Mail:
Phone:
Mobile phone:
Web page:
Safety and Cybersecurity Under Emerging EU Legislation for Industry: A Use-Case Driven Perspective (ARES, 2025)
A Continuous Certification Readiness Framework for Cloudification of IT/OT Platforms (Vision Paper) (IEEE IC2E, 2025)
Liability and Trust Analysis Framework for Multi-Actor Dynamic Microservices (IEEE TNSM, 2025)
Latency-Sensitive Service Chaining with Isolation Constraints (ACM MECC, 2024)
Position Paper: Strengthening Applets on Legacy SIM Cards with Singularization, a New Moving Target Defense Strategy (MSPN, 2023)
Liability and Trust Analysis Framework for Multi-Actor Dynamic Microservices (IEEE TNSM, 2024)
Challenges for Continuous, Provable Security Service Level Agreement Management in Computing Continuum (IEEE Access, 2024)
Keeping Verticals’ Sovereignty During Application Migration in Continuum (Journal of Network and Systems Management, 2024)
Challenges for Continuous, Provable Security Service Level Agreement Management in Computing Continuum (IEEE Access, 2024)
Demonstrating Liability and Trust Metrics for Multi-Actor, Dynamic Edge and Cloud Microservices (ACM MOBICOM, 2023)
Security Context Migration in MEC: Challenges and Use Cases (Electronics, 2022)
TRAILS: Extending TOSCA NFV profiles for liability management in the Cloud-to-IoT continuum (NetSoft, 2022)
Towards constructive approach to end-to-end slice isolation in 5G networks (EURASIP Journal on Information Security, 2018)
Ensuring IoT Security with an Architecture Based on a Separation Kernel (FiCloud, 2018)
A New Threat Assessment Method for Integrating an IoT Infrastructure in an Information System (ICDCSW, 2017)
Diet-ESP: IP layer security for IoT (Journal of Computer Security, 2017)
Assessing the risk of complex ICT systems (Ann. Telecommun., 2017)
A new approach to investigate IoT threats based on a four layer model (NOTERE, 2016)
Internet of Things: A Definition & Taxonomy (NGMAST, 2015)
Recommendations for IPsec Configuration on Homenet and M2M Devices (Q2SWinet, 2015)