Efficient and robust pseudonymous authentication in VANET G Calandriello, P Papadimitratos, JP Hubaux, A Lioy Proceedings of the fourth ACM international workshop on Vehicular ad hoc …, 2007 | 751 | 2007 |
On the performance of secure vehicular communication systems G Calandriello, P Papadimitratos, JP Hubaux, A Lioy IEEE transactions on dependable and secure computing 8 (6), 898-912, 2010 | 132 | 2010 |
Integrity verification of Docker containers for a lightweight cloud environment M De Benedictis, A Lioy Future generation computer systems 97, 236-246, 2019 | 94 | 2019 |
Dependability in wireless networks: Can we rely on WiFi? MD Aime, G Calandriello, A Lioy IEEE Security & Privacy 5 (1), 23-29, 2007 | 90 | 2007 |
Impact of vehicular communications security on transportation safety P Papadimitratos, G Calandriello, JP Hubaux, A Lioy IEEE INFOCOM Workshops 2008, 1-6, 2008 | 72 | 2008 |
Diagnosis oriented test pattern generation P Camurati, A Lioy, P Prinetto, MS Reorda Proceedings of the European Design Automation Conference, 470,471,472,473 …, 1990 | 68 | 1990 |
Adding support for automatic enforcement of security policies in NFV networks C Basile, F Valenza, A Lioy, DR Lopez, AP Perales IEEE/ACM Transactions on Networking 27 (2), 707-720, 2019 | 66 | 2019 |
Virtualized security at the network edge: A user-centric approach D Montero, M Yannuzzi, A Shaw, L Jacquin, A Pastor, R Serral-Gracia, ... IEEE Communications Magazine 53 (4), 176-186, 2015 | 65 | 2015 |
A novel approach for integrating security policy enforcement with dynamic network virtualization C Basile, A Lioy, C Pitscheider, F Valenza, M Vallini Proceedings of the 2015 1st IEEE Conference on Network Softwarization …, 2015 | 62 | 2015 |
Detection of encrypted cryptomining malware connections with machine and deep learning A Pastor, A Mozo, S Vakaruk, D Canavese, DR López, L Regano, ... IEEE Access 8, 158036-158055, 2020 | 58 | 2020 |
Why to adopt a security metric? A brief survey A Atzeni, A Lioy Quality of Protection: Security Measurements and Metrics, 1-12, 2006 | 57 | 2006 |
Network-level access control policy analysis and transformation C Basile, A Cappadonia, A Lioy IEEE/ACM Transactions On Networking 20 (4), 985-998, 2011 | 56 | 2011 |
Advanced fault collapsing A Lioy IEEE Design & Test of Computers 9 (1), 64-71, 1992 | 54 | 1992 |
Automatic synthesis of large telescopic units based on near-minimum timed supersetting L Benini, G De Micheli, A Lioy, E Macii, G Odasso, M Poncino IEEE Transactions on Computers 48 (8), 769-779, 1999 | 51 | 1999 |
PKI past, present and future A Lioy, M Marian, N Moltchanova, M Pala International Journal of Information Security 5, 18-29, 2006 | 45 | 2006 |
Classification and analysis of communication protection policy anomalies F Valenza, C Basile, D Canavese, A Lioy IEEE/ACM Transactions on Networking 25 (5), 2601-2614, 2017 | 44 | 2017 |
Security issues in control, management and routing protocols M Baltatu, A Lioy, F Maino, D Mazzocchi Computer Networks 34 (6), 881-894, 2000 | 44 | 2000 |
A complexity analysis of sequential ATPG A Lioy, PL Montessoro, S Gai IEEE International Symposium on Circuits and Systems,, 1946-1949, 1989 | 42 | 1989 |
DNS security A Lioy, F Maino, M Marian, D Mazzocchi Terena Networking Conference, 2000 | 37 | 2000 |
SHIELD: A novel NFV-based cybersecurity framework G Gardikis, K Tzoulas, K Tripolitis, A Bartzas, S Costicoglou, A Lioy, ... 2017 IEEE Conference on Network Softwarization (NetSoft), 1-6, 2017 | 35 | 2017 |