243 results on '"Ana R. Cavalli"'
Search Results
2. Diagnosis Automation Using Similarity Analysis: Application to Industrial Systems.
3. A Survey on Cyber-Resilience Approaches for Cyber-Physical Systems.
4. Towards Smarter Security Orchestration and Automatic Response for CPS and IoT.
5. HTTP/2 Attacks Generation using 5Greplay.
6. Digital Twin for IoT Environments: A Testing and Simulation Tool.
7. Switched-based Control Testbed to Assure Cyber-physical Resilience by Design.
8. Towards improving explainability, resilience and performance of cybersecurity analysis of 5G/IoT networks (work-in-progress paper).
9. Cyber-Resilience Approaches for Cyber-Physical Systems.
10. 5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection.
11. A Framework for Security Monitoring of Real IoT Testbeds.
12. 5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection.
13. SANCUS: Multi-layers Vulnerability Management Framework for Cloud-native 5G networks.
14. Cyber-Resilience Evaluation of Cyber-Physical Systems.
15. From Formal Test Objectives to TTCN-3 for Verifying ETCS Complex Software Control Systems.
16. Verifying Complex Software Control Systems from Test Objectives: Application to the ETCS System.
17. A Methodology for Enterprise Resource Planning Automation Testing Application to the Open Source ERP-ODOO.
18. Attack Tolerance for Services-Based Applications in the Cloud.
19. Industrial IoT Security Monitoring and Test on Fed4Fire+ Platforms.
20. Switched-Based Resilient Control of Cyber-Physical Systems.
21. Smart Measurements and Analysis for Software Quality Enhancement.
22. Design of a Secure Shield for Internet and Web-Based Services Using Software Reflection.
23. Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications.
24. Decreasing the complexity of deriving test suites against nondeterministic finite state machines.
25. A Study of Threat Detection Systems and Techniques in the Cloud.
26. An Attack-Tolerant Framework for Web Services.
27. Automatic Derivation and Validation of a Cloud Dataset for Insider Threat Detection.
28. Model-Based Attack Tolerance.
29. How Web Services Can Be Tolerant to Intruders through Diversification.
30. Multi-cloud Applications Security Monitoring.
31. A Platform for Security Monitoring of Multi-cloud Applications.
32. A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System.
33. Optimizing network utilization through source code state model representation.
34. A Framework to Reduce the Cost of Monitoring and Diagnosis Using Game Theory.
35. An Implementation of a QoE Evaluation Technique Including Business Model Parameters.
36. An Analysis of Secure M2M Communication in WSNs Using DTLS.
37. Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach.
38. A Misbehavior Node Detection Algorithm for 6LoWPAN Wireless Sensor Networks.
39. QoE-Driven Service Optimization Aware of the Business Model.
40. Network Monitoring Using MMT: An Application Based on the User-Agent Field in HTTP Headers.
41. Effectively Testing of Timed Composite Systems using Test Case Prioritization.
42. Opportunistic media sharing for mobile networks.
43. Improving Protocol Passive Testing through 'Gedanken' Experiments with Finite State Machines.
44. Path sampling, a robust alternative to gossiping for opportunistic network routing.
45. A novel monitoring solution for 6LoWPAN-based Wireless Sensor Networks.
46. Process Mining for Trust Monitoring.
47. QoE Evaluation Based on QoS and QoBiz Parameters Applied to an OTT Service.
48. An Active Testing Tool for Security Testing of Distributed Systems.
49. An Abstraction for the Interoperability Analysis of Security Policies.
50. Monitoring-based validation of functional and performance aspects of a greedy ant colony optimization protocol.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.