Publications in collaboration with researchers from Technical University of Darmstadt (17)

2019

  1. CIPSEC-enhancing critical infrastructure protection with innovative security framework

    Challenges in Cybersecurity and Privacy: the European Research Landscape (River Publishers), pp. 129-148

  2. Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  3. Threat Modeling the Cloud: An Ontology Based Approach

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2018

  1. Flashlight: A novel monitoring path identification schema for securing cloud services

    ACM International Conference Proceeding Series

  2. Whetstone: Reliable monitoring of cloud services

    Proceedings - 2018 IEEE International Conference on Smart Computing, SMARTCOMP 2018

2017

  1. A Framework for Ranking Cloud Security Services

    Proceedings - 2017 IEEE 14th International Conference on Services Computing, SCC 2017

  2. A novel approach to manage cloud security SLA incidents

    Future Generation Computer Systems, Vol. 72, pp. 193-205

  3. DeQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services

    Proceedings - 2017 IEEE 14th International Conference on Services Computing, SCC 2017

  4. Quantitative Reasoning about Cloud Security Using Service Level Agreements

    IEEE Transactions on Cloud Computing, Vol. 5, Núm. 3, pp. 457-471

2016

  1. Identifying and utilizing dependencies across cloud security services

    ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security

  2. Novel efficient techniques for real-time cloud security assessment

    Computers and Security, Vol. 62, pp. 1-18

  3. Quantifiably Trusting the Cloud: Putting Metrics to Work

    IEEE Security and Privacy, Vol. 14, Núm. 3, pp. 73-77

  4. SENTRY: A novel approach for mitigating application layer DDoS threats

    Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016

2015

  1. Assessing privacy capabilities of cloud service providers

    IEEE Latin America Transactions

  2. Blended Identity: Pervasive IdM for Continuous Authentication

    IEEE Security and Privacy, Vol. 13, Núm. 3, pp. 32-39

  3. Idea: Optimising multi-cloud deployments with security controls as constraints

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2014

  1. AHP-based quantitative approach for assessing and comparing cloud security

    Proceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014