Skip to main content
Go to the home page of the European Commission (opens in new window)
English en
CORDIS - EU research results
CORDIS

secuRe desIGn and deplOyment of trUsthwoRthy cOntinUum computing 6G Services

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Design plan of the Multi-domain automated security orchestration, trust-management and deployment (opens in new window)

D3.1 Design plan of the multi-domain automated security orchestration, trust-management and deployment - This deliverable will report the initial outcomes coming from all the tasks in WP3, including the first analysis and design of the enablers and components for automated security orchestration, the design of the human-centric tools, open security and privacy models, the trust management as well as end-to-end slicing across multiple domains and network segments. [M12, R, PU, UWS]

Platform Prototype Integration and In-lab testing 1 (opens in new window)

D5.1 Platform Prototype Integration and In-lab testing - This deliverable will report on the work to be conducted in Task T5.1 and T5.2. It will focus on the methodology for testing and integration, the first set of in-lab experiments and results of achieved with the first prototype. [M18, R, PU, ONE]

First results of the Multi-domain automated security orchestration, trust-management and deployment (opens in new window)

D3.2 First results of the multi-domain automated security orchestration, trust-management and deployment - This deliverable will report the scientific outcomes from the four tasks as well as the implementation aspects of the trust manager, AI-driven orchestrator, End-to-End multi-domain Slice Manager and the Human-Centric DevSecOps tools [M18, R, PU, LNVO]

Dissemination and Communication Plan (opens in new window)

D6.2 Dissemination and Communication Plan -The deliverable reports the complete plan of activities towards dissemination, and impact assessment to be carried during the project duration, as part of Task 6.1. For each of the dissemination methods, the timeline, strategic approach, will be defined to promote coordinated dissemination activities, [M06, R, PU, ITAv]

RIGOUROUS Use-Cases (opens in new window)

D2.2 - RIGOUROUS Use-Cases –This deliverable will report the specifications of the RIGOUROUS Use-cases and the Validation Scenarios as well as the Use-Cases functional requirements. [M12, R, PU, ICT-FI]

Design plan of the AI-driven anomaly detection, decision and mitigation (opens in new window)

D4.1 Design plan of the AI-driven anomaly detection, decision and mitigation -This deliverable will report the initial outcomes coming from all the tasks in WP4, including the first analysis and design of the enablers and components for AI-driven anomaly detection, decision and mitigation. [M12, R, PU, OULU]

First results of the AI-driven anomaly detection, decision and mitigation (opens in new window)

D4.2 First results of the AI-driven anomaly detection, decision and mitigation -This deliverable will report the scientific outcomes from the four tasks as well as the implementation aspects of the relevant AI-driven anomaly detection, decision and mitigation components and enablers. [M18, R, PU, eBOS]

System Requirements Analysis Report and first architecture design (opens in new window)

D2.1 - System Requirements Analysis Report and first architecture design–This deliverable will report all activities and results associated with T2.1 and T2.3, specifically a detailed list of functional and technical requirements for RIGOUROUS and first design of the RIGOUROUS architecture, interfaces and processes flows. [M9, R, PU, ORO]

Project website (opens in new window)

D6.1 Project website -This deliverable will result in the project website, made available to the public, establishing presence in the relevant social networks, and a set of guidelines for partners to engage with the website and social channels. [M03, DEC, PU, UMU]

Publications

Handling imbalanced 5G and beyond network tabular data using conditional generative models (opens in new window)

Author(s): Jimena Andrade-Hoz, Jose M. Alcaraz-Calero, Qi Wang
Published in: The 20th International Wireless Communications & Mobile Computing Conference, 2024, ISSN 2376-6506
Publisher: IEEE
DOI: 10.1109/IWCMC61514.2024.10592409

Privacy-preserving Attribute Based Credentials for 6G Networks (opens in new window)

Author(s): """ Kunz, Andreas Asensio-Garriga, Rodrigo Garcia, Jesus Bernabe, Jorge Bernal Skarmeta Gomez, Antonio Fernando Baskaran, Sheeba Backia Mary Paul, Souvik"""
Published in: Future Networks World Forum 2024 (FNWF 2024), 2024
Publisher: IEEE
DOI: 10.5281/zenodo.13981324

3D-PM: A ML-powered Probabilistic Detection of DDoS Attacks in P4 Switches (opens in new window)

Author(s): Ferhat Mecerhed, Khaled Zeraoulia, Chafika Benzaid, Amel Benabdallah
Published in: Proc. of the 2023 IEEE International Mediterranean Conference on Communications and Networking (MeditCom), 2023, ISBN 979-8-3503-3373-2
Publisher: IEEE
DOI: 10.1109/MeditCom58224.2023.10266635

Enhancing 5G Network Slicing: Slice Isolation via Actor-Critic Reinforcement Learning with Optimal Graph Features (opens in new window)

Author(s): A. Javadpour, F. Ja'fari, T. Taleb and C. Benzaïd
Published in: Proc. of IEEE Globecom’23, 2023, ISSN 2576-6813
Publisher: IEEE
DOI: 10.1109/GLOBECOM54140.2023.10437687

Multi-Model based Federated Learning Against Model Poisoning Attack: A Deep Learning Based Model Selection for MEC Systems

Author(s): Somayeh Kianpisheh, Chafika Benzaid, Tarik Taleb
Published in: IEEE Global Communications Conference

Network slicing as 6G security mechanism to mitigate cyber-attacks: the RIGOUROUS approach (opens in new window)

Author(s): Antonio Matencio Escolar, Jorge Bernal Bernabe, Jose Maria Alcaraz Calero, Qi Wang, Antonio Skarmeta
Published in: 2024 IEEE 10th International Conference on Network Softwarization (NetSoft), 2024, ISSN 2693-9789
Publisher: IEEE
DOI: 10.1109/NETSOFT60951.2024.10588887

Moving Target Defense based Secured Network Slicing System in the O-RAN Architecture (opens in new window)

Author(s): M. K. Motalleb, C. Benzaid, T. Taleb and V. Shah-Mansouri
Published in: Proc. of IEEE Globecom’23, 2023, ISSN 2576-6813
Publisher: IEEE
DOI: 10.1109/GLOBECOM54140.2023.10437795

Multi-Layer Multi-Technology Firewall Optimisation in Beyond 5G Networks Using Machine Learning Classifiers (opens in new window)

Author(s): Jimena Andrade-Hoz, Jose M. Alcaraz-Calero, Qi Wang
Published in: 2024 14th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), 2024, ISSN 2835-9038
Publisher: IEEE
DOI: 10.1109/CSNDSP60683.2024.10636539

Cybersecurity Fusion: Leveraging Mafia Game Tactics and Reinforcement Learning for Botnet Detection

Author(s): A. Javadpour, F. Ja'fari, T. Taleb, H. Ahmadi and C. Benzaïd,
Published in: Proc. of IEEE Globecom’23, 2024, ISSN 2576-6813
Publisher: IEEE

Human Centric Private & Secure Onboarding for Network Applications in 6G (opens in new window)

Author(s): Diogo E. J. Santos, Camila Fonseca, Vitor A. Cunha, João P. Barraca, Rui L. Aguiar
Published in: 2025 4th International Conference on 6G Networking (6GNet), 2025
Publisher: IEEE
DOI: 10.1109/6GNET68413.2025.11314140

Federated Network Intelligence Orchestration for scalable and automated FL-based anomaly detection in B5G Networks

Author(s): Pablo Fernández Saura, José Manuel Bernabé Murcia, Alejandro Molina Zarca, Jorge Bernal Bernabé, Antonio Skarmeta
Published in: FNWF'23 - IEEE Future Networks World Forum 2023, 2023, ISSN 2770-7679
Publisher: IEEE

A novel approach for continual and federated network anomaly detection (opens in new window)

Author(s): Pedro R. Tomas, Pedro Felix, Andre S. Gomes, Luis Cordeiro
Published in: FTC 2024 - Future Technologies Conference 2024 - Technology Conference - SAI Conferences, 2024, ISSN 2583-9888
Publisher: Springer
DOI: 10.51219/JAIMLD/joseph-aaron-tsapa/82

"""A Multi-Layered Zero Trust Microsegmentation Solution for Cloud-Native 5G & Beyond Networks""" (opens in new window)

Author(s): Chafika Benzaid, Nawal Guerd, Nour El Houda Rehouma, Khaled Zaraoulia, and Tarik Taleb
Published in: IEEE Wireless Communications and Networking Conference (WCNC), 2025
Publisher: IEEE
DOI: 10.5281/zenodo.14699793

A Federated Continual Learning Framework for Sustainable Network Anomaly Detection in O-RAN (opens in new window)

Author(s): C Benzaïd, FM Hossain, T Taleb, PM Gómez, M Dieudonne
Published in: 2024 IEEE Wireless Communications and Networking Conference (WCNC), 2024, ISSN 1558-2612
Publisher: IEEE
DOI: 10.1109/WCNC57260.2024.10570951

Lecture Notes in Computer Science (opens in new window)

Author(s): A Javadpour, F Ja'fari, T Taleb
Published in: Distributed Applications and Interoperable Systems, 2024, ISSN 0302-9743
Publisher: Springer
DOI: 10.1007/978-3-031-62638-8_3

Enhanced Protection of 5G-IoT and Beyond Infrastructures: Evolving Intelligent Strategies for DDoS Attack Multiclass Classification (opens in new window)

Author(s): Pablo Benlloch-Caballero, Jose M. Alcaraz Calero, Qi Wang
Published in: 2025 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), 2025, ISSN 2575-4912
Publisher: IEEE
DOI: 10.1109/EUCNC/6GSUMMIT63408.2025.11037213

Process Slicing: A New Mitigation Tool for Cyber-attacks against Softwarised Industrial Environments (opens in new window)

Author(s): Angel M. Gama GarciaJose M. Alcaraz CaleroHiginio Mora MoraQi Wang
Published in:  2023 IEEE 9th International Conference on Network Softwarization (NetSoft), 2023, ISSN 2693-9789
Publisher: IEEE
DOI: 10.1109/NetSoft57336.2023.10175447

End-To-End Network Flow Path Calculation in Beyond 5G Multi-Tenant Infrastructures (opens in new window)

Author(s): Angel M. Gama Garcia, Pablo Benlloch Caballero, Qi Wang, Higinio Mora Mora, Jose M. Alcaraz Calero
Published in: 2024 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 2024, ISSN 1847-358X
Publisher: IEEE
DOI: 10.23919/SOFTCOM62040.2024.10721689

Deploying Testbed Docker-based application for Encryption as a Service in Kubernetes (opens in new window)

Author(s): Amir Javadpour, Forough Ja’Fari, Tarik Taleb, Chafika Benzaïd, Luis Rosa, Pedro Tomás, Luis Cordeiro
Published in: 2024 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 2024
Publisher: IEEE
DOI: 10.23919/SoftCOM62040.2024.10721658

A Novel Weight-Driven ATN-Based SQL Sentence Generator to Accommodate AI-Based Reinforcement Learning (opens in new window)

Author(s): Christopher Troy, Qi Wang, Jose M. Alcaraz-Calero
Published in: 2024 International Conference on Computer, Information and Telecommunication Systems (CITS), 2024, ISBN 979-8-3503-5909-1
Publisher: IEEE
DOI: 10.1109/CITS61189.2024.10608024

A novel buffered federated learning framework for privacy-driven anomaly detection in IIoT (opens in new window)

Author(s): Samira Kamali Poorazad, Chafika Benzaid, Tarik Taleb
Published in: IEEE Global Communications Conference (GLOBECOM 2024), 2024
Publisher: IEEE
DOI: 10.48550/arXiv.2408.08722

Federated Network Intelligence Orchestration for scalable and automated FL-based anomaly detection in B5G Networks (opens in new window)

Author(s): Jayasinghe, Suwani
Published in: IEEE Future Networks World Forum 2023 (FNWF'23), 2023, ISSN 2770-7679
Publisher: IEEE
DOI: 10.1109/FNWF58287.2023.10520615

A Deep Transfer Learning-powered EDoS Detection Mechanism for 5G and Beyond Network Slicing (opens in new window)

Author(s): C. Benzaïd, T. Taleb, A. Sami and O. Hireche,
Published in: Proc. of IEEE Globecom’23, 2023, ISSN 2576-6813
Publisher: IEEE communications society
DOI: 10.1109/GLOBECOM54140.2023.10436891

Enhancing Federated Learning with Homomorphic Encryption and Multi-Party Computation for improved privacy (opens in new window)

Author(s): Pedro Tomás, Samira Kamali Poorazad, Chafika Benzaïd, Luis Rosa, Jorge Proença, Tarik Taleb, Luis Cordeiro
Published in: 2024 IEEE Future Networks World Forum (FNWF), 2025
Publisher: IEEE
DOI: 10.1109/FNWF63303.2024.11028749

Slicing and Filtering security orchestration for cyberattacks mitigation in 5G/6G networks

Author(s): Diego Sanchez Garcia, Pablo Benlloch-Caballero, Jorge Bernal Bernabe, Jose M Alcaraz Calero*, Alejandro Molina Zarca, Antonio F. Skarmeta Gomez
Published in: The 9th International Conference on Mobile Internet Security, 2025

A Network Security Insight based on AI/ML for 5G Advanced & Beyond (opens in new window)

Author(s): Kunz, A., Baskaran, S. B. M., Samdanis, K., & Paul, S.
Published in: IEEE Future Networks World Forum 2023 (FNWF'23), 2023, ISSN 2770-7679
Publisher: IEEE
DOI: 10.1109/FNWF58287.2023.10520559

A Mathematical Model for Analyzing Honeynets and Their Cyber Deception Techniques (opens in new window)

Author(s): A. Javadpour, F. Ja’Fari, T. Taleb and C. Benzaïd
Published in: Proc. of the 27th Int’l Conf. On Engineering of Complex Computer Systems, 2023, ISSN 2770-8535
Publisher: IEEE
DOI: 10.1109/ICECCS59891.2023.00019

Encryption as a Service: A Review of Architectures and Taxonomies (opens in new window)

Author(s): Amir Javadpour, Forough Ja’fari, Tarik Taleb
Published in: Lecture Notes in Computer Science, Distributed Applications and Interoperable Systems, 2024
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-62638-8_3

Blockchain and Deep Learning-Based IDS for Securing SDN-Enabled Industrial IoT Environments (opens in new window)

Author(s): S. K. Poorazad, C. Benzaïd and T. Taleb
Published in: Proc. of IEEE Globecom’23, 2023, ISSN 2576-6813
Publisher: IEEE
DOI: 10.1109/GLOBECOM54140.2023.10436839

Contribution of RIGOUROUS in the Software Software Networks Working White paper

Anonymous credential systems: Identity management using zero-knowledge proofs and their performance in embedded systems

Author(s): Juan Marín Noguera

Human Centric Secure Onboarding in 6G

Author(s): Diogo Emanuel Jesus Santos

AI-driven predictive intelligence for detection and early warning of unseen cyberthreats in 5G/6G networks (opens in new window)

Author(s): Pablo Benlloch Caballero
Published in: 2025
Publisher: UWS
DOI: 10.5281/ZENODO.17085176

Design & implementation of novel AI-network slicing hybrid architectures empowering 5G networks

Author(s): Mohamed Khadmaoui Bichouna
Published in: 2024
Publisher: UWS

Implementation and performance analysis in the application of privacy preservation techniques on cyber intelligence information

Author(s): Ekam Puri Nieto

AI-driven self-optimisation of network control functions in multi-tenant beyond 5G networks (opens in new window)

Author(s): Jimena Andrade Hoz
Published in: 2025
Publisher: UWS
DOI: 10.5281/ZENODO.15719634

Proactive Privacy Risk Detection in DevPrivOps

Author(s): João Francisco Fernandes Felisberto
Published in: DOI:10.1109/ISCC65549.2025.11326355, 2024
Publisher: Universidade de Aveiro

End-to-End Service Management in Multi-tenant Beyond 5G Networks

Author(s): Angel Gama Garcia
Published in: 2024
Publisher: UWS

E2E Network Slicing for Enhanced Cybersecurity, Orchestration, Automation and Response in 5G/6G: The RIGOUROUS Approach (opens in new window)

Author(s): Pablo Benlloch-Caballero, Antonio Matencio-Escolar, Jorge Bernal Bernabe, Antonio Skarmeta, Qi Wang, Jose M. Alcaraz-Calero
Published in: Journal of Network and Systems Management, Issue 34, 2026, ISSN 1064-7570
Publisher: Springer Science and Business Media LLC
DOI: 10.1007/S10922-025-09999-W

FortisEDoS: A Deep Transfer Learning-empowered Economical Denial of Sustainability Detection Framework for Cloud-Native Network Slicing (opens in new window)

Author(s): Chafika Benza¨ıd∗, Tarik Taleb∗, Ashkan Sami†,‡and Othmane Hireche
Published in: IEEE Transactions on Dependable and Secure Computing (TDSC), 2023, ISSN 1545-5971
Publisher: IEEE Computer Society
DOI: 10.1109/TDSC.2023.3318606

A Comprehensive Survey on Cyber Deception Techniques to Improve Honeypot Performance (opens in new window)

Author(s): A Javadpour, F Ja'fari, T Taleb, M Shojafar, C Benzaïd
Published in: Computers & Security, 2024, ISSN 1872-6208
Publisher: Elsevier
DOI: 10.1016/j.cose.2024.103792

Design and implementation of an integrated OWC and RF network slicing-based architecture over hybrid LiFi and 5G networks (opens in new window)

Author(s): Mohamed Khadmaoui-Bichouna, Antonio Matencio Escolar, Jose M. Alcaraz-Calero, Qi Wang
Published in: Wireless Networks, Issue 31, 2025, ISSN 1022-0038
Publisher: Springer Science and Business Media LLC
DOI: 10.1007/S11276-024-03848-5

Distributed dual-layer autonomous closed loops for self-protection of 5G/6G IoT networks from distributed denial of service attacks (opens in new window)

Author(s): Benlloch-Caballero, P., Wang, Q., & Alcaraz-Calero, J. M.
Published in: Elsevier Computer Networks, 2023, ISSN 1872-7069
Publisher: Elsevier BV
DOI: 10.1016/j.comnet.2022.109526

Reinforcement Learning-Based Slice Isolation Against DDoS Attacks in Beyond 5G Networks (opens in new window)

Author(s): Amir Javadpour, Forough Ja’fari, Tarik Taleb, Chafika Benzaïd
Published in: IEEE Transactions on Network and Service Management, Issue 20, 2023, ISSN 1932-4537
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/TNSM.2023.3254581

Encryption as a Service (EaaS): Introducing the Full-Cloud-Fog Architecture for Enhanced Performance and Security (opens in new window)

Author(s): Amir Javadpour, Forough Ja’fari, Tarik Taleb, Chafika Benzaïd, Yang Bin, Yue Zhao
Published in: IEEE Internet of Things Journal, Issue 11, 2024, ISSN 2327-4662
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/JIOT.2024.3450192

AI/ML for Beyond 5G Systems: Concepts, Technology Enablers & Solutions (opens in new window)

Author(s): Tarik Taleb, Chafika Benzaïd, Rami Akrem Addad, Konstantinos Samdanis
Published in: Elsevier Computer Networks, 2023, ISSN 1872-7069
Publisher: ScienceDirect
DOI: 10.1016/j.comnet.2023.110044

Enhancing federated intrusion detection through LLM-Driven alert enrichment and collaborative threat information sharing (opens in new window)

Author(s): Pablo Fernández Saura, Jorge Bernal Bernabé, Antonio Skármeta Gómez
Published in: Future Generation Computer Systems, Issue 178, 2026, ISSN 0167-739X
Publisher: Elsevier BV
DOI: 10.1016/J.FUTURE.2025.108319

Enhancing Honeynet-based Protection with Network Slicing for Massive Pre-6G IoT Smart Cities Deployments (opens in new window)

Author(s): AM Escolar, Q Wang, JMA Calero
Published in: Journal of Network and Computer Applications, 2024, ISSN 1084-8045
Publisher: Elsevier
DOI: 10.1016/j.jnca.2024.103918

Encryption as a Service for IoT: Opportunities, Challenges and Solutions (opens in new window)

Author(s): A. Javadpour, F. Ja’fari, T. Taleb, Y. Zhao, B. Yang and C. Benzaïd,
Published in: IEEE Internet of Things Journal, 2023, ISSN 2327-4662
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/JIOT.2023.3341875

Infrastructure-Wide and Intent-Based Networking Dataset for 5G-and-beyond AI-Driven Autonomous Networks (opens in new window)

Author(s): Jimena Andrade-Hoz, Jose M. Alcaraz-Calero, Qi Wang
Published in: Computing and Applications for Wireless and Mobile Networks), 2024, ISSN 1424-8220
Publisher: Sensors
DOI: 10.3390/s24030783

Collaborative Federated Learning for 6G with a Deep Reinforcement Learning based Controlling Mechanism: A DDoS Attack Detection Scenario (opens in new window)

Author(s): S Kianpisheh, T Taleb
Published in: IEEE Transactions on Network and Service Management, 2024, ISSN 1932-4537
Publisher: IEEE
DOI: 10.1109/TNSM.2024.3387987

Privacy-Based Deployments: The Role of DevPrivOps in 6G Mobile Networks (opens in new window)

Author(s): C Silva, VA Cunha, JP Barraca, P Salvador
Published in: IEEE Communications Magazine, 2024, ISSN 0163-6804
Publisher: IEEE
DOI: 10.1109/MCOM.004.2300405

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0