Follow
Fulvio Valenza
Fulvio Valenza
Tenure-Track Assistant Professor (RTD-B), Politecnico di Torino
Verified email at polito.it - Homepage
Title
Cited by
Cited by
Year
Adding support for automatic enforcement of security policies in NFV networks
C Basile, F Valenza, A Lioy, DR Lopez, AP Perales
IEEE/ACM Transactions on Networking 27 (2), 707-720, 2019
662019
A novel approach for integrating security policy enforcement with dynamic network virtualization
C Basile, A Lioy, C Pitscheider, F Valenza, M Vallini
Network Softwarization (NetSoft), 2015 1st IEEE Conference on, 2015
612015
Automated firewall configuration in virtual networks
D Bringhenti, G Marchetto, R Sisto, F Valenza, J Yusupov
IEEE Transactions on Dependable and Secure Computing 20 (2), 1559-1576, 2022
482022
Securing SOME/IP for in-vehicle service protection
M Iorio, M Reineri, F Risso, R Sisto, F Valenza
IEEE Transactions on Vehicular Technology 69 (11), 13450-13466, 2020
472020
Automated optimal firewall orchestration and configuration in virtualized networks
D Bringhenti, G Marchetto, R Sisto, F Valenza, J Yusupov
NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, 1-7, 2020
472020
Towards a fully automated and optimized network security functions orchestration
D Bringhenti, G Marchetto, R Sisto, F Valenza, J Yusupov
2019 4th International Conference on Computing, Communications and Security …, 2019
442019
Classification and analysis of communication protection policy anomalies
F Valenza, C Basile, D Canavese, A Lioy
IEEE/ACM Transactions on Networking 25 (5), 2601 - 2614, 2017
442017
Protecting In-Vehicle Services : Security-Enabled SOME/IP Middleware
M Iorio, A Buttiglieri, M Reineri, F Risso, R Sisto, F Valenza
IEEE Vehicular Technology Magazine, 2020
372020
Improving the formal verification of reachability policies in virtualized networks
D Bringhenti, G Marchetto, R Sisto, S Spinoso, F Valenza, J Yusupov
IEEE Transactions on Network and Service Management 18 (1), 713 - 728, 2020
362020
Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks
D Bringhenti, J Yusupov, AM Zarca, F Valenza, R Sisto, JB Bernabe, ...
Computer Networks 213, 109123, 2022
312022
Leveraging SDN to improve security in industrial networks
M Cheminod, L Durante, L Seno, F Valenza, A Valenzano, C Zunino
2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS …, 2017
292017
An Optimized Firewall Anomaly Resolution
F Valenza, M Cheminod
Journal of Internet Services and Information Security 10 (1), 22-37, 2020
282020
Formally specifying and checking policies and anomalies in service function chaining
F Valenza, S Spinoso, R Sisto
Journal of Network and Computer Applications 146, 102419, 2019
262019
A comprehensive approach to the automatic refinement and verification of access control policies
M Cheminod, L Durante, L Seno, F Valenza, A Valenzano
Computers & Security 80, 186-199, 2019
262019
Automation for network security configuration: state of the art and research trends
D Bringhenti, G Marchetto, R Sisto, F Valenza
ACM Computing Surveys 56 (3), 1-37, 2023
242023
Toward cybersecurity personalization in smart homes
D Bringhenti, F Valenza, C Basile
IEEE Security & Privacy 20 (1), 45-53, 2021
242021
Assessing network authorization policies via reachability analysis
C Basile, D Canavese, C Pitscheider, A Lioy, F Valenza
Computers & Electrical Engineering 64, 110-131, 2017
242017
A model for the analysis of security policies in service function chains
L Durante, L Seno, F Valenza, A Valenzano
2017 IEEE Conference on Network Softwarization (NetSoft), 1-6, 2017
232017
Introducing programmability and automation in the synthesis of virtual firewall rules
D Bringhenti, G Marchetto, R Sisto, F Valenza, J Yusupov
2020 6th IEEE Conference on Network Softwarization (NetSoft), 473-478, 2020
212020
A framework for verification-oriented user-friendly network function modeling
G Marchetto, R Sisto, F Valenza, J Yusupov
IEEE Access 7, 99349-99359, 2019
212019
The system can't perform the operation now. Try again later.
Articles 1–20