LURK-T: Limited Use of Remote Keys With Added Trust in TLS 1.3.
IEEE Trans. Netw. Sci. Eng., 2024
Forensic Data Analytics for Anomaly Detection in Evolving Networks.
CoRR, 2023
Trust Management Framework for Containerized Workloads Applications to 5G Networks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
Multi-Perspective Content Delivery Networks Security Framework Using Optimized Unsupervised Anomaly Detection.
IEEE Trans. Netw. Serv. Manag., 2022
Content Delivery Network Security: A Survey.
IEEE Commun. Surv. Tutorials, 2021
LURK: Server-Controlled TLS Delegation.
IACR Cryptol. ePrint Arch., 2020
Dynamic Security Orchestration for CDN Edge-Servers.
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018
A Security Orchestration System for CDN Edge Servers.
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018
Corrigendum to 'OBA2: An Onion approach to Binary code Authorship Attribution' [Digit Investig 11 (2014) S94-S103].
Digit. Investig., 2017
Simplified Wireless Connectivity for 5G Machine Type Communication.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Scalable code clone search for malware analysis.
Digit. Investig., 2015
OBA2: An Onion approach to Binary code Authorship Attribution.
Digit. Investig., 2014
On the Reverse Engineering of the Citadel Botnet.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
RESource: A Framework for Online Matching of Assembly with Open Source Code.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
Dynamic deployment of context-aware access control policies for constrained security devices.
J. Syst. Softw., 2011
Model-Driven Security Policy Deployment: Property Oriented Approach.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010
MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010
Architecture-Aware Adaptive Deployment of Contextual Security Policies.
Proceedings of the ARES 2010, 2010
A secured delegation of remote services on IPv6 home networks.
Proceedings of the CRiSIS 2009, 2009
Semantic context aware security policy deployment.
Proceedings of the 2009 ACM Symposium on Information, 2009
Reliable Process for Security Policy Deployment.
Proceedings of the SECRYPT 2007, 2007