All this material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases these works may not be reposted without the explicit permission of the copyright holder.
Liability and Trust Analysis Framework for Multi-Actor Dynamic Microservices (IEEE Transactions on Network and Service Management, 2024)
Challenges for Continuous, Provable Security Service Level Agreement Management in Computing Continuum (IEEE Access, 2024)
Latency-Sensitive Service Chaining with Isolation Constraints (MECC, 2024)
Code to Qed, the Project Manager's Guide to Proof Engineering (ACM TOSEM, 2024)
Keeping Verticals’ Sovereignty During Application Migration in Continuum (Journal of Network and Systems Management, 2024)
Position Paper: Strengthening Applets on Legacy SIM Cards with Singularization, a New Moving Target Defense Strategy (MSPN, 2023)
Demonstrating Liability and Trust Metrics for Multi-Actor, Dynamic Edge and Cloud Microservices (ACM MobiCom, 2023)
Towards a Privacy-Preserving Attestation for Virtualized Networks (ESORICS, 2023)
Pip-MPU: Formal verification of an MPU-based separation kernel for constrained devices (IJESA, 2023)
Trusted Execution Environments for Telecoms: Strengths, Weaknesses, Opportunities, and Threats (IEEE Security and Privacy, 2023)
Towards Scalable Resilient Federated Learning: A Fully Decentralised Approach (PERCOM Workshops, 2023)
Stateful InREC: Stateful In-Network Real Number Computation With Recursive Functions (IEEE Transactions on Network and Service Management, 2023)
Security Context Migration in MEC: Challenges and Use Cases (Electronics, 2022)
Security Constraints for Placement of Latency Sensitive 5G MEC Applications (FiCloud, 2022)
NetREC: Network-wide in-network REal-value Computation (NetSoft, 2022)
eSIM Adoption : Essential Challenges On Responsibilities Repartition (6GNet, 2022)
TRAILS: Extending TOSCA NFV profiles for liability management in the Cloud-to-IoT continuum (NetSoft, 2022)
Towards a Modular Attestation Framework for Flexible Data Protection for Drone Systems (WiMob, 2021)
Verticals in 5G MEC-Use Cases and Security Challenges (IEEE Access, 2021)
BMC: Accelerating Memcached using Safe In-kernel Caching and Pre-stack Processing (NSDI, 2021)
SNAPPY: programmable kernel-level policies for containers (ACM SAC, 2021)
Applied graph theory to security: A qualitative placement of security solutions within IoT networks (Journal of Information Security and Applications, 2020)
Towards an Extensible Security Monitoring Architecture for Vehicular Networks (Nets4Cars/Nets4Trains/Nets4Aircraft, 2020)
Leveraging research and innovation in security standards; the example of INSPIRE-5GPLUS (ETSI, 2020)
Liability-Aware Security Management for 5G (5GWF, 2020)
Bypassing Full Disk Encryption with Virtual Machine Introspection (AICCSA, 2019)
Toward an in-Kernel High Performance Key-Value Store Implementation (SRDS, 2019)
Leveraging Kernel Security Mechanisms to Improve Container Security: a Survey (ARES, 2019)
Deception Techniques in Computer Security: A Research Perspective (ACM Comput. Surv., 2019)
Isolation in cloud computing infrastructures: new security challenges (Ann. Telecommun., 2019)
Offloading Security Services to the Cloud Infrastructure (SecSoN, 2018)
Ensuring IoT Security with an Architecture Based on a Separation Kernel (FiCloud, 2018)
Anomaly detection and diagnosis for cloud services: Practical experiments and lessons learned (Journal of Systems and Software, 2018)
Towards constructive approach to end-to-end slice isolation in 5G networks (EURASIP Journal on Information Security, 2018)
Oko: Extending Open vSwitch with Stateful Filters (SOSR, 2018)
Assessing the risk of complex ICT systems (Ann. Telecommun., 2017)
Evaluation of Deception-Based Web Attacks Detection (MTD, 2017)
Trustworthiness 5G Enabler (FedCSIS, 2017)
On end-to-end approach for slice isolation in 5G networks. Fundamental challenges (FedCSIS, 2017)
K-binID: Kernel binary code identification for Virtual Machine Introspection (DSC, 2017)
Hidden process detection using kernel functions instrumentation (DSC, 2017)
Understanding disruptive monitoring capabilities of programmable networks (NetSoft, 2017)
Mantus: Putting Aspects to Work for Flexible Multi-Cloud Deployment (CLOUD, 2017)
A New Threat Assessment Method for Integrating an IoT Infrastructure in an Information System (ICDCSW, 2017)
Diet-ESP: IP layer security for IoT (Journal of Computer Security, 2017)
Proceedings ACM International Workshop on Security and Dependability of Multi-Domain Infrastructures (XDOM0’17) (ACM EuroSys-XDOMO, 2017)
Anomaly Detection and Root Cause Localization in Virtual Network Functions (ISSRE, 2016)
Overcoming Barriers for Ubiquitous User-Centric Healthcare Services (IEEE Cloud Computing, 2016)
PhishEye: Live Monitoring of Sandboxed Phishing Kits (ACM CCS, 2016)
User-Centric Security and Dependability in the Clouds-of-Clouds (IEEE Cloud Computing, 2016)
A new approach to investigate IoT threats based on a four layer model (NOTERE, 2016)
Towards Black-Box Anomaly Detection in Virtual Network Functions (DSN-W, 2016)
Recommendations for IPsec Configuration on Homenet and M2M Devices (Q2SWinet, 2015)
Internet of Things: A Definition & Taxonomy (NGMAST, 2015)
Virtual Machine Introspection: Techniques and Applications (ARES, 2015)
Trusted Execution Environment: What It is, and What It is Not (TrustCom, 2015)
Towards Integrating Trusted Execution Environment into Embedded Autonomic Systems (ICAC, 2015)
The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation (SEC, 2015)
AMAD: Resource Consumption Profile-Aware Attack Detection in IaaS Cloud (UCC, 2014)
Secure IPsec based offload architectures for mobile data (Q2SWinet, 2014)
Self-Stabilizing Virtual Machine Hypervisor Architecture for Resilient Cloud (SERVICES, 2014)
Mentor: Positive DNS Reputation to Skim-Off Benign Domains in Botnet C&C Blacklists (SEC, 2014)
Extreme Learning Machines for Internet Traffic Classification (ESANN, 2014)
When Dynamic VM Migration Falls under the Control of VM Users (CloudCom, 2013)
PeerViewer: Behavioral Tracking and Classification of P2P Malware (CSS, 2013)
BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis (CANS, 2013)
Reconsidering Intrusion Monitoring Requirements in Shared Cloud Platforms (ARES, 2013)
High Availability for IPsec VPN Platforms: ClusterIP Evaluation (ARES, 2013)
Elastic virtual private cloud (Q2SWinet, 2013)
PREFETCHing to Overcome DNSSEC Performance Issue on Large Resolving Platform (TrustCom, 2013)
Behavioral classification and detection of malware through HTTP user agent anomalies (Journal of Information Security and Applications, 2013)
Failure preventive mechanism for IPsec gateways (ICCIT, 2013)
Routing tables building methods for increasing DNS(SEC) resolving platforms efficiency (IM, 2013)
Overcoming DNSSEC performance issues with DHT-based architectures (IM, 2013)
Engineering Intrusion Prevention Services for IaaS Clouds: The Way of the Hypervisor (SOSE, 2013)
A performance view on DNSSEC migration (CNSM, 2010)
A Service Dependency Model for Cost-Sensitive Intrusion Response (ESORICS, 2010)
Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection - best paper award (CIT, 2010)
A Pervasive Authentication and Authorization Infrastructures for Mobile Users (Comput. Secur., 2010)
A cross-layer reputation system for routing non-cooperation effects mitigation within hybrid ad-hoc networks (IWCMC, 2010)
The Topology Change Attack: Threat and Impact ( JUCS, 2009)
A Component-Based Policy-Neutral Architecture for Kernel-Level Access Control (Ann. Telecommun., 2008)
A QoS and Security Adaptation Model for Autonomic Pervasive Systems (COMPSAC, 2008)
Cooperation monitoring issues in ad hoc networks (IWCMC, 2006)