Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks | 0 | 0.34 | 2022 |
A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks | 1 | 0.35 | 2021 |
Improving the Formal Verification of Reachability Policies in Virtualized Networks | 2 | 0.37 | 2021 |
Introducing programmability and automation in the synthesis of virtual firewall rules | 0 | 0.34 | 2020 |
Work-in-Progress: A Formal Approach to Verify Fault Tolerance in Industrial Network Systems | 0 | 0.34 | 2020 |
Securing SOME/IP for In-Vehicle Service Protection | 2 | 0.63 | 2020 |
Protecting In-Vehicle Services: Security-Enabled SOME/IP Middleware | 1 | 0.34 | 2020 |
Automated optimal firewall orchestration and configuration in virtualized networks. | 0 | 0.34 | 2020 |
Performance measurements of QUIC communications. | 0 | 0.34 | 2019 |
Multipoint Passive Monitoring in Packet Networks | 0 | 0.34 | 2019 |
Formally specifying and checking policies and anomalies in service function chaining. | 1 | 0.35 | 2019 |
Towards a fully automated and optimized network security functions orchestration | 0 | 0.34 | 2019 |
Detecting Injection Attacks on Cooperative Adaptive Cruise Control | 1 | 0.38 | 2019 |
A Framework for Verification-Oriented User-Friendly Network Function Modeling. | 0 | 0.34 | 2019 |
An efficient data exchange mechanism for chained network functions. | 0 | 0.34 | 2018 |
Formally sound implementations of security protocols with JavaSPI. | 0 | 0.34 | 2018 |
Multi-Objective Function Splitting and Placement of Network Slices in 5G Mobile Networks | 1 | 0.35 | 2018 |
Seamless Configuration of Virtual Network Functions in Data Center Provider Networks. | 1 | 0.36 | 2018 |
Push applications and dynamic content generation over content-centric networking. | 0 | 0.34 | 2017 |
A Framework for User-Friendly Verification-Oriented VNF Modeling | 0 | 0.34 | 2017 |
Formal verification of LTE-UMTS and LTE-LTE handover procedures. | 3 | 0.37 | 2017 |
A formal approach for network security policy validation. | 5 | 0.44 | 2017 |
DynNav: Toward Open and Interoperable Navigation Services. | 0 | 0.34 | 2016 |
Final Service Provider DevOps concept and evaluation. | 2 | 0.46 | 2016 |
Initial Service Provider DevOps concept, capabilities and proposed tools | 0 | 0.34 | 2015 |
Service Provider DevOps network capabilities and tools. | 2 | 0.40 | 2015 |
Formal Verification of Virtual Network Function Graphs in an SP-DevOps Context. | 8 | 0.59 | 2015 |
Formal verification of LTE-UMTS handover procedures. | 3 | 0.44 | 2015 |
Safe abstractions of data encodings in formal security protocol models. | 2 | 0.36 | 2014 |
Automated Formal Verification of Application-specific Security Properties | 1 | 0.36 | 2014 |
Formal verification of security protocol implementations: a survey. | 9 | 0.52 | 2014 |
Automatic Configuration of Opaque Network Functions in CMS | 2 | 0.43 | 2014 |
PIT overload analysis in content centric networks. | 21 | 0.85 | 2013 |
Visual Model-Driven Design, Verification and Implementation of Security Protocols | 3 | 0.42 | 2012 |
Formally based semi-automatic implementation of an open security protocol | 6 | 0.49 | 2012 |
Efficient multistriding of large non-deterministic finite state automata for deep packet inspection | 1 | 0.36 | 2012 |
Vehicle navigation service based on real-time traffic information: A RESTful NetAPI solution with long polling notification | 2 | 0.67 | 2012 |
Fast numerical solution of nonlinear nonlocal cochlear models | 1 | 0.37 | 2011 |
JavaSPI: A Framework for Security Protocol Implementation | 10 | 0.61 | 2011 |
The Java SPI Framework for Security Protocol Implementation | 6 | 0.49 | 2011 |
An approach to refinement checking of SysML requirements | 1 | 0.37 | 2011 |
SPAF: stateless FSA-based packet filters | 5 | 0.42 | 2011 |
iNFAnt: NFA pattern matching on GPGPU devices | 40 | 1.63 | 2010 |
Provably correct Java implementations of Spi Calculus security protocols specifications | 11 | 0.51 | 2010 |
An experience in embedded control software verification | 0 | 0.34 | 2009 |
Tools for cryptographic protocols analysis: A technical and experimental comparison | 6 | 0.63 | 2009 |
Detecting Chains of Vulnerabilities in Industrial Networks | 18 | 1.40 | 2009 |
A Lightweight Security Analyzer inside GCC | 2 | 0.36 | 2008 |
Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models | 3 | 0.39 | 2008 |
Efficient representation of the attacker’s knowledge in cryptographic protocols analysis | 1 | 0.40 | 2008 |