Alessandra De Benedictis
Orcid: 0000-0001-7455-4653
According to our database1,
Alessandra De Benedictis
authored at least 68 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Comput. Secur., February, 2024
Designing Secure and Resilient Cyber-Physical Systems: A Model-Based Moving Target Defense Approach.
IEEE Trans. Emerg. Top. Comput., 2024
The convergence of Digital Twins and Distributed Ledger Technologies: A systematic literature review and an architectural proposal.
J. Netw. Comput. Appl., 2024
A Digital Twin Architecture for Intelligent Public Transportation Systems: A FIWARE-Based Solution.
Proceedings of the Web and Wireless Geographical Information Systems, 2024
DEFEDGE: Threat-Driven Security Testing and Proactive Defense Identification for Edge-Cloud Systems.
Proceedings of the Advanced Information Networking and Applications, 2024
2023
Digital Twins for Anomaly Detection in the Industrial Internet of Things: Conceptual Architecture and Proof-of-Concept.
IEEE Trans. Ind. Informatics, December, 2023
Digital Twins in Healthcare: An Architectural Proposal and Its Application in a Social Distancing Case Study.
IEEE J. Biomed. Health Informatics, October, 2023
Towards AI-assisted digital twins for smart railways: preliminary guideline and reference architecture.
J. Reliab. Intell. Environ., September, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
2022
ISM-AC: an immune security model based on alert correlation and software-defined networking.
Int. J. Inf. Sec., 2022
Toward the Adoption of Secure Cyber Digital Twins to Enhance Cyber-Physical Systems Security.
Proceedings of the Quality of Information and Communications Technology, 2022
2021
ACM Trans. Multim. Comput. Commun. Appl., 2021
IEEE Trans. Ind. Informatics, 2021
IEEE Internet Things J., 2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
2020
A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach.
J. Syst. Softw., 2020
Exploiting Workflow Languages and Semantics for Validation of Security Policies in IoT Composite Services.
IEEE Internet Things J., 2020
Int. J. Grid Util. Comput., 2020
Future Gener. Comput. Syst., 2020
Proceedings of the Quality of Information and Communications Technology, 2020
2019
Internet Things, 2019
Int. J. Grid Util. Comput., 2019
Future Gener. Comput. Syst., 2019
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019
Enabling Technologies: Infrastructure for Collaborative Enterprises Editorial for WETICE 2019 Conference.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019
2018
J. Parallel Distributed Comput., 2018
Inf. Sci., 2018
Int. J. Grid Util. Comput., 2018
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018
A Proposal of a Cloud-Oriented Security and Performance Simulator Provided as-a-Service.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018
2017
Int. J. Grid Util. Comput., 2017
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Proceedings of the CLOSER 2017, 2017
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017
2016
Int. J. Grid Util. Comput., 2016
Proceedings of the 25th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2016
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications.
Proceedings of the 2nd International Conference on Cloud Forward: From Distributed to Complete Computing, 2016
A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services.
Proceedings of the 10th International Conference on Complex, 2016
2015
Proceedings of the 24th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2015
Proceedings of the 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
Proceedings of the 10th International Conference on P2P, 2015
2014
Int. J. Bus. Process. Integr. Manag., 2014
Proceedings of the 2014 IEEE 23rd International WETICE Conference, 2014
Proceedings of the CLOSER 2014, 2014
Proceedings of the Accountability and Security in the Cloud, 2014
Proceedings of the 2014 Ninth International Conference on P2P, 2014
2013
Change to survive: a Moving Target Defense approach to secure resource-constrained distributed devices.
PhD thesis, 2013
Int. J. Syst. Syst. Eng., 2013
Proceedings of the Security and Trust Management - 9th International Workshop, 2013
A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices.
Proceedings of the Integration of Reusable Systems [extended versions of the best papers which were presented at IEEE International Conference on Information Reuse and Integration and IEEE International Workshop on Formal Methods Integration, 2013
A moving target defense approach for protecting resource-constrained distributed devices.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
Proceedings of the Cloud Computing and Services Science - Third International Conference, 2013
2012
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops, 2011
2010
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010