Spremljaj
Cataldo Basile
Cataldo Basile
Associate Professor at the Politecnico di Torino
Preverjeni e-poštni naslov na polito.it
Naslov
Navedeno
Navedeno
Leto
Adding Support for Automatic Enforcement of Security Policies in NFV Networks
C Basile, F Valenza, A Lioy, DR Lopez, AP Perales
IEEE/ACM Transactions on Networking 27 (2), 707-720, 2019
682019
Virtualized Security at the Network Edge: A User-centric Approach
D Montero, M Yannuzzi, A Shaw, L Jacquin, A Pastor, R Serral-Gracia, ...
Communications Magazine, IEEE 53 (4), 176 - 186, 2015
652015
Assessment of source code obfuscation techniques
A Viticchié, L Regano, M Torchiano, C Basile, M Ceccato, P Tonella, ...
2016 IEEE 16th International Working Conference on Source Code Analysis and …, 2016
632016
A novel approach for integrating security policy enforcement with dynamic network virtualization
C Basile, A Lioy, C Pitscheider, F Valenza, M Vallini
Proceedings of the 2015 1st IEEE Conference on Network Softwarization …, 2015
622015
Network-Level Access Control Policy Analysis and Transformation
C Basile, A Cappadonia, A Lioy
Networking, IEEE/ACM Transactions on 20 (4), 985-998, 2012
582012
How professional hackers understand protected code while performing attack tasks
M Ceccato, P Tonella, C Basile, B Coppens, B De Sutter, P Falcarin, ...
2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC …, 2017
472017
How professional hackers understand protected code while performing attack tasks
M Ceccato, P Tonella, C Basile, B Coppens, B De Sutter, P Falcarin, ...
2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC …, 2017
472017
Classification and analysis of communication protection policy anomalies
F Valenza, C Basile, D Canavese, A Lioy
IEEE/ACM Transactions on Networking 25 (5), 2601-2614, 2017
462017
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge
M Ceccato, P Tonella, C Basile, P Falcarin, M Torchiano, B Coppens, ...
Empirical Software Engineering 24, 240-286, 2019
442019
A meta-model for software protections and reverse engineering attacks
C Basile, D Canavese, L Regano, P Falcarin, B De Sutter
Journal of Systems and Software 150, 3-21, 2019
382019
FPGA-based remote-code integrity verification of programs in distributed embedded systems
C Basile, S Di Carlo, A Scionti
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2012
322012
Ontology-based security policy translation
C Basile, A Lioy, S Scozzi, M Vallini
Journal of Information Assurance and Security 5 (1), 437-445, 2010
322010
Analysis of Application-Layer Filtering Policies With Application to HTTP
C Basile, A Lioy
IEEE-ACM TRANSACTIONS ON NETWORKING 23 (1), 28-41, 2015
292015
POSITIF: a policy-based security management system
C Basile, A Lioy, GM Perez, FJG Clemente, AFG Skarmeta
Policies for Distributed Systems and Networks, 2007. POLICY'07. Eighth IEEE …, 2007
292007
Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks
A Viticchié, C Basile, A Avancini, M Ceccato, B Abrath, B Coppens
Proceedings of the 2016 ACM Workshop on Software PROtection, 73-84, 2016
282016
Toward cybersecurity personalization in smart homes
D Bringhenti, F Valenza, C Basile
IEEE Security & Privacy 20 (1), 45-53, 2021
272021
Assessing network authorization policies via reachability analysis
C Basile, D Canavese, C Pitscheider, A Lioy, F Valenza
Computers & Electrical Engineering 64, 110-131, 2017
242017
Towards an algebraic approach to solve policy conflicts
C Basile, A Lioy
FCS 4, 319-338, 2004
242004
A formal model of network policy analysis
F Valenza, S Spinoso, C Basile, R Sisto, A Lioy
2015 IEEE 1st International Forum on Research and Technologies for Society …, 2015
212015
Inter‐function anomaly analysis for correct SDN/NFV deployment
C Basile, D Canavese, A Lioy, C Pitscheider, F Valenza
International Journal of Network Management 26 (1), 25-43, 2016
202016
Sistem trenutno ne more izvesti postopka. Poskusite znova pozneje.
Članki 1–20