Skip to content

Publications

Journals and Magazines

#DateTitleDOIsJournal/Magazine
1February 2023Distributed dual-layer autonomous closed loops for self-protection of 5G/6G IoT networks from distributed denial of service attacks10.1016/j.comnet.2022.109526Elsevier Computer Networks
2March 2023Reinforcement Learning-based Slice Isolation against DDoS Attacks in Beyond 5G Networks10.1109/TNSM.2023.3254581
(available at Zenodo)
IEEE TNSM
3June 2023SNS Journal/2023n/aEuropean Commission
4September 2023FortisEDoS: A Deep Transfer Learning-empowered Economical Denial of Sustainability Detection Framework for Cloud-Native Network Slicing10.1109/TDSC.2023.3318606IEEE TDSC
5December 2023Encryption as a Service for IoT: Opportunities, Challenges and Solutions10.1109/JIOT.2023.3341875IEEE Internet of Things Journal
6December 2023AI/ML for Beyond 5G Systems: Concepts, Technology Enablers & Solutions10.1016/j.comnet.2023.110044Elsevier Computer Networks
7January 2024Privacy-Based Deployments: The Role of DevPrivOps in 6G Mobile Networks10.1109/MCOM.004.2300405IEEE Communications Magazine
8January 2024Infrastructure-Wide and Intent-Based Networking Dataset for 5G-and-beyond AI-Driven Autonomous Networks10.3390/s24030783MDPI Sensors
8March 2024Encryption as a Service for IoT: Opportunities, Challenges and Solutions10.1109/JIOT.2023.3341875IEEE Internet of Things Journal
9May 2024A Comprehensive Survey on Cyber Deception Techniques to Improve Honeypot Performance10.1016/j.cose.2024.103792Elsevier Computers & Security

Conferences

#DateTitleDOIsVenue
1June 2023A Mathematical Model for Analyzing Honeynets and Their Cyber Deception Techniques10.1109/ICECCS59891.2023.00019
(download)
27th Intā€™l Conf. On Engineering of Complex Computer Systems, Toulouse, France
2June 2023Process Slicing: A New Mitigation Tool for Cyber-attacks against Softwarised Industrial Environments10.1109/NetSoft57336.2023.10175447 2023 IEEE 9th International Conference on Network Softwarization (NetSoft)
3September 20233D-PM: A ML-powered Probabilistic Detection of DDoS Attacks in P4 Switches10.1109/MeditCom58224.2023.10266635Proc. of the 2023 IEEE International Mediterranean Conference on Communications and Networking (MeditCom)
4November 2023Federated Network Intelligence Orchestration for scalable and automated FL-based anomaly detection in B5G Networks10.5281/zenodo.10868028IEEE Future Networks World Forum 2023 (FNWF’23)
5November 2023A Network Security Insight based on AI/ML for 5G Advanced & Beyond10.5281/zenodo.10797938IEEE Future Networks World Forum 2023 (FNWF’23)
6December 2023Moving Target Defense based Secured Network Slicing System in the O-RAN Architecture10.1109/GLOBECOM54140.2023.10437795Proc. of IEEE Globecomā€™23
7December 2023Enhancing 5G Network Slicing: Slice Isolation via Actor-Critic Reinforcement Learning with Optimal Graph Features10.1109/GLOBECOM54140.2023.10437687Proc. of IEEE Globecomā€™23
8December 2023A Deep Transfer Learning-powered EDoS Detection Mechanism for 5G and Beyond Network Slicing10.1109/GLOBECOM54140.2023.10436891Proc. of IEEE Globecomā€™23
9December 2023Cybersecurity Fusion: Leveraging Mafia Game Tactics and Reinforcement Learning for Botnet Detection10.1109/GLOBECOM54140.2023.10437968Proc. of IEEE Globecomā€™23
10December 2023Blockchain and Deep Learning-Based IDS for Securing SDN-Enabled Industrial IoT Environments10.1109/GLOBECOM54140.2023.10436839Proc. of IEEE Globecomā€™23
11April 2024A Federated Continual Learning Framework for Sustainable Network Anomaly Detection in O-RANTBDTBC
European Union flag
Rigourous logo
Social media:

RIGOUROUS is funded by the European Unionā€™s Research and Innovation Programme Horizon Europe under Grant Agreement no. 101095933