publication venue for
- A decentralized model for usage and information flow control in distributed systems. 144:103975-103975. 2024
- On the self-adjustment of privacy safeguards for query log streams. 134:103450-103450. 2023
- Towards security-Aware 5G slice embedding. 100:102075-102075. 2020
- Solving security constraints for 5G slice embedding: A proof-of-concept. 89:101662-101662. 2019
- Integrated framework for hands-on cybersecurity training: CyTrONE. 78:43-59. 2018
- ArOMA: An SDN based autonomic DDoS mitigation framework. 70:482-499. 2017
- Trust management system design for the Internet of Things: A context-aware and multi-service approach. 39:351-365. 2013
- Management of stateful firewall misconfiguration. 39:64-85. 2013
- Design and formal security evaluation of NeMHIP: A new secure and efficient network mobility management protocol based on the Host Identity Protocol. 32:1-18. 2012
- Exploring attack graph for cost-benefit security hardening: A probabilistic approach. 32:158-169. 2012
- Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks. 30:525-537. 2011
- A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider. 29:180-195. 2009