Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Change to survive: a Moving Target Defense approach to secure resource-constrained distributed devices.. University of Naples Federico II, Italy, (2013)base-search.net (ftunivnapoli:oai:fedoa.unina.it:9403).An Automatic Tool for Benchmark Testing of Cloud Applications., , , and . CLOSER, page 701-708. SciTePress, (2017)SLA-based Secure Cloud Application Development., , , and . Scalable Comput. Pract. Exp., 17 (4): 271-284 (2016)MUSA Deployer: Deployment of Multi-cloud Applications., , , , , , and . WETICE, page 107-112. IEEE Computer Society, (2017)A Security SLA-Driven Moving Target Defense Framework to Secure Cloud Applications., , , and . MTD@CCS, page 48-56. ACM, (2018)A Security Metric Catalogue for Cloud Applications., , , and . CISIS, volume 611 of Advances in Intelligent Systems and Computing, page 854-863. Springer, (2017)A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services., , , , and . CISIS, page 549-554. IEEE Computer Society, (2016)Digital Twin Space: The Integration of Digital Twins and Data Spaces., , , , , and . IEEE Big Data, page 4017-4025. IEEE, (2023)A Security and Privacy Validation Methodology for e-Health Systems., , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 17 (2s): 67:1-67:22 (2021)REST-Based SLA Management for Cloud Applications., , , and . WETICE, page 93-98. IEEE Computer Society, (2015)