Sfoglia per Autore
A generic overall framework for network security evaluation
2005 Atzeni, Andrea; Lioy, Antonio; Tamburino, Lucia
The wireless opaque channel to contrast information leakage
2005 Aime, MARCO DOMENICO; Atzeni, Andrea; Lioy, Antonio
Why to adopt a security metric? A little survey
2005 Atzeni, Andrea; Lioy, Antonio
Opaque channel: contrasting information leakage in wireless scenarios
2006 Aime, MARCO DOMENICO; Atzeni, Andrea
Public Key Infrastructure - theory and practice
2006 Atzeni, Andrea; Lioy, Antonio
AMBRA - Automated Model-Based Risk Analysis
2007 Aime, MARCO DOMENICO; Atzeni, Andrea; Pomi, PAOLO CARLO
An estimation of attack surface to evaluate network (in)security
2007 Atzeni, Andrea; Lioy, Antonio
The Risks With Security Metrics
2008 Aime, MARCO DOMENICO; Atzeni, Andrea; Pomi, PAOLO CARLO
Generation of Diagnostic Plans for Large ICT Systems
2008 Aime, MARCO DOMENICO; Atzeni, Andrea
Learning to enhance dependability of information systems
2008 Aime, MARCO DOMENICO; Atzeni, Andrea; Pomi, PAOLO CARLO
Toward a formal framework to evaluate wireless sensor network security
2009 ABOU EL KALAM, A; Atzeni, Andrea; Cappadonia, Alberto; Cesena, Emanuele; FISCHER HUBNER, S; Lindskog, S; Martucci, L. A.; Pastrone, C.
Problemi di sicurezza delle comunicazioni a distanza
2009 Atzeni, Andrea
Here's Johnny: a methodology for developing attacker personas
2011 Atzeni, Andrea; Faily, S.; Lyle, J.; Cameroni, Cesare; Flechais, I.
Requirements Sensemaking using Concept Maps
2012 Faily, S.; Lyle, J.; Paul, A.; Atzeni, Andrea; Blomme, D.; Desruelle, H.; Bangalore, K.
Model-driven architectural risk analysis using architectural and contextualised attack patterns
2012 Faily, S.; Lyle, J.; Namiluko, C.; Atzeni, Andrea; Cameroni, Cesare
Personal PKI for the smart device era
2013 Lyle, J.; Paverd, A.; King Lacroix, J.; Atzeni, Andrea; Virji, H.; Flechais, I.; Faily, S.
Policies in Context: Factors Influencing the Elicitation and Categorisation of Context−Sensitive Security Policies
2013 Faily, S.; Lyle, J.; Flechais, I.; Atzeni, Andrea; Cameroni, Cesare; Myrhaug, H.; Goker, A.; Kleinfeld, R.
Continuous integration for web-based software infrastructures: lessons learned on the webinos project
2013 Su, Tao; Lyle, J.; Atzeni, Andrea; Faily, S.; Virji, H.; Ntanos, C.; Botsikas, C.
Developing secure‚ unified multi−device and multi−domain platforms: a case study from the webinos project
2014 Atzeni, Andrea; Lyle, J.; Faily, S.
Lightweight Formal Verification in Real World, A Case Study
2014 Atzeni, Andrea; Su, Tao; Montanaro, Teodoro
Citazione | Data di pubblicazione | Autori | File |
---|---|---|---|
A generic overall framework for network security evaluation / Atzeni, Andrea; Lioy, Antonio; Tamburino, Lucia. - STAMPA. - (2005), pp. 605-615. (Intervento presentato al convegno AICA-2005 tenutosi a Udine (Italy) nel October 5-7, 2005). | 1-gen-2005 | ATZENI, ANDREALIOY, ANTONIOTAMBURINO, Lucia | - |
The wireless opaque channel to contrast information leakage / Aime, MARCO DOMENICO; Atzeni, Andrea; Lioy, Antonio. - STAMPA. - 3:(2005), pp. 570-575. (Intervento presentato al convegno WoWMoM-2005, IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks tenutosi a Taormina, Italy nel June 13-16, 2005) [10.1109/WOWMOM.2005.104]. | 1-gen-2005 | AIME, MARCO DOMENICOATZENI, ANDREALIOY, ANTONIO | - |
Why to adopt a security metric? A little survey / Atzeni, Andrea; Lioy, Antonio. - STAMPA. - (2005), pp. 1-12. (Intervento presentato al convegno QoP-2005: Quality of Protection workshop tenutosi a Milano (Italy) nel September 15, 2005) [10.1007/978-0-387-36584-8_1]. | 1-gen-2005 | ATZENI, ANDREALIOY, ANTONIO | - |
Opaque channel: contrasting information leakage in wireless scenarios / Aime, MARCO DOMENICO; Atzeni, Andrea. - STAMPA. - (2006), pp. 481-490. (Intervento presentato al convegno AICA-2006 tenutosi a Cesena (Italy) nel September 21-22, 2006). | 1-gen-2006 | AIME, MARCO DOMENICOATZENI, ANDREA | - |
Public Key Infrastructure - theory and practice / Atzeni, Andrea; Lioy, Antonio. - (2006), pp. 1-261. | 1-gen-2006 | ATZENI, ANDREALIOY, ANTONIO | - |
AMBRA - Automated Model-Based Risk Analysis / Aime, MARCO DOMENICO; Atzeni, Andrea; Pomi, PAOLO CARLO. - STAMPA. - (2007), pp. 43-48. (Intervento presentato al convegno QoP-2007, ACM workshop on Quality of Protection tenutosi a Alexandria, VA, USA nel October 29, 2007) [10.1145/1314257.1314272]. | 1-gen-2007 | AIME, MARCO DOMENICOATZENI, ANDREAPOMI, PAOLO CARLO | - |
An estimation of attack surface to evaluate network (in)security / Atzeni, Andrea; Lioy, Antonio. - STAMPA. - (2007), pp. 493-498. (Intervento presentato al convegno ICEIS 2007 - 9th International Conference on Enterprise Information Systems tenutosi a Funchal (Portugal) nel 12-16 June 2007). | 1-gen-2007 | ATZENI, ANDREALIOY, ANTONIO | - |
The Risks With Security Metrics / Aime, MARCO DOMENICO; Atzeni, Andrea; Pomi, PAOLO CARLO. - STAMPA. - (2008), pp. 65-70. (Intervento presentato al convegno QoP 2008, ACM Workshop on Quality of Protection tenutosi a Alexandria, VA, USA nel 27 Oct 2008) [10.1145/1456362.1456376]. | 1-gen-2008 | AIME, MARCO DOMENICOATZENI, ANDREAPOMI, PAOLO CARLO | - |
Generation of Diagnostic Plans for Large ICT Systems / Aime, MARCO DOMENICO; Atzeni, Andrea. - STAMPA. - (2008), pp. 344-349. (Intervento presentato al convegno Second International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE'08) tenutosi a Cap Esterel, France nel August 25-31, 2008) [10.1109/SECURWARE.2008.56]. | 1-gen-2008 | AIME, MARCO DOMENICOATZENI, ANDREA | - |
Learning to enhance dependability of information systems / Aime, MARCO DOMENICO; Atzeni, Andrea; Pomi, PAOLO CARLO. - STAMPA. - (2008), pp. 483-484. (Intervento presentato al convegno SASO 2008, IEEE International Conference on Self-Adaptive and Self-Organizing Systems tenutosi a Venezia nel October 20-24, 2008) [10.1109/SASO.2008.50]. | 1-gen-2008 | AIME, MARCO DOMENICOATZENI, ANDREAPOMI, PAOLO CARLO | - |
Toward a formal framework to evaluate wireless sensor network security / ABOU EL KALAM, A; Atzeni, Andrea; Cappadonia, Alberto; Cesena, Emanuele; FISCHER HUBNER, S; Lindskog, S; Martucci, L. A.; Pastrone, C.. - (2009). | 1-gen-2009 | ATZENI, ANDREACAPPADONIA, ALBERTOCESENA, EMANUELE + | - |
Problemi di sicurezza delle comunicazioni a distanza / Atzeni, Andrea - In: Nuove tecnologie e processo penaleTURIN : Giappichelli Editore, 2009. - ISBN 9788834877982. - pp. 102-108 | 1-gen-2009 | ATZENI, ANDREA | - |
Here's Johnny: a methodology for developing attacker personas / Atzeni, Andrea; Faily, S.; Lyle, J.; Cameroni, Cesare; Flechais, I.. - STAMPA. - (2011), pp. 722-727. (Intervento presentato al convegno ARES-2011: 6th Int. Conf. on Availability, Reliability and Security tenutosi a Vienna (Austria) nel 22-26 August 2011) [10.1109/ARES.2011.115]. | 1-gen-2011 | ATZENI, ANDREACAMERONI, CESARE + | - |
Requirements Sensemaking using Concept Maps / Faily, S.; Lyle, J.; Paul, A.; Atzeni, Andrea; Blomme, D.; Desruelle, H.; Bangalore, K.. - STAMPA. - 7623:(2012), pp. 217-232. (Intervento presentato al convegno HCSE-2012: 4th International Conference on Human-Centred Software Engineering tenutosi a Toulouse (France) nel October 29-31, 2012) [10.1007/978-3-642-34347-6_13]. | 1-gen-2012 | ATZENI, ANDREA + | - |
Model-driven architectural risk analysis using architectural and contextualised attack patterns / Faily, S.; Lyle, J.; Namiluko, C.; Atzeni, Andrea; Cameroni, Cesare. - (2012). (Intervento presentato al convegno MDSec 2012: Workshop on Model-Driven Security, at the 15th ACM/IEEE International Conference on Model Driven Engineering Languages and System tenutosi a Innsbruck (Austria) nel October 1-5, 2012) [10.1145/2422498.2422501]. | 1-gen-2012 | ATZENI, ANDREACAMERONI, CESARE + | - |
Personal PKI for the smart device era / Lyle, J.; Paverd, A.; King Lacroix, J.; Atzeni, Andrea; Virji, H.; Flechais, I.; Faily, S.. - STAMPA. - (2013), pp. 69-84. (Intervento presentato al convegno 9th European Workshop EuroPKI 2012 tenutosi a Pisa (Italy) nel September 13-14, 2012). | 1-gen-2013 | ATZENI, ANDREA + | - |
Policies in Context: Factors Influencing the Elicitation and Categorisation of Context−Sensitive Security Policies / Faily, S.; Lyle, J.; Flechais, I.; Atzeni, Andrea; Cameroni, Cesare; Myrhaug, H.; Goker, A.; Kleinfeld, R.. - ELETTRONICO. - (2013). (Intervento presentato al convegno HUPS-2013: workshop on Home Usable Privacy and Security tenutosi a Newcastle (UK) nel 24-26/7/2013). | 1-gen-2013 | ATZENI, ANDREACAMERONI, CESARE + | - |
Continuous integration for web-based software infrastructures: lessons learned on the webinos project / Su, Tao; Lyle, J.; Atzeni, Andrea; Faily, S.; Virji, H.; Ntanos, C.; Botsikas, C.. - STAMPA. - LNCS-8244:(2013), pp. 145-150. (Intervento presentato al convegno HVC-2013: Ninth Haifa Verification Conference tenutosi a Haifa (Israel) nel 5-7/11/2013) [10.1007/978-3-319-03077-7_10]. | 1-gen-2013 | SU, TAOATZENI, ANDREA + | - |
Developing secure‚ unified multi−device and multi−domain platforms: a case study from the webinos project / Atzeni, Andrea; Lyle, J.; Faily, S. - In: Architectures and Protocols for Secure Information Technology / A. Ruiz-Martinez, R. Marin-Lopez, F. Pereniguez-Garcia. - STAMPA. - [s.l] : IGI Global, 2014. - ISBN 1466645148. - pp. 310-333 [10.4018/978-1-4666-4514-1.ch012] | 1-gen-2014 | ATZENI, ANDREA + | - |
Lightweight Formal Verification in Real World, A Case Study / Atzeni, Andrea; Su, Tao; Montanaro, Teodoro. - STAMPA. - (2014), pp. 335-342. (Intervento presentato al convegno WISSE 2014: 4th International Workshop on Information Systems Security Engineering tenutosi a Thessaloniki (Greece) nel 17 June 2014) [10.1007/978-3-319-07869-4_31]. | 1-gen-2014 | ATZENI, ANDREASU, TAOMONTANARO, TEODORO | - |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile