Author of the publication

A formal approach for network security policy validation.

, , , , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 8 (1): 79-100 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards the Dynamic Provision of Virtualized Security Services., , , , and . CSP Forum, volume 530 of Communications in Computer and Information Science, page 65-76. Springer, (2015)Automated fixing of access policy implementation in Industrial Networked Systems., , , , and . WFCS, page 1-9. IEEE, (2017)A demonstration of VEREFOO: an automated framework for virtual firewall configuration., , and . NetSoft, page 293-295. IEEE, (2023)Automating the configuration of firewalls and channel protection systems in virtual networks., , and . NetSoft, page 474-479. IEEE, (2023)A Hybrid Threat Model for Smart Systems., , , and . IEEE Trans. Dependable Secur. Comput., 20 (5): 4403-4417 (September 2023)Inter-technology Conflict Analysis for Communication Protection Policies., , , and . CRiSIS, volume 8924 of Lecture Notes in Computer Science, page 148-163. Springer, (2014)Automatic Discovery of Software Attacks via Backward Reasoning., , , , and . SPRO@ICSE, page 52-58. IEEE Computer Society, (2015)Towards a fully automated and optimized network security functions orchestration., , , , and . ICCCS, page 1-7. IEEE, (2019)Securing SOME/IP for In-Vehicle Service Protection., , , , and . IEEE Trans. Veh. Technol., 69 (11): 13450-13466 (2020)Inter-function anomaly analysis for correct SDN/NFV deployment., , , , and . Int. J. Netw. Manag., 26 (1): 25-43 (2016)