Alessandra De Benedictis

Orcid: 0000-0001-7455-4653

According to our database1, Alessandra De Benedictis authored at least 68 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Secure software development and testing: A model-based methodology.
Comput. Secur., February, 2024

Designing Secure and Resilient Cyber-Physical Systems: A Model-Based Moving Target Defense Approach.
IEEE Trans. Emerg. Top. Comput., 2024

The convergence of Digital Twins and Distributed Ledger Technologies: A systematic literature review and an architectural proposal.
J. Netw. Comput. Appl., 2024

A Digital Twin Architecture for Intelligent Public Transportation Systems: A FIWARE-Based Solution.
Proceedings of the Web and Wireless Geographical Information Systems, 2024

DEFEDGE: Threat-Driven Security Testing and Proactive Defense Identification for Edge-Cloud Systems.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Digital Twins for Anomaly Detection in the Industrial Internet of Things: Conceptual Architecture and Proof-of-Concept.
IEEE Trans. Ind. Informatics, December, 2023

Digital Twins in Healthcare: An Architectural Proposal and Its Application in a Social Distancing Case Study.
IEEE J. Biomed. Health Informatics, October, 2023

Towards AI-assisted digital twins for smart railways: preliminary guideline and reference architecture.
J. Reliab. Intell. Environ., September, 2023

Digital Twin Space: The Integration of Digital Twins and Data Spaces.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
ISM-AC: an immune security model based on alert correlation and software-defined networking.
Int. J. Inf. Sec., 2022

Toward the Adoption of Secure Cyber Digital Twins to Enhance Cyber-Physical Systems Security.
Proceedings of the Quality of Information and Communications Technology, 2022

2021
A Security and Privacy Validation Methodology for e-Health Systems.
ACM Trans. Multim. Comput. Commun. Appl., 2021

On the Adoption of Physically Unclonable Functions to Secure IIoT Devices.
IEEE Trans. Ind. Informatics, 2021

Security-Aware Deployment Optimization of Cloud-Edge Systems in Industrial IoT.
IEEE Internet Things J., 2021

Toward Automated Threat Modeling of Edge Computing Systems.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach.
J. Syst. Softw., 2020

Exploiting Workflow Languages and Semantics for Validation of Security Policies in IoT Composite Services.
IEEE Internet Things J., 2020

A methodology for automated penetration testing of cloud applications.
Int. J. Grid Util. Comput., 2020

Security and trust in cloud application life-cycle management.
Future Gener. Comput. Syst., 2020

A Cloud SecDevOps Methodology: From Design to Testing.
Proceedings of the Quality of Information and Communications Technology, 2020

2019
Toward the automation of threat modeling and risk assessment in IoT systems.
Internet Things, 2019

A security monitoring system for internet of things.
Internet Things, 2019

Model-based deployment of secure multi-cloud applications.
Int. J. Grid Util. Comput., 2019

A PUF-based mutual authentication scheme for Cloud-Edges IoT systems.
Future Gener. Comput. Syst., 2019

A First Step Towards an ISO-Based Information Security Domain Ontology.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

Enabling Technologies: Infrastructure for Collaborative Enterprises Editorial for WETICE 2019 Conference.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

PUF-Enabled Authentication-as-a-Service in Fog-IoT Systems.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

2018
A PUF-based hardware mutual authentication protocol.
J. Parallel Distributed Comput., 2018

Security-by-design in multi-cloud applications: An optimization approach.
Inf. Sci., 2018

Per-service security SLAs for cloud security management: model and implementation.
Int. J. Grid Util. Comput., 2018

Towards Automated Penetration Testing for Cloud Applications.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018

A Model-Based Evaluation Methodology for Smart Energy Systems.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

A Proposal of a Cloud-Oriented Security and Performance Simulator Provided as-a-Service.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

A Security SLA-Driven Moving Target Defense Framework to Secure Cloud Applications.
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018

Automated Risk Analysis for IoT Systems.
Proceedings of the Advances on P2P, 2018

2017
Automatically Enforcing Security SLAs in the Cloud.
IEEE Trans. Serv. Comput., 2017

SLAs for cloud applications: agreement protocol and REST-based implementation.
Int. J. Grid Util. Comput., 2017

MUSA Deployer: Deployment of Multi-cloud Applications.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

Towards Model-Based Security Assessment of Cloud Applications.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

An Automatic Tool for Benchmark Testing of Cloud Applications.
Proceedings of the CLOSER 2017, 2017

A Security Metric Catalogue for Cloud Applications.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017

2016
SLA-based Secure Cloud Application Development.
Scalable Comput. Pract. Exp., 2016

A framework for cloud-aware development of bag-of-tasks scientific applications.
Int. J. Grid Util. Comput., 2016

Per-Service Security SLa: A New Model for Security Management in Clouds.
Proceedings of the 25th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2016

Cloud Security: From Per-Provider to Per-Service Security SLAs.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications.
Proceedings of the 2nd International Conference on Cloud Forward: From Distributed to Complete Computing, 2016

A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services.
Proceedings of the 10th International Conference on Complex, 2016

2015
REST-Based SLA Management for Cloud Applications.
Proceedings of the 24th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2015

SLA-Based Secure Cloud Application Development: The SPECS Framework.
Proceedings of the 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2015

Security Monitoring in the Cloud: An SLA-Based Approach.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

DoS Protection in the Cloud through the SPECS Services.
Proceedings of the 10th International Conference on P2P, 2015

2014
An SLA-based brokering platform to provide sensor networks as-a-service.
Int. J. Bus. Process. Integr. Manag., 2014

A probabilistic framework for jammer identification in MANETs.
Ad Hoc Networks, 2014

Cloud-Aware Development of Scientific Applications.
Proceedings of the 2014 IEEE 23rd International WETICE Conference, 2014

Preliminary Design of a Platform-as-a-Service to Provide Security in Cloud.
Proceedings of the CLOSER 2014, 2014

On the Adoption of Security SLAs in the Cloud.
Proceedings of the Accountability and Security in the Cloud, 2014

Mobile Traffic Analysis Exploiting a Cloud Infrastructure and Hardware Accelerators.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
Change to survive: a Moving Target Defense approach to secure resource-constrained distributed devices.
PhD thesis, 2013

SeNsiM-SEC: secure sensor networks integration to monitor rail freight transport.
Int. J. Syst. Syst. Eng., 2013

A Probabilistic Framework for Distributed Localization of Attackers in MANETs.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013

A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices.
Proceedings of the Integration of Reusable Systems [extended versions of the best papers which were presented at IEEE International Conference on Information Reuse and Integration and IEEE International Workshop on Formal Methods Integration, 2013

A moving target defense approach for protecting resource-constrained distributed devices.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013

A moving target defense mechanism for MANETs based on identity virtualization.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

An SLA-Based Approach to Manage Sensor Networks as-a-Service.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

SecLA-Based Negotiation and Brokering of Cloud Resources.
Proceedings of the Cloud Computing and Services Science - Third International Conference, 2013

2012
A Probabilistic Framework for Localization of Attackers in MANETs.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Analysis and Comparison of Security Protocols in Wireless Sensor Networks.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops, 2011

2010
Securing a tiered re-taskable sensing system.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010


  Loading...