Skip to main content
Vai all'homepage della Commissione europea (si apre in una nuova finestra)
italiano italiano
CORDIS - Risultati della ricerca dell’UE
CORDIS

secuRe desIGn and deplOyment of trUsthwoRthy cOntinUum computing 6G Services

CORDIS fornisce collegamenti ai risultati finali pubblici e alle pubblicazioni dei progetti ORIZZONTE.

I link ai risultati e alle pubblicazioni dei progetti del 7° PQ, così come i link ad alcuni tipi di risultati specifici come dataset e software, sono recuperati dinamicamente da .OpenAIRE .

Risultati finali

Design plan of the Multi-domain automated security orchestration, trust-management and deployment (si apre in una nuova finestra)

D3.1 Design plan of the multi-domain automated security orchestration, trust-management and deployment - This deliverable will report the initial outcomes coming from all the tasks in WP3, including the first analysis and design of the enablers and components for automated security orchestration, the design of the human-centric tools, open security and privacy models, the trust management as well as end-to-end slicing across multiple domains and network segments. [M12, R, PU, UWS]

Platform Prototype Integration and In-lab testing 1 (si apre in una nuova finestra)

D5.1 Platform Prototype Integration and In-lab testing - This deliverable will report on the work to be conducted in Task T5.1 and T5.2. It will focus on the methodology for testing and integration, the first set of in-lab experiments and results of achieved with the first prototype. [M18, R, PU, ONE]

First results of the Multi-domain automated security orchestration, trust-management and deployment (si apre in una nuova finestra)

D3.2 First results of the multi-domain automated security orchestration, trust-management and deployment - This deliverable will report the scientific outcomes from the four tasks as well as the implementation aspects of the trust manager, AI-driven orchestrator, End-to-End multi-domain Slice Manager and the Human-Centric DevSecOps tools [M18, R, PU, LNVO]

Dissemination and Communication Plan (si apre in una nuova finestra)

D6.2 Dissemination and Communication Plan -The deliverable reports the complete plan of activities towards dissemination, and impact assessment to be carried during the project duration, as part of Task 6.1. For each of the dissemination methods, the timeline, strategic approach, will be defined to promote coordinated dissemination activities, [M06, R, PU, ITAv]

RIGOUROUS Use-Cases (si apre in una nuova finestra)

D2.2 - RIGOUROUS Use-Cases –This deliverable will report the specifications of the RIGOUROUS Use-cases and the Validation Scenarios as well as the Use-Cases functional requirements. [M12, R, PU, ICT-FI]

Design plan of the AI-driven anomaly detection, decision and mitigation (si apre in una nuova finestra)

D4.1 Design plan of the AI-driven anomaly detection, decision and mitigation -This deliverable will report the initial outcomes coming from all the tasks in WP4, including the first analysis and design of the enablers and components for AI-driven anomaly detection, decision and mitigation. [M12, R, PU, OULU]

First results of the AI-driven anomaly detection, decision and mitigation (si apre in una nuova finestra)

D4.2 First results of the AI-driven anomaly detection, decision and mitigation -This deliverable will report the scientific outcomes from the four tasks as well as the implementation aspects of the relevant AI-driven anomaly detection, decision and mitigation components and enablers. [M18, R, PU, eBOS]

System Requirements Analysis Report and first architecture design (si apre in una nuova finestra)

D2.1 - System Requirements Analysis Report and first architecture design–This deliverable will report all activities and results associated with T2.1 and T2.3, specifically a detailed list of functional and technical requirements for RIGOUROUS and first design of the RIGOUROUS architecture, interfaces and processes flows. [M9, R, PU, ORO]

Project website (si apre in una nuova finestra)

D6.1 Project website -This deliverable will result in the project website, made available to the public, establishing presence in the relevant social networks, and a set of guidelines for partners to engage with the website and social channels. [M03, DEC, PU, UMU]

Pubblicazioni

Handling imbalanced 5G and beyond network tabular data using conditional generative models (si apre in una nuova finestra)

Autori: Jimena Andrade-Hoz, Jose M. Alcaraz-Calero, Qi Wang
Pubblicato in: The 20th International Wireless Communications & Mobile Computing Conference, 2024, ISSN 2376-6506
Editore: IEEE
DOI: 10.1109/IWCMC61514.2024.10592409

Privacy-preserving Attribute Based Credentials for 6G Networks (si apre in una nuova finestra)

Autori: """ Kunz, Andreas Asensio-Garriga, Rodrigo Garcia, Jesus Bernabe, Jorge Bernal Skarmeta Gomez, Antonio Fernando Baskaran, Sheeba Backia Mary Paul, Souvik"""
Pubblicato in: Future Networks World Forum 2024 (FNWF 2024), 2024
Editore: IEEE
DOI: 10.5281/zenodo.13981324

3D-PM: A ML-powered Probabilistic Detection of DDoS Attacks in P4 Switches (si apre in una nuova finestra)

Autori: Ferhat Mecerhed, Khaled Zeraoulia, Chafika Benzaid, Amel Benabdallah
Pubblicato in: Proc. of the 2023 IEEE International Mediterranean Conference on Communications and Networking (MeditCom), 2023, ISBN 979-8-3503-3373-2
Editore: IEEE
DOI: 10.1109/MeditCom58224.2023.10266635

Enhancing 5G Network Slicing: Slice Isolation via Actor-Critic Reinforcement Learning with Optimal Graph Features (si apre in una nuova finestra)

Autori: A. Javadpour, F. Ja'fari, T. Taleb and C. Benzaïd
Pubblicato in: Proc. of IEEE Globecom’23, 2023, ISSN 2576-6813
Editore: IEEE
DOI: 10.1109/GLOBECOM54140.2023.10437687

Moving Target Defense based Secured Network Slicing System in the O-RAN Architecture (si apre in una nuova finestra)

Autori: M. K. Motalleb, C. Benzaid, T. Taleb and V. Shah-Mansouri
Pubblicato in: Proc. of IEEE Globecom’23, 2023, ISSN 2576-6813
Editore: IEEE
DOI: 10.1109/GLOBECOM54140.2023.10437795

Cybersecurity Fusion: Leveraging Mafia Game Tactics and Reinforcement Learning for Botnet Detection

Autori: A. Javadpour, F. Ja'fari, T. Taleb, H. Ahmadi and C. Benzaïd,
Pubblicato in: Proc. of IEEE Globecom’23, 2024, ISSN 2576-6813
Editore: IEEE

Federated Network Intelligence Orchestration for scalable and automated FL-based anomaly detection in B5G Networks

Autori: Pablo Fernández Saura, José Manuel Bernabé Murcia, Alejandro Molina Zarca, Jorge Bernal Bernabé, Antonio Skarmeta
Pubblicato in: FNWF'23 - IEEE Future Networks World Forum 2023, 2023, ISSN 2770-7679
Editore: IEEE

A novel approach for continual and federated network anomaly detection (si apre in una nuova finestra)

Autori: Pedro R. Tomas, Pedro Felix, Andre S. Gomes, Luis Cordeiro
Pubblicato in: FTC 2024 - Future Technologies Conference 2024 - Technology Conference - SAI Conferences, 2024, ISSN 2583-9888
Editore: Springer
DOI: 10.51219/JAIMLD/joseph-aaron-tsapa/82

"""A Multi-Layered Zero Trust Microsegmentation Solution for Cloud-Native 5G & Beyond Networks""" (si apre in una nuova finestra)

Autori: Chafika Benzaid, Nawal Guerd, Nour El Houda Rehouma, Khaled Zaraoulia, and Tarik Taleb
Pubblicato in: IEEE Wireless Communications and Networking Conference (WCNC), 2025
Editore: IEEE
DOI: 10.5281/zenodo.14699793

A Federated Continual Learning Framework for Sustainable Network Anomaly Detection in O-RAN (si apre in una nuova finestra)

Autori: C Benzaïd, FM Hossain, T Taleb, PM Gómez, M Dieudonne
Pubblicato in: 2024 IEEE Wireless Communications and Networking Conference (WCNC), 2024, ISSN 1558-2612
Editore: IEEE
DOI: 10.1109/WCNC57260.2024.10570951

Lecture Notes in Computer Science (si apre in una nuova finestra)

Autori: A Javadpour, F Ja'fari, T Taleb
Pubblicato in: Distributed Applications and Interoperable Systems, 2024, ISSN 0302-9743
Editore: Springer
DOI: 10.1007/978-3-031-62638-8_3

Process Slicing: A New Mitigation Tool for Cyber-attacks against Softwarised Industrial Environments (si apre in una nuova finestra)

Autori: Angel M. Gama GarciaJose M. Alcaraz CaleroHiginio Mora MoraQi Wang
Pubblicato in:  2023 IEEE 9th International Conference on Network Softwarization (NetSoft), 2023, ISSN 2693-9789
Editore: IEEE
DOI: 10.1109/NetSoft57336.2023.10175447

Deploying Testbed Docker-based application for Encryption as a Service in Kubernetes (si apre in una nuova finestra)

Autori: Amir Javadpour, Forough Ja’Fari, Tarik Taleb, Chafika Benzaïd, Luis Rosa, Pedro Tomás, Luis Cordeiro
Pubblicato in: 2024 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 2024
Editore: IEEE
DOI: 10.23919/SoftCOM62040.2024.10721658

A novel buffered federated learning framework for privacy-driven anomaly detection in IIoT (si apre in una nuova finestra)

Autori: Samira Kamali Poorazad, Chafika Benzaid, Tarik Taleb
Pubblicato in: IEEE Global Communications Conference (GLOBECOM 2024), 2024
Editore: IEEE
DOI: 10.48550/arXiv.2408.08722

Federated Network Intelligence Orchestration for scalable and automated FL-based anomaly detection in B5G Networks (si apre in una nuova finestra)

Autori: Jayasinghe, Suwani
Pubblicato in: IEEE Future Networks World Forum 2023 (FNWF'23), 2023, ISSN 2770-7679
Editore: IEEE
DOI: 10.1109/FNWF58287.2023.10520615

A Deep Transfer Learning-powered EDoS Detection Mechanism for 5G and Beyond Network Slicing (si apre in una nuova finestra)

Autori: C. Benzaïd, T. Taleb, A. Sami and O. Hireche,
Pubblicato in: Proc. of IEEE Globecom’23, 2023, ISSN 2576-6813
Editore: IEEE communications society
DOI: 10.1109/GLOBECOM54140.2023.10436891

A Network Security Insight based on AI/ML for 5G Advanced & Beyond (si apre in una nuova finestra)

Autori: Kunz, A., Baskaran, S. B. M., Samdanis, K., & Paul, S.
Pubblicato in: IEEE Future Networks World Forum 2023 (FNWF'23), 2023, ISSN 2770-7679
Editore: IEEE
DOI: 10.1109/FNWF58287.2023.10520559

A Mathematical Model for Analyzing Honeynets and Their Cyber Deception Techniques (si apre in una nuova finestra)

Autori: A. Javadpour, F. Ja’Fari, T. Taleb and C. Benzaïd
Pubblicato in: Proc. of the 27th Int’l Conf. On Engineering of Complex Computer Systems, 2023, ISSN 2770-8535
Editore: IEEE
DOI: 10.1109/ICECCS59891.2023.00019

Blockchain and Deep Learning-Based IDS for Securing SDN-Enabled Industrial IoT Environments (si apre in una nuova finestra)

Autori: S. K. Poorazad, C. Benzaïd and T. Taleb
Pubblicato in: Proc. of IEEE Globecom’23, 2023, ISSN 2576-6813
Editore: IEEE
DOI: 10.1109/GLOBECOM54140.2023.10436839

FortisEDoS: A Deep Transfer Learning-empowered Economical Denial of Sustainability Detection Framework for Cloud-Native Network Slicing (si apre in una nuova finestra)

Autori: Chafika Benza¨ıd∗, Tarik Taleb∗, Ashkan Sami†,‡and Othmane Hireche
Pubblicato in: IEEE Transactions on Dependable and Secure Computing (TDSC), 2023, ISSN 1545-5971
Editore: IEEE Computer Society
DOI: 10.1109/TDSC.2023.3318606

A Comprehensive Survey on Cyber Deception Techniques to Improve Honeypot Performance (si apre in una nuova finestra)

Autori: A Javadpour, F Ja'fari, T Taleb, M Shojafar, C Benzaïd
Pubblicato in: Computers & Security, 2024, ISSN 1872-6208
Editore: Elsevier
DOI: 10.1016/j.cose.2024.103792

Distributed dual-layer autonomous closed loops for self-protection of 5G/6G IoT networks from distributed denial of service attacks (si apre in una nuova finestra)

Autori: Benlloch-Caballero, P., Wang, Q., & Alcaraz-Calero, J. M.
Pubblicato in: Elsevier Computer Networks, 2023, ISSN 1872-7069
Editore: Elsevier BV
DOI: 10.1016/j.comnet.2022.109526

Reinforcement Learning-Based Slice Isolation Against DDoS Attacks in Beyond 5G Networks (si apre in una nuova finestra)

Autori: Amir Javadpour, Forough Ja’fari, Tarik Taleb, Chafika Benzaïd
Pubblicato in: IEEE Transactions on Network and Service Management, Numero 20, 2023, ISSN 1932-4537
Editore: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/TNSM.2023.3254581

Encryption as a Service (EaaS): Introducing the Full-Cloud-Fog Architecture for Enhanced Performance and Security (si apre in una nuova finestra)

Autori: Amir Javadpour, Forough Ja’fari, Tarik Taleb, Chafika Benzaïd, Yang Bin, Yue Zhao
Pubblicato in: IEEE Internet of Things Journal, Numero 11, 2024, ISSN 2327-4662
Editore: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/JIOT.2024.3450192

AI/ML for Beyond 5G Systems: Concepts, Technology Enablers & Solutions (si apre in una nuova finestra)

Autori: Tarik Taleb, Chafika Benzaïd, Rami Akrem Addad, Konstantinos Samdanis
Pubblicato in: Elsevier Computer Networks, 2023, ISSN 1872-7069
Editore: ScienceDirect
DOI: 10.1016/j.comnet.2023.110044

Enhancing Honeynet-based Protection with Network Slicing for Massive Pre-6G IoT Smart Cities Deployments (si apre in una nuova finestra)

Autori: AM Escolar, Q Wang, JMA Calero
Pubblicato in: Journal of Network and Computer Applications, 2024, ISSN 1084-8045
Editore: Elsevier
DOI: 10.1016/j.jnca.2024.103918

Encryption as a Service for IoT: Opportunities, Challenges and Solutions (si apre in una nuova finestra)

Autori: A. Javadpour, F. Ja’fari, T. Taleb, Y. Zhao, B. Yang and C. Benzaïd,
Pubblicato in: IEEE Internet of Things Journal, 2023, ISSN 2327-4662
Editore: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/JIOT.2023.3341875

Infrastructure-Wide and Intent-Based Networking Dataset for 5G-and-beyond AI-Driven Autonomous Networks (si apre in una nuova finestra)

Autori: Jimena Andrade-Hoz, Jose M. Alcaraz-Calero, Qi Wang
Pubblicato in: Computing and Applications for Wireless and Mobile Networks), 2024, ISSN 1424-8220
Editore: Sensors
DOI: 10.3390/s24030783

Collaborative Federated Learning for 6G with a Deep Reinforcement Learning based Controlling Mechanism: A DDoS Attack Detection Scenario (si apre in una nuova finestra)

Autori: S Kianpisheh, T Taleb
Pubblicato in: IEEE Transactions on Network and Service Management, 2024, ISSN 1932-4537
Editore: IEEE
DOI: 10.1109/TNSM.2024.3387987

Privacy-Based Deployments: The Role of DevPrivOps in 6G Mobile Networks (si apre in una nuova finestra)

Autori: C Silva, VA Cunha, JP Barraca, P Salvador
Pubblicato in: IEEE Communications Magazine, 2024, ISSN 0163-6804
Editore: IEEE
DOI: 10.1109/MCOM.004.2300405

È in corso la ricerca di dati su OpenAIRE...

Si è verificato un errore durante la ricerca dei dati su OpenAIRE

Nessun risultato disponibile

Il mio fascicolo 0 0