89 results on '"VALENZA, FULVIO"'
Search Results
2. A novel abstraction for security configuration in virtual networks
3. Optimizing distributed firewall reconfiguration transients
4. Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks
5. Automated fixing of access policy implementation in Industrial Networked Systems
6. Classification and Analysis of Communication Protection Policy Anomalies
7. Automatic Firewalls’ Configuration Using Argumentation Reasoning
8. (User-friendly) formal requirements verification in the context of ISO26262
9. Automating VPN Configuration in Computer Networks
10. Formally specifying and checking policies and anomalies in service function chaining
11. A comprehensive approach to the automatic refinement and verification of access control policies
12. Formal Verification of the FDO Protocol
13. Automation for Network Security Configuration: State of the Art and Research Trends
14. Assessing network authorization policies via reachability analysis
15. Automation for Network Security Configuration: State of the Art and Research Trends.
16. Towards the Dynamic Provision of Virtualized Security Services
17. Inter-technology Conflict Analysis for Communication Protection Policies
18. An Optimized Approach for Assisted Firewall Anomaly Resolution
19. Guest Editors Introduction: Special Section on Recent Advances in Network Security Management
20. Security Automation using Traffic Flow Modeling
21. Next Generation of Hybrid Threats
22. A Hybrid Threat Model for Smart Systems
23. Toward Cybersecurity Personalization in Smart Homes
24. Automated firewall configuration in virtual networks
25. A Twofold Model for VNF Embedding and Time-Sensitive Network Flow Scheduling
26. A hybrid threat model for smart systems
27. Towards the Dynamic Provision of Virtualized Security Services
28. Guest editorial: Special issue on novel cyber-security paradigms for software-defined and virtualized systems
29. Automated Firewall Configuration in Virtual Networks
30. A novel approach for security function graph configuration and deployment
31. Improvements in the transmission of data or messages on board a vehicle by means of a SOME/IP communication protocol
32. Improving the Formal Verification of Reachability Policies in Virtualized Networks
33. A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks
34. Short Paper
35. Securing SOME/IP for In-Vehicle Service Protection
36. Protecting In-Vehicle Services: Security-Enabled SOME/IP Middleware
37. Introducing programmability and automation in the synthesis of virtual firewall rules
38. Automated optimal firewall orchestration and configuration in virtualized networks
39. Work-in-Progress: A Formal Approach to Verify Fault Tolerance in Industrial Network Systems
40. Towards a Framework for Automatic Firewalls Configuration via Argumentation Reasoning
41. Perfezionamenti nella trasmissione di dati o messaggi a bordo di un veicolo mediante un protocollo di comunicazione SOME/IP
42. User-oriented Network Security Policy Specification
43. Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions
44. Towards a fully automated and optimized network security functions orchestration
45. Adding Support for Automatic Enforcement of Security Policies in NFV Networks
46. A Framework for Verification-Oriented User-Friendly Network Function Modeling
47. Modelling and Analysis of Network Security Policies
48. Toward attribute-based access control policy in industrial networked systems
49. Classification and Analysis of Communication Protection Policy Anomalies
50. Leveraging SDN to improve security in industrial networks
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.