Author of the publication

Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement.

, , , , , , , and . ESORICS (2), volume 11736 of Lecture Notes in Computer Science, page 239-262. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ProSPEC: Proactive Security Policy Enforcement for Containers., , , , , , and . CODASPY, page 155-166. ACM, (2022)MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV)., , , , and . ESORICS (3), volume 13556 of Lecture Notes in Computer Science, page 466-489. Springer, (2022)Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack., , , , , , and . CloudCom, page 58-65. IEEE Computer Society, (2015)Cloud calculus: Security verification in elastic cloud computing platform., , , , and . CTS, page 447-454. IEEE, (2012)Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement., , , , , , , and . ESORICS (2), volume 11736 of Lecture Notes in Computer Science, page 239-262. Springer, (2019)A Unified Approach for Verification and Validation of Systems and Software Engineering Models., , , , and . ECBS, page 409-418. IEEE Computer Society, (2006)Probabilistic Attack Scenarios to Evaluate Policies over Communication Protocols., , , and . J. Softw., 7 (7): 1488-1495 (2012)Multi-Level Proactive Security Auditing for Clouds., , , , , , , and . DSC, page 1-8. IEEE, (2019)Model-based systems security quantification., , and . PST, page 142-149. IEEE, (2011)Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack., , , , , and . CODASPY, page 195-206. ACM, (2016)