selected publications
-
academic article
- A Network Traffic Mutation Based Ontology, and Its Application to 5G Networks. IEEE Access. 11:43925-43944. 2023
- A SPIN-based approach for detecting vulnerabilities in C programs. Automatic Control and Computer Sciences. 46:379-386. 2012
-
chapter
- Enhancing IoT Security in 6G Networks: AI-Based Intrusion Detection, Penetration Testing, and Blockchain-Based Trust Management (Work-in-Progress Paper). IFIP advances in information and communication technology. 53-67. 2024
- Digital Twin for IoT Environments: A Testing and Simulation Tool. Communications in computer and information science. 205-219. 2022
- Industrial IoT Security Monitoring and Test on Fed4Fire+ Platforms. Lecture notes in computer science. 270-278. 2019
- Using Testing Techniques for Vulnerability Detection in C Programs. Lecture notes in computer science. 80-96. 2011
-
conference paper
- Cybersecurity, Monitoring, Explainability and Resilience. . 1-7. 2023
- HTTP/2 Attacks Generation using 5Greplay. Proceedings of the 17th International Conference on Availability, Reliability and Security. 1-7. 2023
- Towards improving explainability, resilience and performance of cybersecurity analysis of 5G/IoT networks (work-in-progress paper). . 2022
- Towards improving explainability, resilience and performance of cybersecurity analysis of 5G/IoT networks (work-in-progress paper). . 7-10. 2022
- A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic. . 234-241. 2022
- 5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection. Proceedings of the 17th International Conference on Availability, Reliability and Security. 1-8. 2021
- A Framework for Security Monitoring of Real IoT Testbeds. . 645-652. 2021
- A Framework for Security Monitoring of Real IoT Testbeds. . 645-652. 2021
- Metrics-driven DevSecOps. . 228-233. 2020