Fulvio Valenza

According to our database1, Fulvio Valenza authored at least 29 papers between 2014 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks.
IEEE Trans. Ind. Informatics, 2021

2020
Securing SOME/IP for In-Vehicle Service Protection.
IEEE Trans. Veh. Technol., 2020

An Optimized Firewall Anomaly Resolution.
J. Internet Serv. Inf. Secur., 2020

Work-in-Progress: A Formal Approach to Verify Fault Tolerance in Industrial Network Systems.
Proceedings of the 16th IEEE International Conference on Factory Communication Systems, 2020

Towards a Framework for Automatic Firewalls Configuration via Argumentation Reasoning.
Proceedings of the NOMS 2020, 2020

Automated optimal firewall orchestration and configuration in virtualized networks.
Proceedings of the NOMS 2020, 2020

Introducing programmability and automation in the synthesis of virtual firewall rules.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

2019
Adding Support for Automatic Enforcement of Security Policies in NFV Networks.
IEEE/ACM Trans. Netw., 2019

Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions.
Secur. Commun. Networks, 2019

Formally specifying and checking policies and anomalies in service function chaining.
J. Netw. Comput. Appl., 2019

A comprehensive approach to the automatic refinement and verification of access control policies.
Comput. Secur., 2019

A Framework for Verification-Oriented User-Friendly Network Function Modeling.
IEEE Access, 2019

Automated Security Management for Virtual Services.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2019

Towards a fully automated and optimized network security functions orchestration.
Proceedings of the 2019 4th International Conference on Computing, 2019

2018
On the impossibility of effectively using likely-invariants for software attestation purposes.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

User-oriented Network Security Policy Specification.
J. Internet Serv. Inf. Secur., 2018

Toward attribute-based access control policy in industrial networked systems.
Proceedings of the 14th IEEE International Workshop on Factory Communication Systems, 2018

2017
Classification and Analysis of Communication Protection Policy Anomalies.
IEEE/ACM Trans. Netw., 2017

A formal approach for network security policy validation.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017

Assessing network authorization policies via reachability analysis.
Comput. Electr. Eng., 2017

Leveraging SDN to improve security in industrial networks.
Proceedings of the IEEE 13th International Workshop on Factory Communication Systems, 2017

Automated fixing of access policy implementation in Industrial Networked Systems.
Proceedings of the IEEE 13th International Workshop on Factory Communication Systems, 2017

A model for the analysis of security policies in service function chains.
Proceedings of the 2017 IEEE Conference on Network Softwarization, 2017

2016
Inter-function anomaly analysis for correct SDN/NFV deployment.
Int. J. Netw. Manag., 2016

Online and Offline Security Policy Assessment.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

2015
A novel approach for integrating security policy enforcement with dynamic network virtualization.
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015

Automatic Discovery of Software Attacks via Backward Reasoning.
Proceedings of the 1st IEEE/ACM International Workshop on Software Protection, 2015

Towards the Dynamic Provision of Virtualized Security Services.
Proceedings of the Cyber Security and Privacy, 2015

2014
Inter-technology Conflict Analysis for Communication Protection Policies.
Proceedings of the Risks and Security of Internet and Systems, 2014


  Loading...