Valentina Casola
Orcid: 0000-0003-0964-7014
According to our database1,
Valentina Casola
authored at least 124 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Internet Things J., October, 2024
Comput. Secur., February, 2024
Designing Secure and Resilient Cyber-Physical Systems: A Model-Based Moving Target Defense Approach.
IEEE Trans. Emerg. Top. Comput., 2024
Error Resiliency and Adversarial Robustness in Convolutional Neural Networks: An Empirical Analysis.
Proceedings of the Internet of Things, 2024
Ineffectiveness of Digital Transformations for Detecting Adversarial Attacks Against Quantized and Approximate CNNs.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
Proceedings of the 21st ACM International Conference on Computing Frontiers, 2024
DEFEDGE: Threat-Driven Security Testing and Proactive Defense Identification for Edge-Cloud Systems.
Proceedings of the Advanced Information Networking and Applications, 2024
A comprehensive evaluation of interrupt measurement techniques for predictability in safety-critical systems.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Understanding the challenges and novel architectural models of multi-cloud native applications - a systematic literature review.
J. Cloud Comput., 2023
Proceedings of the 9th International Workshop on Advances in Sensors and Interfaces, 2023
Timing Behavior Characterization of Critical Real-Time Systems through Hybrid Timing Analysis.
Proceedings of the 7th International Conference on System Reliability and Safety, 2023
Ensuring End-to-End Security in Computing Continuum Exploiting Physical Unclonable Functions.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Guest Editorial: Advanced Computing and Blockchain Applications for Critical Industrial IoT.
IEEE Trans. Ind. Informatics, 2022
Softw. Qual. J., 2022
Security and Privacy Service Level Agreement composition for Internet of Things systems on top of standard controls.
Comput. Electr. Eng., 2022
A Memory Protection Strategy for Resource Constrained Devices in Safety Critical Applications.
Proceedings of the 6th International Conference on System Reliability and Safety, 2022
2021
ACM Trans. Multim. Comput. Commun. Appl., 2021
IEEE Trans. Ind. Informatics, 2021
Combining contextualized word representation and sub-document level analysis through Bi-LSTM+CRF architecture for clinical de-identification.
Knowl. Based Syst., 2021
IEEE Internet Things J., 2021
A Novel COVID-19 Data Set and an Effective Deep Learning Approach for the De-Identification of Italian Medical Records.
IEEE Access, 2021
Proceedings of the Quality of Information and Communications Technology, 2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
2020
A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach.
J. Syst. Softw., 2020
Exploiting Workflow Languages and Semantics for Validation of Security Policies in IoT Composite Services.
IEEE Internet Things J., 2020
Int. J. Grid Util. Comput., 2020
Crosslingual named entity recognition for clinical de-identification applied to a COVID-19 Italian data set.
Appl. Soft Comput., 2020
Proceedings of the Quality of Information and Communications Technology, 2020
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020
2019
Internet Things, 2019
Int. J. Grid Util. Comput., 2019
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019
Enabling Technologies: Infrastructure for Collaborative Enterprises Editorial for WETICE 2019 Conference.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019
2018
Inf. Sci., 2018
Int. J. Grid Util. Comput., 2018
Comput. Secur., 2018
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018
A Proposal of a Cloud-Oriented Security and Performance Simulator Provided as-a-Service.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018
2017
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Proceedings of the CLOSER 2017, 2017
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017
2016
Cloud Computing for Earth Surface Deformation Analysis via Spaceborne Radar Imaging: A Case Study.
IEEE Trans. Cloud Comput., 2016
IEEE Cloud Comput., 2016
Proceedings of the 25th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2016
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
SLA-Driven Monitoring of Multi-cloud Application Components Using the MUSA Framework.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016
Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications.
Proceedings of the 2nd International Conference on Cloud Forward: From Distributed to Complete Computing, 2016
Proceedings of the Cloud Computing and Services Science - 6th International Conference, 2016
Providing Security SLA in Next Generation Data Centers with SPECS: The EMC Case Study.
Proceedings of the CLOSER 2016, 2016
Proceedings of the CLOSER 2016, 2016
A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services.
Proceedings of the 10th International Conference on Complex, 2016
2015
An On-Demand Web Tool for the Unsupervised Retrieval of Earth's Surface Deformation from SAR Data: The P-SBAS Service within the ESA G-POD Environment.
Remote. Sens., 2015
Proceedings of the 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2015
Unsupervised on-demand web service for DInSAR processing: The P-SBAS implementation within the ESA G-POD environment.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015
Towards Self-Protective Multi-Cloud Applications - MUSA - a Holistic Framework to Support the Security-Intelligent Lifecycle Management of Multi-Cloud Applications.
Proceedings of the CLOSER 2015, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
Proceedings of the 10th International Conference on P2P, 2015
2014
Int. J. Bus. Process. Integr. Manag., 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Cloud Platform for Scientific Advances in Earth Surface Interferometric SAR Image Analysis.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014
Proceedings of the CLOSER 2014, 2014
Proceedings of the CLOSER 2014, 2014
Proceedings of the Accountability and Security in the Cloud, 2014
2013
Int. J. Syst. Syst. Eng., 2013
A smart decision support systems based on a fast classifier and a semantic post reasoner.
Int. J. Syst. Syst. Eng., 2013
SIREN: a feasible moving target defence framework for securing resource-constrained embedded nodes.
Int. J. Crit. Comput. Based Syst., 2013
Log. J. IGPL, 2013
Future Gener. Comput. Syst., 2013
Proceedings of the 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2013
Proceedings of the Security and Trust Management - 9th International Workshop, 2013
Proceedings of the 2nd IEEE International Workshop on Measurements & Networking, 2013
A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices.
Proceedings of the Integration of Reusable Systems [extended versions of the best papers which were presented at IEEE International Conference on Information Reuse and Integration and IEEE International Workshop on Formal Methods Integration, 2013
A moving target defense approach for protecting resource-constrained distributed devices.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013
Proceedings of the Intelligent Distributed Computing VII, 2013
Proceedings of the Algorithms and Architectures for Parallel Processing, 2013
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
Proceedings of the Advanced Concepts for Intelligent Vision Systems, 2013
Proceedings of the Eighth International Conference on P2P, 2013
Proceedings of the Eighth International Conference on P2P, 2013
2012
Int. J. Adapt. Resilient Auton. Syst., 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
2011
Simul. Model. Pract. Theory, 2011
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops, 2011
Proceedings of the International Conference on Complex, 2011
Proceedings of the Computational Intelligence in Security for Information Systems, 2011
Proceedings of the Computers, Privacy and Data Protection: an Element of Choice, 2011
2010
Int. J. Auton. Adapt. Commun. Syst., 2010
Proceedings of the Euro-Par 2010 Parallel Processing Workshops, 2010
Proceedings of the CISIS 2010, 2010
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
A semantic based methodology to classify and protect sensitive data in medical records.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
2009
Proceedings of the GeoSensor Networks, Third International Conference, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the Cloud Computing - First International Conference, 2009
2008
Proceedings of the The Third International Conference on Availability, 2008
2007
A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures.
J. Comput. Secur., 2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
A policy-based evaluation framework for Quality and Security in Service Oriented Architectures.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007
Proceedings of the Advances in Grid and Pervasive Computing, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006
Design and implementation of TruMan, a Trust Manager Component for Distributed Systems.
Proceedings of the Second International Workshop on Security, 2006
2005
J. Univers. Comput. Sci., 2005
Security Design and Evaluation in a VoIP Secure Infrastracture: A Policy Based Approach.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
An Innovative Policy-Based Cross Certification Methodology for Public Key Infrastructures.
Proceedings of the Public Key Infrastructure, 2005
2004
Design of Policy-Based Security Mechanisms in a Distributed Web Services Architecture.
Proceedings of the Applied Parallel Computing, 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
A Policy-Based Design Methodology and Performance Evaluation Framework for a Secure VoIP Infrastructure.
Proceedings of the ICETE 2004, 2004
2003
Policy based interoperability in distributed security infrastructures.
Proceedings of the Enhanced Interoperable Systems. Proceedings of the 10th ISPE International Conference on Concurrent Engineering (ISPE CE 2003), 2003
2002
Policy formalization to combine separate systems into larger connected network of trust.
Proceedings of the Network Control and Engineering for QoS, 2002