Riccardo Sisto
Politecnico di Torino
H-index: 27
Europe-Italy
Top articles of Riccardo Sisto
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Transmission of data or messages on board a vehicle using a SOME/IP communication protocol | 2024/3/19 | ||
Automatic and optimized firewall reconfiguration | Francesco Pizzato Daniele Bringhenti Riccardo Sisto Fulvio Valenza | 2024/1/15 | |
Security automation for multi-cluster orchestration in Kubernetes | Daniele Bringhenti Riccardo Sisto Fulvio Valenza | 2023/6/19 | |
Automation for network security configuration: State of the art and research Trends | Daniele Bringhenti Guido Marchetto Riccardo Sisto Fulvio Valenza | 2024 | |
Automating the configuration of firewalls and channel protection systems in virtual networks | Daniele Bringhenti Riccardo Sisto Fulvio Valenza | 2023/6/19 | |
RFC 9506: Explicit Host-to-Network Flow Measurements Techniques | M Cociglio A Ferrieux G Fioccola I Lubashev F Bulgarella | 2023/10/1 | |
A novel abstraction for security configuration in virtual networks | Computer Networks | Daniele Bringhenti Riccardo Sisto Fulvio Valenza | 2023/6/1 |
Formal Verification of a V2X Privacy Preserving Scheme Using Proverif | Simone Bussa Riccardo Sisto Fulvio Valenza | 2023/7/31 | |
Introduction to Formal Methods for the Analysis and Design of Cryptographic Protocols | Daniele Bringhenti Riccardo Sisto Fulvio Valenza Jalolliddin Yusupov | 2023/9/19 | |
A demonstration of VEREFOO: an automated framework for virtual firewall configuration | Daniele Bringhenti Riccardo Sisto Fulvio Valenza | 2023/6/19 | |
Towards Security Automation in Virtual Networks | Daniele Bringhenti Riccardo Sisto Fulvio Valenza | 2023/6/19 | |
Formal Verification of the FDO Protocol | Simone Bussa Riccardo Sisto Fulvio Valenza | 2023/11/6 | |
Formal verification of Remote Attestation protocols in a Fog Computing Architecture | Andreina Erika Ricci | 2022/7/29 | |
Security automation using traffic flow modeling | Simone Bussa Riccardo Sisto Fulvio Valenza | 2022/6/27 | |
Automated firewall configuration in virtual networks | IEEE Transactions on Dependable and Secure Computing | Daniele Bringhenti Guido Marchetto Riccardo Sisto Fulvio Valenza Jalolliddin Yusupov | 2023/3 |
Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks | Computer Networks | Daniele Bringhenti Jalolliddin Yusupov Alejandro Molina Zarca Fulvio Valenza Riccardo Sisto | 2022/8/4 |
Formal verification of security properties for remote attestation protocols | Alessandro Di Lorenzo | 2022/7/29 | |
Traffic flow and network security function models | Simone Bussa | 2021/7/27 | |
A novel approach for security function graph configuration and deployment | Daniele Bringhenti Guido Marchetto Riccardo Sisto Fulvio Valenza | 2021/6/28 | |
Modeling and Trajectory Tracking Control for Magnetic Wheeled Mobile Robots Based on Improved Dual-Heuristic Dynamic Programming | IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS | Guido Marchetto Riccardo Sisto Fulvio Valenza Jalolliddin Yusupov Adlen Ksentini | 2021/2/1 |