Comparative Assessment of Process Mining for Supporting IoT Predictive Security | 0 | 0.34 | 2021 |
Towards Automating Security Enhancement For Cloud Services | 0 | 0.34 | 2021 |
From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models | 1 | 0.35 | 2020 |
A Tool Suite For The Automated Synthesis Of Security Function Chains | 0 | 0.34 | 2019 |
Automated Factorization of Security Chains in Software-Defined Networks | 0 | 0.34 | 2019 |
Unikernel-based approach for software-defined security in cloud infrastructures. | 0 | 0.34 | 2018 |
Demo: On-the-fly generation of unikernels for software-defined security in cloud infrastructures. | 0 | 0.34 | 2018 |
Report on the 10th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2016) - Management and Security in the Age of Hyperconnectivity. | 0 | 0.34 | 2018 |
Synaptic: A formal checker for SDN-based security policies. | 0 | 0.34 | 2018 |
Generation of SDN policies for protecting android environments based on automata learning. | 0 | 0.34 | 2018 |
Rule-Based Synthesis of Chains of Security Functions for Software-Defined Networks | 0 | 0.34 | 2018 |
Softwarization Of Networks, Clouds, And Internet Of Things | 1 | 0.36 | 2017 |
Towards a Software-Defined Security Framework for Supporting Distributed Cloud. | 0 | 0.34 | 2017 |
Using the RPL Protocol for Supporting Passive Monitoring in the Internet of Things | 2 | 0.38 | 2016 |
A Taxonomy of Attacks in RPL-based Internet of Things | 20 | 0.74 | 2016 |
Mitigation Of Topological Inconsistency Attacks In Rpl-Based Low-Power Lossy Networks | 10 | 0.52 | 2015 |
An Online Risk Management Strategy for VoIP Enterprise Infrastructures | 3 | 0.39 | 2015 |
Machine-assisted Cyber Threat Analysis Using Conceptual Knowledge Discovery. | 0 | 0.34 | 2015 |
Towards cloud-based compositions of security functions for mobile devices | 2 | 0.43 | 2015 |
Behavioral and dynamic security functions chaining for Android devices | 2 | 0.45 | 2015 |
A SAT-based autonomous strategy for security vulnerability management | 4 | 0.44 | 2014 |
Vulnerability Assessment in Autonomic Networks and Services: A Survey | 3 | 0.67 | 2014 |
Outsourcing Mobile Security in the Cloud. | 4 | 0.40 | 2014 |
A Study of RPL DODAG Version Attacks. | 11 | 0.65 | 2014 |
Leveraging Countermeasures As A Service For Voip Security In The Cloud | 1 | 0.35 | 2014 |
A probabilistic cost-efficient approach for mobile security assessment | 2 | 0.40 | 2013 |
Improving present security through the detection of past hidden vulnerable states | 0 | 0.34 | 2013 |
Ovaldroid: An OVAL-based vulnerability assessment framework for Android | 2 | 0.40 | 2013 |
Dynamic exposure control in P2PSIP networks | 3 | 0.40 | 2012 |
Increasing Android Security Using a Lightweight OVAL-Based Vulnerability Assessment Framework. | 3 | 0.48 | 2012 |
A broad-spectrum strategy for runtime risk management in VoIP enterprise architectures. | 3 | 0.41 | 2011 |
Managing risks at runtime in VoIP networks and services | 2 | 0.46 | 2010 |
Risk management in VoIP infrastructures using support vector machines | 7 | 0.54 | 2010 |
On Service Orchestration in Mobile Computing Environments | 2 | 0.37 | 2008 |
Dynamic pull-based load balancing for autonomic servers | 14 | 1.17 | 2008 |
Self-configurable fault monitoring in ad-hoc networks | 5 | 0.55 | 2008 |
Service Load Balancing with Autonomic Servers: Reversing the Decision Making Process | 1 | 0.35 | 2008 |
Fault detection in autonomic networks using the concept of promised cooperation | 0 | 0.34 | 2007 |
Fault monitoring in ad-hoc networks based on information theory | 3 | 0.43 | 2006 |
Monitoring end-to-end connectivity in mobile ad-hoc networks | 5 | 0.53 | 2005 |
Self-Organized Monitoring in Ad-Hoc Networks | 4 | 0.42 | 2005 |
Management of mobile ad hoc networks: information model and probe-based architecture | 17 | 1.05 | 2005 |
A Framework for Optimizing End-to-End Connectivity Degree in Mobile Ad-Hoc Networks | 1 | 0.37 | 2005 |
Automating the Provisioning of Application Services with the BPEL4WS Workflow Language | 16 | 3.24 | 2004 |