Search

Your search keyword '"Casola, Valentina"' showing total 356 results

Search Constraints

Start Over You searched for: Author "Casola, Valentina" Remove constraint Author: "Casola, Valentina"
356 results on '"Casola, Valentina"'

Search Results

151. Design of Policy-Based Security Mechanisms in a Distributed Web Services Architecture.

152. An Innovative Policy-Based Cross Certification Methodology for Public Key Infrastructures.

154. A semantic approach for fine-grain access control of e-health documents.

155. Cooperative 3D Air Quality Assessment with Wireless Chemical Sensing Networks.

158. Hacking Goals: A Goal-Centric Attack Classification Framework

159. Inspecting Code Churns to Prioritize Test Cases

160. Automated Transition Coverage in Behavioural Conformance Testing

161. A Comparative Study on Combinatorial and Random Testing for Highly Configurable Systems

162. Automatic Fairness Testing of Machine Learning Models

163. Architecture Based on Keyword Driven Testing with Domain Specific Language for a Testing System

164. Using an SMT Solver for Checking the Completeness of FSM-Based Tests

165. An Executable Mechanised Formalisation of an Adaptive State Counting Algorithm

166. Methods for Live Testing of Cloud Services

167. A Technique for Parallel GUI Testing of Android Applications

168. Trigger Alarm: A Smart NFC Sniffer for High-Precision Measurements

169. Measurement-Based Analysis of a DoS Defense Module for an Open Source Web Server

170. Trust Is in the Air: A New Adaptive Method to Evaluate Mobile Wireless Networks

171. About the Robustness and Looseness of Yara Rules

172. APPregator: A Large-Scale Platform for Mobile Security Analysis

173. Vulsploit: A Module for Semi-automatic Exploitation of Vulnerabilities

174. Interrogating Virtual Agents: In Quest of Security Vulnerabilities

175. Enabling Next-Generation Cyber Ranges with Mobile Security Components

176. Learning Abstracted Non-deterministic Finite State Machines

177. Giving a Model-Based Testing Language a Formal Semantics via Partial MAX-SAT

178. Using Model Learning for the Generation of Mock Components

179. A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services

180. A Memory Protection Strategy for Resource Constrained Devices in Safety Critical Applications

181. Security and Privacy Service Level Agreement composition for Internet of Things systems on top of standard controls

182. Security-aware Deployment Optimization of Cloud-Edge systems in Industrial IoT

183. Security-by-design in multi-cloud applications: An optimization approach

184. A proposal of a cloud-oriented security and performance simulator provided as-a-service

185. Toward the automation of threat modeling and risk assessment in IoT systems

186. A security monitoring system for internet of things

187. Towards automated penetration testing for cloud applications

188. A security SLA-driven moving target defense framework to secure cloud applications

189. Per-service security SLAs for cloud security management: Model and implementation

190. Security SLA in Next Generation Data Centers, the SPECS Approach

191. Automatically Enforcing Security SLAs in the Cloud

192. A security metric catalogue for cloud applications

193. Towards Model-Based Security Assessment of Cloud Applications

194. Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications

195. Per-service security sla: A new model for security management in clouds

196. SLA-based secure cloud application development

197. Providing security SLA in next generation Data Centers with SPECS: The EMC case study

198. Healthcare-Related Data in the Cloud: Challenges and Opportunities

199. SLA-Driven Monitoring of Multi-cloud Application Components Using the MUSA Framework

200. SLA-Based Secure Cloud Application Development: The SPECS Framework

Catalog

Books, media, physical & digital resources