Wissam Mallouli

According to our database1, Wissam Mallouli authored at least 51 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking.
IEEE Trans. Information Forensics and Security, 2019

A security monitoring system for internet of things.
Internet Things, 2019

Service level agreement-based GDPR compliance and security assurance in (multi)Cloud-based systems.
IET Software, 2019

An Orchestrated NDN Virtual Infrastructure Transporting Web Traffic: Design, Implementation, and First Experiments with Real End Users.
IEEE Communications Magazine, 2019

Industrial IoT Security Monitoring and Test on Fed4Fire+ Platforms.
Proceedings of the Testing Software and Systems, 2019

Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

2018
A Security Monitoring Plane for Named Data Networking Deployment.
IEEE Communications Magazine, 2018

A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System.
Comput. J., 2018

Leveraging NFV for the deployment of NDN: Application to HTTP traffic transport.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Towards a security monitoring plane for named data networking and its application against content poisoning attack.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Enhancing Software Development Process Quality based on Metrics Correlation and Suggestion.
Proceedings of the 13th International Conference on Software Technologies, 2018

Smart Measurements and Analysis for Software Quality Enhancement.
Proceedings of the Software Technologies - 13th International Conference, 2018

Implementation of content poisoning attack detection and reaction in virtualized NDN networks.
Proceedings of the 21st Conference on Innovation in Clouds, 2018

2017
An SDN and NFV Use Case: NDN Implementation and Security Monitoring.
Proceedings of the Guide to Security in SDN and NFV, 2017

Multi-cloud Applications Security Monitoring.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

SLA-Based Continuous Security Assurance in Multi-Cloud DevOps.
Proceedings of the International Workshop on Secure Software Engineering in DevOps and Agile Development co-located with the 22nd European Symposium on Research in Computer Security (ESORICS 2017), 2017

A Platform for Security Monitoring of Multi-cloud Applications.
Proceedings of the Perspectives of System Informatics, 2017

Dynamic security assurance in multi-cloud DevOps.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
An approach for deploying and monitoring dynamic security policies.
Comput. Secur., 2016

An Implementation of a QoE Evaluation Technique Including Business Model Parameters.
Proceedings of the 11th International Joint Conference on Software Technologies (ICSOFT 2016) - Volume 2: ICSOFT-PT, Lisbon, Portugal, July 24, 2016

SLA-Driven Monitoring of Multi-cloud Application Components Using the MUSA Framework.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016

Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016

A virtualized and monitored NDN infrastructure featuring a NDN/HTTP gateway.
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 2016

2015
An effective attack detection approach in wireless mesh networks.
IJSSC, 2015

Dynamic Deployment and Monitoring of Security Policies.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Monitoring-based validation of functional and performance aspects of a greedy ant colony optimization protocol.
Proceedings of the 2015 Latin American Network Operations and Management Symposium, 2015

Self-protecting multi-cloud applications.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
QoE Prediction for Multimedia Services: Comparing Fuzzy and Logic Network Approaches.
IJOCI, 2014

Evaluating Web Service QoE by Learning Logic Networks.
Proceedings of the WEBIST 2014, 2014

How to Evaluate Trust Using MMT.
Proceedings of the Network and System Security - 8th International Conference, 2014

QoE Estimation for Web Service Selection Using a Fuzzy-Rough Hybrid Expert System.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
The Forth International Workshop on Security Testing (SECTEST 2013).
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

2012
A systematic approach to integrate common timed security rules within a TEFSM-based system specification.
Inf. Softw. Technol., 2012

2011
VDC-Based Dynamic Code Analysis: Application to C Programs.
J. Internet Serv. Inf. Secur., 2011

Using Testing Techniques for Vulnerability Detection in C Programs.
Proceedings of the Testing Software and Systems, 2011

2010
Timed Extended Invariants for the Passive Testing of Web Services.
Proceedings of the IEEE International Conference on Web Services, 2010

WebMov: A Dedicated Framework for the Modelling and Testing of Web Services Composition.
Proceedings of the IEEE International Conference on Web Services, 2010

Practical Experience Gained from Passive Testing of Web Based Systems.
Proceedings of the Third International Conference on Software Testing, 2010

2009
An Automated Passive Testing Approach for the IMS PoC Service.
Proceedings of the ASE 2009, 2009

A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification.
Proceedings of the 16th Asia-Pacific Software Engineering Conference, 2009

2008
Modeling and Testing Secure Web-Based Systems: Application to an Industrial Case Study.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

Testing Security Policies for Web Applications.
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008

Security Rules Specification and Analysis Based on Passive Testing.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines.
Proceedings of the 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, 2008

Two Complementary Tools for the Formal Testing of Distributed Systems with Time Constraints.
Proceedings of the 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, 2008

Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking.
Proceedings of the Ad-hoc, Mobile and Wireless Networks, 7th International Conference, 2008

2007
A formal approach for testing security rules.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Testing Security Rules with Decomposable Activities.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

2006
Application of Two Test Generation Tools to an Industrial Case Study.
Proceedings of the Testing of Communicating Systems, 2006

Light Client Management Protocol for Wireless Mesh Networks.
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006


  Loading...