Name
Papers
Collaborators
FULVIO VALENZA
28
39
Citations 
PageRank 
Referers 
54
11.17
134
Referees 
References 
378
164
Search Limit
100378
Title
Citations
PageRank
Year
A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks10.352021
Improving the Formal Verification of Reachability Policies in Virtualized Networks20.372021
Introducing programmability and automation in the synthesis of virtual firewall rules00.342020
Work-in-Progress: A Formal Approach to Verify Fault Tolerance in Industrial Network Systems00.342020
Securing SOME/IP for In-Vehicle Service Protection20.632020
Short Paper - Automatic Configuration for an Optimal Channel Protection in Virtualized Networks.10.362020
Protecting In-Vehicle Services: Security-Enabled SOME/IP Middleware10.342020
Automatic Firewalls' Configuration Using Argumentation Reasoning.00.342020
Automated optimal firewall orchestration and configuration in virtualized networks.00.342020
An Optimized Firewall Anomaly Resolution.00.342020
Adding Support for Automatic Enforcement of Security Policies in NFV Networks60.642019
Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions00.342019
Formally specifying and checking policies and anomalies in service function chaining.10.352019
Towards a fully automated and optimized network security functions orchestration00.342019
A Framework for Verification-Oriented User-Friendly Network Function Modeling.00.342019
A comprehensive approach to the automatic refinement and verification of access control policies.10.352019
User-oriented Network Security Policy Specification.00.342018
On the impossibility of effectively using likely-invariants for software attestation purposes.00.342018
A model for the analysis of security policies in service function chains40.502017
Classification and Analysis of Communication Protection Policy Anomalies.30.392017
Leveraging SDN to improve security in industrial networks10.362017
Assessing network authorization policies via reachability analysis.50.442017
A formal approach for network security policy validation.50.442017
Inter-function anomaly analysis for correct SDN/NFV deployment.00.342016
Online and Offline Security Policy Assessment.00.342016
A novel approach for integrating security policy enforcement with dynamic network virtualization140.732015
Towards the Dynamic Provision of Virtualized Security Services40.442015
Inter-technology Conflict Analysis for Communication Protection Policies.30.422014