selected publications
-
academic article
-
chapter
- Quantifying the Impact Propagation of Cyber Attacks Using Business Logic Modeling. Lecture notes in computer science. 49-71. 2024
- Security and Privacy in the TeSLA Architecture. Lecture notes on data engineering and communications technologies. 85-108. 2019
- $$\mathcal {PCS}$$, A Privacy-Preserving Certification Scheme. Lecture notes in computer science. 239-256. 2017
- A Game Theoretical Model for Optimal Distribution of Network Security Resources. Lecture notes in computer science. 234-255. 2017
- Anonymous Certification for an e-Assessment Framework. Lecture notes in computer science. 70-85. 2017
- List of Authors. Elsevier eBooks. 245-245. 2015
-
conference paper
- Survey on intrusion detection systems in 5G. . 2023
- A new approach of network simulation for data generation in evaluating security products. . 2018
- Preserving confidentiality during the migration of virtual SDN topologies: A formal approach. . 1-5. 2017
- PCS, a privacy-preserving certification scheme. . 2017
- Towards a Secure Identity Management in Smartphone Environments. . 2133-2135. 2013