sep 2022, Talavera de la Reina, Spain. pp.205-219, ⟨10.1007/978-3-031-14179-9_14⟩
International audience; Digital Twin (DT) is one of the pillars of modern information technologies that plays an important role on industry's digitalization. A DT is composed of a real physical object, a virtual abstraction of the object and a bidire
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e223b19eca495cfbd11c0096f96c4425
https://doi.org/10.1007/978-3-031-14179-9_14
https://doi.org/10.1007/978-3-031-14179-9_14
Publikováno v:
ARES 21: Proceedings of the 16th International Conference on Availability, Reliability and Security
ARES 2021: The 16th International Conference on Availability, Reliability and Security
ARES 2021: The 16th International Conference on Availability, Reliability and Security, Aug 2021, Vienna, Austria. pp.1-8, ⟨10.1145/3465481.3470079⟩
ARES
The 16th International Conference on Availability, Reliability and Security
ARES 2021: The 16th International Conference on Availability, Reliability and Security
ARES 2021: The 16th International Conference on Availability, Reliability and Security, Aug 2021, Vienna, Austria. pp.1-8, ⟨10.1145/3465481.3470079⟩
ARES
The 16th International Conference on Availability, Reliability and Security
International audience; The fifth generation of mobile broadband is more than just an evolution to provide more mobile bandwidth, massive machine-type communications, and ultra-reliable and low-latency communications. It relies on a complex, dynamic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a69def8c1d7e6896f47ae6516f62f7d6
https://hal.science/hal-04064212/document
https://hal.science/hal-04064212/document
Autor:
Andrey Sadovykh, Dragos Truscan, Wissam Mallouli, Ana Rosa Cavalli, Cristina Seceleanu, Alessandra Bagnato
This book provides an overview of software security analysis in a DevOps cycle including requirements formalisation, verification and continuous monitoring. It presents an overview of the latest techniques and tools that help engineers and developers