Davide Berardi

Orcid: 0000-0002-2473-2439

According to our database1, Davide Berardi authored at least 18 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Ranflood: A mitigation tool based on the principles of data flooding against ransomware.
SoftwareX, February, 2024

2023
Time sensitive networking security: issues of precision time protocol and its implementation.
Cybersecur., December, 2023

When Operation Technology Meets Information Technology: Challenges and Opportunities.
Future Internet, March, 2023

Data Flooding against Ransomware: Concepts and Implementations.
Comput. Secur., 2023

A Systematic Literature Review of Offensive and Defensive Security Solutions With Software Defined Network.
IEEE Access, 2023

Real-time Pipeline Reconfiguration of P4 Programmable Switches to Efficiently Detect and Mitigate DDoS Attacks.
Proceedings of the 26th Conference on Innovation in Clouds, Internet and Networks, 2023

A Structured Approach to Insider Threat Monitoring for Offensive Security Teams.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

Towards the Creation of Interdisciplinary Consumer-Oriented Security Metrics.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
P4DM: Measure the Link Delay with P4.
Sensors, 2022

Microservice security: a systematic literature review.
PeerJ Comput. Sci., 2022

An Industrial Network Digital Twin for enhanced security of Cyber-Physical Systems.
Proceedings of the International Symposium on Networks, Computers and Communications, 2022

2021
P-SCOR: Integration of Constraint Programming Orchestration and Programmable Data Plane.
IEEE Trans. Netw. Serv. Manag., 2021

A Security Monitoring Architecture based on Data Plane Programmability.
Proceedings of the Joint European Conference on Networks and Communications & 6G Summit, 2021

2020
Password Similarity Using Probabilistic Data Structures.
J. Cybersecur. Priv., December, 2020

Sustainable Infrastructure Monitoring for Security-Oriented Purposes.
Proceedings of the GoodTechs '20: 6th EAI International Conference on Smart Objects and Technologies for Social Good, 2020

TechNETium: Atomic Predicates and Model Driven Development to Verify Security Network Policies.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

2018
Security network policy enforcement through a SDN framework.
Proceedings of the 28th International Telecommunication Networks and Applications Conference, 2018

A Policy Checker Approach for Secure Industrial SDN.
Proceedings of the 2nd Cyber Security in Networking Conference, 2018


  Loading...