Security Automation using Traffic Flow Modeling S Bussa, R Sisto, F Valenza 2022 IEEE 8th International Conference on Network Softwarization (NetSoft …, 2022 | 9 | 2022 |
Formal Verification of a V2X Privacy Preserving Scheme Using Proverif S Bussa, R Sisto, F Valenza 2023 IEEE International Conference on Cyber Security and Resilience (CSR …, 2023 | 1 | 2023 |
PAKA: Pseudonymous Authenticated Key Agreement without bilinear cryptography R Schermann, S Bussa, R Urian, R Toegl, C Steger Proceedings of the 19th International Conference on Availability …, 2024 | | 2024 |
A Two-Fold Traffic Flow Model for Network Security Management D Bringhenti, S Bussa, R Sisto, F Valenza IEEE Transactions on Network and Service Management, 2024 | | 2024 |
Formal Verification of the FDO Protocol S Bussa, R Sisto, F Valenza 2023 IEEE Conference on Standards for Communications and Networking (CSCN …, 2023 | | 2023 |
Zero-Touch Privacy Preserving Provisioning in an Edge-, Fog-, and Cloud Environment R Schermann, S Bussa, R Urian, C Steger 2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC …, 2023 | | 2023 |
Traffic flow and network security function models S Bussa Politecnico di Torino, 2021 | | 2021 |