The growing complexity and diversification of cyber-attacks are largely reflected in the increasing sophistication of security appliances, which are often too cumbersome to be run in virtual services and IoT devices. Hence, the design of cyber-security frameworks is today looking at more cooperative models, which collect security-related data from a large set of heterogeneous sources for centralized analysis and correlation.In this paper, we outline a flexible abstraction layer for access to security context. It is conceived to program and gather data from lightweight inspection and enforcement hooks deployed in cloud applications and IoT devices. We also provide a preliminary description of its implementation, by reviewing the main softwar...
Cyber-attacks affect every aspect of our lives. These attacks have serious consequences, not only fo...
9th International Conference on Cloud Computing and Services Science, 2019, Heraklion, Crete, Greece...
The use of Internet of Things (IoT) devices has increased in the past decade. These IoT devices gene...
The growing complexity and diversification of cyber-attacks are largely reflected in the increasing ...
In last years, the security appliance is becoming a more important and critical challenge considerin...
Internet of things (IoT) plays a key role in enabling smart sustainable cities. Pervasive computing ...
The uptake of virtualization and cloud technologies has pushed novel development and operation model...
We survey some critical issues arising in the ubiquitous computing paradigm, in particular the inter...
Evolving business models, computing paradigms, and management practices are rapidly re-shaping the u...
Cloud computing provides the flexible architecture where data and resources are dispersed at various...
Cloud Computing paradigm represents an opportunity for users to reduce costs and increase the ecienc...
Even as black-box web vulnerability scanners help identify security vulnerabilities of web applicati...
Abstract: Cybersecurity is referred to the process, technologies and practices for protection of dev...
The definition of elastic network services that can be orchestrated at run-time brings unprecedented...
Abstract: Cyber security is referred to the process, technologies and practices for protection of...
Cyber-attacks affect every aspect of our lives. These attacks have serious consequences, not only fo...
9th International Conference on Cloud Computing and Services Science, 2019, Heraklion, Crete, Greece...
The use of Internet of Things (IoT) devices has increased in the past decade. These IoT devices gene...
The growing complexity and diversification of cyber-attacks are largely reflected in the increasing ...
In last years, the security appliance is becoming a more important and critical challenge considerin...
Internet of things (IoT) plays a key role in enabling smart sustainable cities. Pervasive computing ...
The uptake of virtualization and cloud technologies has pushed novel development and operation model...
We survey some critical issues arising in the ubiquitous computing paradigm, in particular the inter...
Evolving business models, computing paradigms, and management practices are rapidly re-shaping the u...
Cloud computing provides the flexible architecture where data and resources are dispersed at various...
Cloud Computing paradigm represents an opportunity for users to reduce costs and increase the ecienc...
Even as black-box web vulnerability scanners help identify security vulnerabilities of web applicati...
Abstract: Cybersecurity is referred to the process, technologies and practices for protection of dev...
The definition of elastic network services that can be orchestrated at run-time brings unprecedented...
Abstract: Cyber security is referred to the process, technologies and practices for protection of...
Cyber-attacks affect every aspect of our lives. These attacks have serious consequences, not only fo...
9th International Conference on Cloud Computing and Services Science, 2019, Heraklion, Crete, Greece...
The use of Internet of Things (IoT) devices has increased in the past decade. These IoT devices gene...