selected publications
-
academic article
- A Network Traffic Mutation Based Ontology, and Its Application to 5G Networks. IEEE Access. 11:43925-43944. 2023
- Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications. EURASIP Journal on Wireless Communications and Networking. 2022. 2022
- A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System. The Computer Journal. 61:1109-1122. 2018
- Modeling OMG SMM metrics using the Modelio modeling tool in the MEASURE project. HAL (Le Centre pour la Communication Scientifique Directe). 2017
- QoE Prediction for Multimedia Services. International Journal of Organizational and Collective Intelligence. 4:44-64. 2014
- A systematic approach to integrate common timed security rules within a TEFSM-based system specification. Information and Software Technology. 54:87-98. 2011
-
book
-
chapter
- Enhancing IoT Security in 6G Networks: AI-Based Intrusion Detection, Penetration Testing, and Blockchain-Based Trust Management (Work-in-Progress Paper). IFIP advances in information and communication technology. 53-67. 2024
- Digital Twin for IoT Environments: A Testing and Simulation Tool. Communications in computer and information science. 205-219. 2022
- Industrial IoT Security Monitoring and Test on Fed4Fire+ Platforms. Lecture notes in computer science. 270-278. 2019
- A Platform for Security Monitoring of Multi-cloud Applications. Lecture notes in computer science. 59-71. 2018
- Multi-cloud Applications Security Monitoring. Lecture notes in computer science. 748-758. 2017
- QoE Prediction for Multimedia Services. IGI Global eBooks. 1784-1804. 2015
- Using Testing Techniques for Vulnerability Detection in C Programs. Lecture notes in computer science. 80-96. 2011
- Modeling and testing secure web applications. HAL (Le Centre pour la Communication Scientifique Directe). 2010
- Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking. Lecture notes in computer science. 345-356. 2008
-
conference paper
- Testing techniques to assess impact and cascading effects. . 269-272. 2023
- A Cyber Digital Twin Framework to Support Cyber-Physical Systems Security. . 1-10. 2023
- HTTP/2 Attacks Generation using 5Greplay. Proceedings of the 17th International Conference on Availability, Reliability and Security. 1-7. 2023
- Study on Adversarial Attacks Techniques, Learning Methods and Countermeasures: Application to Anomaly Detection. . 510-517. 2023
- A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic. . 234-241. 2022
- 5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection. Proceedings of the 17th International Conference on Availability, Reliability and Security. 1-8. 2021
- A Framework for Security Monitoring of Real IoT Testbeds. . 645-652. 2021
- A Framework for Security Monitoring of Real IoT Testbeds. . 645-652. 2021
- Metrics-driven DevSecOps. . 228-233. 2020
- Enhancing Software Development Process Quality based on Metrics Correlation and Suggestion. . 154-165. 2018
- Monitoring techniques in practice: experiences and lessons learned. . 2016
- Monitoring-based validation of functional and performance aspects of a greedy ant colony optimization protocol. . 69-72. 2015
- QoE Estimation for Web Service Selection Using a Fuzzy-Rough Hybrid Expert System. . 629-634. 2014
- Evaluating Web Service QoE by Learning Logic Networks. . 168-176. 2014
- WebMov: A Dedicated Framework for the Modelling and Testing of Web Services Composition. . 377-384. 2010
- A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification. . 489-496. 2009
- Modeling and Testing Secure Web-Based Systems: Application to an Industrial Case Study. . 128-136. 2008
- Security Rules Specification and Analysis Based on Passive Testing. . 1-6. 2008
- Testing Security Policies for Web Applications. . 269-270. 2008