Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

secuRe desIGn and deplOyment of trUsthwoRthy cOntinUum computing 6G Services

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Design plan of the Multi-domain automated security orchestration, trust-management and deployment (opens in new window)

D3.1 Design plan of the multi-domain automated security orchestration, trust-management and deployment - This deliverable will report the initial outcomes coming from all the tasks in WP3, including the first analysis and design of the enablers and components for automated security orchestration, the design of the human-centric tools, open security and privacy models, the trust management as well as end-to-end slicing across multiple domains and network segments. [M12, R, PU, UWS]

Platform Prototype Integration and In-lab testing 1 (opens in new window)

D5.1 Platform Prototype Integration and In-lab testing - This deliverable will report on the work to be conducted in Task T5.1 and T5.2. It will focus on the methodology for testing and integration, the first set of in-lab experiments and results of achieved with the first prototype. [M18, R, PU, ONE]

First results of the Multi-domain automated security orchestration, trust-management and deployment (opens in new window)

D3.2 First results of the multi-domain automated security orchestration, trust-management and deployment - This deliverable will report the scientific outcomes from the four tasks as well as the implementation aspects of the trust manager, AI-driven orchestrator, End-to-End multi-domain Slice Manager and the Human-Centric DevSecOps tools [M18, R, PU, LNVO]

Dissemination and Communication Plan (opens in new window)

D6.2 Dissemination and Communication Plan -The deliverable reports the complete plan of activities towards dissemination, and impact assessment to be carried during the project duration, as part of Task 6.1. For each of the dissemination methods, the timeline, strategic approach, will be defined to promote coordinated dissemination activities, [M06, R, PU, ITAv]

RIGOUROUS Use-Cases (opens in new window)

D2.2 - RIGOUROUS Use-Cases –This deliverable will report the specifications of the RIGOUROUS Use-cases and the Validation Scenarios as well as the Use-Cases functional requirements. [M12, R, PU, ICT-FI]

Design plan of the AI-driven anomaly detection, decision and mitigation (opens in new window)

D4.1 Design plan of the AI-driven anomaly detection, decision and mitigation -This deliverable will report the initial outcomes coming from all the tasks in WP4, including the first analysis and design of the enablers and components for AI-driven anomaly detection, decision and mitigation. [M12, R, PU, OULU]

First results of the AI-driven anomaly detection, decision and mitigation (opens in new window)

D4.2 First results of the AI-driven anomaly detection, decision and mitigation -This deliverable will report the scientific outcomes from the four tasks as well as the implementation aspects of the relevant AI-driven anomaly detection, decision and mitigation components and enablers. [M18, R, PU, eBOS]

System Requirements Analysis Report and first architecture design (opens in new window)

D2.1 - System Requirements Analysis Report and first architecture design–This deliverable will report all activities and results associated with T2.1 and T2.3, specifically a detailed list of functional and technical requirements for RIGOUROUS and first design of the RIGOUROUS architecture, interfaces and processes flows. [M9, R, PU, ORO]

Project website (opens in new window)

D6.1 Project website -This deliverable will result in the project website, made available to the public, establishing presence in the relevant social networks, and a set of guidelines for partners to engage with the website and social channels. [M03, DEC, PU, UMU]

Publications

Handling imbalanced 5G and beyond network tabular data using conditional generative models (opens in new window)

Author(s): Jimena Andrade-Hoz, Jose M. Alcaraz-Calero, Qi Wang
Published in: The 20th International Wireless Communications & Mobile Computing Conference, 2024, ISSN 2376-6506
Publisher: IEEE
DOI: 10.1109/IWCMC61514.2024.10592409

Privacy-preserving Attribute Based Credentials for 6G Networks (opens in new window)

Author(s): """ Kunz, Andreas Asensio-Garriga, Rodrigo Garcia, Jesus Bernabe, Jorge Bernal Skarmeta Gomez, Antonio Fernando Baskaran, Sheeba Backia Mary Paul, Souvik"""
Published in: Future Networks World Forum 2024 (FNWF 2024), 2024
Publisher: IEEE
DOI: 10.5281/zenodo.13981324

3D-PM: A ML-powered Probabilistic Detection of DDoS Attacks in P4 Switches (opens in new window)

Author(s): Ferhat Mecerhed, Khaled Zeraoulia, Chafika Benzaid, Amel Benabdallah
Published in: Proc. of the 2023 IEEE International Mediterranean Conference on Communications and Networking (MeditCom), 2023, ISBN 979-8-3503-3373-2
Publisher: IEEE
DOI: 10.1109/MeditCom58224.2023.10266635

Enhancing 5G Network Slicing: Slice Isolation via Actor-Critic Reinforcement Learning with Optimal Graph Features (opens in new window)

Author(s): A. Javadpour, F. Ja'fari, T. Taleb and C. Benzaïd
Published in: Proc. of IEEE Globecom’23, 2023, ISSN 2576-6813
Publisher: IEEE
DOI: 10.1109/GLOBECOM54140.2023.10437687

Moving Target Defense based Secured Network Slicing System in the O-RAN Architecture (opens in new window)

Author(s): M. K. Motalleb, C. Benzaid, T. Taleb and V. Shah-Mansouri
Published in: Proc. of IEEE Globecom’23, 2023, ISSN 2576-6813
Publisher: IEEE
DOI: 10.1109/GLOBECOM54140.2023.10437795

Cybersecurity Fusion: Leveraging Mafia Game Tactics and Reinforcement Learning for Botnet Detection

Author(s): A. Javadpour, F. Ja'fari, T. Taleb, H. Ahmadi and C. Benzaïd,
Published in: Proc. of IEEE Globecom’23, 2024, ISSN 2576-6813
Publisher: IEEE

Federated Network Intelligence Orchestration for scalable and automated FL-based anomaly detection in B5G Networks

Author(s): Pablo Fernández Saura, José Manuel Bernabé Murcia, Alejandro Molina Zarca, Jorge Bernal Bernabé, Antonio Skarmeta
Published in: FNWF'23 - IEEE Future Networks World Forum 2023, 2023, ISSN 2770-7679
Publisher: IEEE

A novel approach for continual and federated network anomaly detection (opens in new window)

Author(s): Pedro R. Tomas, Pedro Felix, Andre S. Gomes, Luis Cordeiro
Published in: FTC 2024 - Future Technologies Conference 2024 - Technology Conference - SAI Conferences, 2024, ISSN 2583-9888
Publisher: Springer
DOI: 10.51219/JAIMLD/joseph-aaron-tsapa/82

"""A Multi-Layered Zero Trust Microsegmentation Solution for Cloud-Native 5G & Beyond Networks""" (opens in new window)

Author(s): Chafika Benzaid, Nawal Guerd, Nour El Houda Rehouma, Khaled Zaraoulia, and Tarik Taleb
Published in: IEEE Wireless Communications and Networking Conference (WCNC), 2025
Publisher: IEEE
DOI: 10.5281/zenodo.14699793

A Federated Continual Learning Framework for Sustainable Network Anomaly Detection in O-RAN (opens in new window)

Author(s): C Benzaïd, FM Hossain, T Taleb, PM Gómez, M Dieudonne
Published in: 2024 IEEE Wireless Communications and Networking Conference (WCNC), 2024, ISSN 1558-2612
Publisher: IEEE
DOI: 10.1109/WCNC57260.2024.10570951

Lecture Notes in Computer Science (opens in new window)

Author(s): A Javadpour, F Ja'fari, T Taleb
Published in: Distributed Applications and Interoperable Systems, 2024, ISSN 0302-9743
Publisher: Springer
DOI: 10.1007/978-3-031-62638-8_3

Process Slicing: A New Mitigation Tool for Cyber-attacks against Softwarised Industrial Environments (opens in new window)

Author(s): Angel M. Gama GarciaJose M. Alcaraz CaleroHiginio Mora MoraQi Wang
Published in:  2023 IEEE 9th International Conference on Network Softwarization (NetSoft), 2023, ISSN 2693-9789
Publisher: IEEE
DOI: 10.1109/NetSoft57336.2023.10175447

Deploying Testbed Docker-based application for Encryption as a Service in Kubernetes (opens in new window)

Author(s): Amir Javadpour, Forough Ja’Fari, Tarik Taleb, Chafika Benzaïd, Luis Rosa, Pedro Tomás, Luis Cordeiro
Published in: 2024 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 2024
Publisher: IEEE
DOI: 10.23919/SoftCOM62040.2024.10721658

A novel buffered federated learning framework for privacy-driven anomaly detection in IIoT (opens in new window)

Author(s): Samira Kamali Poorazad, Chafika Benzaid, Tarik Taleb
Published in: IEEE Global Communications Conference (GLOBECOM 2024), 2024
Publisher: IEEE
DOI: 10.48550/arXiv.2408.08722

Federated Network Intelligence Orchestration for scalable and automated FL-based anomaly detection in B5G Networks (opens in new window)

Author(s): Jayasinghe, Suwani
Published in: IEEE Future Networks World Forum 2023 (FNWF'23), 2023, ISSN 2770-7679
Publisher: IEEE
DOI: 10.1109/FNWF58287.2023.10520615

A Deep Transfer Learning-powered EDoS Detection Mechanism for 5G and Beyond Network Slicing (opens in new window)

Author(s): C. Benzaïd, T. Taleb, A. Sami and O. Hireche,
Published in: Proc. of IEEE Globecom’23, 2023, ISSN 2576-6813
Publisher: IEEE communications society
DOI: 10.1109/GLOBECOM54140.2023.10436891

A Network Security Insight based on AI/ML for 5G Advanced & Beyond (opens in new window)

Author(s): Kunz, A., Baskaran, S. B. M., Samdanis, K., & Paul, S.
Published in: IEEE Future Networks World Forum 2023 (FNWF'23), 2023, ISSN 2770-7679
Publisher: IEEE
DOI: 10.1109/FNWF58287.2023.10520559

A Mathematical Model for Analyzing Honeynets and Their Cyber Deception Techniques (opens in new window)

Author(s): A. Javadpour, F. Ja’Fari, T. Taleb and C. Benzaïd
Published in: Proc. of the 27th Int’l Conf. On Engineering of Complex Computer Systems, 2023, ISSN 2770-8535
Publisher: IEEE
DOI: 10.1109/ICECCS59891.2023.00019

Blockchain and Deep Learning-Based IDS for Securing SDN-Enabled Industrial IoT Environments (opens in new window)

Author(s): S. K. Poorazad, C. Benzaïd and T. Taleb
Published in: Proc. of IEEE Globecom’23, 2023, ISSN 2576-6813
Publisher: IEEE
DOI: 10.1109/GLOBECOM54140.2023.10436839

FortisEDoS: A Deep Transfer Learning-empowered Economical Denial of Sustainability Detection Framework for Cloud-Native Network Slicing (opens in new window)

Author(s): Chafika Benza¨ıd∗, Tarik Taleb∗, Ashkan Sami†,‡and Othmane Hireche
Published in: IEEE Transactions on Dependable and Secure Computing (TDSC), 2023, ISSN 1545-5971
Publisher: IEEE Computer Society
DOI: 10.1109/TDSC.2023.3318606

A Comprehensive Survey on Cyber Deception Techniques to Improve Honeypot Performance (opens in new window)

Author(s): A Javadpour, F Ja'fari, T Taleb, M Shojafar, C Benzaïd
Published in: Computers & Security, 2024, ISSN 1872-6208
Publisher: Elsevier
DOI: 10.1016/j.cose.2024.103792

Distributed dual-layer autonomous closed loops for self-protection of 5G/6G IoT networks from distributed denial of service attacks (opens in new window)

Author(s): Benlloch-Caballero, P., Wang, Q., & Alcaraz-Calero, J. M.
Published in: Elsevier Computer Networks, 2023, ISSN 1872-7069
Publisher: Elsevier BV
DOI: 10.1016/j.comnet.2022.109526

Reinforcement Learning-Based Slice Isolation Against DDoS Attacks in Beyond 5G Networks (opens in new window)

Author(s): Amir Javadpour, Forough Ja’fari, Tarik Taleb, Chafika Benzaïd
Published in: IEEE Transactions on Network and Service Management, Issue 20, 2023, ISSN 1932-4537
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/TNSM.2023.3254581

Encryption as a Service (EaaS): Introducing the Full-Cloud-Fog Architecture for Enhanced Performance and Security (opens in new window)

Author(s): Amir Javadpour, Forough Ja’fari, Tarik Taleb, Chafika Benzaïd, Yang Bin, Yue Zhao
Published in: IEEE Internet of Things Journal, Issue 11, 2024, ISSN 2327-4662
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/JIOT.2024.3450192

AI/ML for Beyond 5G Systems: Concepts, Technology Enablers & Solutions (opens in new window)

Author(s): Tarik Taleb, Chafika Benzaïd, Rami Akrem Addad, Konstantinos Samdanis
Published in: Elsevier Computer Networks, 2023, ISSN 1872-7069
Publisher: ScienceDirect
DOI: 10.1016/j.comnet.2023.110044

Enhancing Honeynet-based Protection with Network Slicing for Massive Pre-6G IoT Smart Cities Deployments (opens in new window)

Author(s): AM Escolar, Q Wang, JMA Calero
Published in: Journal of Network and Computer Applications, 2024, ISSN 1084-8045
Publisher: Elsevier
DOI: 10.1016/j.jnca.2024.103918

Encryption as a Service for IoT: Opportunities, Challenges and Solutions (opens in new window)

Author(s): A. Javadpour, F. Ja’fari, T. Taleb, Y. Zhao, B. Yang and C. Benzaïd,
Published in: IEEE Internet of Things Journal, 2023, ISSN 2327-4662
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/JIOT.2023.3341875

Infrastructure-Wide and Intent-Based Networking Dataset for 5G-and-beyond AI-Driven Autonomous Networks (opens in new window)

Author(s): Jimena Andrade-Hoz, Jose M. Alcaraz-Calero, Qi Wang
Published in: Computing and Applications for Wireless and Mobile Networks), 2024, ISSN 1424-8220
Publisher: Sensors
DOI: 10.3390/s24030783

Collaborative Federated Learning for 6G with a Deep Reinforcement Learning based Controlling Mechanism: A DDoS Attack Detection Scenario (opens in new window)

Author(s): S Kianpisheh, T Taleb
Published in: IEEE Transactions on Network and Service Management, 2024, ISSN 1932-4537
Publisher: IEEE
DOI: 10.1109/TNSM.2024.3387987

Privacy-Based Deployments: The Role of DevPrivOps in 6G Mobile Networks (opens in new window)

Author(s): C Silva, VA Cunha, JP Barraca, P Salvador
Published in: IEEE Communications Magazine, 2024, ISSN 0163-6804
Publisher: IEEE
DOI: 10.1109/MCOM.004.2300405

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0