Automated optimal firewall orchestration and configuration in virtualized networks D Bringhenti, G Marchetto, R Sisto, F Valenza, J Yusupov NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, 1-7, 2020 | 40 | 2020 |
Towards a fully automated and optimized network security functions orchestration D Bringhenti, G Marchetto, R Sisto, F Valenza, J Yusupov 4th IEEE International Conference on Computing Communication and Security …, 2019 | 36 | 2019 |
Automated Firewall Configuration in Virtual Networks D Bringhenti, G Marchetto, R Sisto, F Valenza, J Yusupov IEEE Transactions on Dependable and Secure Computing 20 (2), 1559-1576, 2023 | 33 | 2023 |
Improving the formal verification of reachability policies in virtualized networks D Bringhenti, G Marchetto, R Sisto, S Spinoso, F Valenza, J Yusupov IEEE Transactions on Network and Service Management 18 (1), 713-728, 2021 | 32 | 2021 |
Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks D Bringhenti, J Yusupov, AM Zarca, F Valenza, R Sisto, JB Bernabe, ... Computer Networks 213, 109123, 2022 | 22 | 2022 |
Toward Cybersecurity Personalization in Smart Homes D Bringhenti, F Valenza, C Basile IEEE Security & Privacy, 2-11, 2022 | 20 | 2022 |
Introducing programmability and automation in the synthesis of virtual firewall rules D Bringhenti, G Marchetto, R Sisto, F Valenza, J Yusupov 2020 6th IEEE Conference on Network Softwarization (NetSoft), 473-478, 2020 | 19 | 2020 |
A novel approach for security function graph configuration and deployment D Bringhenti, G Marchetto, R Sisto, F Valenza 2021 IEEE 7th International Conference on Network Softwarization (NetSoft …, 2021 | 17 | 2021 |
Short Paper: Automatic Configuration for an Optimal Channel Protection in Virtualized Networks D Bringhenti, G Marchetto, R Sisto, F Valenza Proceedings of the 2nd Workshop on Cyber-Security Arms Race, 25-30, 2020 | 15 | 2020 |
Optimizing distributed firewall reconfiguration transients D Bringhenti, F Valenza Computer Networks 215, 109183, 2022 | 11 | 2022 |
Automation for network security configuration: state of the art and research trends D Bringhenti, G Marchetto, R Sisto, F Valenza ACM Computing Surveys 56 (3), 1-37, 2024 | 10 | 2024 |
A novel abstraction for security configuration in virtual networks D Bringhenti, R Sisto, F Valenza Computer Networks 228, 109745, 2023 | 9 | 2023 |
A Twofold Model for VNF Embedding and Time-Sensitive Network Flow Scheduling D Bringhenti, F Valenza IEEE Access 10, 44384-44399, 2022 | 5 | 2022 |
A demonstration of VEREFOO: an automated framework for virtual firewall configuration D Bringhenti, R Sisto, F Valenza 2023 IEEE 9th International Conference on Network Softwarization (NetSoft …, 2023 | 2 | 2023 |
Security automation for multi-cluster orchestration in Kubernetes D Bringhenti, R Sisto, F Valenza 2023 IEEE 9th International Conference on Network Softwarization (NetSoft …, 2023 | 2 | 2023 |
Automating the configuration of firewalls and channel protection systems in virtual networks D Bringhenti, R Sisto, F Valenza 2023 IEEE 9th International Conference on Network Softwarization (NetSoft …, 2023 | 2 | 2023 |
An Optimized Approach for Assisted Firewall Anomaly Resolution D Bringhenti, L Seno, F Valenza IEEE Access 11, 119693-119710, 2023 | 1 | 2023 |
Towards Security Automation in Virtual Networks D Bringhenti, R Sisto, F Valenza 2023 IEEE 9th International Conference on Network Softwarization (NetSoft …, 2023 | 1 | 2023 |
Introduction to Formal Methods for the Analysis and Design of Cryptographic Protocols D Bringhenti, R Sisto, F Valenza, J Yusupov Handbook of Formal Analysis and Verification in Cryptography, 57-104, 2023 | | 2023 |