Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Deployment and Monitoring of Security Policies., , , , and . TrustBus, volume 9264 of Lecture Notes in Computer Science, page 180-192. Springer, (2015)The Forth International Workshop on Security Testing (SECTEST 2013)., and . ICST Workshops, page 433-434. IEEE Computer Society, (2013)Towards Content-Centric Control Plane Supporting Efficient Anomaly Detection Functions., , , , and . CNSM, page 1-9. IEEE, (2019)GEIGER: Solution for small businesses to protect themselves against cyber-threats., , , and . ARES, page 157:1-157:4. ACM, (2021)AI-Powered Penetration Testing using Shennina: From Simulation to Validation., , , , , , and . ARES, page 169:1-169:7. ACM, (2024)Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking., , and . ADHOC-NOW, volume 5198 of Lecture Notes in Computer Science, page 345-356. Springer, (2008)Metrics-driven DevSecOps., , , and . ICSOFT, page 228-233. ScitePress, (2020)A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic., , , , , and . ICSOFT, page 234-241. SCITEPRESS, (2022)The DYNABIC approach to resilience of critical infrastructures., , , , , , , , , and 2 other author(s). ARES, page 136:1-136:8. ACM, (2023)5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection., , , , and . ARES, page 106:1-106:8. ACM, (2021)