Follow
Tao Su
Title
Cited by
Cited by
Year
A formal approach for network security policy validation.
F Valenza, T Su, S Spinoso, A Lioy, R Sisto, M Vallini
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8 (1), 79-100, 2017
212017
The trust problem in modern network infrastructures
L Jacquin, A Lioy, DR Lopez, AL Shaw, T Su
Cyber Security and Privacy: 4th Cyber Security and Privacy Innovation Forum …, 2015
162015
Continuous Integration for Web-Based Software Infrastructures: Lessons Learned on the webinos Project
T Su, J Lyle, A Atzeni, S Faily, H Virji, C Ntanos, C Botsikas
Hardware and Software: Verification and Testing: 9th International Haifa …, 2013
122013
How dangerous is your Android app? An evaluation methodology
A Atzeni, T Su, M Baltatu, R D'Alessandro, G Pessiva
Proceedings of the 11th International Conference on Mobile and Ubiquitous …, 2014
82014
Cloudification of public services in smart cities the clips project
A Filograna, P Smiraglia, C Gilsanz, S Krco, A Medela, T Su
2016 IEEE Symposium on Computers and Communication (ISCC), 153-158, 2016
72016
◾ Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems
T Su, A Lioy, N Barresi
Cloud Computing Security, 371-384, 2016
52016
Offloading personal security applications to a secure and trusted network node
R Bonafiglia, F Ciaccia, A Lioy, M Nemirovsky, F Risso, T Su
Proceedings of the 2015 1st IEEE Conference on Network Softwarization …, 2015
52015
Trust in SDN/NFV environments
A Lioy, T Su, AL Shaw, H Attak, DR Lopez, A Pastor
Guide to Security in SDN and NFV: Challenges, Opportunities, and …, 2017
42017
Lightweight formal verification in real world, a case study
A Atzeni, T Su, T Montanaro
Advanced Information Systems Engineering Workshops: CAiSE 2014 International …, 2014
42014
and Antonio Pastor
A Lioy, T Su, AL Shaw, H Attak, DR Lopez
Guide to Security in SDN and NFV: Challenges, Opportunities, and …, 2017
2017
Trust and integrity in distributed systems
T Su
Politecnico di Torino, 2017
2017
The Trust Problem in Modern Network Infrastructures
AL Shaw, T Su
Cyber Security and Privacy: 4th Cyber Security and Privacy Innovation Forum …, 2015
2015
Android Apps Risk Evaluation: a methodology
A Atzeni, T Su, M Baltatu, R D'Alessandro, G Pessiva
EAI Endorsed Transactions on Ubiquitous Environments 1 (4), 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–13