Nome |
# |
Virtualized Security at the Network Edge: A User-centric Approach, file e384c42e-39c4-d4b2-e053-9f05fe0a1d67
|
955
|
Dependability in wireless networks: can we rely on WiFi?, file e384c42d-f3a2-d4b2-e053-9f05fe0a1d67
|
847
|
Offloading personal security applications to a secure and trusted network node, file e384c42e-3b32-d4b2-e053-9f05fe0a1d67
|
806
|
Consulenza scientifica sul PIN delle carte di pagamento elettroniche a marchio BANCOMAT e PagoBANCOMAT, file e384c42e-317b-d4b2-e053-9f05fe0a1d67
|
792
|
Anatomia del malware, file e384c42e-2d05-d4b2-e053-9f05fe0a1d67
|
698
|
Practical assessment of Biba integrity for TCG-enabled platforms, file e384c42e-2efe-d4b2-e053-9f05fe0a1d67
|
613
|
Analysis of application-layer filtering policies with application to HTTP, file e384c42e-3b8b-d4b2-e053-9f05fe0a1d67
|
484
|
Exploiting the network for securing personal devices, file e384c42e-3b3e-d4b2-e053-9f05fe0a1d67
|
448
|
Offloading security applications into the network, file e384c42e-3871-d4b2-e053-9f05fe0a1d67
|
429
|
Federating e-identities across Europe, or how to build cross-border e-services, file e384c42e-0a93-d4b2-e053-9f05fe0a1d67
|
411
|
Ontology-based policy translation, file e384c42e-04d4-d4b2-e053-9f05fe0a1d67
|
404
|
Modern standard-based access control in network services: XACML in action, file e384c42e-01da-d4b2-e053-9f05fe0a1d67
|
403
|
The ForwardDiffSig scheme for multicast authentication, file e384c42e-10af-d4b2-e053-9f05fe0a1d67
|
378
|
The trust problem in modern network infrastructures, file e384c42e-b987-d4b2-e053-9f05fe0a1d67
|
332
|
Network-level access control policy analysis and transformation, file e384c42e-1199-d4b2-e053-9f05fe0a1d67
|
317
|
A unified and flexible solution for integrating CRL and OCSP into PKI applications, file e384c42e-024d-d4b2-e053-9f05fe0a1d67
|
219
|
Adding Support for Automatic Enforcement of Security Policies in NFV Networks, file e384c430-7912-d4b2-e053-9f05fe0a1d67
|
201
|
D7.1 - Project leaflet and portal, file e384c42f-1f15-d4b2-e053-9f05fe0a1d67
|
193
|
User-oriented Network Security Policy Specification, file e384c430-ba6d-d4b2-e053-9f05fe0a1d67
|
190
|
Consumerization of IT: Risk Mitigation Strategies and Good Practices. Responding to the Emerging Threat Environment., file e384c42e-3969-d4b2-e053-9f05fe0a1d67
|
186
|
Providing Login and Wi-Fi Access Services With the eIDAS Network: A Practical Approach, file e384c432-496b-d4b2-e053-9f05fe0a1d67
|
145
|
Harmonised security across devices (interview with Prof. Antonio Lioy), file e384c42e-f922-d4b2-e053-9f05fe0a1d67
|
114
|
Inter-technology conflict analysis for communication protection policies, file e384c432-d3d9-d4b2-e053-9f05fe0a1d67
|
97
|
Towards Automatic Risk Analysis and Mitigation of Software Applications, file e384c42f-17f4-d4b2-e053-9f05fe0a1d67
|
95
|
Electronic identification for universities: Building cross-border services based on the eIDAS infrastructure, file e384c431-4ba2-d4b2-e053-9f05fe0a1d67
|
87
|
Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions, file e384c431-3e17-d4b2-e053-9f05fe0a1d67
|
83
|
On the impossibility of effectively using likely-invariants for software attestation purposes, file e384c430-34d2-d4b2-e053-9f05fe0a1d67
|
81
|
Supporting authorize-then-authenticate for wi-fi access based on an electronic identity infrastructure, file e384c432-5e78-d4b2-e053-9f05fe0a1d67
|
69
|
Detection of encrypted cryptomining malware connections with machine and deep learning, file e384c432-6c17-d4b2-e053-9f05fe0a1d67
|
60
|
Towards a complete software stack to integrate Quantum Key Distribution in a cloud environment, file e384c433-f77e-d4b2-e053-9f05fe0a1d67
|
56
|
Classification and analysis of communication protection policy anomalies, file e384c432-b558-d4b2-e053-9f05fe0a1d67
|
45
|
A Formal Model of Network Policy Analysis, file e384c432-d63e-d4b2-e053-9f05fe0a1d67
|
42
|
A novel approach for integrating security policy enforcement with dynamic network virtualization, file e384c432-d454-d4b2-e053-9f05fe0a1d67
|
38
|
Assessing network authorization policies via reachability analysis, file e384c432-b559-d4b2-e053-9f05fe0a1d67
|
32
|
Inter-function anomaly analysis for correct SDN/NFV deployment, file e384c432-a2ed-d4b2-e053-9f05fe0a1d67
|
28
|
Data set and machine learning models for the classification of network traffic originators, file e384c434-85aa-d4b2-e053-9f05fe0a1d67
|
21
|
On enabling additional natural person and domain-specific attributes in the eIDAS network, file e384c434-0304-d4b2-e053-9f05fe0a1d67
|
20
|
Using MACsec to protect a Network Functions Virtualisation Infrastructure, file 9b60f49d-a716-4f29-a031-a87307d25fc4
|
19
|
Online and offline security policy assessment, file e384c432-d997-d4b2-e053-9f05fe0a1d67
|
17
|
PALANTIR demo: leveraging SecaaS model for managing threats in industrial environments, file 540635cb-1a69-4e38-a7a6-326172548eeb
|
15
|
Cybersecurity in ICT supply chains: key challenges and a relevant architecture, file e384c433-cf5c-d4b2-e053-9f05fe0a1d67
|
13
|
On the complexity of public-key certificate validation, file e384c42e-00a7-d4b2-e053-9f05fe0a1d67
|
10
|
Quantum Key Distribution in Kubernetes Clusters, file c54bd7da-94a6-4fc0-8219-74245ee0bf45
|
7
|
A proposal for trust monitoring in a Network Functions Virtualisation Infrastructure, file e384c430-f5f3-d4b2-e053-9f05fe0a1d67
|
7
|
Integrity verification of Docker containers for a lightweight cloud environment, file e384c431-c9e7-d4b2-e053-9f05fe0a1d67
|
7
|
PALANTIR: Zero-trust architecture for Managed Security Service Provider, file f52ebaf7-ce6c-4b32-828f-4e0791e95423
|
6
|
Classification and analysis of communication protection policy anomalies, file e384c431-c9ed-d4b2-e053-9f05fe0a1d67
|
5
|
Inter-technology conflict analysis for communication protection policies, file e384c432-c039-d4b2-e053-9f05fe0a1d67
|
5
|
Modular architecture providing convergent and ubiquitous intelligent connectivity for networks beyond 2030, file 8fddd750-aa07-4296-a01d-4fe5e6aa69c6
|
4
|
A Model for Automated Cybersecurity Threat Remediation and Sharing, file d79010c0-0440-451c-97d9-408200cbd87b
|
4
|
Assessing network authorization policies via reachability analysis, file e384c431-867c-d4b2-e053-9f05fe0a1d67
|
4
|
A novel approach for integrating security policy enforcement with dynamic network virtualization, file e384c432-c395-d4b2-e053-9f05fe0a1d67
|
4
|
A Formal Model of Network Policy Analysis, file e384c432-d37e-d4b2-e053-9f05fe0a1d67
|
4
|
Attack Strategies and Countermeasures in Transport-Based Time Synchronization Solutions, file 69998a62-2d7b-44fd-9fae-7db9b7229f18
|
3
|
Attack Strategies and Countermeasures in Transport-Based Time Synchronization Solutions, file c2341aef-998c-4889-8a1a-8a553749a97b
|
3
|
On the performance of secure vehicular communication systems, file e384c42e-ab45-d4b2-e053-9f05fe0a1d67
|
3
|
Towards Optimally Hiding Protected Assets in Software Applications, file e384c42f-9aa3-d4b2-e053-9f05fe0a1d67
|
3
|
Adding Support for Automatic Enforcement of Security Policies in NFV Networks, file e384c431-8682-d4b2-e053-9f05fe0a1d67
|
3
|
Authorize-then-Authenticate: Supporting Authorization Decisions Prior to Authentication in an Electronic Identity Infrastructure, file e384c432-59ef-d4b2-e053-9f05fe0a1d67
|
3
|
Inter-function anomaly analysis for correct SDN/NFV deployment, file e384c432-a2eb-d4b2-e053-9f05fe0a1d67
|
3
|
Online and offline security policy assessment, file e384c432-a2f6-d4b2-e053-9f05fe0a1d67
|
3
|
A novel architecture to virtualise a hardware-bound trusted platform module, file 0a100c9b-4b5c-414e-b0cd-8f22c0b3d5fb
|
2
|
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection, file 761d196d-a135-40df-bf65-66dcedf46dda
|
2
|
An Evaluation of X.509 Certificate Revocation and Related Privacy Issues in the Web PKI Ecosystem, file 8935fca3-fee6-4b86-abe0-4d186981abc0
|
2
|
Network-level access control policy analysis and transformation, file e384c42e-1198-d4b2-e053-9f05fe0a1d67
|
2
|
Virtualized Security at the Network Edge: A User-centric Approach, file e384c42e-396d-d4b2-e053-9f05fe0a1d67
|
2
|
Analysis of application-layer filtering policies with application to HTTP, file e384c42e-3adf-d4b2-e053-9f05fe0a1d67
|
2
|
Efficient Attribute Management in a Federated Identity Management Infrastructure, file e384c42f-2967-d4b2-e053-9f05fe0a1d67
|
2
|
NFV-based network protection: The SHIELD approach, file 3f648f38-311b-4de8-b5cf-f8a790bca2cf
|
1
|
A Flexible Trust Manager for Remote Attestation in Heterogeneous Critical Infrastructures, file 5bc0ef41-41fe-4cdb-abb2-cf40d2916556
|
1
|
Using MACsec to protect a Network Functions Virtualisation Infrastructure, file 6bab94dd-bb21-4a5a-a7e9-79d940230cd0
|
1
|
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection, file 73e01ef0-a5ee-43f6-bd7e-6e800dde52a1
|
1
|
PALANTIR demo: leveraging SecaaS model for managing threats in industrial environments, file 7c05b7c0-c46d-4513-af1a-885960e178ea
|
1
|
A model of capabilities of Network Security Functions, file 82502786-04ca-4946-985d-f2c469769054
|
1
|
Practical Autonomous Cyberhealth for resilient Micro, Small and Medium-sized Enterprises, file 8c317746-6236-4622-ad63-3bbc8668879d
|
1
|
A Flexible Trust Manager for Remote Attestation in Heterogeneous Critical Infrastructures, file 9d33c5ba-fa84-4332-ab55-58f34a348063
|
1
|
Exploiting the DICE specification to ensure strong identity and integrity of IoT devices, file cb9fbd22-8881-4124-b92f-42e11803e91d
|
1
|
Exploiting the DICE specification to ensure strong identity and integrity of IoT devices, file dac8ca6b-71ed-4d9e-9093-18f1d0bd80e5
|
1
|
Improved reachability analysis for security management, file e384c42e-2581-d4b2-e053-9f05fe0a1d67
|
1
|
On the design, implementation and integration of an Attribute Provider in the Pan-European eID infrastructure, file e384c42f-26b5-d4b2-e053-9f05fe0a1d67
|
1
|
Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems, file e384c42f-27a9-d4b2-e053-9f05fe0a1d67
|
1
|
Providing digital identity and academic attributes through European eID infrastructures: Results achieved, limitations, and future steps, file e384c431-753d-d4b2-e053-9f05fe0a1d67
|
1
|
Towards a secure and lightweight Network Function Virtualisation environment, file e384c431-c385-d4b2-e053-9f05fe0a1d67
|
1
|
Totale |
10.603 |