Nome |
# |
Modelling and Analysis of Network Security Policies, file e384c42f-883a-d4b2-e053-9f05fe0a1d67
|
3.202
|
Adding Support for Automatic Enforcement of Security Policies in NFV Networks, file e384c430-7912-d4b2-e053-9f05fe0a1d67
|
201
|
User-oriented Network Security Policy Specification, file e384c430-ba6d-d4b2-e053-9f05fe0a1d67
|
190
|
Protecting In-Vehicle Services : Security-Enabled SOME/IP Middleware, file e384c431-fe5f-d4b2-e053-9f05fe0a1d67
|
152
|
Improving the formal verification of reachability policies in virtualized networks, file e384c432-e938-d4b2-e053-9f05fe0a1d67
|
124
|
Securing SOME/IP for In-Vehicle Service Protection, file e384c432-78c9-d4b2-e053-9f05fe0a1d67
|
122
|
Towards a fully automated and optimized network security functions orchestration, file e384c431-7705-d4b2-e053-9f05fe0a1d67
|
120
|
Automated firewall configuration in virtual networks, file e384c434-95d9-d4b2-e053-9f05fe0a1d67
|
119
|
Inter-technology conflict analysis for communication protection policies, file e384c432-d3d9-d4b2-e053-9f05fe0a1d67
|
97
|
A comprehensive approach to the automatic refinement and verification of access control policies, file e384c431-d778-d4b2-e053-9f05fe0a1d67
|
94
|
Automated optimal firewall orchestration and configuration in virtualized networks, file e384c432-a0a6-d4b2-e053-9f05fe0a1d67
|
89
|
Towards the Dynamic Provision of Virtualized Security Services, file e384c432-b378-d4b2-e053-9f05fe0a1d67
|
84
|
Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions, file e384c431-3e17-d4b2-e053-9f05fe0a1d67
|
83
|
On the impossibility of effectively using likely-invariants for software attestation purposes, file e384c430-34d2-d4b2-e053-9f05fe0a1d67
|
81
|
Introducing programmability and automation in the synthesis of virtual firewall rules, file e384c432-7c62-d4b2-e053-9f05fe0a1d67
|
77
|
A novel approach for security function graph configuration and deployment, file e384c433-d411-d4b2-e053-9f05fe0a1d67
|
75
|
A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks, file e384c432-ccb6-d4b2-e053-9f05fe0a1d67
|
73
|
A Framework for Verification-Oriented User-Friendly Network Function Modeling, file e384c430-f5fb-d4b2-e053-9f05fe0a1d67
|
67
|
Automatic discovery of software attacks via backward reasoning, file e384c432-ca65-d4b2-e053-9f05fe0a1d67
|
66
|
Automated Security Management for Virtual Services, file e384c431-6572-d4b2-e053-9f05fe0a1d67
|
65
|
Leveraging SDN To Improve Security in Industrial Networks, file e384c432-b56e-d4b2-e053-9f05fe0a1d67
|
65
|
Short Paper: Automatic Configuration for an Optimal Channel Protection in Virtualized Networks, file e384c432-a0ab-d4b2-e053-9f05fe0a1d67
|
60
|
(User-friendly) formal requirements verification in the context of ISO26262, file e384c432-1da9-d4b2-e053-9f05fe0a1d67
|
55
|
An optimized firewall anomaly resolution, file e384c432-26ae-d4b2-e053-9f05fe0a1d67
|
55
|
Toward attribute-based access control policy in industrial networked systems, file e384c431-cded-d4b2-e053-9f05fe0a1d67
|
46
|
Classification and analysis of communication protection policy anomalies, file e384c432-b558-d4b2-e053-9f05fe0a1d67
|
45
|
A Formal Model of Network Policy Analysis, file e384c432-d63e-d4b2-e053-9f05fe0a1d67
|
42
|
Toward Cybersecurity Personalization in Smart Homes, file e384c434-5c1d-d4b2-e053-9f05fe0a1d67
|
41
|
Security Automation using Traffic Flow Modeling, file 71db8946-473b-49ed-997a-b3eb9b1e8b6b
|
39
|
A novel approach for integrating security policy enforcement with dynamic network virtualization, file e384c432-d454-d4b2-e053-9f05fe0a1d67
|
38
|
Work-in-Progress: A Formal Approach to Verify Fault Tolerance in Industrial Network Systems, file e384c432-7caf-d4b2-e053-9f05fe0a1d67
|
34
|
Assessing network authorization policies via reachability analysis, file e384c432-b559-d4b2-e053-9f05fe0a1d67
|
32
|
Inter-function anomaly analysis for correct SDN/NFV deployment, file e384c432-a2ed-d4b2-e053-9f05fe0a1d67
|
28
|
Automated Fixing of Access Policy Implementation in Industrial Networked Systems, file e384c432-c682-d4b2-e053-9f05fe0a1d67
|
23
|
Toward Cybersecurity Personalization in Smart Homes, file e384c434-6d4b-d4b2-e053-9f05fe0a1d67
|
22
|
A Model for the Analysis of Security Policies in Service Function Chains, file e384c432-d992-d4b2-e053-9f05fe0a1d67
|
21
|
Formally specifying and checking policies and anomalies in service function chaining, file e384c432-d388-d4b2-e053-9f05fe0a1d67
|
17
|
Online and offline security policy assessment, file e384c432-d997-d4b2-e053-9f05fe0a1d67
|
17
|
A hybrid threat model for smart systems, file 40fc9f5d-6a90-4ee3-a59b-a38158bfdf7b
|
16
|
Automated optimal firewall orchestration and configuration in virtualized networks, file e384c432-6712-d4b2-e053-9f05fe0a1d67
|
13
|
Towards a Framework for Automatic Firewalls Configuration via Argumentation Reasoning, file e384c432-8c69-d4b2-e053-9f05fe0a1d67
|
10
|
A twofold model for VNF embedding and time-sensitive network flow scheduling, file e384c434-b22a-d4b2-e053-9f05fe0a1d67
|
10
|
Next Generation of Hybrid Threats, file 9b0042a8-4b9f-4610-b509-173324ed275a
|
9
|
Towards a fully automated and optimized network security functions orchestration, file e384c431-66b0-d4b2-e053-9f05fe0a1d67
|
9
|
A twofold model for VNF embedding and time-sensitive network flow scheduling, file e384c434-89f5-d4b2-e053-9f05fe0a1d67
|
9
|
Introduction to Formal Methods for the Analysis and Design of Cryptographic Protocols, file f4a950d3-95fb-4a78-bcd8-a38866e61998
|
8
|
Improving the formal verification of reachability policies in virtualized networks, file e384c433-0c82-d4b2-e053-9f05fe0a1d67
|
6
|
Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks, file e384c434-d4a1-d4b2-e053-9f05fe0a1d67
|
6
|
Classification and analysis of communication protection policy anomalies, file e384c431-c9ed-d4b2-e053-9f05fe0a1d67
|
5
|
Inter-technology conflict analysis for communication protection policies, file e384c432-c039-d4b2-e053-9f05fe0a1d67
|
5
|
Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks, file e384c434-c349-d4b2-e053-9f05fe0a1d67
|
5
|
Automation for network security configuration: state of the art and research trends, file 33c319e2-99b7-40f8-bbad-b50a295cbc7f
|
4
|
An Optimized Approach for Assisted Firewall Anomaly Resolution, file 3a011aa7-3c1c-4d37-ab9b-e35ff63a32ea
|
4
|
Formally specifying and checking policies and anomalies in service function chaining, file e384c431-849e-d4b2-e053-9f05fe0a1d67
|
4
|
Leveraging SDN To Improve Security in Industrial Networks, file e384c431-849f-d4b2-e053-9f05fe0a1d67
|
4
|
Assessing network authorization policies via reachability analysis, file e384c431-867c-d4b2-e053-9f05fe0a1d67
|
4
|
Protecting In-Vehicle Services : Security-Enabled SOME/IP Middleware, file e384c432-5f61-d4b2-e053-9f05fe0a1d67
|
4
|
Short Paper: Automatic Configuration for an Optimal Channel Protection in Virtualized Networks, file e384c432-af52-d4b2-e053-9f05fe0a1d67
|
4
|
A novel approach for integrating security policy enforcement with dynamic network virtualization, file e384c432-c395-d4b2-e053-9f05fe0a1d67
|
4
|
A Formal Model of Network Policy Analysis, file e384c432-d37e-d4b2-e053-9f05fe0a1d67
|
4
|
An Optimized Approach for Assisted Firewall Anomaly Resolution, file 1ba93240-fcaf-4cf1-8dd0-6002568f38f6
|
3
|
Automation for network security configuration: state of the art and research trends, file 560c63c5-0b9a-4cee-883f-7d62f2511edf
|
3
|
Adding Support for Automatic Enforcement of Security Policies in NFV Networks, file e384c431-8682-d4b2-e053-9f05fe0a1d67
|
3
|
A Model for the Analysis of Security Policies in Service Function Chains, file e384c431-c816-d4b2-e053-9f05fe0a1d67
|
3
|
A comprehensive approach to the automatic refinement and verification of access control policies, file e384c432-2c3f-d4b2-e053-9f05fe0a1d67
|
3
|
Introducing programmability and automation in the synthesis of virtual firewall rules, file e384c432-3478-d4b2-e053-9f05fe0a1d67
|
3
|
Inter-function anomaly analysis for correct SDN/NFV deployment, file e384c432-a2eb-d4b2-e053-9f05fe0a1d67
|
3
|
Online and offline security policy assessment, file e384c432-a2f6-d4b2-e053-9f05fe0a1d67
|
3
|
Towards the Dynamic Provision of Virtualized Security Services, file e384c432-b379-d4b2-e053-9f05fe0a1d67
|
3
|
Towards Security Automation in Virtual Networks, file 140de8ab-b9de-4edf-af0c-510d5cc9c17e
|
2
|
Formal verification of the FDO protocol, file 1db6e18d-c75a-461b-ac49-19169c0b6ba8
|
2
|
Optimizing distributed firewall reconfiguration transients, file 89619f4e-a365-488d-b5c0-bb06f7ff13ff
|
2
|
Formal Verification of a V2X Privacy Preserving Scheme Using Proverif, file c4e8d61a-4ce5-480d-9769-d16f0409c4bd
|
2
|
Security Automation using Traffic Flow Modeling, file d63aa0d2-dd2e-4f3f-a5f9-8099f9a2a660
|
2
|
Guest Editors Introduction: Special Section on Recent Advances in Network Security Management, file ded47a37-1bc4-4a3c-a865-8b1110eaa99f
|
2
|
Automated Fixing of Access Policy Implementation in Industrial Networked Systems, file e384c432-b4ba-d4b2-e053-9f05fe0a1d67
|
2
|
A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks, file e384c432-ccb5-d4b2-e053-9f05fe0a1d67
|
2
|
Guest editorial: Special issue on novel cyber-security paradigms for software-defined and virtualized systems, file e384c433-7246-d4b2-e053-9f05fe0a1d67
|
2
|
Securing SOME/IP for In-Vehicle Service Protection, file e384c433-f2a8-d4b2-e053-9f05fe0a1d67
|
2
|
A demonstration of VEREFOO: an automated framework for virtual firewall configuration, file 4ea0c5d6-2c43-41c3-b9b5-40f32ea58b09
|
1
|
Security automation for multi-cluster orchestration in Kubernetes, file 72d96cb6-eb18-48cd-a631-5238e4934df7
|
1
|
Towards Security Automation in Virtual Networks, file 7fc94ed1-0c9a-4df5-8c00-48444b10f4de
|
1
|
A demonstration of VEREFOO: an automated framework for virtual firewall configuration, file 80477350-e367-4c3f-b3f2-51e77f69d37e
|
1
|
A novel abstraction for security configuration in virtual networks, file 858f6a8f-8e1f-4122-835b-8c12c83a509d
|
1
|
A hybrid threat model for smart systems, file 892d9d8d-dc35-4aa4-9a37-4c78815cfa8c
|
1
|
Security automation for multi-cluster orchestration in Kubernetes, file 984ea291-b990-4127-9bb1-a2af5dc6d946
|
1
|
Automating the configuration of firewalls and channel protection systems in virtual networks, file 9db1cd12-b012-4824-8020-6d08036b1a67
|
1
|
Formal Verification of a V2X Privacy Preserving Scheme Using Proverif, file b0a926fc-d210-4d66-b239-d0e29014727e
|
1
|
Automating the configuration of firewalls and channel protection systems in virtual networks, file d2bac964-c7fd-4116-903f-fb08117d736c
|
1
|
Automatic Firewalls’ Configuration Using Argumentation Reasoning, file e03932ab-b4b4-4044-adfb-93f48d47c109
|
1
|
Toward attribute-based access control policy in industrial networked systems, file e384c431-d773-d4b2-e053-9f05fe0a1d67
|
1
|
Work-in-Progress: A Formal Approach to Verify Fault Tolerance in Industrial Network Systems, file e384c432-5ad8-d4b2-e053-9f05fe0a1d67
|
1
|
Towards a Framework for Automatic Firewalls Configuration via Argumentation Reasoning, file e384c432-78f5-d4b2-e053-9f05fe0a1d67
|
1
|
Automatic discovery of software attacks via backward reasoning, file e384c432-ca66-d4b2-e053-9f05fe0a1d67
|
1
|
A novel approach for security function graph configuration and deployment, file e384c433-d410-d4b2-e053-9f05fe0a1d67
|
1
|
Totale |
6.071 |