Danilo Valeros Bernardo

According to our database1, Danilo Valeros Bernardo authored at least 21 papers between 2008 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Introduction and Analysis of SDN and NFV Security Architecture (SN-SECA).
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2013
Utilizing Security Risk Approach in Managing Cloud Computing Services.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

Random validation and fault detection method in systems implementations.
Proceedings of the 13th International Conference on Intellient Systems Design and Applications, 2013

Open Source Developer Download Tiers: A Survival Framework.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

2012
Network security mechanisms and implementations for the next generation reliable fast data transfer protocol - UDT
PhD thesis, 2012

Security risk assessment: toward a comprehensive practical risk management.
Int. J. Inf. Comput. Secur., 2012

Multi-layer security analysis and experimentation of high speed protocol data transfer for GRID.
Int. J. Grid Util. Comput., 2012

Securing the Cloud, Dispelling Fears: Ways to Combat Climate Change.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Symbolic Analysis of the Proposed UDT Security Architecture.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

Compositional Logic for Proof of Correctness of Proposed UDT Security Mechanisms.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

2011
Integrating scholarly articles within e-learning courses: a framework.
Proceedings of the 16th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2011

Formalization and Information-Theoretic Soundness in the Development of Security Architecture for Next Generation Network Protocol - UDT.
Proceedings of the Security Technology, 2011

Empirical Survey: Experimentation and Implementations of High Speed Protocol Data Transfer for GRID.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characterization
CoRR, 2010

Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Protecting Next Generation High Speed Network Protocol - UDT through Generic Security Service Application Program Interface - GSS-API.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

Understanding the Use of Elicitation Approaches for Effective Requirements Gathering.
Proceedings of the Fifth International Conference on Software Engineering Advances, 2010

End-to-End Security Methods for UDT Data Transmissions.
Proceedings of the Future Generation Information Technology, 2010

UDT -Authentication Option field: An approach.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Quantitative Security Risk Assessment (SRA) Method: An Empirical Case Study.
Proceedings of the World Congress on Nature & Biologically Inspired Computing, 2009

2008
Criteria for Estimating Effort for Requirements Changes.
Proceedings of the Software Process Improvement, 15th European Conference, 2008


  Loading...