Virtualized Security at the Network Edge: A User-centric Approach D Montero, M Yannuzzi, A Shaw, L Jacquin, A Pastor, R Serral-Gracia, ... Communications Magazine, IEEE 53 (4), 176 - 186, 2015 | 63 | 2015 |
Adding Support for Automatic Enforcement of Security Policies in NFV Networks C Basile, F Valenza, A Lioy, DR Lopez, AP Perales IEEE/ACM Transactions on Networking 27 (2), 707-720, 2019 | 62 | 2019 |
A novel approach for integrating security policy enforcement with dynamic network virtualization C Basile, A Lioy, C Pitscheider, F Valenza, M Vallini Proceedings of the 2015 1st IEEE Conference on Network Softwarization …, 2015 | 58 | 2015 |
Assessment of source code obfuscation techniques A Viticchié, L Regano, M Torchiano, C Basile, M Ceccato, P Tonella, ... 2016 IEEE 16th International Working Conference on Source Code Analysis and …, 2016 | 55 | 2016 |
Network-Level Access Control Policy Analysis and Transformation C Basile, A Cappadonia, A Lioy Networking, IEEE/ACM Transactions on 20 (4), 985-998, 2012 | 54 | 2012 |
How professional hackers understand protected code while performing attack tasks M Ceccato, P Tonella, C Basile, B Coppens, B De Sutter, P Falcarin, ... 2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC …, 2017 | 44 | 2017 |
How professional hackers understand protected code while performing attack tasks M Ceccato, P Tonella, C Basile, B Coppens, B De Sutter, P Falcarin, ... 2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC …, 2017 | 44 | 2017 |
Classification and analysis of communication protection policy anomalies F Valenza, C Basile, D Canavese, A Lioy IEEE/ACM Transactions on Networking 25 (5), 2601-2614, 2017 | 42 | 2017 |
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge M Ceccato, P Tonella, C Basile, P Falcarin, M Torchiano, B Coppens, ... Empirical Software Engineering 24, 240-286, 2019 | 38 | 2019 |
A meta-model for software protections and reverse engineering attacks C Basile, D Canavese, L Regano, P Falcarin, B De Sutter Journal of Systems and Software 150, 3-21, 2019 | 32 | 2019 |
Ontology-based security policy translation C Basile, A Lioy, S Scozzi, M Vallini Journal of Information Assurance and Security 5 (1), 437-445, 2010 | 31 | 2010 |
FPGA-based remote-code integrity verification of programs in distributed embedded systems C Basile, S Di Carlo, A Scionti IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2012 | 30 | 2012 |
Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks A Viticchié, C Basile, A Avancini, M Ceccato, B Abrath, B Coppens Proceedings of the 2016 ACM Workshop on Software PROtection, 73-84, 2016 | 28 | 2016 |
Analysis of Application-Layer Filtering Policies With Application to HTTP C Basile, A Lioy IEEE-ACM TRANSACTIONS ON NETWORKING 23 (1), 28-41, 2015 | 27 | 2015 |
POSITIF: a policy-based security management system C Basile, A Lioy, GM Perez, FJG Clemente, AFG Skarmeta Policies for Distributed Systems and Networks, 2007. POLICY'07. Eighth IEEE …, 2007 | 26 | 2007 |
Assessing network authorization policies via reachability analysis C Basile, D Canavese, C Pitscheider, A Lioy, F Valenza Computers & Electrical Engineering 64, 110-131, 2017 | 24 | 2017 |
Towards an algebraic approach to solve policy conflicts C Basile, A Lioy FCS 4, 319-338, 2004 | 24 | 2004 |
A formal model of network policy analysis F Valenza, S Spinoso, C Basile, R Sisto, A Lioy 2015 IEEE 1st International Forum on Research and Technologies for Society …, 2015 | 21 | 2015 |
Toward cybersecurity personalization in smart homes D Bringhenti, F Valenza, C Basile IEEE Security & Privacy 20 (1), 45-53, 2021 | 20 | 2021 |
Inter‐function anomaly analysis for correct SDN/NFV deployment C Basile, D Canavese, A Lioy, C Pitscheider, F Valenza International Journal of Network Management 26 (1), 25-43, 2016 | 19 | 2016 |