SU, TAO

SU, TAO  

Dipartimento di Automatica e Informatica  

020788  

Mostra records
Risultati 1 - 11 di 11 (tempo di esecuzione: 0.011 secondi).
Citazione Data di pubblicazione Autori File
Android Apps Risk Evaluation: a methodology / Atzeni, Andrea; Su, Tao; Baltatu, Madalina; D'Alessandro, Rosalia; Pessiva, Giovanni. - In: ICST TRANSACTIONS ON UBIQUITOUS ENVIRONMENTS. - ISSN 2032-9377. - ELETTRONICO. - 1:4(2015), pp. 1-18. [10.4108/ue.1.4.e5] 1-gen-2015 ATZENI, ANDREASU, TAO + ue.1.4.e5.pdf
Cloudification of Public Services in Smart Cities: the CLIPS project / Filograna, Antonio; Smiraglia, Paolo; Gilsanz, Celia; Krco, Srdjan; Medela, Arturo; Su, Tao. - ELETTRONICO. - (2016), pp. 153-158. ((Intervento presentato al convegno 21st IEEE Symposium on Computers and Communications (ISCC'16) tenutosi a Messina (IT) nel 2016 [10.1109/ISCC.2016.7543731]. 1-gen-2016 SMIRAGLIA, PAOLOSU, TAO + 07543731.pdf
Continuous integration for web-based software infrastructures: lessons learned on the webinos project / Su, Tao; Lyle, J.; Atzeni, Andrea; Faily, S.; Virji, H.; Ntanos, C.; Botsikas, C.. - STAMPA. - LNCS-8244:(2013), pp. 145-150. ((Intervento presentato al convegno HVC-2013: Ninth Haifa Verification Conference tenutosi a Haifa (Israel) nel 5-7/11/2013 [10.1007/978-3-319-03077-7_10]. 1-gen-2013 SU, TAOATZENI, ANDREA + -
A formal approach for network security policy validation / Valenza, Fulvio; Su, Tao; Spinoso, Serena; Lioy, Antonio; Sisto, Riccardo; Vallini, Marco. - In: JOURNAL OF WIRELESS MOBILE NETWORKS, UBIQUITOUS COMPUTING AND DEPENDABLE APPLICATIONS. - ISSN 2093-5374. - STAMPA. - 8:1(2017), pp. 79-100. [10.22667/JOWUA.2017.03.31.079] 1-gen-2017 VALENZA, FULVIOSU, TAOSPINOSO, SERENALIOY, ANTONIOSISTO, RiccardoVALLINI, MARCO 2017JOWUA.pdf
How Dangerous is Your Android App? An Evaluation Methodology / Atzeni, Andrea; Su, Tao; M., Baltatu; R., D'Alessandro; G., Pessiva. - ELETTRONICO. - (2014), pp. 130-139. ((Intervento presentato al convegno 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services tenutosi a London, United Kingdom nel 02/12/2014-05/12/2014 [10.4108/icst.mobiquitous.2014.257832]. 1-gen-2014 ATZENI, ANDREASU, TAO + p130-atzeni.pdf
Lightweight Formal Verification in Real World, A Case Study / Atzeni, Andrea; Su, Tao; Montanaro, Teodoro. - STAMPA. - (2014), pp. 335-342. ((Intervento presentato al convegno WISSE 2014: 4th International Workshop on Information Systems Security Engineering tenutosi a Thessaloniki (Greece) nel 17 June 2014 [10.1007/978-3-319-07869-4_31]. 1-gen-2014 ATZENI, ANDREASU, TAOMONTANARO, TEODORO 1780335.pdf
Offloading personal security applications to a secure and trusted network node / Bonafiglia, Roberto; Ciaccia, F.; Lioy, Antonio; Nemirovsky, M.; Risso, FULVIO GIOVANNI OTTAVIO; Su, Tao. - STAMPA. - (2015), pp. 1-2. ((Intervento presentato al convegno Netsoft-2015: 1st IEEE Conference on Network Softwarization tenutosi a London (UK) nel 13-17 April 2015 [10.1109/NETSOFT.2015.7116171]. 1-gen-2015 BONAFIGLIA, ROBERTOLIOY, ANTONIORISSO, FULVIO GIOVANNI OTTAVIOSU, TAO + 2015_netsoft_secured_final.pdf
Trust and integrity in distributed systems / Su, Tao. - (2017). [10.6092/polito/porto/2676918] 1-gen-2017 SU, TAO SU_TAO_thesis.pdf
Trust in SDN/NFV environments / Lioy, Antonio; Su, Tao; Lopez, Diego R.; Pastor, Antonio; Shaw, Adrian L.; Attak, Hamza. - STAMPA. - (2017), pp. 103-124. [10.1007/978-3-319-64653-4_4] 1-gen-2017 LIOY, ANTONIOSU, TAO + -
The trust problem in modern network infrastructures / Jacquin, Ludovic; Lioy, Antonio; Lopez, Diego R.; Shaw, Adrian L.; Su, Tao. - STAMPA. - (2015), pp. 116-127. [10.1007/978-3-319-25360-2_10] 1-gen-2015 LIOY, ANTONIOSU, TAO + trust_modern_network_2015.pdf
Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems / Su, Tao; Lioy, Antonio; Barresi, Nicola. - STAMPA. - (2016), pp. 345-358. [10.1201/9781315372112-27] 1-gen-2016 SU, TAOLIOY, ANTONIOBARRESI, NICOLA torsec_CRC_cloud_TC.pdf