Browsing by Person sous

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  

Showing results 2 to 10 of 10 < previous 
Issue DateTitleInvolved Person(s)
May-2023Demo: closed-loop security orchestration in the telco cloud for moving target defenseSoussi, Wissem; Christopoulou, Maria; Xilouris, George; Oca, Edgardo Montes de; Lefebvre, Vincent, et al
2022ETSI ZSM driven security management in future networksChollon, Geoffrey; Ayed, Dhouha; Garriga, Rodrigo Asensio; Zarca, Alejandro Molina; Skarmeta, Antonio, et al
2022Graph based liability analysis for the microservice architectureKalinagac, Onur; Soussi, Wissem; Gür, Gürkan
Jun-2023IoMiRCA : root cause analysis in IoT-extended 5G microservice environmentsHeeb, Zeno; Kalinagac, Onur; Soussi, Wissem; Gür, Gürkan
2023MERLINS : moving target defense enhanced with deep-RL for NFV in-depth securitySoussi, Wissem; Christopoulou, Maria; Gür, Gürkan; Stiller, Burkhard
Sep-2021Moving target defense as a proactive defense element for beyond 5GSoussi, Wissem; Christopoulou, Maria; Xilouris, George; Gür, Gürkan
2023Root cause and liability analysis in the microservices architecture for edge IoT servicesKalinagac, Onur; Soussi, Wissem; Anser, Yacine; Gaber, Chrystel; Gür, Gürkan
2022The impact of Manufacturer Usage Description (MUD) on IoT securityHeeb, Zeno; Kalinagac, Onur; Soussi, Wissem; Gür, Gürkan
May-2023TopoFuzzer : a network topology fuzzer for moving target defense in the telco cloudSoussi, Wissem; Christopoulou, Maria; Anagnostopoulos, Themis; Gür, Gürkan; Stiller, Burkhard