Fulvio Valenza
Politecnico di Torino
H-index: 19
Europe-Italy
Top articles of Fulvio Valenza
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Transmission of data or messages on board a vehicle using a SOME/IP communication protocol | 2024/3/19 | ||
Automatic and optimized firewall reconfiguration | Francesco Pizzato Daniele Bringhenti Riccardo Sisto Fulvio Valenza | 2024/1/15 | |
A novel abstraction for security configuration in virtual networks | Computer Networks | Daniele Bringhenti Riccardo Sisto Fulvio Valenza | 2023/6/1 |
Formal Verification of a V2X Privacy Preserving Scheme Using Proverif | Simone Bussa Riccardo Sisto Fulvio Valenza | 2023/7/31 | |
Introduction to Formal Methods for the Analysis and Design of Cryptographic Protocols | Daniele Bringhenti Riccardo Sisto Fulvio Valenza Jalolliddin Yusupov | 2023/9/19 | |
A demonstration of VEREFOO: an automated framework for virtual firewall configuration | Daniele Bringhenti Riccardo Sisto Fulvio Valenza | 2023/6/19 | |
Towards Security Automation in Virtual Networks | Daniele Bringhenti Riccardo Sisto Fulvio Valenza | 2023/6/19 | |
Formal Verification of the FDO Protocol | Simone Bussa Riccardo Sisto Fulvio Valenza | 2023/11/6 | |
Security automation for multi-cluster orchestration in Kubernetes | Daniele Bringhenti Riccardo Sisto Fulvio Valenza | 2023/6/19 | |
An Optimized Approach for Assisted Firewall Anomaly Resolution | IEEE Access | Daniele Bringhenti Lucia Seno Fulvio Valenza | 2023/10/27 |
Automating the configuration of firewalls and channel protection systems in virtual networks | Daniele Bringhenti Riccardo Sisto Fulvio Valenza | 2023/6/19 | |
Automation for network security configuration: State of the art and research Trends | Daniele Bringhenti Guido Marchetto Riccardo Sisto Fulvio Valenza | 2024 | |
Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks | Computer Networks | Daniele Bringhenti Jalolliddin Yusupov Alejandro Molina Zarca Fulvio Valenza Riccardo Sisto | 2022/8/4 |
Security automation using traffic flow modeling | Simone Bussa Riccardo Sisto Fulvio Valenza | 2022/6/27 | |
A hybrid threat model for smart systems | IEEE Transactions on Dependable and Secure Computing | Fulvio Valenza Erisa Karafili Rodrigo Vieira Steiner Emil C Lupu | 2022/10/11 |
Next Generation of Hybrid Threats | Fulvio Valenza | 2022/6/15 | |
Optimizing distributed firewall reconfiguration transients | Computer Networks | Daniele Bringhenti Fulvio Valenza | 2022/10/9 |
A twofold model for VNF embedding and time-sensitive network flow scheduling | IEEE Access | Daniele Bringhenti Fulvio Valenza | 2022/4/22 |
Guest Editors Introduction: Special Section on Recent Advances in Network Security Management | Rémi Badonnel Carol Fung Sandra Scott-Hayward Qi Li Fulvio Valenza | 2022/9 | |
Automated firewall configuration in virtual networks | IEEE Transactions on Dependable and Secure Computing | Daniele Bringhenti Guido Marchetto Riccardo Sisto Fulvio Valenza Jalolliddin Yusupov | 2023/3 |