Mail:
Phone:
Mobile phone:
Web page:
Challenges for Continuous, Provable Security Service Level Agreement Management in Computing Continuum (IEEE Access, 2024)
Keeping Verticals’ Sovereignty During Application Migration in Continuum (Journal of Network and Systems Management, 2024)
Latency-Sensitive Service Chaining with Isolation Constraints (MECC, 2024)
Liability and Trust Analysis Framework for Multi-Actor Dynamic Microservices (IEEE Transactions on Network and Service Management, 2024)
Demonstrating Liability and Trust Metrics for Multi-Actor, Dynamic Edge and Cloud Microservices (ACM MobiCom, 2023)
Position Paper: Strengthening Applets on Legacy SIM Cards with Singularization, a New Moving Target Defense Strategy (MSPN, 2023)
TRAILS: Extending TOSCA NFV profiles for liability management in the Cloud-to-IoT continuum (NetSoft, 2022)
Security Constraints for Placement of Latency Sensitive 5G MEC Applications (FiCloud, 2022)
Security Context Migration in MEC: Challenges and Use Cases (Electronics, 2022)
Verticals in 5G MEC-Use Cases and Security Challenges (IEEE Access, 2021)
Liability-Aware Security Management for 5G (5GWF, 2020)
Towards constructive approach to end-to-end slice isolation in 5G networks (EURASIP Journal on Information Security, 2018)
Ensuring IoT Security with an Architecture Based on a Separation Kernel (FiCloud, 2018)
Assessing the risk of complex ICT systems (Ann. Telecommun., 2017)
A New Threat Assessment Method for Integrating an IoT Infrastructure in an Information System (ICDCSW, 2017)
Diet-ESP: IP layer security for IoT (Journal of Computer Security, 2017)
On end-to-end approach for slice isolation in 5G networks. Fundamental challenges (FedCSIS, 2017)
A new approach to investigate IoT threats based on a four layer model (NOTERE, 2016)
Recommendations for IPsec Configuration on Homenet and M2M Devices (Q2SWinet, 2015)
Internet of Things: A Definition & Taxonomy (NGMAST, 2015)