Edgardo Montes de Oca

Orcid: 0000-0001-6771-0689

According to our database1, Edgardo Montes de Oca authored at least 53 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Towards Deterministic Communications in 6G Networks: State of the Art, Open Challenges and the Way Forward.
CoRR, 2023

Toward Deterministic Communications in 6G Networks: State of the Art, Open Challenges and the Way Forward.
IEEE Access, 2023

A Network Traffic Mutation Based Ontology, and Its Application to 5G Networks.
IEEE Access, 2023

Demo: Closed-Loop Security Orchestration in the Telco Cloud for Moving Target Defense.
Proceedings of the NOMS 2023, 2023

A Comprehensive P4-based Monitoring Framework for L4S leveraging In-band Network Telemetry.
Proceedings of the NOMS 2023, 2023

Cybersecurity, Monitoring, Explainability and Resilience.
Proceedings of the Fourteenth International Conference on Mobile Computing and Ubiquitous Network, 2023

A deep learning anomaly detection framework with explainability and robustness.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

HTTP/2 Attacks Generation using 5Greplay.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
The Role of Machine Learning in Cybersecurity.
CoRR, 2022

Digital Twin for IoT Environments: A Testing and Simulation Tool.
Proceedings of the Quality of Information and Communications Technology, 2022

Towards improving explainability, resilience and performance of cybersecurity analysis of 5G/IoT networks (work-in-progress paper).
Proceedings of the 15th IEEE International Conference on Software Testing, 2022

A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic.
Proceedings of the 17th International Conference on Software Technologies, 2022

The Owner, the Provider and the Subcontractors: How to Handle Accountability and Liability Management for 5G End to End Service.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
A Framework for Security Monitoring of Real IoT Testbeds.
Proceedings of the 16th International Conference on Software Technologies, 2021

5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Metrics-driven DevSecOps.
Proceedings of the 15th International Conference on Software Technologies, 2020

Using 5G to Bring More than just Bits to Homes.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2020


2019
Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking.
IEEE Trans. Inf. Forensics Secur., 2019

A security monitoring system for internet of things.
Internet Things, 2019

An Orchestrated NDN Virtual Infrastructure Transporting Web Traffic: Design, Implementation, and First Experiments with Real End Users.
IEEE Commun. Mag., 2019

Industrial IoT Security Monitoring and Test on Fed4Fire+ Platforms.
Proceedings of the Testing Software and Systems, 2019

Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Towards Content-Centric Control Plane Supporting Efficient Anomaly Detection Functions.
Proceedings of the 15th International Conference on Network and Service Management, 2019

2018
A Security Monitoring Plane for Named Data Networking Deployment.
IEEE Commun. Mag., 2018

Towards a security monitoring plane for named data networking and its application against content poisoning attack.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Implementation of content poisoning attack detection and reaction in virtualized NDN networks.
Proceedings of the 21st Conference on Innovation in Clouds, 2018

Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
An SDN and NFV Use Case: NDN Implementation and Security Monitoring.
Proceedings of the Guide to Security in SDN and NFV, 2017

Enhancing Security of Software Defined Mobile Networks.
IEEE Access, 2017

Software Defined Monitoring (SDM) for 5G mobile backhaul networks.
Proceedings of the 2017 IEEE International Symposium on Local and Metropolitan Area Networks, 2017

2016
An approach for deploying and monitoring dynamic security policies.
Comput. Secur., 2016

A virtualized and monitored NDN infrastructure featuring a NDN/HTTP gateway.
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 2016

2015
An effective attack detection approach in wireless mesh networks.
Int. J. Space Based Situated Comput., 2015

Dynamic Deployment and Monitoring of Security Policies.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Security for Future Software Defined Mobile Networks.
Proceedings of the 9th International Conference on Next Generation Mobile Applications, 2015

Leveraging LTE security with SDN and NFV.
Proceedings of the 10th IEEE International Conference on Industrial and Information Systems, 2015

SDN and NFV integration in generalized mobile network architecture.
Proceedings of the 2015 European Conference on Networks and Communications, 2015

Self-protecting multi-cloud applications.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
How to Evaluate Trust Using MMT.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
An Effective Attack Detection Approach in Wireless Mesh Networks.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
An advanced approach for modeling and detecting software vulnerabilities.
Inf. Softw. Technol., 2012

A SPIN-based approach for detecting vulnerabilities in C programs.
Autom. Control. Comput. Sci., 2012

Events-Based Security Monitoring Using MMT Tool.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

Network monitoring challenges in the evolved packet core.
Proceedings of the 2012 Future Network & Mobile Summit, Berlin, Germany, July 4-6, 2012, 2012

2011
Using Testing Techniques for Vulnerability Detection in C Programs.
Proceedings of the Testing Software and Systems, 2011

2010
Timed Extended Invariants for the Passive Testing of Web Services.
Proceedings of the IEEE International Conference on Web Services, 2010

2009
A passive conformance testing approach for a MANET routing protocol.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

A Formal Passive Testing Approach to test a MANET Routing Protocol.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

An Automated Passive Testing Approach for the IMS PoC Service.
Proceedings of the ASE 2009, 2009

2008
Two Complementary Tools for the Formal Testing of Distributed Systems with Time Constraints.
Proceedings of the 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, 2008

2003
TestNet: Let's Test Together!.
Proceedings of the Testing of Communicating Systems, 15th IFIP International Conference, 2003


  Loading...