Background and activities
Scientific, academic and artistic work
A selection of recent journal publications, artistic productions, books, including book and report excerpts. See all publications in the database
- (2017) Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures. Advances in Intelligent Systems and Computing. vol. 461.
- (2017) Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017. Advances in Intelligent Systems and Computing. vol. 611.
- (2017) Security Requirements for the Deployment of Services Across Tactical SOA, International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017. Lecture Notes in Computer Science. vol. 10446.
- (2017) TACTICS: Validation of the security framework developed for tactical SOA, Journal of Information Security and Applications. Journal of Information Security and Applications. vol. 35.
- (2017) A smart micro-grid architecture for resource constrained environments. Advanced Information Networking and Applications.
- (2016) MPLS Policy Target Recognition Network. Lecture Notes in Computer Science. vol. 9572.
- (2016) Policy enforcement system for secure interoperable control in distributed Smart Grid systems. Journal of Network and Computer Applications. vol. 59.
- (2016) Inferring relevance and presence of evidence in service-oriented and SaaS architectures. Proceedings of the IEEE Symposium on Computers and Communications. vol. 2016-February.
- (2016) Recovering Structural Controllability on Erdős-Rényi Graphs in the Presence of Compromised Nodes. Lecture Notes in Computer Science. vol. 9578.
- (2016) Efficient security policy reconciliation in tactical service oriented architectures. Communications in Computer and Information Science. vol. 670.
- (2016) A Survey on the Security Vulnerabilities of Cellular Communication Systems (GSM-UMTS-LTE). Norsk Informasjonssikkerhetskonferanse (NISK). vol. 2016.
- (2016) A distributed continuous double auction framework for resource constrained microgrids. Lecture Notes in Computer Science. vol. 9578.
- (2015) Enabling Dynamic Security Policy Evaluation for Service-Oriented Architectures in Tactical Networks. Norsk Informasjonssikkerhetskonferanse (NISK).
- (2013) Locating subverted processes using random packet comparison in SCADA systems. International Journal of Critical Infrastructures. vol. 9 (1/2).
- (2012) Algorithmic approach for clandestine localisation and tracking in short-range environments. International Journal of Communication Networks and Distributed Systems. vol. 9 (3/4).
- (2013) Critical Information Infrastructure Security; 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers. Springer. 2013. ISBN 978-3-642-41476-3. Lecture Notes in Computer Science (6983).
- (2012) Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense. Springer. 2012. ISBN 9783642289194. Lecture Notes in Computer Science (7130).
- (2011) Critical Information Infrastructure Security. 5th International Workshop, CRITIS 2010, Athens, Greece, September 2010, Revised Papers. Springer. 2011. ISBN 978-3-642-21693-0. Lecture Notes in Computer Science (6712).
Part of book/report
- (2017) Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids. Security of Industrial Control Systems and Cyber-Physical Systems Second International Workshop, CyberICPS 2016 Heraklion, Crete, Greece, September 26–30, 2016 Revised Selected Papers.
- (2017) A Security Policy Infrastructure for Tactical Service Oriented Architectures. Security of Industrial Control Systems and Cyber-Physical Systems Second International Workshop, CyberICPS 2016 Heraklion, Crete, Greece, September 26–30, 2016 Revised Selected Papers.