356 results on '"Casola, Valentina"'
Search Results
2. Understanding the challenges and novel architectural models of multi-cloud native applications – a systematic literature review
3. Secure software development and testing: A model-based methodology
4. Towards Tracking Data Flows in Cloud Architectures
5. Scrum for safety: an agile methodology for safety-critical software systems
6. Security and Privacy Service Level Agreement composition for Internet of Things systems on top of standard controls
7. Scrum for Safety: Agile Development in Safety-Critical Software Systems
8. A Cloud SecDevOps Methodology: From Design to Testing
9. Combining contextualized word representation and sub-document level analysis through Bi-LSTM+CRF architecture for clinical de-identification
10. Crosslingual named entity recognition for clinical de-identification applied to a COVID-19 Italian data set
11. Automated Risk Analysis for IoT Systems
12. A Proposal of a Cloud-Oriented Security and Performance Simulator Provided as-a-Service
13. A Security Metric Catalogue for Cloud Applications
14. Toward the automation of threat modeling and risk assessment in IoT systems
15. A security monitoring system for internet of things
16. Timing Behavior Characterization of Critical Real-Time Systems through Hybrid Timing Analysis
17. Security SLA in Next Generation Data Centers, the SPECS Approach
18. Towards Model-Based Security Assessment of Cloud Applications
19. Security-by-design in multi-cloud applications: An optimization approach
20. Automatic Test Generation to Improve Scrum for Safety Agile Methodology
21. A Cyber Digital Twin Framework to Support Cyber-Physical Systems Security
22. On the Adoption of Security SLAs in the Cloud
23. Understanding the challenges and novel architectural models of multi-cloud native applications – a systematic literature review
24. Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications
25. An FPGA-Based Smart Classifier for Decision Support Systems
26. A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices
27. Automated Risk Analysis for IoT Systems
28. A Proposal of a Cloud-Oriented Security and Performance Simulator Provided as-a-Service
29. Monitoring Data Security in the Cloud: A Security SLA-Based Approach
30. Contributors
31. A Probabilistic Framework for Distributed Localization of Attackers in MANETs
32. Towards Automatic Generation of Hardware Classifiers
33. Performance Evaluation of Video Analytics for Surveillance On-Board Trains
34. Wireless Energy Meters for Distributed Energy Efficiency Applications
35. Security and Performance Trade-off in PerfCloud
36. An Innovative Framework for Securing Unstructured Documents
37. Access Control in Cloud-on-Grid Systems: The PerfCloud Case Study
38. A Memory Protection Strategy for Resource Constrained Devices in Safety Critical Applications
39. Guest Editorial: Advanced Computing and Blockchain Applications for Critical Industrial IoT
40. PerfCloud: Performance-Oriented Integration of Cloud and GRID
41. A Service-Based Architecture for the Interoperability of Heterogeneous Sensor data: A Case Study on Early Warning
42. A Reference Architecture for Sensor Networks Integration and Management
43. A Security Metric Catalogue for Cloud Applications
44. Towards Model-Based Security Assessment of Cloud Applications
45. Building Autonomic and Secure Service Oriented Architectures with MAWeS
46. Interoperable Grid PKIs Among Untrusted Domains: An Architectural Proposal
47. A SLA evaluation methodology in Service Oriented Architectures
48. Design of Policy-Based Security Mechanisms in a Distributed Web Services Architecture
49. An Innovative Policy-Based Cross Certification Methodology for Public Key Infrastructures
50. The CloudGrid approach: Security analysis and performance evaluation
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.