Authors |
Title |
Publication Details |
Download from Zenodo |
Stefan Covaci, Riccardo Rapuzzi, Matteo Repetto, Fulvio Risso | A New Paradigm to Address Threats for Virtualized Services | IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), July, 23rd-27th, Tokyo, Japan, No pages, 978-1-5386-2667-2/0730-3157 | |
Alessandro Carrega, Matteo Repetto, Fulvio Risso, Stefan Covaci, Anastasios Zafeiropoulos, Thanassis Giannetsos and Orazio Toscano | Situational Awareness in Virtual Networks: the ASTRID Approach | IEEE 7th International Conference on Cloud Networking (CloudNet), October, 22nd-24th, Tokyo, Japan, No pages, | |
Stefan Covaci, Matteo Repetto, and Fulvio Risso | Towards Autonomous Security Assurance in 5G Infrastructures | IEICE Transactions on Communications, , Tokyo, Japan, No pages, 0916-8516/1745-1345 | |
R. Bolla, A. Carrega, M. Repetto | An abstraction layer for cybersecurity context | 2019 International Conference on Computing, Networking and Communications (ICNC), February 18th-21st, 2019, Honolulu, HI, USA, No pages, 978-1-5386-9223-3 | |
Matteo Bertrone, Sebastiano Miano, Fulvio Risso, Massimo Tumolo | Accelerating Linux Security with eBPF iptables | Proceedings of the ACM SIGCOMM 2018 Conference (SIGCOMM 2018), , Budapest, Hungary, No pages, | |
Matteo Bertrone, Sebastiano Miano, Jianwen Pi, Fulvio Risso, Massimo Tumolo | Toward an eBPF-based clone of iptables | Netdev 0x12, The Technical Conference on Linux Networking, , Montreal, Canada, No pages, | |
Sebastiano Miano, Matteo Bertrone, Fulvio Risso, Massimo Tumolo, Mauricio Vasquez Bernal | Creating Complex Network Services with eBPF: Experience and Lessons Learned | IEEE International Conference on High Performance Switching and Routing (HPSR 2018), , Bucarest, Romania, No pages, | |
N. Koutroumpouchos, C. Ntatogian, S.A. Menesidou, K. Liang, P. Gouvas, C. Xenakis, T. Giannetsos | Secure Edge Computing with Lightweight Control-Flow Property-based Attestation | 1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (co-located with IEEE Conference on Network Softwarization), June 2019, Paris, France, No pages, | |
T. Giannetsos, I. Krontiris | Securing V2X Communications for the Future - Can PKI Systems offer the answer? | 1st Location Privacy Workshop held in conjunction with the 14th International Conference on Availability, Reliability and Security, August 2019, UK, No pages, | |
Sebastiano Miano, Matteo Bertrone, Fulvio Risso, Mauricio V?squez Bernal, Yunsong Lu, Jianwen Pi | Securing Linux with a Faster and Scalable Iptables | ACM Computer Communication Review, vol. 49 (3), United States, No pages, 0146-4833 | |
Constantinos Pouyioukka; Thanassis Giannetsos; Weizhi Meng | CrowdLED: Towards Crowd-Empowered and Privacy-Preserving Data Sharing Using Smart Contracts | IFIP International Conference on Trust Management, , Copenhagen, Denmark, No pages, 978-3-030-33716-2 | |
M. Repetto, A. Carrega, G. Lamanna | An architecture to manage security services for cloud applications | 4th IEEE International Conference on Computing, Communication & Security (ICCCS-2019), October 10th-12th, Rome, Italy, No pages, | |
M. Repetto, A. Carrega, G. Lamanna | Towards Novel Security Architectures for Network Functions Virtualization | IEEE Conference on Network Function Virtualization and Software Defined Networks (IEEE NFV-SDN), November 12th-14th, Dallas, Texas, USA, No pages, | |
M. Repetto, A. Carrega, J. Yusupov, F. Valenza, F. Risso, G. Lamanna | Automated Security Management for Virtual Services | IEEE Conference on Network Function Virtualization and Software Defined Networks (IEEE NFV-SDN), November 12th-14th, Dallas, Texas, USA, No pages, | |
A. Carrega, M. Repetto | Data Log Management for Cyber-Security Programmability of Cloud Services and Applications | 26th ACM Conference on Computer and Communications Security, November 15th, London, UK, No pages, | |
Alessandro Carrega, Luca Caviglione, Matteo Repetto and Marco Zuppelli | Programmable Data Gathering for Detecting Stegomalware | IEEE International Conference on Network Softwarization (NetSoft 2020) - 2nd International Workshop on Cyber-Security Threats, Trust and Privacy management in Software-defined and Virtualized Infrastructures , July, 3rd, Ghent, Belgium , No pages, | |
D. Bringhenti, G. Marchetto, R. Sisto, F. Valenza, J. Yusupov | Towards a fully automated and optimized network security functions orchestration | IEEE 4th International Conference on Computing, Communications and Security (ICCCS 2019 ), , Rome, Italy, , No pages, 978-1-7281-0875-9 | |
F. Valenza, S. Spinoso, R. Sisto | Formally specifying and checking policies and anomalies in service function chaining | Journal of Network and Computer Applications, 146, USA, No pages, | |
G. Marchetto, R. Sisto, F. Valenza, J. Yusupov | A Framework for Verification-Oriented User-Friendly Network Function Modeling | IEEE Access, vol. 7, USA, No pages, 2169-3536 | |
S. Miano, R. Doriguzzi-Corin, F. Risso, D. Siracusa, R. Sommese | Introducing SmartNICs in Server-Based Data Plane Processing: The DDoS Mitigation Use Case | , vol. 7, USA, No pages, 2169-3536 | |
S. Miano, M. Bertrone, F. Risso, M. VASQUEZ BERNAL, Y. Lu, J. Pi, A. Shaikh | A Service-Agnostic Software Framework for Fast and Efficient In-Kernel Network Services | 15th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS '19), September 2019, Cambridge, UK, No pages, | |
O. R. Sanchez, M. Repetto, A. Carrega, R. Bolla, and J. F. Pajo | Feature Selection Evaluation towards a Lightweight Deep Learning DDoS Detector | IEEE International Conference on Communications, June 14th-23rd, 2021, Montreal, Canada, No pages, | |
M. Repetto, A. Carrega, G. Lamanna, J. Yusupov, O. Toscano, G. Bruno, M. Nuovo, M. Cappelli | Leveraging the 5G architecture to mitigate amplification attacks | IEEE International Conference on Network Softwarization (NetSoft 2021) - 3rd International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft), July 2nd, 2021, Tokyo, Japan, No pages, | |
O. R. Sanchez, M. Repetto, A. Carrega, R. Bolla | Evaluating ML-based DDoS Detection with Grid Search Hyperparameter Optimization | IEEE International Conference on Network Softwarization (NetSoft 2021) - 3rd International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft), July 2nd, 2021, Tokyo, Japan, No pages, | |
L. Caviglione, M. Zuppelli, W. Mazurczyk, A. Shaffhauser, M. Repetto | Code Augmentation for Detecting Covert Channels Targeting the IPv6 Flow Label | IEEE International Conference on Network Softwarization - 3rd International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft), July 2nd, 2021, Tokyo, Japan, No pages, | |
M. Repetto, L. Caviglione, M. Zuppelli | bccstego: A Framework for Investigating Network Covert Channels | The 16th International Conference on Availability, Reliability and Security (ARES 2021) - The 5th International Workshop on Criminal Use of Information Hiding (CUING 2021), August, 16th-20th, 2021, All digital conference, No pages, | |
F. Valenza, M. Repetto, S. Shiaeles | Guest editorial: Special issue on novel cyber-security paradigms for software-defined and virtualized systems | Computer Networks, Vol. 193, July 2021, Netherlands, No pages, ISSN: 13891286 | |
M. Repetto, A. Carrega, R. Rapuzzi | An architecture to manage security operations for digital service chains | Future Generation Computer Systems, Volume 115, February 2021, Netherlands, No pages, ISSN 0167739X | |
L. Caviglione, W. Mazurczyk, M. Repetto, A. Schaffhauser, M. Zuppelli | Kernel-level tracing for detecting stegomalware and covert channels in Linux environments | Computer Networks, Volume 191, May 2021, Netherlands, No pages, ISSN 13891286 | |
M. Repetto, D. Striccoli, G. Piro, A. Carrega, G. Boggia, R. Bolla | An autonomous cybersecurity framework for next-generation digital service chains | Journal of Network and Systems Management, Vol. 29, Art. no. 37, May 2021, United States, No pages, ISSN 10647570, 15737705 | |
D. Bringhenti, G. Marchetto,R. Sisto, F. Valenza, J. Yusupov | Introducing programmability and automation in the synthesis of virtual firewall rules | 6th IEEE Conference on Network Softwarization (NetSoft2020), , Ghent, Belgium, No pages, 978-1-7281-5684-2 | |
D. Bringhenti, G. Marchetto, R. Sisto, F. Valenza | Short Paper: Automatic Configuration for an Optimal Channel Protection in Virtualized Networks | Proceedings of the 2nd Workshop on Cyber-Security Arms Race (CYSARM'20), , Virtual Event, No pages, | |
D. Bringhenti, G. Marchetto, R. Sisto, F. Valenza, J. Yusupov | Automated optimal firewall orchestration and configuration in virtualized networks | IEEE/IFIP Network Operations and Management Symposium (NOMS 2020), , Budapest, Hungary, No pages, 978-1-7281-4973-8 | |
D. Papamartzivanos, S. Menesidou, P. Gouvas, T. Giannetsos | Towards Efficient Control-Flow Attestation with Software-Assisted Multi-level Execution Tracing | IEEE MeditCom 2021, , Greece, No pages, | |
Heini Bergsson Debes, Thanassis Giannetsos, Ioannis Krontiris | BLINDTRUST: Oblivious Remote Attestation for Secure Service Function Chains | DCOSS 2021, , Greece, No pages, | |
Benjamin Larsen,Thanassis Giannetsos, Ioannis Krontiris, Kenneth Goldman | Direct Anonymous Attestation on the Road: Efficient and Privacy-Preserving Revocation in C-ITS | WiSec 2021, , Abu Dhabi, No pages, | |
Shahzana Liaqat, Adnan Akhunzada, Fatema Sabeen Shaikh, Thanassis Giannetsos, Mian Ahmad Jan | SDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT) | Elsevier, , Elsevier, No pages, | |
Adnan Akhunzada, Saif ul Islam, Sherali Zeadally | Securing Cyberspace of Future Smart Cities with 5G Technologies | IEEE Network, , IEEE, No pages, | |
FaizanMurtaza, Adnan Akhunzada, Saif ulI slam, Jalil Boudjadard, Rajkumar Buyya | QoS-aware service provisioning in fog computing | Science Direct, , Science Direct, No pages, | |
Soneila Khan, Adnan Akhunzada | A hybrid DL-driven intelligent SDN-enabled malware detection framework for Internet of Medical Things (IoMT) | Science Direct, , Science Direct, No pages, | |
Jahanzaib Malik, Adnan Akhunzada, Iram Bibi, Muhammad Imran, Arslan Musaddiq, Sung Won Kim | Hybrid Deep Learning: An Efficient Reconnaissance and Surveillance Detection Mechanism in SDN | IEEE Access, , IEEE, No pages, | |
Iram Bibi, Adnan Akhunzada, Jahanzaib Malik, Javed Iqbal, Arslan Musaddiq, Sungwon Kim | A Dynamic DL-Driven Architecture to Combat Sophisticated Android Malware | IEEE Access, , IEEE, No pages, | |