2017 Index IEEE Transactions on Services Computing Vol. 10 MV Ahluwalia, Y Ait-Ameur, Z Anwar, D Ardagna, K Aziz, G Babin, J Baek, ... | | |
A cloud SecDevOps methodology: from design to testing V Casola, A De Benedictis, M Rak, G Salzillo Quality of Information and Communications Technology: 13th International …, 2020 | 14 | 2020 |
A Cyber Digital Twin Framework to Support Cyber-Physical Systems Security A Somma, V Casola, AR Cavalli, A De Benedictis, W Mallouli, VE Valdés 2023 IEEE Smart World Congress (SWC), 1-10, 2023 | | 2023 |
A Digital Twin Architecture for Intelligent Public Transportation Systems: A FIWARE-Based Solution A De Benedictis, F Rocco di Torrepadula, A Somma International Symposium on Web and Wireless Geographical Information Systems …, 2024 | | 2024 |
A first step towards an ISO-based information security domain ontology V Casola, R Catelli, A De Benedictis 2019 IEEE 28th International Conference on Enabling Technologies …, 2019 | 6 | 2019 |
A framework for cloud-aware development of bag-of-tasks scientific applications AD Benedictis, M Rak, M Turtur, U Villano International Journal of Grid and Utility Computing 7 (2), 130-140, 2016 | 6 | 2016 |
A methodology for automated penetration testing of cloud applications V Casola, AD Benedictis, M Rak, U Villano International Journal of Grid and Utility Computing 11 (2), 267-277, 2020 | 23 | 2020 |
A model-based evaluation methodology for Smart Energy Systems A De Benedictis, N Mazzocca, R Nardone, S Venticinque 2018 IEEE International Conference on Smart Computing (SMARTCOMP), 187-194, 2018 | 1 | 2018 |
A moving target defense approach for protecting resource-constrained distributed devices V Casola, A De Benedictis, M Albanese 2013 IEEE 14th International Conference on Information Reuse & Integration …, 2013 | 74 | 2013 |
A moving target defense mechanism for manets based on identity virtualization M Albanese, A De Benedictis, S Jajodia, K Sun 2013 IEEE Conference on Communications and Network Security (CNS), 278-286, 2013 | 59 | 2013 |
A multi-layer moving target defense approach for protecting resource-constrained distributed devices V Casola, A De Benedictis, M Albanese Integration of Reusable Systems, 299-324, 2014 | 32 | 2014 |
A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach V Casola, A De Benedictis, M Rak, U Villano Journal of Systems and Software 163, 110537, 2020 | 82 | 2020 |
A probabilistic framework for distributed localization of attackers in MANETs A De Benedictis, B Koosha, M Albanese, V Casola Security and Trust Management: 9th International Workshop, STM 2013, Egham …, 2013 | 3 | 2013 |
A probabilistic framework for jammer identification in MANETs M Albanese, A De Benedictis, S Jajodia, D Torrieri Ad Hoc Networks 14, 84-94, 2014 | 9 | 2014 |
A probabilistic framework for localization of attackers in manets M Albanese, A De Benedictis, S Jajodia, P Shakarian Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012 | 5 | 2012 |
A Proposal of a Cloud-oriented Security and Performance Simulator Provided as-a-service V Casola, A De Benedictis, M Rak, U Villano Complex, Intelligent, and Software Intensive Systems: Proceedings of the …, 2019 | 3 | 2019 |
A PUF-based hardware mutual authentication protocol M Barbareschi, A De Benedictis, N Mazzocca Journal of Parallel and Distributed Computing 119, 107-120, 2018 | 50 | 2018 |
A PUF-based mutual authentication scheme for cloud-edges IoT systems M Barbareschi, A De Benedictis, E La Montagna, A Mazzeo, N Mazzocca Future Generation Computer Systems 101, 246-261, 2019 | 62 | 2019 |
A Secure Architecture for Re-Taskable Sensing Systems A De Benedictis, A Gaglione, N Mazzocca Journal of Information Assurance and Security 6, 240-247, 2011 | 2 | 2011 |
A security and privacy validation methodology for e-health systems F Amato, V Casola, G Cozzolino, A De Benedictis, N Mazzocca, ... ACM Transactions on Multimedia Computing, Communications, and Applications …, 2021 | 17 | 2021 |