Fulvio Valenza

Orcid: 0000-0002-8471-3029

According to our database1, Fulvio Valenza authored at least 56 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Automation for Network Security Configuration: State of the Art and Research Trends.
ACM Comput. Surv., March, 2024

2023
A novel abstraction for security configuration in virtual networks.
Comput. Networks, June, 2023

A Hybrid Threat Model for Smart Systems.
IEEE Trans. Dependable Secur. Comput., 2023

Automated Firewall Configuration in Virtual Networks.
IEEE Trans. Dependable Secur. Comput., 2023

An Optimized Approach for Assisted Firewall Anomaly Resolution.
IEEE Access, 2023

Security automation for multi-cluster orchestration in Kubernetes.
Proceedings of the 9th IEEE International Conference on Network Softwarization, 2023

Automating the configuration of firewalls and channel protection systems in virtual networks.
Proceedings of the 9th IEEE International Conference on Network Softwarization, 2023

Towards Security Automation in Virtual Networks.
Proceedings of the 9th IEEE International Conference on Network Softwarization, 2023

A demonstration of VEREFOO: an automated framework for virtual firewall configuration.
Proceedings of the 9th IEEE International Conference on Network Softwarization, 2023

Formal Verification of a V2X Privacy Preserving Scheme Using Proverif.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Formal Verification of the FDO Protocol.
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2023

Introduction to Formal Methods for the Analysis and Design of Cryptographic Protocols.
Proceedings of the Handbook of Formal Analysis and Verification in Cryptography, 2023

2022
Guest Editors Introduction: Special Section on Recent Advances in Network Security Management.
IEEE Trans. Netw. Serv. Manag., 2022

Toward Cybersecurity Personalization in Smart Homes.
IEEE Secur. Priv., 2022

Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks.
Comput. Networks, 2022

Optimizing distributed firewall reconfiguration transients.
Comput. Networks, 2022

A Twofold Model for VNF Embedding and Time-Sensitive Network Flow Scheduling.
IEEE Access, 2022

Security Automation using Traffic Flow Modeling.
Proceedings of the 8th IEEE International Conference on Network Softwarization, 2022

Next Generation of Hybrid Threats.
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022

2021
Improving the Formal Verification of Reachability Policies in Virtualized Networks.
IEEE Trans. Netw. Serv. Manag., 2021

A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks.
IEEE Trans. Ind. Informatics, 2021

Guest editorial: Special issue on novel cyber-security paradigms for software-defined and virtualized systems.
Comput. Networks, 2021

A novel approach for security function graph configuration and deployment.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

2020
Protecting In-Vehicle Services: Security-Enabled SOME/IP Middleware.
IEEE Veh. Technol. Mag., 2020

Securing SOME/IP for In-Vehicle Service Protection.
IEEE Trans. Veh. Technol., 2020

An Optimized Firewall Anomaly Resolution.
J. Internet Serv. Inf. Secur., 2020

Work-in-Progress: A Formal Approach to Verify Fault Tolerance in Industrial Network Systems.
Proceedings of the 16th IEEE International Conference on Factory Communication Systems, 2020

Towards a Framework for Automatic Firewalls Configuration via Argumentation Reasoning.
Proceedings of the NOMS 2020, 2020

Automated optimal firewall orchestration and configuration in virtualized networks.
Proceedings of the NOMS 2020, 2020

Introducing programmability and automation in the synthesis of virtual firewall rules.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

Automatic Firewalls' Configuration Using Argumentation Reasoning.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2020

Short Paper: Automatic Configuration for an Optimal Channel Protection in Virtualized Networks.
Proceedings of the CYSARM@CCS '20: Proceedings of the 2nd Workshop on Cyber-Security Arms Race, 2020

2019
Adding Support for Automatic Enforcement of Security Policies in NFV Networks.
IEEE/ACM Trans. Netw., 2019

Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions.
Secur. Commun. Networks, 2019

Formally specifying and checking policies and anomalies in service function chaining.
J. Netw. Comput. Appl., 2019

A comprehensive approach to the automatic refinement and verification of access control policies.
Comput. Secur., 2019

A Framework for Verification-Oriented User-Friendly Network Function Modeling.
IEEE Access, 2019

Automated Security Management for Virtual Services.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2019

Towards a fully automated and optimized network security functions orchestration.
Proceedings of the 2019 4th International Conference on Computing, 2019

2018
On the impossibility of effectively using likely-invariants for software attestation purposes.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

User-oriented Network Security Policy Specification.
J. Internet Serv. Inf. Secur., 2018

Toward attribute-based access control policy in industrial networked systems.
Proceedings of the 14th IEEE International Workshop on Factory Communication Systems, 2018

2017
Modelling and Analysis of Network Security Policies.
PhD thesis, 2017

Classification and Analysis of Communication Protection Policy Anomalies.
IEEE/ACM Trans. Netw., 2017

A formal approach for network security policy validation.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017

Assessing network authorization policies via reachability analysis.
Comput. Electr. Eng., 2017

Leveraging SDN to improve security in industrial networks.
Proceedings of the IEEE 13th International Workshop on Factory Communication Systems, 2017

Automated fixing of access policy implementation in Industrial Networked Systems.
Proceedings of the IEEE 13th International Workshop on Factory Communication Systems, 2017

A model for the analysis of security policies in service function chains.
Proceedings of the 2017 IEEE Conference on Network Softwarization, 2017

2016
Inter-function anomaly analysis for correct SDN/NFV deployment.
Int. J. Netw. Manag., 2016

Online and Offline Security Policy Assessment.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

2015
A formal model of network policy analysis.
Proceedings of the 1st IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2015

A novel approach for integrating security policy enforcement with dynamic network virtualization.
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015

Automatic Discovery of Software Attacks via Backward Reasoning.
Proceedings of the 1st IEEE/ACM International Workshop on Software Protection, 2015

Towards the Dynamic Provision of Virtualized Security Services.
Proceedings of the Cyber Security and Privacy, 2015

2014
Inter-technology Conflict Analysis for Communication Protection Policies.
Proceedings of the Risks and Security of Internet and Systems, 2014


  Loading...