Skip to main content
Weiter zur Homepage der Europäischen Kommission (öffnet in neuem Fenster)
Deutsch Deutsch
CORDIS - Forschungsergebnisse der EU
CORDIS

secuRe desIGn and deplOyment of trUsthwoRthy cOntinUum computing 6G Services

CORDIS bietet Links zu öffentlichen Ergebnissen und Veröffentlichungen von HORIZONT-Projekten.

Links zu Ergebnissen und Veröffentlichungen von RP7-Projekten sowie Links zu einigen Typen spezifischer Ergebnisse wie Datensätzen und Software werden dynamisch von OpenAIRE abgerufen.

Leistungen

Design plan of the Multi-domain automated security orchestration, trust-management and deployment (öffnet in neuem Fenster)

D3.1 Design plan of the multi-domain automated security orchestration, trust-management and deployment - This deliverable will report the initial outcomes coming from all the tasks in WP3, including the first analysis and design of the enablers and components for automated security orchestration, the design of the human-centric tools, open security and privacy models, the trust management as well as end-to-end slicing across multiple domains and network segments. [M12, R, PU, UWS]

Platform Prototype Integration and In-lab testing 1 (öffnet in neuem Fenster)

D5.1 Platform Prototype Integration and In-lab testing - This deliverable will report on the work to be conducted in Task T5.1 and T5.2. It will focus on the methodology for testing and integration, the first set of in-lab experiments and results of achieved with the first prototype. [M18, R, PU, ONE]

First results of the Multi-domain automated security orchestration, trust-management and deployment (öffnet in neuem Fenster)

D3.2 First results of the multi-domain automated security orchestration, trust-management and deployment - This deliverable will report the scientific outcomes from the four tasks as well as the implementation aspects of the trust manager, AI-driven orchestrator, End-to-End multi-domain Slice Manager and the Human-Centric DevSecOps tools [M18, R, PU, LNVO]

Dissemination and Communication Plan (öffnet in neuem Fenster)

D6.2 Dissemination and Communication Plan -The deliverable reports the complete plan of activities towards dissemination, and impact assessment to be carried during the project duration, as part of Task 6.1. For each of the dissemination methods, the timeline, strategic approach, will be defined to promote coordinated dissemination activities, [M06, R, PU, ITAv]

RIGOUROUS Use-Cases (öffnet in neuem Fenster)

D2.2 - RIGOUROUS Use-Cases –This deliverable will report the specifications of the RIGOUROUS Use-cases and the Validation Scenarios as well as the Use-Cases functional requirements. [M12, R, PU, ICT-FI]

Design plan of the AI-driven anomaly detection, decision and mitigation (öffnet in neuem Fenster)

D4.1 Design plan of the AI-driven anomaly detection, decision and mitigation -This deliverable will report the initial outcomes coming from all the tasks in WP4, including the first analysis and design of the enablers and components for AI-driven anomaly detection, decision and mitigation. [M12, R, PU, OULU]

First results of the AI-driven anomaly detection, decision and mitigation (öffnet in neuem Fenster)

D4.2 First results of the AI-driven anomaly detection, decision and mitigation -This deliverable will report the scientific outcomes from the four tasks as well as the implementation aspects of the relevant AI-driven anomaly detection, decision and mitigation components and enablers. [M18, R, PU, eBOS]

System Requirements Analysis Report and first architecture design (öffnet in neuem Fenster)

D2.1 - System Requirements Analysis Report and first architecture design–This deliverable will report all activities and results associated with T2.1 and T2.3, specifically a detailed list of functional and technical requirements for RIGOUROUS and first design of the RIGOUROUS architecture, interfaces and processes flows. [M9, R, PU, ORO]

Project website (öffnet in neuem Fenster)

D6.1 Project website -This deliverable will result in the project website, made available to the public, establishing presence in the relevant social networks, and a set of guidelines for partners to engage with the website and social channels. [M03, DEC, PU, UMU]

Veröffentlichungen

Handling imbalanced 5G and beyond network tabular data using conditional generative models (öffnet in neuem Fenster)

Autoren: Jimena Andrade-Hoz, Jose M. Alcaraz-Calero, Qi Wang
Veröffentlicht in: The 20th International Wireless Communications & Mobile Computing Conference, 2024, ISSN 2376-6506
Herausgeber: IEEE
DOI: 10.1109/IWCMC61514.2024.10592409

Privacy-preserving Attribute Based Credentials for 6G Networks (öffnet in neuem Fenster)

Autoren: """ Kunz, Andreas Asensio-Garriga, Rodrigo Garcia, Jesus Bernabe, Jorge Bernal Skarmeta Gomez, Antonio Fernando Baskaran, Sheeba Backia Mary Paul, Souvik"""
Veröffentlicht in: Future Networks World Forum 2024 (FNWF 2024), 2024
Herausgeber: IEEE
DOI: 10.5281/zenodo.13981324

3D-PM: A ML-powered Probabilistic Detection of DDoS Attacks in P4 Switches (öffnet in neuem Fenster)

Autoren: Ferhat Mecerhed, Khaled Zeraoulia, Chafika Benzaid, Amel Benabdallah
Veröffentlicht in: Proc. of the 2023 IEEE International Mediterranean Conference on Communications and Networking (MeditCom), 2023, ISBN 979-8-3503-3373-2
Herausgeber: IEEE
DOI: 10.1109/MeditCom58224.2023.10266635

Enhancing 5G Network Slicing: Slice Isolation via Actor-Critic Reinforcement Learning with Optimal Graph Features (öffnet in neuem Fenster)

Autoren: A. Javadpour, F. Ja'fari, T. Taleb and C. Benzaïd
Veröffentlicht in: Proc. of IEEE Globecom’23, 2023, ISSN 2576-6813
Herausgeber: IEEE
DOI: 10.1109/GLOBECOM54140.2023.10437687

Moving Target Defense based Secured Network Slicing System in the O-RAN Architecture (öffnet in neuem Fenster)

Autoren: M. K. Motalleb, C. Benzaid, T. Taleb and V. Shah-Mansouri
Veröffentlicht in: Proc. of IEEE Globecom’23, 2023, ISSN 2576-6813
Herausgeber: IEEE
DOI: 10.1109/GLOBECOM54140.2023.10437795

Cybersecurity Fusion: Leveraging Mafia Game Tactics and Reinforcement Learning for Botnet Detection

Autoren: A. Javadpour, F. Ja'fari, T. Taleb, H. Ahmadi and C. Benzaïd,
Veröffentlicht in: Proc. of IEEE Globecom’23, 2024, ISSN 2576-6813
Herausgeber: IEEE

Federated Network Intelligence Orchestration for scalable and automated FL-based anomaly detection in B5G Networks

Autoren: Pablo Fernández Saura, José Manuel Bernabé Murcia, Alejandro Molina Zarca, Jorge Bernal Bernabé, Antonio Skarmeta
Veröffentlicht in: FNWF'23 - IEEE Future Networks World Forum 2023, 2023, ISSN 2770-7679
Herausgeber: IEEE

A novel approach for continual and federated network anomaly detection (öffnet in neuem Fenster)

Autoren: Pedro R. Tomas, Pedro Felix, Andre S. Gomes, Luis Cordeiro
Veröffentlicht in: FTC 2024 - Future Technologies Conference 2024 - Technology Conference - SAI Conferences, 2024, ISSN 2583-9888
Herausgeber: Springer
DOI: 10.51219/JAIMLD/joseph-aaron-tsapa/82

"""A Multi-Layered Zero Trust Microsegmentation Solution for Cloud-Native 5G & Beyond Networks""" (öffnet in neuem Fenster)

Autoren: Chafika Benzaid, Nawal Guerd, Nour El Houda Rehouma, Khaled Zaraoulia, and Tarik Taleb
Veröffentlicht in: IEEE Wireless Communications and Networking Conference (WCNC), 2025
Herausgeber: IEEE
DOI: 10.5281/zenodo.14699793

A Federated Continual Learning Framework for Sustainable Network Anomaly Detection in O-RAN (öffnet in neuem Fenster)

Autoren: C Benzaïd, FM Hossain, T Taleb, PM Gómez, M Dieudonne
Veröffentlicht in: 2024 IEEE Wireless Communications and Networking Conference (WCNC), 2024, ISSN 1558-2612
Herausgeber: IEEE
DOI: 10.1109/WCNC57260.2024.10570951

Lecture Notes in Computer Science (öffnet in neuem Fenster)

Autoren: A Javadpour, F Ja'fari, T Taleb
Veröffentlicht in: Distributed Applications and Interoperable Systems, 2024, ISSN 0302-9743
Herausgeber: Springer
DOI: 10.1007/978-3-031-62638-8_3

Process Slicing: A New Mitigation Tool for Cyber-attacks against Softwarised Industrial Environments (öffnet in neuem Fenster)

Autoren: Angel M. Gama GarciaJose M. Alcaraz CaleroHiginio Mora MoraQi Wang
Veröffentlicht in:  2023 IEEE 9th International Conference on Network Softwarization (NetSoft), 2023, ISSN 2693-9789
Herausgeber: IEEE
DOI: 10.1109/NetSoft57336.2023.10175447

Deploying Testbed Docker-based application for Encryption as a Service in Kubernetes (öffnet in neuem Fenster)

Autoren: Amir Javadpour, Forough Ja’Fari, Tarik Taleb, Chafika Benzaïd, Luis Rosa, Pedro Tomás, Luis Cordeiro
Veröffentlicht in: 2024 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 2024
Herausgeber: IEEE
DOI: 10.23919/SoftCOM62040.2024.10721658

A novel buffered federated learning framework for privacy-driven anomaly detection in IIoT (öffnet in neuem Fenster)

Autoren: Samira Kamali Poorazad, Chafika Benzaid, Tarik Taleb
Veröffentlicht in: IEEE Global Communications Conference (GLOBECOM 2024), 2024
Herausgeber: IEEE
DOI: 10.48550/arXiv.2408.08722

Federated Network Intelligence Orchestration for scalable and automated FL-based anomaly detection in B5G Networks (öffnet in neuem Fenster)

Autoren: Jayasinghe, Suwani
Veröffentlicht in: IEEE Future Networks World Forum 2023 (FNWF'23), 2023, ISSN 2770-7679
Herausgeber: IEEE
DOI: 10.1109/FNWF58287.2023.10520615

A Deep Transfer Learning-powered EDoS Detection Mechanism for 5G and Beyond Network Slicing (öffnet in neuem Fenster)

Autoren: C. Benzaïd, T. Taleb, A. Sami and O. Hireche,
Veröffentlicht in: Proc. of IEEE Globecom’23, 2023, ISSN 2576-6813
Herausgeber: IEEE communications society
DOI: 10.1109/GLOBECOM54140.2023.10436891

A Network Security Insight based on AI/ML for 5G Advanced & Beyond (öffnet in neuem Fenster)

Autoren: Kunz, A., Baskaran, S. B. M., Samdanis, K., & Paul, S.
Veröffentlicht in: IEEE Future Networks World Forum 2023 (FNWF'23), 2023, ISSN 2770-7679
Herausgeber: IEEE
DOI: 10.1109/FNWF58287.2023.10520559

A Mathematical Model for Analyzing Honeynets and Their Cyber Deception Techniques (öffnet in neuem Fenster)

Autoren: A. Javadpour, F. Ja’Fari, T. Taleb and C. Benzaïd
Veröffentlicht in: Proc. of the 27th Int’l Conf. On Engineering of Complex Computer Systems, 2023, ISSN 2770-8535
Herausgeber: IEEE
DOI: 10.1109/ICECCS59891.2023.00019

Blockchain and Deep Learning-Based IDS for Securing SDN-Enabled Industrial IoT Environments (öffnet in neuem Fenster)

Autoren: S. K. Poorazad, C. Benzaïd and T. Taleb
Veröffentlicht in: Proc. of IEEE Globecom’23, 2023, ISSN 2576-6813
Herausgeber: IEEE
DOI: 10.1109/GLOBECOM54140.2023.10436839

FortisEDoS: A Deep Transfer Learning-empowered Economical Denial of Sustainability Detection Framework for Cloud-Native Network Slicing (öffnet in neuem Fenster)

Autoren: Chafika Benza¨ıd∗, Tarik Taleb∗, Ashkan Sami†,‡and Othmane Hireche
Veröffentlicht in: IEEE Transactions on Dependable and Secure Computing (TDSC), 2023, ISSN 1545-5971
Herausgeber: IEEE Computer Society
DOI: 10.1109/TDSC.2023.3318606

A Comprehensive Survey on Cyber Deception Techniques to Improve Honeypot Performance (öffnet in neuem Fenster)

Autoren: A Javadpour, F Ja'fari, T Taleb, M Shojafar, C Benzaïd
Veröffentlicht in: Computers & Security, 2024, ISSN 1872-6208
Herausgeber: Elsevier
DOI: 10.1016/j.cose.2024.103792

Distributed dual-layer autonomous closed loops for self-protection of 5G/6G IoT networks from distributed denial of service attacks (öffnet in neuem Fenster)

Autoren: Benlloch-Caballero, P., Wang, Q., & Alcaraz-Calero, J. M.
Veröffentlicht in: Elsevier Computer Networks, 2023, ISSN 1872-7069
Herausgeber: Elsevier BV
DOI: 10.1016/j.comnet.2022.109526

Reinforcement Learning-Based Slice Isolation Against DDoS Attacks in Beyond 5G Networks (öffnet in neuem Fenster)

Autoren: Amir Javadpour, Forough Ja’fari, Tarik Taleb, Chafika Benzaïd
Veröffentlicht in: IEEE Transactions on Network and Service Management, Ausgabe 20, 2023, ISSN 1932-4537
Herausgeber: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/TNSM.2023.3254581

Encryption as a Service (EaaS): Introducing the Full-Cloud-Fog Architecture for Enhanced Performance and Security (öffnet in neuem Fenster)

Autoren: Amir Javadpour, Forough Ja’fari, Tarik Taleb, Chafika Benzaïd, Yang Bin, Yue Zhao
Veröffentlicht in: IEEE Internet of Things Journal, Ausgabe 11, 2024, ISSN 2327-4662
Herausgeber: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/JIOT.2024.3450192

AI/ML for Beyond 5G Systems: Concepts, Technology Enablers & Solutions (öffnet in neuem Fenster)

Autoren: Tarik Taleb, Chafika Benzaïd, Rami Akrem Addad, Konstantinos Samdanis
Veröffentlicht in: Elsevier Computer Networks, 2023, ISSN 1872-7069
Herausgeber: ScienceDirect
DOI: 10.1016/j.comnet.2023.110044

Enhancing Honeynet-based Protection with Network Slicing for Massive Pre-6G IoT Smart Cities Deployments (öffnet in neuem Fenster)

Autoren: AM Escolar, Q Wang, JMA Calero
Veröffentlicht in: Journal of Network and Computer Applications, 2024, ISSN 1084-8045
Herausgeber: Elsevier
DOI: 10.1016/j.jnca.2024.103918

Encryption as a Service for IoT: Opportunities, Challenges and Solutions (öffnet in neuem Fenster)

Autoren: A. Javadpour, F. Ja’fari, T. Taleb, Y. Zhao, B. Yang and C. Benzaïd,
Veröffentlicht in: IEEE Internet of Things Journal, 2023, ISSN 2327-4662
Herausgeber: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/JIOT.2023.3341875

Infrastructure-Wide and Intent-Based Networking Dataset for 5G-and-beyond AI-Driven Autonomous Networks (öffnet in neuem Fenster)

Autoren: Jimena Andrade-Hoz, Jose M. Alcaraz-Calero, Qi Wang
Veröffentlicht in: Computing and Applications for Wireless and Mobile Networks), 2024, ISSN 1424-8220
Herausgeber: Sensors
DOI: 10.3390/s24030783

Collaborative Federated Learning for 6G with a Deep Reinforcement Learning based Controlling Mechanism: A DDoS Attack Detection Scenario (öffnet in neuem Fenster)

Autoren: S Kianpisheh, T Taleb
Veröffentlicht in: IEEE Transactions on Network and Service Management, 2024, ISSN 1932-4537
Herausgeber: IEEE
DOI: 10.1109/TNSM.2024.3387987

Privacy-Based Deployments: The Role of DevPrivOps in 6G Mobile Networks (öffnet in neuem Fenster)

Autoren: C Silva, VA Cunha, JP Barraca, P Salvador
Veröffentlicht in: IEEE Communications Magazine, 2024, ISSN 0163-6804
Herausgeber: IEEE
DOI: 10.1109/MCOM.004.2300405

Suche nach OpenAIRE-Daten ...

Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten

Es liegen keine Ergebnisse vor

Mein Booklet 0 0