generated by bibbase.org
  2021 (2)
A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks. Marchetto, G., Sisto, R., Valenza, F., Yusupov, J., & Ksentini, A. IEEE Transactions on Industrial Informatics, 17(2): 1515–1525. 2021.
A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks [pdf]Paper   doi   link   bibtex   abstract  
Improving the Formal Verification of Reachability Policies in Virtualized Networks. Bringhenti, D., Marchetto, G., Sisto, R., Spinoso, S., Valenza, F., & Yusupov, J. IEEE Transactions on Network and Service Management, 18(1): 713-728. 2021.
Improving the Formal Verification of Reachability Policies in Virtualized Networks [pdf]Paper   doi   link   bibtex   abstract  
  2020 (10)
Work-in-Progress: A Formal Approach to Verify Fault Tolerance in Industrial Network Systems. Sacco, A., Marchetto, G., Sisto, R., & Valenza, F. In Proceedings of the 16th IEEE International Conference on Factory Communication Systems (WFCS 2020), pages 1–4, 2020. IEEE
Work-in-Progress: A Formal Approach to Verify Fault Tolerance in Industrial Network Systems [pdf]Paper   doi   link   bibtex   abstract  
Towards a Framework for Automatic Firewalls Configuration via Argumentation Reasoning. Karafili, E., Valenza, F., Chen, Y., & Lupu, E. C. In Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS 2020), pages 1–4, 2020. IEEE
Towards a Framework for Automatic Firewalls Configuration via Argumentation Reasoning [pdf]Paper   doi   link   bibtex   abstract  
Automated optimal firewall orchestration and configuration in virtualized networks. Bringhenti, D., Marchetto, G., Sisto, R., Valenza, F., & Yusupov, J. In Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS 2020), pages 1–7, 2020. IEEE
Automated optimal firewall orchestration and configuration in virtualized networks [pdf]Paper   doi   link   bibtex   abstract  
Introducing programmability and automation in the synthesis of virtual firewall rules. Bringhenti, D., Marchetto, G., Sisto, R., Valenza, F., & Yusupov, J. In Proceedings of the 6th IEEE Conference on Network Softwarization (NetSoft 2020), pages 473–478, 2020. IEEE
Introducing programmability and automation in the synthesis of virtual firewall rules [pdf]Paper   doi   link   bibtex   abstract  
An Optimized Firewall Anomaly Resolution. Valenza, F., & Cheminod, M. Journal of Internet Services and Information Security, 10(1): 22–37. 2020.
An Optimized Firewall Anomaly Resolution [pdf]Paper   doi   link   bibtex   abstract  
Securing SOME/IP for In-Vehicle Service Protection. Iorio, M., Reineri, M., Risso, F., Sisto, R., & Valenza, F. IEEE Transactions on Vehicular Technology, 69(11): 13450–13466. 2020.
Securing SOME/IP for In-Vehicle Service Protection [pdf]Paper   doi   link   bibtex   abstract  
Short Paper: Automatic Configuration for an Optimal Channel Protection in Virtualized Networks. Bringhenti, D., Marchetto, G., Sisto, R., & Valenza, F. In Proceedings of the 2nd AMC CCS Workshop on Cyber-Security Arms Race (CYSARM 2020), pages 25-30, 2020.
Short Paper: Automatic Configuration for an Optimal Channel Protection in Virtualized Networks [pdf]Paper   doi   link   bibtex   abstract  
Protecting In-Vehicle Services: Security-Enabled SOME/IP Middleware. Iorio, M., Buttiglieri, A., Reineri, M., Risso, F., Sisto, R., & Valenza, F. IEEE Vehicular Technology Magazine, 15(3): 77-85. 2020.
Protecting In-Vehicle Services: Security-Enabled SOME/IP Middleware [pdf]Paper   doi   link   bibtex   abstract  
(User-friendly) formal requirements verification in the context of ISO26262. Makartetskiy, D., Marchetto, G., Sisto, R., Valenza, F., Virgilio, M., Leri, D., Denti, P., & Finizio, R. Engineering Science and Technology, an International Journal, 23(3): 494-506. 2020.
(User-friendly) formal requirements verification in the context of ISO26262 [pdf]Paper   doi   link   bibtex   abstract  
Introducing programmability and automation in the synthesis of virtual firewall rules. Bringhenti, D., Marchetto, G., Sisto, R., Valenza, F., & Yusupov, J. In Proceedings of the 6th IEEE Conference on Network Softwarization (NetSoft 2020), pages 473-478, 2020.
Introducing programmability and automation in the synthesis of virtual firewall rules [pdf]Paper   doi   link   bibtex   abstract  
  2019 (7)
Formally specifying and checking policies and anomalies in service function chaining. Valenza, F., Spinoso, S., & Sisto, R. Journal of Network and Computer Applications, 146. 2019.
Formally specifying and checking policies and anomalies in service function chaining [link]Paper   doi   link   bibtex   abstract  
Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions. Pedone, I., Lioy, A., & Valenza, F. Secur. Commun. Networks, 2019: 2425983:1–2425983:11. 2019.
Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions [pdf]Paper   doi   link   bibtex   abstract  
A Framework for Verification-Oriented User-Friendly Network Function Modeling. Marchetto, G., Sisto, R., Valenza, F., & Yusupov, J. IEEE Access, 7: 99349–99359. 2019.
A Framework for Verification-Oriented User-Friendly Network Function Modeling [pdf]Paper   doi   link   bibtex   abstract  
A comprehensive approach to the automatic refinement and verification of access control policies. Cheminod, M., Durante, L., Seno, L., Valenza, F., & Valenzano, A. Computers and Security, 80: 186–199. 2019.
A comprehensive approach to the automatic refinement and verification of access control policies [pdf]Paper   doi   link   bibtex   abstract  
Automated Security Management for Virtual Services. Repetto, M., Carrega, A., Yusupov, J., Valenza, F., Risso, F., & Lamanna, G. In Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2019), pages 1–2, 2019. IEEE
Automated Security Management for Virtual Services [pdf]Paper   doi   link   bibtex   abstract  
Towards a fully automated and optimized network security functions orchestration. Bringhenti, D., Marchetto, G., Sisto, R., Valenza, F., & Yusupov, J. In Proceedings of the 4th International Conference on Computing, Communications and Security (ICCCS 2019), pages 1–7, 2019. IEEE
Towards a fully automated and optimized network security functions orchestration [pdf]Paper   doi   link   bibtex   abstract  
Adding Support for Automatic Enforcement of Security Policies in NFV Networks. Basile, C., Valenza, F., Lioy, A., López, D. R., & Perales, A. P. IEEE/ACM Transactions on Networking, 27(2): 707–720. 2019.
Adding Support for Automatic Enforcement of Security Policies in NFV Networks [pdf]Paper   doi   link   bibtex   abstract  
  2018 (2)
On the impossibility of effectively using likely-invariants for software attestation purposes. Viticchié, A., Basile, C., Valenza, F., & Lioy, A. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 9(2): 1–25. 2018.
On the impossibility of effectively using likely-invariants for software attestation purposes [pdf]Paper   doi   link   bibtex   abstract  
Toward attribute-based access control policy in industrial networked systems. Cheminod, M., Durante, L., Valenza, F., & Valenzano, A. In 14th IEEE International Workshop on Factory Communication Systems, WFCS 2018, Imperia, Italy, June 13-15, 2018, pages 1–9, 2018. IEEE
Toward attribute-based access control policy in industrial networked systems [pdf]Paper   doi   link   bibtex   abstract  
  2017 (6)
A formal approach for network security policy validation. Valenza, F., Su, T., Spinoso, S., Lioy, A., Sisto, R., & Vallini, M. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 8(1): 79–100. 2017.
A formal approach for network security policy validation [pdf]Paper   doi   link   bibtex   abstract  
Automated fixing of access policy implementation in Industrial Networked Systems. Cheminod, M., Durante, L., Seno, L., Valenza, F., & Valenzano, A. In Proceedings of the 13th IEEE International Workshop on Factory Communication Systems (WFCS 2017), pages 1–9, 2017. IEEE
Automated fixing of access policy implementation in Industrial Networked Systems [pdf]Paper   doi   link   bibtex   abstract  
Leveraging SDN to improve security in industrial networks. Cheminod, M., Durante, L., Seno, L., Valenza, F., Valenzano, A., & Zunino, C. In Proceedings of the 13th IEEE International Workshop on Factory Communication Systems (WFCS 2017), pages 1–7, 2017. IEEE
Leveraging SDN to improve security in industrial networks [pdf]Paper   doi   link   bibtex   abstract  
A model for the analysis of security policies in service function chains. Durante, L., Seno, L., Valenza, F., & Valenzano, A. In Proceedings of the IEEE Conference on Network Softwarization (NetSoft 2017), pages 1–6, 2017. IEEE
A model for the analysis of security policies in service function chains [pdf]Paper   doi   link   bibtex   abstract  
Classification and Analysis of Communication Protection Policy Anomalies. Valenza, F., Basile, C., Canavese, D., & Lioy, A. IEEE/ACM Transactions on Networking, 25(5): 2601–2614. 2017.
Classification and Analysis of Communication Protection Policy Anomalies [pdf]Paper   doi   link   bibtex   abstract  
Assessing network authorization policies via reachability analysis. Basile, C., Canavese, D., Pitscheider, C., Lioy, A., & Valenza, F. Computers and Electrical Engineering, 64: 110–131. 2017.
Assessing network authorization policies via reachability analysis [pdf]Paper   doi   link   bibtex   abstract  
  2016 (2)
Inter-function anomaly analysis for correct SDN/NFV deployment. Basile, C., Canavese, D., Lioy, A., Pitscheider, C., & Valenza, F. International Journal of Network Management, 26(1): 25–43. 2016.
Inter-function anomaly analysis for correct SDN/NFV deployment [pdf]Paper   doi   link   bibtex   abstract  
Online and Offline Security Policy Assessment. Valenza, F., Vallini, M., & Lioy, A. In Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats (MIST@CCS 2016), pages 101–104, 2016. ACM
Online and Offline Security Policy Assessment [pdf]Paper   doi   link   bibtex   abstract  
  2015 (4)
Towards the Dynamic Provision of Virtualized Security Services. Basile, C., Pitscheider, C., Risso, F., Valenza, F., & Vallini, M. In Cleary, F., & Felici, M., editor(s), Cyber Security and Privacy - 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium, April 28-29, 2015, Revised Selected Papers, volume 530, of Communications in Computer and Information Science, pages 65–76, 2015. Springer
Towards the Dynamic Provision of Virtualized Security Services [pdf]Paper   doi   link   bibtex   abstract  
A novel approach for integrating security policy enforcement with dynamic network virtualization. Basile, C., Lioy, A., Pitscheider, C., Valenza, F., & Vallini, M. In Proceedings of the 1st IEEE Conference on Network Softwarization (NetSoft 2015), pages 1–5, 2015. IEEE
A novel approach for integrating security policy enforcement with dynamic network virtualization [pdf]Paper   doi   link   bibtex   abstract  
Automatic Discovery of Software Attacks via Backward Reasoning. Basile, C., Canavese, D., d'Annoville , J., Sutter, B. D., & Valenza, F. In Proceedings of the 1st IEEE/ACM International Workshop on Software Protection (SPRO 2015), pages 52–58, 2015. IEEE
Automatic Discovery of Software Attacks via Backward Reasoning [pdf]Paper   doi   link   bibtex   abstract  
A formal model of network policy analysis. Valenza, F., Spinoso, S., Basile, C., Sisto, R., & Lioy, A. In Proceedings of the 1st IEEE International Forum on Research and Technologies for Society and Industry (RTSI 2015), pages 516-522, 2015.
A formal model of network policy analysis [pdf]Paper   doi   link   bibtex   abstract  
  2014 (1)
Inter-technology Conflict Analysis for Communication Protection Policies. Basile, C., Canavese, D., Lioy, A., & Valenza, F. In Proceedings of the 9th International Conference of Risks and Security of Internet and Systems (CRiSIS 2014), pages 148–163, 2014. Springer,
Inter-technology Conflict Analysis for Communication Protection Policies [pdf]Paper   doi   link   bibtex   abstract