Nome |
# |
An Overview of Software-based Support Tools for ISO 26262, file e384c42e-104b-d4b2-e053-9f05fe0a1d67
|
2.500
|
Formal Verification of Security Protocol Implementations: A Survey, file e384c42e-212f-d4b2-e053-9f05fe0a1d67
|
1.653
|
Formally based semi-automatic implementation of an open security protocol, file e384c42e-1092-d4b2-e053-9f05fe0a1d67
|
929
|
Formal Vulnerability Analysis of a Security System for Remote Fieldbus Access, file e384c42e-12a1-d4b2-e053-9f05fe0a1d67
|
862
|
Efficient Multistriding of Large Non-deterministic Finite State Automata for Deep Packet Inspection, file e384c42e-1f24-d4b2-e053-9f05fe0a1d67
|
789
|
iNFAnt: NFA pattern matching on GPGPU devices, file e384c42e-1701-d4b2-e053-9f05fe0a1d67
|
781
|
Spi2Java: automatic cryptographic protocol java code generation from spi calculus, file e384c42d-fa67-d4b2-e053-9f05fe0a1d67
|
762
|
Automatic Configuration of Opaque Network Functions in CMS, file e384c42e-2f99-d4b2-e053-9f05fe0a1d67
|
615
|
An Efficient Data Exchange Algorithm for Chained Network Functions, file e384c42e-303f-d4b2-e053-9f05fe0a1d67
|
599
|
Formal Verification of LTE-UMTS Handover Procedures, file e384c42e-bb58-d4b2-e053-9f05fe0a1d67
|
569
|
A LOTOS Extension for the Performance Analysis of Distributed Systems, file e384c42d-fb01-d4b2-e053-9f05fe0a1d67
|
566
|
Visual Model-Driven Design, Verification and Implementation of Security Protocols, file e384c42e-2501-d4b2-e053-9f05fe0a1d67
|
565
|
Safe abstractions of data encodings in formal security protocol models, file e384c42e-2503-d4b2-e053-9f05fe0a1d67
|
551
|
The JavaSPI Framework for Security Protocol Implementation, file e384c42e-0faa-d4b2-e053-9f05fe0a1d67
|
546
|
Vehicle Navigation Service Based on Real-Time Traffic Information, file e384c42e-1f28-d4b2-e053-9f05fe0a1d67
|
531
|
Formal verification of Virtual Network Function graphs in an SP-DevOps context, file e384c42e-b44d-d4b2-e053-9f05fe0a1d67
|
528
|
SPAF: Stateless FSA-Based Packet Filters, file e384c42e-0e07-d4b2-e053-9f05fe0a1d67
|
514
|
Scalable Algorithms for NFA Multi-Striding and NFA-Based Deep Packet Inspection on GPUs, file e384c42e-3906-d4b2-e053-9f05fe0a1d67
|
492
|
PIT Overload Analysis in Content Centric Networks, file e384c42e-2e3f-d4b2-e053-9f05fe0a1d67
|
482
|
Integrating Performance Analysis in the Context of LOTOS-Based Design, file e384c42d-f46e-d4b2-e053-9f05fe0a1d67
|
464
|
An approach to refinement checking of SysML requirements, file e384c42e-1346-d4b2-e053-9f05fe0a1d67
|
463
|
Provably correct Java implementations of Spi Calculus security protocols specifications, file e384c42e-055e-d4b2-e053-9f05fe0a1d67
|
410
|
An Experiment in Interoperable Cryptographic Protocol Implementation Using Automatic Code Generation, file e384c42d-faf5-d4b2-e053-9f05fe0a1d67
|
347
|
Resource Management Policies for Cloud-based Interactive 3D Applications, file e384c42e-2e3c-d4b2-e053-9f05fe0a1d67
|
341
|
DynNav: Toward Open and Interoperable Navigation Services, file e384c42e-3b30-d4b2-e053-9f05fe0a1d67
|
339
|
Interest Flooding Attack Countermeasures Assessment on Content Centric Networking, file e384c42e-bc77-d4b2-e053-9f05fe0a1d67
|
323
|
Formally Sound Refinement of Spi Calculus Protocol Specifications into Java Code, file e384c42e-01c3-d4b2-e053-9f05fe0a1d67
|
316
|
Multipoint passive monitoring in packet networks, file e384c431-50d9-d4b2-e053-9f05fe0a1d67
|
247
|
Formally sound implementations of security protocols with JavaSPI, file e384c42f-e32d-d4b2-e053-9f05fe0a1d67
|
239
|
Formal verification of LTE-UMTS and LTE–LTE handover procedures, file e384c42f-7b42-d4b2-e053-9f05fe0a1d67
|
225
|
Seamless configuration of virtual network functions in data center provider networks, file e384c42f-9d82-d4b2-e053-9f05fe0a1d67
|
224
|
An efficient data exchange mechanism for chained network functions, file e384c42f-e53a-d4b2-e053-9f05fe0a1d67
|
156
|
Protecting In-Vehicle Services : Security-Enabled SOME/IP Middleware, file e384c431-fe5f-d4b2-e053-9f05fe0a1d67
|
152
|
Improving the formal verification of reachability policies in virtualized networks, file e384c432-e938-d4b2-e053-9f05fe0a1d67
|
124
|
Securing SOME/IP for In-Vehicle Service Protection, file e384c432-78c9-d4b2-e053-9f05fe0a1d67
|
122
|
Towards a fully automated and optimized network security functions orchestration, file e384c431-7705-d4b2-e053-9f05fe0a1d67
|
120
|
Automated firewall configuration in virtual networks, file e384c434-95d9-d4b2-e053-9f05fe0a1d67
|
119
|
Automated optimal firewall orchestration and configuration in virtualized networks, file e384c432-a0a6-d4b2-e053-9f05fe0a1d67
|
89
|
Introducing programmability and automation in the synthesis of virtual firewall rules, file e384c432-7c62-d4b2-e053-9f05fe0a1d67
|
77
|
A novel approach for security function graph configuration and deployment, file e384c433-d411-d4b2-e053-9f05fe0a1d67
|
75
|
A VNF modeling approach for verification purposes, file e384c431-5af7-d4b2-e053-9f05fe0a1d67
|
74
|
A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks, file e384c432-ccb6-d4b2-e053-9f05fe0a1d67
|
73
|
A Framework for Verification-Oriented User-Friendly Network Function Modeling, file e384c430-f5fb-d4b2-e053-9f05fe0a1d67
|
67
|
Short Paper: Automatic Configuration for an Optimal Channel Protection in Virtualized Networks, file e384c432-a0ab-d4b2-e053-9f05fe0a1d67
|
60
|
(User-friendly) formal requirements verification in the context of ISO26262, file e384c432-1da9-d4b2-e053-9f05fe0a1d67
|
55
|
Detecting Injection Attacks on Cooperative Adaptive Cruise Control, file e384c431-7bda-d4b2-e053-9f05fe0a1d67
|
50
|
A Formal Model of Network Policy Analysis, file e384c432-d63e-d4b2-e053-9f05fe0a1d67
|
42
|
Security Automation using Traffic Flow Modeling, file 71db8946-473b-49ed-997a-b3eb9b1e8b6b
|
39
|
Work-in-Progress: A Formal Approach to Verify Fault Tolerance in Industrial Network Systems, file e384c432-7caf-d4b2-e053-9f05fe0a1d67
|
34
|
Virtual Network Embedding with Formal Reachability Assurance, file e384c431-4579-d4b2-e053-9f05fe0a1d67
|
33
|
Multi-Objective Function Splitting and Placement of Network Slices in 5G Mobile Networks, file e384c431-46d1-d4b2-e053-9f05fe0a1d67
|
33
|
Performance measurements of QUIC communications, file e384c431-aea2-d4b2-e053-9f05fe0a1d67
|
26
|
Formally specifying and checking policies and anomalies in service function chaining, file e384c432-d388-d4b2-e053-9f05fe0a1d67
|
17
|
Formally verified latency-aware VNF placement in industrial Internet of things, file e384c431-6c14-d4b2-e053-9f05fe0a1d67
|
13
|
Automated optimal firewall orchestration and configuration in virtualized networks, file e384c432-6712-d4b2-e053-9f05fe0a1d67
|
13
|
Detecting Injection Attacks on Cooperative Adaptive Cruise Control, file e384c431-7e7b-d4b2-e053-9f05fe0a1d67
|
10
|
Towards a fully automated and optimized network security functions orchestration, file e384c431-66b0-d4b2-e053-9f05fe0a1d67
|
9
|
Introduction to Formal Methods for the Analysis and Design of Cryptographic Protocols, file f4a950d3-95fb-4a78-bcd8-a38866e61998
|
8
|
Interest Flooding Attack Countermeasures Assessment on Content Centric Networking, file e384c42e-b44c-d4b2-e053-9f05fe0a1d67
|
7
|
Improving the formal verification of reachability policies in virtualized networks, file e384c433-0c82-d4b2-e053-9f05fe0a1d67
|
6
|
Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks, file e384c434-d4a1-d4b2-e053-9f05fe0a1d67
|
6
|
Multipoint passive monitoring in packet networks, file e384c431-742a-d4b2-e053-9f05fe0a1d67
|
5
|
Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks, file e384c434-c349-d4b2-e053-9f05fe0a1d67
|
5
|
Automation for network security configuration: state of the art and research trends, file 33c319e2-99b7-40f8-bbad-b50a295cbc7f
|
4
|
Detecting Chains of Vulnerabilities in Industrial Networks, file e384c42e-03f4-d4b2-e053-9f05fe0a1d67
|
4
|
Scalable Algorithms for NFA Multi-Striding and NFA-Based Deep Packet Inspection on GPUs, file e384c42f-0a6b-d4b2-e053-9f05fe0a1d67
|
4
|
Seamless configuration of virtual network functions in data center provider networks, file e384c430-1fc8-d4b2-e053-9f05fe0a1d67
|
4
|
An efficient data exchange mechanism for chained network functions, file e384c430-2134-d4b2-e053-9f05fe0a1d67
|
4
|
Formally specifying and checking policies and anomalies in service function chaining, file e384c431-849e-d4b2-e053-9f05fe0a1d67
|
4
|
Protecting In-Vehicle Services : Security-Enabled SOME/IP Middleware, file e384c432-5f61-d4b2-e053-9f05fe0a1d67
|
4
|
Short Paper: Automatic Configuration for an Optimal Channel Protection in Virtualized Networks, file e384c432-af52-d4b2-e053-9f05fe0a1d67
|
4
|
A Formal Model of Network Policy Analysis, file e384c432-d37e-d4b2-e053-9f05fe0a1d67
|
4
|
Automation for network security configuration: state of the art and research trends, file 560c63c5-0b9a-4cee-883f-7d62f2511edf
|
3
|
iNFAnt: NFA pattern matching on GPGPU devices, file e384c42e-16ad-d4b2-e053-9f05fe0a1d67
|
3
|
Formal verification of LTE-UMTS and LTE–LTE handover procedures, file e384c42f-7b43-d4b2-e053-9f05fe0a1d67
|
3
|
Formally sound implementations of security protocols with JavaSPI, file e384c42f-de70-d4b2-e053-9f05fe0a1d67
|
3
|
Performance measurements of QUIC communications, file e384c431-83ff-d4b2-e053-9f05fe0a1d67
|
3
|
Introducing programmability and automation in the synthesis of virtual firewall rules, file e384c432-3478-d4b2-e053-9f05fe0a1d67
|
3
|
Towards Security Automation in Virtual Networks, file 140de8ab-b9de-4edf-af0c-510d5cc9c17e
|
2
|
Formal verification of the FDO protocol, file 1db6e18d-c75a-461b-ac49-19169c0b6ba8
|
2
|
Formal Verification of a V2X Privacy Preserving Scheme Using Proverif, file c4e8d61a-4ce5-480d-9769-d16f0409c4bd
|
2
|
Security Automation using Traffic Flow Modeling, file d63aa0d2-dd2e-4f3f-a5f9-8099f9a2a660
|
2
|
A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks, file e384c432-ccb5-d4b2-e053-9f05fe0a1d67
|
2
|
Securing SOME/IP for In-Vehicle Service Protection, file e384c433-f2a8-d4b2-e053-9f05fe0a1d67
|
2
|
Detecting Chains of Vulnerabilities in Industrial Networks, file fa495c18-24ec-4adb-9adf-8c873508ed3b
|
2
|
Spi2Java: automatic cryptographic protocol java code generation from spi calculus, file 1026d7c6-7527-4e34-9baf-80be22a5c9c3
|
1
|
A new knowledge representation strategy for cryptographic protocol analysis, file 19390f17-6b7a-4087-a294-e38f223d7003
|
1
|
A demonstration of VEREFOO: an automated framework for virtual firewall configuration, file 4ea0c5d6-2c43-41c3-b9b5-40f32ea58b09
|
1
|
Automatic Detection of Attacks on Cryptographic Protocols: a Case Study, file 654bb606-67db-4e42-a3a7-e26e5dc29e34
|
1
|
Introducing Commutative and Associative Operators in Cryptographic Protocol Analysis, file 66ad65ad-5aea-4202-96fe-9d21bbc74987
|
1
|
Security automation for multi-cluster orchestration in Kubernetes, file 72d96cb6-eb18-48cd-a631-5238e4934df7
|
1
|
Exploiting Symmetries for Testing Equivalence in the Spi Calculus, file 7525785e-c702-4b09-9edd-5d8c645d452e
|
1
|
Towards Security Automation in Virtual Networks, file 7fc94ed1-0c9a-4df5-8c00-48444b10f4de
|
1
|
A demonstration of VEREFOO: an automated framework for virtual firewall configuration, file 80477350-e367-4c3f-b3f2-51e77f69d37e
|
1
|
A novel abstraction for security configuration in virtual networks, file 858f6a8f-8e1f-4122-835b-8c12c83a509d
|
1
|
Security automation for multi-cluster orchestration in Kubernetes, file 984ea291-b990-4127-9bb1-a2af5dc6d946
|
1
|
Automating the configuration of firewalls and channel protection systems in virtual networks, file 9db1cd12-b012-4824-8020-6d08036b1a67
|
1
|
A Configurable Mobile Agent Data Protection Protocol, file ae141864-cad8-4d34-8a35-0396a1cb0cf7
|
1
|
Formal Verification of a V2X Privacy Preserving Scheme Using Proverif, file b0a926fc-d210-4d66-b239-d0e29014727e
|
1
|
Automating the configuration of firewalls and channel protection systems in virtual networks, file d2bac964-c7fd-4116-903f-fb08117d736c
|
1
|
Totale |
20.574 |