Mail:
Phone:
Mobile phone:
Web page:
Liability and Trust Analysis Framework for Multi-Actor Dynamic Microservices (IEEE TNSM, 2024)
Latency-Sensitive Service Chaining with Isolation Constraints (ACM MECC, 2024)
Keeping Verticals’ Sovereignty During Application Migration in Continuum (Journal of Network and Systems Management, 2024)
Position Paper: Strengthening Applets on Legacy SIM Cards with Singularization, a New Moving Target Defense Strategy (MSPN, 2023)
Challenges for Continuous, Provable Security Service Level Agreement Management in Computing Continuum (IEEE Access, 2024)
Challenges for Continuous, Provable Security Service Level Agreement Management in Computing Continuum (IEEE Access, 2024)
Demonstrating Liability and Trust Metrics for Multi-Actor, Dynamic Edge and Cloud Microservices (ACM MOBICOM, 2023)
TRAILS: Extending TOSCA NFV profiles for liability management in the Cloud-to-IoT continuum (NetSoft, 2022)
Security Context Migration in MEC: Challenges and Use Cases (Electronics, 2022)
Ensuring IoT Security with an Architecture Based on a Separation Kernel (FiCloud, 2018)
Towards constructive approach to end-to-end slice isolation in 5G networks (EURASIP Journal on Information Security, 2018)
A New Threat Assessment Method for Integrating an IoT Infrastructure in an Information System (ICDCSW, 2017)
Assessing the risk of complex ICT systems (Ann. Telecommun., 2017)
Diet-ESP: IP layer security for IoT (Journal of Computer Security, 2017)
A new approach to investigate IoT threats based on a four layer model (NOTERE, 2016)
Recommendations for IPsec Configuration on Homenet and M2M Devices (Q2SWinet, 2015)
Internet of Things: A Definition & Taxonomy (NGMAST, 2015)