Follow
Fulvio Valenza
Fulvio Valenza
Tenure-Track Assistant Professor (RTD-B), Politecnico di Torino
Verified email at polito.it - Homepage
Title
Cited by
Cited by
Year
Adding support for automatic enforcement of security policies in NFV networks
C Basile, F Valenza, A Lioy, DR Lopez, AP Perales
IEEE/ACM Transactions on Networking 27 (2), 707-720, 2019
572019
A novel approach for integrating security policy enforcement with dynamic network virtualization
C Basile, A Lioy, C Pitscheider, F Valenza, M Vallini
Network Softwarization (NetSoft), 2015 1st IEEE Conference on, 2015
572015
Classification and analysis of communication protection policy anomalies
F Valenza, C Basile, D Canavese, A Lioy
IEEE/ACM Transactions on Networking 25 (5), 2601 - 2614, 2017
402017
Automated optimal firewall orchestration and configuration in virtualized networks
D Bringhenti, G Marchetto, R Sisto, F Valenza, J Yusupov
NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, 1-7, 2020
382020
Securing SOME/IP for in-vehicle service protection
M Iorio, M Reineri, F Risso, R Sisto, F Valenza
IEEE Transactions on Vehicular Technology 69 (11), 13450-13466, 2020
352020
Towards a fully automated and optimized network security functions orchestration
D Bringhenti, G Marchetto, R Sisto, F Valenza, J Yusupov
2019 4th International Conference on Computing, Communications and Security …, 2019
322019
Improving the formal verification of reachability policies in virtualized networks
D Bringhenti, G Marchetto, R Sisto, S Spinoso, F Valenza, J Yusupov
IEEE Transactions on Network and Service Management 18 (1), 713 - 728, 2020
312020
Automated firewall configuration in virtual networks
D Bringhenti, G Marchetto, R Sisto, F Valenza, J Yusupov
IEEE Transactions on Dependable and Secure Computing 20 (2), 1559-1576, 2022
292022
Protecting In-Vehicle Services : Security-Enabled SOME/IP Middleware
M Iorio, A Buttiglieri, M Reineri, F Risso, R Sisto, F Valenza
IEEE Vehicular Technology Magazine, 2020
282020
Leveraging SDN to improve security in industrial networks
M Cheminod, L Durante, L Seno, F Valenza, A Valenzano, C Zunino
2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS …, 2017
272017
An Optimized Firewall Anomaly Resolution
F Valenza, M Cheminod
Journal of Internet Services and Information Security 10 (1), 22-37, 2020
262020
Formally specifying and checking policies and anomalies in service function chaining
F Valenza, S Spinoso, R Sisto
Journal of Network and Computer Applications 146, 102419, 2019
242019
Assessing network authorization policies via reachability analysis
C Basile, D Canavese, C Pitscheider, A Lioy, F Valenza
Computers & Electrical Engineering 64, 110-131, 2017
242017
A comprehensive approach to the automatic refinement and verification of access control policies
M Cheminod, L Durante, L Seno, F Valenza, A Valenzano
Computers & Security 80, 186-199, 2019
222019
Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks
D Bringhenti, J Yusupov, AM Zarca, F Valenza, R Sisto, JB Bernabe, ...
Computer Networks 213, 109123, 2022
212022
A model for the analysis of security policies in service function chains
L Durante, L Seno, F Valenza, A Valenzano
2017 IEEE Conference on Network Softwarization (NetSoft), 1-6, 2017
212017
A formal model of network policy analysis
F Valenza, S Spinoso, C Basile, R Sisto, A Lioy
2015 IEEE 1st International Forum on Research and Technologies for Society …, 2015
212015
Toward cybersecurity personalization in smart homes
D Bringhenti, F Valenza, C Basile
IEEE Security & Privacy 20 (1), 45-53, 2021
192021
Inter‐function anomaly analysis for correct SDN/NFV deployment
C Basile, D Canavese, A Lioy, C Pitscheider, F Valenza
International Journal of Network Management 26 (1), 25-43, 2016
192016
Towards the dynamic provision of virtualized security services
C Basile, C Pitscheider, F Risso, F Valenza, M Vallini
Cyber Security and Privacy: 4th Cyber Security and Privacy Innovation Forum …, 2015
192015
The system can't perform the operation now. Try again later.
Articles 1–20