A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks | 1 | 0.35 | 2021 |
Improving the Formal Verification of Reachability Policies in Virtualized Networks | 2 | 0.37 | 2021 |
Introducing programmability and automation in the synthesis of virtual firewall rules | 0 | 0.34 | 2020 |
Work-in-Progress: A Formal Approach to Verify Fault Tolerance in Industrial Network Systems | 0 | 0.34 | 2020 |
Securing SOME/IP for In-Vehicle Service Protection | 2 | 0.63 | 2020 |
Short Paper - Automatic Configuration for an Optimal Channel Protection in Virtualized Networks. | 1 | 0.36 | 2020 |
Protecting In-Vehicle Services: Security-Enabled SOME/IP Middleware | 1 | 0.34 | 2020 |
Automatic Firewalls' Configuration Using Argumentation Reasoning. | 0 | 0.34 | 2020 |
Automated optimal firewall orchestration and configuration in virtualized networks. | 0 | 0.34 | 2020 |
An Optimized Firewall Anomaly Resolution. | 0 | 0.34 | 2020 |
Adding Support for Automatic Enforcement of Security Policies in NFV Networks | 6 | 0.64 | 2019 |
Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions | 0 | 0.34 | 2019 |
Formally specifying and checking policies and anomalies in service function chaining. | 1 | 0.35 | 2019 |
Towards a fully automated and optimized network security functions orchestration | 0 | 0.34 | 2019 |
A Framework for Verification-Oriented User-Friendly Network Function Modeling. | 0 | 0.34 | 2019 |
A comprehensive approach to the automatic refinement and verification of access control policies. | 1 | 0.35 | 2019 |
User-oriented Network Security Policy Specification. | 0 | 0.34 | 2018 |
On the impossibility of effectively using likely-invariants for software attestation purposes. | 0 | 0.34 | 2018 |
A model for the analysis of security policies in service function chains | 4 | 0.50 | 2017 |
Classification and Analysis of Communication Protection Policy Anomalies. | 3 | 0.39 | 2017 |
Leveraging SDN to improve security in industrial networks | 1 | 0.36 | 2017 |
Assessing network authorization policies via reachability analysis. | 5 | 0.44 | 2017 |
A formal approach for network security policy validation. | 5 | 0.44 | 2017 |
Inter-function anomaly analysis for correct SDN/NFV deployment. | 0 | 0.34 | 2016 |
Online and Offline Security Policy Assessment. | 0 | 0.34 | 2016 |
A novel approach for integrating security policy enforcement with dynamic network virtualization | 14 | 0.73 | 2015 |
Towards the Dynamic Provision of Virtualized Security Services | 4 | 0.44 | 2015 |
Inter-technology Conflict Analysis for Communication Protection Policies. | 3 | 0.42 | 2014 |