generated by bibbase.org
  2022 (4)
Automated firewall configuration in virtual networks. Bringhenti, D., Marchetto, G., Sisto, R., Valenza, F., & Yusupov, J. IEEE Transactions on Dependable and Secure Computing. 2022. in press
Automated firewall configuration in virtual networks [pdf]Paper   doi   link   bibtex   abstract   18 downloads  
Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks. Bringhenti, D., Yusupov, J., Zarca, A. M., Valenza, F., Sisto, R., Bernabe, J. B., & Skarmeta, A. Elsevier Computer Networks, 213: 109–123. 2022.
Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks [pdf]Paper   doi   link   bibtex   abstract   5 downloads  
A Twofold Model for VNF Embedding and Time-Sensitive Network Flow Scheduling. Bringhenti, D., & Valenza, F. IEEE Access, 10: 44384–44399. 2022.
A Twofold Model for VNF Embedding and Time-Sensitive Network Flow Scheduling [pdf]Paper   doi   link   bibtex   abstract   3 downloads  
Toward Cybersecurity Personalization in Smart Homes. Bringhenti, D., Valenza, F., & Basile, C. IEEE Secur. Priv., 20(1): 45–53. 2022.
Toward Cybersecurity Personalization in Smart Homes [pdf]Paper   doi   link   bibtex   abstract   5 downloads  
  2021 (4)
Improving the Formal Verification of Reachability Policies in Virtualized Networks. Bringhenti, D., Marchetto, G., Sisto, R., Spinoso, S., Valenza, F., & Yusupov, J. IEEE Transactions on Network and Service Management, 18(1): 713-728. 2021.
Improving the Formal Verification of Reachability Policies in Virtualized Networks [pdf]Paper   doi   link   bibtex   abstract   21 downloads  
Guest editorial: Special issue on novel cyber-security paradigms for software-defined and virtualized systems. Valenza, F., Repetto, M., & Shiaeles, S. Comput. Networks, 193: 108126. 2021.
Guest editorial: Special issue on novel cyber-security paradigms for software-defined and virtualized systems [pdf]Paper   doi   link   bibtex   abstract   4 downloads  
A novel approach for security function graph configuration and deployment. Bringhenti, D., Marchetto, G., Sisto, R., & Valenza, F. In 7th IEEE International Conference on Network Softwarization, NetSoft 2021, Tokyo, Japan, June 28 - July 2, 2021, pages 457–463, 2021. IEEE
A novel approach for security function graph configuration and deployment [pdf]Paper   doi   link   bibtex   abstract   4 downloads  
A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks. Marchetto, G., Sisto, R., Valenza, F., Yusupov, J., & Ksentini, A. IEEE Transactions on Industrial Informatics, 17(2): 1515–1525. 2021.
A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks [pdf]Paper   doi   link   bibtex   abstract   17 downloads  
  2020 (9)
Work-in-Progress: A Formal Approach to Verify Fault Tolerance in Industrial Network Systems. Sacco, A., Marchetto, G., Sisto, R., & Valenza, F. In Proceedings of the 16th IEEE International Conference on Factory Communication Systems (WFCS 2020), pages 1–4, 2020. IEEE
Work-in-Progress: A Formal Approach to Verify Fault Tolerance in Industrial Network Systems [pdf]Paper   doi   link   bibtex   abstract   3 downloads  
Towards a Framework for Automatic Firewalls Configuration via Argumentation Reasoning. Karafili, E., Valenza, F., Chen, Y., & Lupu, E. C. In Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS 2020), pages 1–4, 2020. IEEE
Towards a Framework for Automatic Firewalls Configuration via Argumentation Reasoning [pdf]Paper   doi   link   bibtex   abstract   7 downloads  
Automated optimal firewall orchestration and configuration in virtualized networks. Bringhenti, D., Marchetto, G., Sisto, R., Valenza, F., & Yusupov, J. In Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS 2020), pages 1–7, 2020. IEEE
Automated optimal firewall orchestration and configuration in virtualized networks [pdf]Paper   doi   link   bibtex   abstract   11 downloads  
An Optimized Firewall Anomaly Resolution. Valenza, F., & Cheminod, M. Journal of Internet Services and Information Security, 10(1): 22–37. 2020.
An Optimized Firewall Anomaly Resolution [pdf]Paper   doi   link   bibtex   abstract   9 downloads  
Securing SOME/IP for In-Vehicle Service Protection. Iorio, M., Reineri, M., Risso, F., Sisto, R., & Valenza, F. IEEE Transactions on Vehicular Technology, 69(11): 13450–13466. 2020.
Securing SOME/IP for In-Vehicle Service Protection [pdf]Paper   doi   link   bibtex   abstract   4 downloads  
Short Paper: Automatic Configuration for an Optimal Channel Protection in Virtualized Networks. Bringhenti, D., Marchetto, G., Sisto, R., & Valenza, F. In Proceedings of the 2nd AMC CCS Workshop on Cyber-Security Arms Race (CYSARM 2020), pages 25-30, 2020.
Short Paper: Automatic Configuration for an Optimal Channel Protection in Virtualized Networks [pdf]Paper   doi   link   bibtex   abstract   8 downloads  
Protecting In-Vehicle Services: Security-Enabled SOME/IP Middleware. Iorio, M., Buttiglieri, A., Reineri, M., Risso, F., Sisto, R., & Valenza, F. IEEE Vehicular Technology Magazine, 15(3): 77-85. 2020.
Protecting In-Vehicle Services: Security-Enabled SOME/IP Middleware [pdf]Paper   doi   link   bibtex   abstract   4 downloads  
(User-friendly) formal requirements verification in the context of ISO26262. Makartetskiy, D., Marchetto, G., Sisto, R., Valenza, F., Virgilio, M., Leri, D., Denti, P., & Finizio, R. Engineering Science and Technology, an International Journal, 23(3): 494-506. 2020.
(User-friendly) formal requirements verification in the context of ISO26262 [pdf]Paper   doi   link   bibtex   abstract   3 downloads  
Introducing programmability and automation in the synthesis of virtual firewall rules. Bringhenti, D., Marchetto, G., Sisto, R., Valenza, F., & Yusupov, J. In Proceedings of the 6th IEEE Conference on Network Softwarization (NetSoft 2020), pages 473-478, 2020.
Introducing programmability and automation in the synthesis of virtual firewall rules [pdf]Paper   doi   link   bibtex   abstract   5 downloads  
  2019 (7)
Formally specifying and checking policies and anomalies in service function chaining. Valenza, F., Spinoso, S., & Sisto, R. Journal of Network and Computer Applications, 146. 2019.
Formally specifying and checking policies and anomalies in service function chaining [link]Paper   doi   link   bibtex   abstract   4 downloads  
Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions. Pedone, I., Lioy, A., & Valenza, F. Secur. Commun. Networks, 2019: 2425983:1–2425983:11. 2019.
Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions [pdf]Paper   doi   link   bibtex   abstract   3 downloads  
A Framework for Verification-Oriented User-Friendly Network Function Modeling. Marchetto, G., Sisto, R., Valenza, F., & Yusupov, J. IEEE Access, 7: 99349–99359. 2019.
A Framework for Verification-Oriented User-Friendly Network Function Modeling [pdf]Paper   doi   link   bibtex   abstract   4 downloads  
A comprehensive approach to the automatic refinement and verification of access control policies. Cheminod, M., Durante, L., Seno, L., Valenza, F., & Valenzano, A. Computers and Security, 80: 186–199. 2019.
A comprehensive approach to the automatic refinement and verification of access control policies [pdf]Paper   doi   link   bibtex   abstract   10 downloads  
Automated Security Management for Virtual Services. Repetto, M., Carrega, A., Yusupov, J., Valenza, F., Risso, F., & Lamanna, G. In Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2019), pages 1–2, 2019. IEEE
Automated Security Management for Virtual Services [pdf]Paper   doi   link   bibtex   abstract   4 downloads  
Towards a fully automated and optimized network security functions orchestration. Bringhenti, D., Marchetto, G., Sisto, R., Valenza, F., & Yusupov, J. In Proceedings of the 4th International Conference on Computing, Communications and Security (ICCCS 2019), pages 1–7, 2019. IEEE
Towards a fully automated and optimized network security functions orchestration [pdf]Paper   doi   link   bibtex   abstract   5 downloads  
Adding Support for Automatic Enforcement of Security Policies in NFV Networks. Basile, C., Valenza, F., Lioy, A., López, D. R., & Perales, A. P. IEEE/ACM Transactions on Networking, 27(2): 707–720. 2019.
Adding Support for Automatic Enforcement of Security Policies in NFV Networks [pdf]Paper   doi   link   bibtex   abstract   9 downloads  
  2018 (3)
User-oriented Network Security Policy Specification. Valenza, F., & Lioy, A. J. of Internet Services and Information Security (JISIS), 8(2): 33–47. 2018.
User-oriented Network Security Policy Specification [pdf]Paper   doi   link   bibtex   abstract   3 downloads  
On the impossibility of effectively using likely-invariants for software attestation purposes. Viticchié, A., Basile, C., Valenza, F., & Lioy, A. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 9(2): 1–25. 2018.
On the impossibility of effectively using likely-invariants for software attestation purposes [pdf]Paper   doi   link   bibtex   abstract   3 downloads  
Toward attribute-based access control policy in industrial networked systems. Cheminod, M., Durante, L., Valenza, F., & Valenzano, A. In 14th IEEE International Workshop on Factory Communication Systems, WFCS 2018, Imperia, Italy, June 13-15, 2018, pages 1–9, 2018. IEEE
Toward attribute-based access control policy in industrial networked systems [pdf]Paper   doi   link   bibtex   abstract   3 downloads  
  2017 (6)
A formal approach for network security policy validation. Valenza, F., Su, T., Spinoso, S., Lioy, A., Sisto, R., & Vallini, M. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 8(1): 79–100. 2017.
A formal approach for network security policy validation [pdf]Paper   doi   link   bibtex   abstract   3 downloads  
Automated fixing of access policy implementation in Industrial Networked Systems. Cheminod, M., Durante, L., Seno, L., Valenza, F., & Valenzano, A. In Proceedings of the 13th IEEE International Workshop on Factory Communication Systems (WFCS 2017), pages 1–9, 2017. IEEE
Automated fixing of access policy implementation in Industrial Networked Systems [pdf]Paper   doi   link   bibtex   abstract   4 downloads  
Leveraging SDN to improve security in industrial networks. Cheminod, M., Durante, L., Seno, L., Valenza, F., Valenzano, A., & Zunino, C. In Proceedings of the 13th IEEE International Workshop on Factory Communication Systems (WFCS 2017), pages 1–7, 2017. IEEE
Leveraging SDN to improve security in industrial networks [pdf]Paper   doi   link   bibtex   abstract   6 downloads  
A model for the analysis of security policies in service function chains. Durante, L., Seno, L., Valenza, F., & Valenzano, A. In Proceedings of the IEEE Conference on Network Softwarization (NetSoft 2017), pages 1–6, 2017. IEEE
A model for the analysis of security policies in service function chains [pdf]Paper   doi   link   bibtex   abstract   6 downloads  
Classification and Analysis of Communication Protection Policy Anomalies. Valenza, F., Basile, C., Canavese, D., & Lioy, A. IEEE/ACM Transactions on Networking, 25(5): 2601–2614. 2017.
Classification and Analysis of Communication Protection Policy Anomalies [pdf]Paper   doi   link   bibtex   abstract   4 downloads  
Assessing network authorization policies via reachability analysis. Basile, C., Canavese, D., Pitscheider, C., Lioy, A., & Valenza, F. Computers and Electrical Engineering, 64: 110–131. 2017.
Assessing network authorization policies via reachability analysis [pdf]Paper   doi   link   bibtex   abstract   3 downloads  
  2016 (2)
Inter-function anomaly analysis for correct SDN/NFV deployment. Basile, C., Canavese, D., Lioy, A., Pitscheider, C., & Valenza, F. International Journal of Network Management, 26(1): 25–43. 2016.
Inter-function anomaly analysis for correct SDN/NFV deployment [pdf]Paper   doi   link   bibtex   abstract   1 download  
Online and Offline Security Policy Assessment. Valenza, F., Vallini, M., & Lioy, A. In Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats (MIST@CCS 2016), pages 101–104, 2016. ACM
Online and Offline Security Policy Assessment [pdf]Paper   doi   link   bibtex   abstract  
  2015 (4)
Towards the Dynamic Provision of Virtualized Security Services. Basile, C., Pitscheider, C., Risso, F., Valenza, F., & Vallini, M. In Cleary, F., & Felici, M., editor(s), Cyber Security and Privacy - 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium, April 28-29, 2015, Revised Selected Papers, volume 530, of Communications in Computer and Information Science, pages 65–76, 2015. Springer
Towards the Dynamic Provision of Virtualized Security Services [pdf]Paper   doi   link   bibtex   abstract   1 download  
A novel approach for integrating security policy enforcement with dynamic network virtualization. Basile, C., Lioy, A., Pitscheider, C., Valenza, F., & Vallini, M. In Proceedings of the 1st IEEE Conference on Network Softwarization (NetSoft 2015), pages 1–5, 2015. IEEE
A novel approach for integrating security policy enforcement with dynamic network virtualization [pdf]Paper   doi   link   bibtex   abstract   19 downloads  
Automatic Discovery of Software Attacks via Backward Reasoning. Basile, C., Canavese, D., d'Annoville , J., Sutter, B. D., & Valenza, F. In Proceedings of the 1st IEEE/ACM International Workshop on Software Protection (SPRO 2015), pages 52–58, 2015. IEEE
Automatic Discovery of Software Attacks via Backward Reasoning [pdf]Paper   doi   link   bibtex   abstract   2 downloads  
A formal model of network policy analysis. Valenza, F., Spinoso, S., Basile, C., Sisto, R., & Lioy, A. In Proceedings of the 1st IEEE International Forum on Research and Technologies for Society and Industry (RTSI 2015), pages 516-522, 2015.
A formal model of network policy analysis [pdf]Paper   doi   link   bibtex   abstract   5 downloads  
  2014 (1)
Inter-technology Conflict Analysis for Communication Protection Policies. Basile, C., Canavese, D., Lioy, A., & Valenza, F. In Proceedings of the 9th International Conference of Risks and Security of Internet and Systems (CRiSIS 2014), pages 148–163, 2014. Springer,
Inter-technology Conflict Analysis for Communication Protection Policies [pdf]Paper   doi   link   bibtex   abstract   30 downloads