generated by bibbase.org
  2022 (4)
Automated firewall configuration in virtual networks. Bringhenti, D.; Marchetto, G.; Sisto, R.; Valenza, F.; and Yusupov, J. IEEE Transactions on Dependable and Secure Computing. 2022. in press
Automated firewall configuration in virtual networks [pdf]Paper   doi   link   bibtex   abstract   18 downloads  
Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks. Bringhenti, D.; Yusupov, J.; Zarca, A. M.; Valenza, F.; Sisto, R.; Bernabe, J. B.; and Skarmeta, A. Elsevier Computer Networks, 213: 109–123. 2022.
Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks [pdf]Paper   doi   link   bibtex   abstract   5 downloads  
A Twofold Model for VNF Embedding and Time-Sensitive Network Flow Scheduling. Bringhenti, D.; and Valenza, F. IEEE Access, 10: 44384–44399. 2022.
A Twofold Model for VNF Embedding and Time-Sensitive Network Flow Scheduling [pdf]Paper   doi   link   bibtex   abstract   3 downloads  
Toward Cybersecurity Personalization in Smart Homes. Bringhenti, D.; Valenza, F.; and Basile, C. IEEE Secur. Priv., 20(1): 45–53. 2022.
Toward Cybersecurity Personalization in Smart Homes [pdf]Paper   doi   link   bibtex   abstract   5 downloads  
  2021 (4)
Improving the Formal Verification of Reachability Policies in Virtualized Networks. Bringhenti, D.; Marchetto, G.; Sisto, R.; Spinoso, S.; Valenza, F.; and Yusupov, J. IEEE Transactions on Network and Service Management, 18(1): 713-728. 2021.
Improving the Formal Verification of Reachability Policies in Virtualized Networks [pdf]Paper   doi   link   bibtex   abstract   21 downloads  
Guest editorial: Special issue on novel cyber-security paradigms for software-defined and virtualized systems. Valenza, F.; Repetto, M.; and Shiaeles, S. Comput. Networks, 193: 108126. 2021.
Guest editorial: Special issue on novel cyber-security paradigms for software-defined and virtualized systems [pdf]Paper   doi   link   bibtex   abstract   4 downloads  
A novel approach for security function graph configuration and deployment. Bringhenti, D.; Marchetto, G.; Sisto, R.; and Valenza, F. In 7th IEEE International Conference on Network Softwarization, NetSoft 2021, Tokyo, Japan, June 28 - July 2, 2021, pages 457–463, 2021. IEEE
A novel approach for security function graph configuration and deployment [pdf]Paper   doi   link   bibtex   abstract   4 downloads  
A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks. Marchetto, G.; Sisto, R.; Valenza, F.; Yusupov, J.; and Ksentini, A. IEEE Transactions on Industrial Informatics, 17(2): 1515–1525. 2021.
A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks [pdf]Paper   doi   link   bibtex   abstract   17 downloads  
  2020 (9)
Work-in-Progress: A Formal Approach to Verify Fault Tolerance in Industrial Network Systems. Sacco, A.; Marchetto, G.; Sisto, R.; and Valenza, F. In Proceedings of the 16th IEEE International Conference on Factory Communication Systems (WFCS 2020), pages 1–4, 2020. IEEE
Work-in-Progress: A Formal Approach to Verify Fault Tolerance in Industrial Network Systems [pdf]Paper   doi   link   bibtex   abstract   3 downloads  
Towards a Framework for Automatic Firewalls Configuration via Argumentation Reasoning. Karafili, E.; Valenza, F.; Chen, Y.; and Lupu, E. C. In Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS 2020), pages 1–4, 2020. IEEE
Towards a Framework for Automatic Firewalls Configuration via Argumentation Reasoning [pdf]Paper   doi   link   bibtex   abstract   7 downloads  
Automated optimal firewall orchestration and configuration in virtualized networks. Bringhenti, D.; Marchetto, G.; Sisto, R.; Valenza, F.; and Yusupov, J. In Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS 2020), pages 1–7, 2020. IEEE
Automated optimal firewall orchestration and configuration in virtualized networks [pdf]Paper   doi   link   bibtex   abstract   11 downloads  
An Optimized Firewall Anomaly Resolution. Valenza, F.; and Cheminod, M. Journal of Internet Services and Information Security, 10(1): 22–37. 2020.
An Optimized Firewall Anomaly Resolution [pdf]Paper   doi   link   bibtex   abstract   9 downloads  
Securing SOME/IP for In-Vehicle Service Protection. Iorio, M.; Reineri, M.; Risso, F.; Sisto, R.; and Valenza, F. IEEE Transactions on Vehicular Technology, 69(11): 13450–13466. 2020.
Securing SOME/IP for In-Vehicle Service Protection [pdf]Paper   doi   link   bibtex   abstract   4 downloads  
Short Paper: Automatic Configuration for an Optimal Channel Protection in Virtualized Networks. Bringhenti, D.; Marchetto, G.; Sisto, R.; and Valenza, F. In Proceedings of the 2nd AMC CCS Workshop on Cyber-Security Arms Race (CYSARM 2020), pages 25-30, 2020.
Short Paper: Automatic Configuration for an Optimal Channel Protection in Virtualized Networks [pdf]Paper   doi   link   bibtex   abstract   8 downloads  
Protecting In-Vehicle Services: Security-Enabled SOME/IP Middleware. Iorio, M.; Buttiglieri, A.; Reineri, M.; Risso, F.; Sisto, R.; and Valenza, F. IEEE Vehicular Technology Magazine, 15(3): 77-85. 2020.
Protecting In-Vehicle Services: Security-Enabled SOME/IP Middleware [pdf]Paper   doi   link   bibtex   abstract   4 downloads  
(User-friendly) formal requirements verification in the context of ISO26262. Makartetskiy, D.; Marchetto, G.; Sisto, R.; Valenza, F.; Virgilio, M.; Leri, D.; Denti, P.; and Finizio, R. Engineering Science and Technology, an International Journal, 23(3): 494-506. 2020.
(User-friendly) formal requirements verification in the context of ISO26262 [pdf]Paper   doi   link   bibtex   abstract   3 downloads  
Introducing programmability and automation in the synthesis of virtual firewall rules. Bringhenti, D.; Marchetto, G.; Sisto, R.; Valenza, F.; and Yusupov, J. In Proceedings of the 6th IEEE Conference on Network Softwarization (NetSoft 2020), pages 473-478, 2020.
Introducing programmability and automation in the synthesis of virtual firewall rules [pdf]Paper   doi   link   bibtex   abstract   5 downloads  
  2019 (7)
Formally specifying and checking policies and anomalies in service function chaining. Valenza, F.; Spinoso, S.; and Sisto, R. Journal of Network and Computer Applications, 146. 2019.
Formally specifying and checking policies and anomalies in service function chaining [link]Paper   doi   link   bibtex   abstract   4 downloads  
Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions. Pedone, I.; Lioy, A.; and Valenza, F. Secur. Commun. Networks, 2019: 2425983:1–2425983:11. 2019.
Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions [pdf]Paper   doi   link   bibtex   abstract   3 downloads  
A Framework for Verification-Oriented User-Friendly Network Function Modeling. Marchetto, G.; Sisto, R.; Valenza, F.; and Yusupov, J. IEEE Access, 7: 99349–99359. 2019.
A Framework for Verification-Oriented User-Friendly Network Function Modeling [pdf]Paper   doi   link   bibtex   abstract   4 downloads  
A comprehensive approach to the automatic refinement and verification of access control policies. Cheminod, M.; Durante, L.; Seno, L.; Valenza, F.; and Valenzano, A. Computers and Security, 80: 186–199. 2019.
A comprehensive approach to the automatic refinement and verification of access control policies [pdf]Paper   doi   link   bibtex   abstract   10 downloads  
Automated Security Management for Virtual Services. Repetto, M.; Carrega, A.; Yusupov, J.; Valenza, F.; Risso, F.; and Lamanna, G. In Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2019), pages 1–2, 2019. IEEE
Automated Security Management for Virtual Services [pdf]Paper   doi   link   bibtex   abstract   4 downloads  
Towards a fully automated and optimized network security functions orchestration. Bringhenti, D.; Marchetto, G.; Sisto, R.; Valenza, F.; and Yusupov, J. In Proceedings of the 4th International Conference on Computing, Communications and Security (ICCCS 2019), pages 1–7, 2019. IEEE
Towards a fully automated and optimized network security functions orchestration [pdf]Paper   doi   link   bibtex   abstract   5 downloads  
Adding Support for Automatic Enforcement of Security Policies in NFV Networks. Basile, C.; Valenza, F.; Lioy, A.; López, D. R.; and Perales, A. P. IEEE/ACM Transactions on Networking, 27(2): 707–720. 2019.
Adding Support for Automatic Enforcement of Security Policies in NFV Networks [pdf]Paper   doi   link   bibtex   abstract   9 downloads  
  2018 (3)
User-oriented Network Security Policy Specification. Valenza, F.; and Lioy, A. J. of Internet Services and Information Security (JISIS), 8(2): 33–47. 2018.
User-oriented Network Security Policy Specification [pdf]Paper   doi   link   bibtex   abstract   3 downloads  
On the impossibility of effectively using likely-invariants for software attestation purposes. Viticchié, A.; Basile, C.; Valenza, F.; and Lioy, A. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 9(2): 1–25. 2018.
On the impossibility of effectively using likely-invariants for software attestation purposes [pdf]Paper   doi   link   bibtex   abstract   3 downloads  
Toward attribute-based access control policy in industrial networked systems. Cheminod, M.; Durante, L.; Valenza, F.; and Valenzano, A. In 14th IEEE International Workshop on Factory Communication Systems, WFCS 2018, Imperia, Italy, June 13-15, 2018, pages 1–9, 2018. IEEE
Toward attribute-based access control policy in industrial networked systems [pdf]Paper   doi   link   bibtex   abstract   3 downloads  
  2017 (6)
A formal approach for network security policy validation. Valenza, F.; Su, T.; Spinoso, S.; Lioy, A.; Sisto, R.; and Vallini, M. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 8(1): 79–100. 2017.
A formal approach for network security policy validation [pdf]Paper   doi   link   bibtex   abstract   3 downloads  
Automated fixing of access policy implementation in Industrial Networked Systems. Cheminod, M.; Durante, L.; Seno, L.; Valenza, F.; and Valenzano, A. In Proceedings of the 13th IEEE International Workshop on Factory Communication Systems (WFCS 2017), pages 1–9, 2017. IEEE
Automated fixing of access policy implementation in Industrial Networked Systems [pdf]Paper   doi   link   bibtex   abstract   4 downloads  
Leveraging SDN to improve security in industrial networks. Cheminod, M.; Durante, L.; Seno, L.; Valenza, F.; Valenzano, A.; and Zunino, C. In Proceedings of the 13th IEEE International Workshop on Factory Communication Systems (WFCS 2017), pages 1–7, 2017. IEEE
Leveraging SDN to improve security in industrial networks [pdf]Paper   doi   link   bibtex   abstract   6 downloads  
A model for the analysis of security policies in service function chains. Durante, L.; Seno, L.; Valenza, F.; and Valenzano, A. In Proceedings of the IEEE Conference on Network Softwarization (NetSoft 2017), pages 1–6, 2017. IEEE
A model for the analysis of security policies in service function chains [pdf]Paper   doi   link   bibtex   abstract   6 downloads  
Classification and Analysis of Communication Protection Policy Anomalies. Valenza, F.; Basile, C.; Canavese, D.; and Lioy, A. IEEE/ACM Transactions on Networking, 25(5): 2601–2614. 2017.
Classification and Analysis of Communication Protection Policy Anomalies [pdf]Paper   doi   link   bibtex   abstract   4 downloads  
Assessing network authorization policies via reachability analysis. Basile, C.; Canavese, D.; Pitscheider, C.; Lioy, A.; and Valenza, F. Computers and Electrical Engineering, 64: 110–131. 2017.
Assessing network authorization policies via reachability analysis [pdf]Paper   doi   link   bibtex   abstract   3 downloads  
  2016 (2)
Inter-function anomaly analysis for correct SDN/NFV deployment. Basile, C.; Canavese, D.; Lioy, A.; Pitscheider, C.; and Valenza, F. International Journal of Network Management, 26(1): 25–43. 2016.
Inter-function anomaly analysis for correct SDN/NFV deployment [pdf]Paper   doi   link   bibtex   abstract   1 download  
Online and Offline Security Policy Assessment. Valenza, F.; Vallini, M.; and Lioy, A. In Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats (MIST@CCS 2016), pages 101–104, 2016. ACM
Online and Offline Security Policy Assessment [pdf]Paper   doi   link   bibtex   abstract  
  2015 (4)
Towards the Dynamic Provision of Virtualized Security Services. Basile, C.; Pitscheider, C.; Risso, F.; Valenza, F.; and Vallini, M. In Cleary, F.; and Felici, M., editor(s), Cyber Security and Privacy - 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium, April 28-29, 2015, Revised Selected Papers, volume 530, of Communications in Computer and Information Science, pages 65–76, 2015. Springer
Towards the Dynamic Provision of Virtualized Security Services [pdf]Paper   doi   link   bibtex   abstract   1 download  
A novel approach for integrating security policy enforcement with dynamic network virtualization. Basile, C.; Lioy, A.; Pitscheider, C.; Valenza, F.; and Vallini, M. In Proceedings of the 1st IEEE Conference on Network Softwarization (NetSoft 2015), pages 1–5, 2015. IEEE
A novel approach for integrating security policy enforcement with dynamic network virtualization [pdf]Paper   doi   link   bibtex   abstract   19 downloads  
Automatic Discovery of Software Attacks via Backward Reasoning. Basile, C.; Canavese, D.; d'Annoville , J.; Sutter, B. D.; and Valenza, F. In Proceedings of the 1st IEEE/ACM International Workshop on Software Protection (SPRO 2015), pages 52–58, 2015. IEEE
Automatic Discovery of Software Attacks via Backward Reasoning [pdf]Paper   doi   link   bibtex   abstract   2 downloads  
A formal model of network policy analysis. Valenza, F.; Spinoso, S.; Basile, C.; Sisto, R.; and Lioy, A. In Proceedings of the 1st IEEE International Forum on Research and Technologies for Society and Industry (RTSI 2015), pages 516-522, 2015.
A formal model of network policy analysis [pdf]Paper   doi   link   bibtex   abstract   5 downloads  
  2014 (1)
Inter-technology Conflict Analysis for Communication Protection Policies. Basile, C.; Canavese, D.; Lioy, A.; and Valenza, F. In Proceedings of the 9th International Conference of Risks and Security of Internet and Systems (CRiSIS 2014), pages 148–163, 2014. Springer,
Inter-technology Conflict Analysis for Communication Protection Policies [pdf]Paper   doi   link   bibtex   abstract   30 downloads