default search action
Edgardo Montes de Oca
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c42]Manh-Dung Nguyen, Wissam Mallouli, Ana Rosa Cavalli, Edgardo Montes de Oca:
AI4SOAR: A Security Intelligence Tool for Automated Incident Response. ARES 2024: 170:1-170:8 - [c41]Huu Nghia Nguyen, Manh-Dung Nguyen, Edgardo Montes de Oca:
A Framework for In-network Inference using P4. ARES 2024: 175:1-175:6 - [c40]Abdul-Rasheed Ottun, Rasinthe Marasinghe, Toluwani Elemosho, Mohan Liyanage, Mohamad Ragab, Prachi Bagave, Marcus Westberg, Mehrdad Asadi, Michell Boerger, Chamara Sandeepa, Thulitha Senevirathna, Bartlomiej Siniarski, Madhusanka Liyanage, Vinh Hoa La, Manh-Dung Nguyen, Edgardo Montes de Oca, Tessa Oomen, João Fernando Ferreira Gonçalves, Illija Tanaskovic, Sasa Klopanovic, Nicolas Kourtellis, Claudio Soriente, Jason Pridmore, Ana Rosa Cavalli, Drasko Draskovic, Samuel Marchal, Shen Wang, David Solans Noguero, Nikolay Tcholtchev, Aaron Yi Ding, Huber Flores:
The SPATIAL Architecture: Design and Development Experiences from Gauging and Monitoring the AI Inference Capabilities of Modern Applications. ICDCS 2024: 947-959 - 2023
- [j11]Zujany Salazar, Fatiha Zaïdi, Huu Nghia Nguyen, Wissam Mallouli, Ana Rosa Cavalli, Edgardo Montes de Oca:
A Network Traffic Mutation Based Ontology, and Its Application to 5G Networks. IEEE Access 11: 43925-43944 (2023) - [j10]Gourav Prateek Sharma, Dhruvin Patel, Joachim Sachs, Marilet De Andrade, János Farkas, János Harmatos, Balázs Varga, Hans-Peter Bernhard, Raheeb Muzaffar, Mahin Ahmed, Frank Dürr, Dietmar Bruckner, Edgardo Montes de Oca, Drissa Houatra, Hongwei Zhang, James Gross:
Toward Deterministic Communications in 6G Networks: State of the Art, Open Challenges and the Way Forward. IEEE Access 11: 106898-106923 (2023) - [c39]Manh-Dung Nguyen, Anis Bouaziz, Valeria Valdés, Ana Rosa Cavalli, Wissam Mallouli, Edgardo Montes de Oca:
A deep learning anomaly detection framework with explainability and robustness. ARES 2023: 134:1-134:7 - [c38]Francesco G. Caccavale, Huu Nghia Nguyen, Ana R. Cavalli, Edgardo Montes de Oca, Wissam Mallouli:
HTTP/2 Attacks Generation using 5Greplay. ARES 2023: 138:1-138:7 - [c37]Ana Rosa Cavalli, Edgardo Montes de Oca:
Cybersecurity, Monitoring, Explainability and Resilience. ICMU 2023: 1-7 - [c36]Huu Nghia Nguyen, Bertrand Mathieu, Marius Letourneau, Guillaume Doyen, Stéphane Tuffin, Edgardo Montes de Oca:
A Comprehensive P4-based Monitoring Framework for L4S leveraging In-band Network Telemetry. NOMS 2023: 1-6 - [c35]Wissem Soussi, Maria Christopoulou, George Xilouris, Edgardo Montes de Oca, Vincent Lefebvre, Gürkan Gür, Burkhard Stiller:
Demo: Closed-Loop Security Orchestration in the Telco Cloud for Moving Target Defense. NOMS 2023: 1-3 - [i3]Gourav Prateek Sharma, Dhruvin Patel, Joachim Sachs, Marilet De Andrade, János Farkas, János Harmatos, Balázs Varga, Hans-Peter Bernhard, Raheeb Muzaffar, Mahin K. Atiq, Frank Dürr, Dietmar Bruckner, Edgardo Montes de Oca, Drissa Houatra, Hongwei Zhang, James Gross:
Towards Deterministic Communications in 6G Networks: State of the Art, Open Challenges and the Way Forward. CoRR abs/2304.01299 (2023) - [i2]Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R. Cavalli, Edgardo Montes de Oca:
5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection. CoRR abs/2304.05719 (2023) - 2022
- [c34]Chrystel Gaber, Ghada Arfaoui, Yannick Carlinet, Nancy Perrot, Laurent Valleyre, Marc Lacoste, Jean-Philippe Wary, Yacine Anser, Rafal Artych, Aleksandra Podlasek, Edgardo Montes de Oca, Vinh Hoa La, Vincent Lefebvre, Gürkan Gür:
The Owner, the Provider and the Subcontractors: How to Handle Accountability and Liability Management for 5G End to End Service. ARES 2022: 68:1-68:7 - [c33]Zujany Salazar, Fatiha Zaïdi, Wissam Mallouli, Ana Rosa Cavalli, Huu Nghia Nguyen, Edgardo Montes de Oca:
A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic. ICSOFT 2022: 234-241 - [c32]Manh-Dung Nguyen, Vinh Hoa La, Ana R. Cavalli, Edgardo Montes de Oca:
Towards improving explainability, resilience and performance of cybersecurity analysis of 5G/IoT networks (work-in-progress paper). ICST Workshops 2022: 7-10 - [c31]Luong Nguyen, Mariana Segovia, Wissam Mallouli, Edgardo Montes de Oca, Ana R. Cavalli:
Digital Twin for IoT Environments: A Testing and Simulation Tool. QUATIC 2022: 205-219 - [i1]Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di Franco:
The Role of Machine Learning in Cybersecurity. CoRR abs/2206.09707 (2022) - 2021
- [c30]Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R. Cavalli, Edgardo Montes de Oca:
5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection. ARES 2021: 106:1-106:8 - [c29]Vinh Hoa La, Edgardo Montes de Oca, Wissam Mallouli, Ana R. Cavalli:
A Framework for Security Monitoring of Real IoT Testbeds. ICSOFT 2021: 645-652 - 2020
- [c28]Jordi Ortiz, Ramon Sanchez-Iborra, Jorge Bernal Bernabé, Antonio F. Skarmeta, Chafika Benzaid, Tarik Taleb, Pol Alemany, Raul Muñoz, Ricard Vilalta, Chrystel Gaber, Jean-Philippe Wary, Dhouha Ayed, Pascal Bisson, Maria Christopoulou, George Xilouris, Edgardo Montes de Oca, Gürkan Gür, Gianni Santinelli, Vincent Lefebvre, Antonio Pastor, Diego R. López:
INSPIRE-5Gplus: intelligent security and pervasive trust for 5G and beyond networks. ARES 2020: 105:1-105:10 - [c27]Bo Tan, John Cosmas, Konstantinos Banitsas, Michael Rustell, Joonas Säe, Mikko Valkama, Yue Zhang, Edgardo Montes de Oca, David Aondoakaa:
Using 5G to Bring More than just Bits to Homes. BMSB 2020: 1-8 - [c26]Wissam Mallouli, Ana Rosa Cavalli, Alessandra Bagnato, Edgardo Montes de Oca:
Metrics-driven DevSecOps. ICSOFT 2020: 228-233
2010 – 2019
- 2019
- [j9]Guillaume Doyen, Thibault Cholez, Wissam Mallouli, Bertrand Mathieu, Hoang Long Mai, Xavier Marchal, Daishi Kondo, Messaoud Aouadj, Alain Ploix, Edgardo Montes de Oca, Olivier Festor:
An Orchestrated NDN Virtual Infrastructure Transporting Web Traffic: Design, Implementation, and First Experiments with Real End Users. IEEE Commun. Mag. 57(6): 33-39 (2019) - [j8]Valentina Casola, Alessandra De Benedictis, Antonio Riccio, Diego Rivera, Wissam Mallouli, Edgardo Montes de Oca:
A security monitoring system for internet of things. Internet Things 7 (2019) - [j7]Tan N. Nguyen, Hoang Long Mai, Rémi Cogranne, Guillaume Doyen, Wissam Mallouli, Luong Nguyen, Moustapha El Aoun, Edgardo Montes de Oca, Olivier Festor:
Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking. IEEE Trans. Inf. Forensics Secur. 14(9): 2470-2485 (2019) - [c25]Hoang Long Mai, Guillaume Doyen, Wissam Mallouli, Edgardo Montes de Oca, Olivier Festor:
Towards Content-Centric Control Plane Supporting Efficient Anomaly Detection Functions. CNSM 2019: 1-9 - [c24]Hoang Long Mai, Messaoud Aouadj, Guillaume Doyen, Wissam Mallouli, Edgardo Montes de Oca, Olivier Festor:
Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN. IM 2019: 594-598 - [c23]Diego Rivera, Edgardo Montes de Oca, Wissam Mallouli, Ana R. Cavalli, Brecht Vermeulen, Matevz Vucnik:
Industrial IoT Security Monitoring and Test on Fed4Fire+ Platforms. ICTSS 2019: 270-278 - 2018
- [j6]Tan N. Nguyen, Hoang Long Mai, Guillaume Doyen, Rémi Cogranne, Wissam Mallouli, Edgardo Montes de Oca, Olivier Festor:
A Security Monitoring Plane for Named Data Networking Deployment. IEEE Commun. Mag. 56(11): 88-94 (2018) - [c22]Gregory Blanc, Nizar Kheir, Dhouha Ayed, Vincent Lefebvre, Edgardo Montes de Oca, Pascal Bisson:
Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service. ARES 2018: 47:1-47:8 - [c21]Hoang Long Mai, Messaoud Aouadj, Guillaume Doyen, Daishi Kondo, Xavier Marchal, Thibault Cholez, Edgardo Montes de Oca, Wissam Mallouli:
Implementation of content poisoning attack detection and reaction in virtualized NDN networks. ICIN 2018: 1-3 - [c20]Hoang Long Mai, Tan N. Nguyen, Guillaume Doyen, Rémi Cogranne, Wissam Mallouli, Edgardo Montes de Oca, Olivier Festor:
Towards a security monitoring plane for named data networking and its application against content poisoning attack. NOMS 2018: 1-9 - 2017
- [j5]Madhusanka Liyanage, Ijaz Ahmed, Jude Okwuibe, Mika Ylianttila, Hammad Kabir, Jesus Llorente Santos, Raimo Kantola, Oscar Lopez Perez, Mikel Uriarte Itzazelaia, Edgardo Montes de Oca:
Enhancing Security of Software Defined Mobile Networks. IEEE Access 5: 9422-9438 (2017) - [c19]Madhusanka Liyanage, Jude Okwuibe, Ijaz Ahmed, Mika Ylianttila, Oscar Lopez Perez, Mikel Uriarte Itzazelaia, Edgardo Montes de Oca:
Software Defined Monitoring (SDM) for 5G mobile backhaul networks. LANMAN 2017: 1-6 - [p1]Théo Combe, Wissam Mallouli, Thibault Cholez, Guillaume Doyen, Bertrand Mathieu, Edgardo Montes de Oca:
An SDN and NFV Use Case: NDN Implementation and Security Monitoring. Guide to Security in SDN and NFV 2017: 299-321 - 2016
- [j4]José Miguel Horcas, Mónica Pinto, Lidia Fuentes, Wissam Mallouli, Edgardo Montes de Oca:
An approach for deploying and monitoring dynamic security policies. Comput. Secur. 58: 20-38 (2016) - [c18]Xavier Marchal, Moustapha El Aoun, Bertrand Mathieu, Wissam Mallouli, Thibault Cholez, Guillaume Doyen, Patrick Truong, Alain Ploix, Edgardo Montes de Oca:
A virtualized and monitored NDN infrastructure featuring a NDN/HTTP gateway. ICN 2016: 225-226 - 2015
- [j3]Felipe Barbosa Abreu, Anderson Nunes Paiva Morais, Ana R. Cavalli, Bachar Wehbi, Edgardo Montes de Oca, Wissam Mallouli:
An effective attack detection approach in wireless mesh networks. Int. J. Space Based Situated Comput. 5(2): 89-99 (2015) - [c17]Bertrand Mathieu, Guillaume Doyen, Wissam Mallouli, Thomas Silverston, Olivier Bettan, François-Xavier Aguessy, Thibault Cholez, Abdelkader Lahmadi, Patrick Truong, Edgardo Montes de Oca:
Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment. ARES 2015: 741-748 - [c16]Antonio M. Ortiz, Erkuden Rios, Wissam Mallouli, Eider Iturbe, Edgardo Montes de Oca:
Self-protecting multi-cloud applications. CNS 2015: 643-647 - [c15]José Costa-Requena, Jesus Llorente Santos, Vicent Ferrer Guasch, Kimmo Ahokas, Gopika Premsankar, Sakari Luukkainen, Oscar Lopez Perez, Mikel Uriarte Itzazelaia, Ijaz Ahmad, Madhusanka Liyanage, Mika Ylianttila, Edgardo Montes de Oca:
SDN and NFV integration in generalized mobile network architecture. EuCNC 2015: 154-158 - [c14]Madhusanka Liyanage, Ijaz Ahmad, Mika Ylianttila, Andrei V. Gurtov, Ahmed Bux Abro, Edgardo Montes de Oca:
Leveraging LTE security with SDN and NFV. ICIIS 2015: 220-225 - [c13]Madhusanka Liyanage, Ijaz Ahmed, Mika Ylianttila, Jesus Llorente Santos, Raimo Kantola, Oscar Lopez Perez, Mikel Uriarte Itzazelaia, Edgardo Montes de Oca, Asier Valtierra, Carlos Jimenez:
Security for Future Software Defined Mobile Networks. NGMAST 2015: 256-264 - [c12]José Miguel Horcas, Mónica Pinto, Lidia Fuentes, Wissam Mallouli, Edgardo Montes de Oca:
Dynamic Deployment and Monitoring of Security Policies. TrustBus 2015: 180-192 - 2014
- [c11]Khalifa Toumi, Wissam Mallouli, Edgardo Montes de Oca, César Andrés, Ana R. Cavalli:
How to Evaluate Trust Using MMT. NSS 2014: 484-492 - [e1]Mercedes G. Merayo, Edgardo Montes de Oca:
Testing Software and Systems - 26th IFIP WG 6.1 International Conference, ICTSS 2014, Madrid, Spain, September 23-25, 2014. Proceedings. Lecture Notes in Computer Science 8763, Springer 2014, ISBN 978-3-662-44856-4 [contents] - 2013
- [c10]Felipe Barbosa Abreu, Anderson Nunes Paiva Morais, Ana R. Cavalli, Bachar Wehbi, Edgardo Montes de Oca:
An Effective Attack Detection Approach in Wireless Mesh Networks. AINA Workshops 2013: 1450-1455 - 2012
- [j2]Natalia Kushik, Amel Mammar, Ana R. Cavalli, Nina Yevtushenko, Willy Jimenez, Edgardo Montes de Oca:
A SPIN-based approach for detecting vulnerabilities in C programs. Autom. Control. Comput. Sci. 46(7): 379-386 (2012) - [j1]Nahid Shahmehri, Amel Mammar, Edgardo Montes de Oca, David Byers, Ana R. Cavalli, Shanai Ardi, Willy Jimenez:
An advanced approach for modeling and detecting software vulnerabilities. Inf. Softw. Technol. 54(9): 997-1013 (2012) - [c9]Bachar Wehbi, Jouko Sankala, Edgardo Montes de Oca:
Network monitoring challenges in the evolved packet core. Future Network & Mobile Summit 2012: 1-8 - [c8]Bachar Wehbi, Edgardo Montes de Oca, Michel Bourdellès:
Events-Based Security Monitoring Using MMT Tool. ICST 2012: 860-863 - 2011
- [c7]Amel Mammar, Ana R. Cavalli, Willy Jimenez, Wissam Mallouli, Edgardo Montes de Oca:
Using Testing Techniques for Vulnerability Detection in C Programs. ICTSS 2011: 80-96 - 2010
- [c6]Gerardo Morales, Stéphane Maag, Ana R. Cavalli, Wissam Mallouli, Edgardo Montes de Oca, Bachar Wehbi:
Timed Extended Invariants for the Passive Testing of Web Services. ICWS 2010: 592-599
2000 – 2009
- 2009
- [c5]Felipe Lalanne, Stéphane Maag, Edgardo Montes de Oca, Ana R. Cavalli, Wissam Mallouli, Arnaud Gonguet:
An Automated Passive Testing Approach for the IMS PoC Service. ASE 2009: 535-539 - [c4]Ana R. Cavalli, Stéphane Maag, Edgardo Montes de Oca, Fatiha Zaïdi:
A Formal Passive Testing Approach to test a MANET Routing Protocol. PerCom Workshops 2009: 1-6 - [c3]Ana R. Cavalli, Stéphane Maag, Edgardo Montes de Oca:
A passive conformance testing approach for a MANET routing protocol. SAC 2009: 207-211 - 2008
- [c2]Ana R. Cavalli, Edgardo Montes de Oca, Wissam Mallouli, Mounir Lallali:
Two Complementary Tools for the Formal Testing of Distributed Systems with Time Constraints. DS-RT 2008: 315-318 - 2003
- [c1]Ana R. Cavalli, Edgardo Montes de Oca, Manuel Núñez:
TestNet: Let's Test Together!. TestCom 2003: 258-264
Coauthor Index
aka: Ana Rosa Cavalli
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 21:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint