Mail:
Phone:
Mobile phone:
Web page:
Safety and Cybersecurity Under Emerging EU Legislation for Industry: A Use-Case Driven Perspective (ARES, 2025)
Liability and Trust Analysis Framework for Multi-Actor Dynamic Microservices (IEEE TNSM, 2025)
A Continuous Certification Readiness Framework for Cloudification of IT/OT Platforms (Vision Paper) (IEEE IC2E, 2025)
Challenges for Continuous, Provable Security Service Level Agreement Management in Computing Continuum (IEEE Access, 2024)
Challenges for Continuous, Provable Security Service Level Agreement Management in Computing Continuum (IEEE Access, 2024)
Position Paper: Strengthening Applets on Legacy SIM Cards with Singularization, a New Moving Target Defense Strategy (MSPN, 2023)
Latency-Sensitive Service Chaining with Isolation Constraints (ACM MECC, 2024)
Keeping Verticals’ Sovereignty During Application Migration in Continuum (Journal of Network and Systems Management, 2024)
Liability and Trust Analysis Framework for Multi-Actor Dynamic Microservices (IEEE TNSM, 2024)
Demonstrating Liability and Trust Metrics for Multi-Actor, Dynamic Edge and Cloud Microservices (ACM MOBICOM, 2023)
Security Context Migration in MEC: Challenges and Use Cases (Electronics, 2022)
TRAILS: Extending TOSCA NFV profiles for liability management in the Cloud-to-IoT continuum (NetSoft, 2022)
Ensuring IoT Security with an Architecture Based on a Separation Kernel (FiCloud, 2018)
Towards constructive approach to end-to-end slice isolation in 5G networks (EURASIP Journal on Information Security, 2018)
Diet-ESP: IP layer security for IoT (Journal of Computer Security, 2017)
Assessing the risk of complex ICT systems (Ann. Telecommun., 2017)
A New Threat Assessment Method for Integrating an IoT Infrastructure in an Information System (ICDCSW, 2017)
A new approach to investigate IoT threats based on a four layer model (NOTERE, 2016)
Recommendations for IPsec Configuration on Homenet and M2M Devices (Q2SWinet, 2015)
Internet of Things: A Definition & Taxonomy (NGMAST, 2015)