Skip to content

Publications

Journals and Magazines

#DateTitleDOIsJournal/Magazine
1February 2023Distributed dual-layer autonomous closed loops for self-protection of 5G/6G IoT networks from distributed denial of service attacks10.1016/j.comnet.2022.109526Elsevier Computer Networks
2March 2023Reinforcement Learning-based Slice Isolation against DDoS Attacks in Beyond 5G Networks10.1109/TNSM.2023.3254581
(available at Zenodo)
IEEE TNSM
3June 2023SNS Journal/2023n/aEuropean Commission
4September 2023FortisEDoS: A Deep Transfer Learning-empowered Economical Denial of Sustainability Detection Framework for Cloud-Native Network Slicing10.1109/TDSC.2023.3318606IEEE TDSC
5December 2023Encryption as a Service for IoT: Opportunities, Challenges and Solutions10.1109/JIOT.2023.3341875IEEE Internet of Things Journal
6December 2023AI/ML for Beyond 5G Systems: Concepts, Technology Enablers & Solutions10.1016/j.comnet.2023.110044Elsevier Computer Networks
7January 2024Privacy-Based Deployments: The Role of DevPrivOps in 6G Mobile Networks10.1109/MCOM.004.2300405IEEE Communications Magazine
8January 2024Infrastructure-Wide and Intent-Based Networking Dataset for 5G-and-beyond AI-Driven Autonomous Networks10.3390/s24030783MDPI Sensors
9May 2024A Comprehensive Survey on Cyber Deception Techniques to Improve Honeypot Performance10.1016/j.cose.2024.103792Elsevier Computers & Security
10May 2024Collaborative Federated Learning for 6G with a Deep Reinforcement Learning based Controlling Mechanism: A DDoS Attack Detection Scenario10.1109/TNSM.2024.3387987IEEE Transactions on Network and Service Management
11Sept 2024Enhancing Honeynet-based Protection with Network Slicing for Massive Pre-6G IoT Smart Cities Deployments10.1016/j.jnca.2024.103918Journal of Network and Computer Applications
12Sept 2024Encryption as a Service (EaaS): Introducing the Full-Cloud-Fog Architecture for Enhanced Performance and Security10.1109/JIOT.2024.3450192IEEE Internet of Things Journal

Conferences

#DateTitleDOIsVenue
1June 2023A Mathematical Model for Analyzing Honeynets and Their Cyber Deception Techniques10.1109/ICECCS59891.2023.00019
(download)
27th Int’l Conf. On Engineering of Complex Computer Systems, Toulouse, France
2June 2023Process Slicing: A New Mitigation Tool for Cyber-attacks against Softwarised Industrial Environments10.1109/NetSoft57336.2023.10175447 2023 IEEE 9th International Conference on Network Softwarization (NetSoft)
3September 20233D-PM: A ML-powered Probabilistic Detection of DDoS Attacks in P4 Switches10.1109/MeditCom58224.2023.10266635Proc. of the 2023 IEEE International Mediterranean Conference on Communications and Networking (MeditCom)
4November 2023Federated Network Intelligence Orchestration for scalable and automated FL-based anomaly detection in B5G Networks10.5281/zenodo.10868028IEEE Future Networks World Forum 2023 (FNWF’23)
5November 2023A Network Security Insight based on AI/ML for 5G Advanced & Beyond10.5281/zenodo.10797938IEEE Future Networks World Forum 2023 (FNWF’23)
6December 2023Moving Target Defense based Secured Network Slicing System in the O-RAN Architecture10.1109/GLOBECOM54140.2023.10437795Proc. of IEEE Globecom’23
7December 2023Enhancing 5G Network Slicing: Slice Isolation via Actor-Critic Reinforcement Learning with Optimal Graph Features10.1109/GLOBECOM54140.2023.10437687Proc. of IEEE Globecom’23
8December 2023A Deep Transfer Learning-powered EDoS Detection Mechanism for 5G and Beyond Network Slicing10.1109/GLOBECOM54140.2023.10436891Proc. of IEEE Globecom’23
9December 2023Cybersecurity Fusion: Leveraging Mafia Game Tactics and Reinforcement Learning for Botnet Detection10.1109/GLOBECOM54140.2023.10437968Proc. of IEEE Globecom’23
10December 2023Blockchain and Deep Learning-Based IDS for Securing SDN-Enabled Industrial IoT Environments10.1109/GLOBECOM54140.2023.10436839Proc. of IEEE Globecom’23
11April 2024A Federated Continual Learning Framework for Sustainable Network Anomaly Detection in O-RAN10.1109/WCNC57260.2024.10570951IEEE Wireless Communications and Networking Conference (WCNC 2024)
12June 2024Encryption as a Service: A Review of
Architectures and Taxonomies
10.1007/978-3-031-62638-8_319th International Federated Conference on Distributed Computing Techniques (DiCoTec 2024)
13Sept 2024Deploying Testbed Docker-based application for
Encryption as a Service in Kubernetes
10.23919/SoftCOM62040.2024.107216582024 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)
14Oct 2024Enhancing Federated Learning with Homomorphic Encryption and Multi-Party Computation for improved privacyTBDTBD
15Oct 2024Privacy-preserving Attribute Based Credentials for 6G Networks10.5281/zenodo.13981325FNWF 2024 – Future Networks World Forum 2024 – Symposium On Security In Future Networks
16Nov 2024A novel approach for continual and federated network anomaly detection10.1007/978-3-031-73128-0_14FTC 2024 – Future Technologies Conference 2024 – Technology Conference – SAI Conferences
17Nov 2024A holistic security approach to protect Cloud-Native applications10.1007/978-3-031-73128-0_5FTC 2024 – Future Technologies Conference 2024 – Technology Conference – SAI Conferences
18Dec 2024A novel buffered federated learning framework for privacy-driven anomaly detection in IoTTBDGlobeCom 2024
European Union flag
Rigourous logo
Social media:

RIGOUROUS is funded by the European Union’s Research and Innovation Programme Horizon Europe under Grant Agreement no. 101095933