A formal approach for network security policy validation. F Valenza, T Su, S Spinoso, A Lioy, R Sisto, M Vallini J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8 (1), 79-100, 2017 | 21 | 2017 |
The trust problem in modern network infrastructures L Jacquin, A Lioy, DR Lopez, AL Shaw, T Su Cyber Security and Privacy: 4th Cyber Security and Privacy Innovation Forum …, 2015 | 16 | 2015 |
Continuous Integration for Web-Based Software Infrastructures: Lessons Learned on the webinos Project T Su, J Lyle, A Atzeni, S Faily, H Virji, C Ntanos, C Botsikas Hardware and Software: Verification and Testing: 9th International Haifa …, 2013 | 12 | 2013 |
How dangerous is your Android app? An evaluation methodology A Atzeni, T Su, M Baltatu, R D'Alessandro, G Pessiva Proceedings of the 11th International Conference on Mobile and Ubiquitous …, 2014 | 8 | 2014 |
Cloudification of public services in smart cities the clips project A Filograna, P Smiraglia, C Gilsanz, S Krco, A Medela, T Su 2016 IEEE Symposium on Computers and Communication (ISCC), 153-158, 2016 | 7 | 2016 |
◾ Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems T Su, A Lioy, N Barresi Cloud Computing Security, 371-384, 2016 | 5 | 2016 |
Offloading personal security applications to a secure and trusted network node R Bonafiglia, F Ciaccia, A Lioy, M Nemirovsky, F Risso, T Su Proceedings of the 2015 1st IEEE Conference on Network Softwarization …, 2015 | 5 | 2015 |
Trust in SDN/NFV environments A Lioy, T Su, AL Shaw, H Attak, DR Lopez, A Pastor Guide to Security in SDN and NFV: Challenges, Opportunities, and …, 2017 | 4 | 2017 |
Lightweight formal verification in real world, a case study A Atzeni, T Su, T Montanaro Advanced Information Systems Engineering Workshops: CAiSE 2014 International …, 2014 | 4 | 2014 |
and Antonio Pastor A Lioy, T Su, AL Shaw, H Attak, DR Lopez Guide to Security in SDN and NFV: Challenges, Opportunities, and …, 2017 | | 2017 |
Trust and integrity in distributed systems T Su Politecnico di Torino, 2017 | | 2017 |
The Trust Problem in Modern Network Infrastructures AL Shaw, T Su Cyber Security and Privacy: 4th Cyber Security and Privacy Innovation Forum …, 2015 | | 2015 |
Android Apps Risk Evaluation: a methodology A Atzeni, T Su, M Baltatu, R D'Alessandro, G Pessiva EAI Endorsed Transactions on Ubiquitous Environments 1 (4), 2015 | | 2015 |