default search action
Alessandra De Benedictis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Valentina Casola, Alessandra De Benedictis, Carlo Mazzocca, Vittorio Orbinato:
Secure software development and testing: A model-based methodology. Comput. Secur. 137: 103639 (2024) - [j27]Alessandra Somma, Alessandra De Benedictis, Christiancarmine Esposito, Nicola Mazzocca:
The convergence of Digital Twins and Distributed Ledger Technologies: A systematic literature review and an architectural proposal. J. Netw. Comput. Appl. 225: 103857 (2024) - [j26]Valentina Casola, Alessandra De Benedictis, Carlo Mazzocca, Rebecca Montanari:
Designing Secure and Resilient Cyber-Physical Systems: A Model-Based Moving Target Defense Approach. IEEE Trans. Emerg. Top. Comput. 12(2): 631-642 (2024) - [c39]Valentina Casola, Marta Catillo, Alessandra De Benedictis, Felice Moretta, Antonio Pecchia, Massimiliano Rak, Umberto Villano:
DEFEDGE: Threat-Driven Security Testing and Proactive Defense Identification for Edge-Cloud Systems. AINA (5) 2024: 79-88 - [c38]Alessandra De Benedictis, Franca Rocco di Torrepadula, Alessandra Somma:
A Digital Twin Architecture for Intelligent Public Transportation Systems: A FIWARE-Based Solution. W2GIS 2024: 165-182 - 2023
- [j25]Lorenzo De Donato, Ruth Dirnfeld, Alessandra Somma, Alessandra De Benedictis, Francesco Flammini, Stefano Marrone, Mehdi Saman Azari, Valeria Vittorini:
Towards AI-assisted digital twins for smart railways: preliminary guideline and reference architecture. J. Reliab. Intell. Environ. 9(3): 303-317 (2023) - [j24]Alessandra De Benedictis, Francesco Flammini, Nicola Mazzocca, Alessandra Somma, Francesco Vitale:
Digital Twins for Anomaly Detection in the Industrial Internet of Things: Conceptual Architecture and Proof-of-Concept. IEEE Trans. Ind. Informatics 19(12): 11553-11563 (2023) - [j23]Alessandra De Benedictis, Nicola Mazzocca, Alessandra Somma, Carmine Strigaro:
Digital Twins in Healthcare: An Architectural Proposal and Its Application in a Social Distancing Case Study. IEEE J. Biomed. Health Informatics 27(10): 5143-5154 (2023) - [c37]Alessandra Somma, Alessandra De Benedictis, Marco Zappatore, Cristian Martella, Angelo Martella, Antonella Longo:
Digital Twin Space: The Integration of Digital Twins and Data Spaces. IEEE Big Data 2023: 4017-4025 - 2022
- [j22]Roberto Vasconcelos Melo, Douglas D. J. de Macedo, Diego Kreutz, Alessandra De Benedictis, Maurício M. Fiorenza:
ISM-AC: an immune security model based on alert correlation and software-defined networking. Int. J. Inf. Sec. 21(2): 191-205 (2022) - [c36]Alessandra De Benedictis, Christiancarmine Esposito, Alessandra Somma:
Toward the Adoption of Secure Cyber Digital Twins to Enhance Cyber-Physical Systems Security. QUATIC 2022: 307-321 - 2021
- [j21]Valentina Casola, Alessandra De Benedictis, Sergio Di Martino, Nicola Mazzocca, Luigi Libero Lucio Starace:
Security-Aware Deployment Optimization of Cloud-Edge Systems in Industrial IoT. IEEE Internet Things J. 8(16): 12724-12733 (2021) - [j20]Mario Barbareschi, Valentina Casola, Alessandra De Benedictis, Erasmo La Montagna, Nicola Mazzocca:
On the Adoption of Physically Unclonable Functions to Secure IIoT Devices. IEEE Trans. Ind. Informatics 17(11): 7781-7790 (2021) - [j19]Flora Amato, Valentina Casola, Giovanni Cozzolino, Alessandra De Benedictis, Nicola Mazzocca, Francesco Moscato:
A Security and Privacy Validation Methodology for e-Health Systems. ACM Trans. Multim. Comput. Commun. Appl. 17(2s): 67:1-67:22 (2021) - [c35]Valentina Casola, Alessandra De Benedictis, Carlo Mazzocca, Rebecca Montanari:
Toward Automated Threat Modeling of Edge Computing Systems. CSR 2021: 135-140 - 2020
- [j18]Massimiliano Albanese, Alessandra De Benedictis, Douglas D. J. de Macedo, Fabrizio Messina:
Security and trust in cloud application life-cycle management. Future Gener. Comput. Syst. 111: 934-936 (2020) - [j17]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
A methodology for automated penetration testing of cloud applications. Int. J. Grid Util. Comput. 11(2): 267-277 (2020) - [j16]Flora Amato, Valentina Casola, Giovanni Cozzolino, Alessandra De Benedictis, Francesco Moscato:
Exploiting Workflow Languages and Semantics for Validation of Security Policies in IoT Composite Services. IEEE Internet Things J. 7(5): 4655-4665 (2020) - [j15]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach. J. Syst. Softw. 163: 110537 (2020) - [c34]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Giovanni Salzillo:
A Cloud SecDevOps Methodology: From Design to Testing. QUATIC 2020: 317-331 - [e1]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak:
Testing Software and Systems - 32nd IFIP WG 6.1 International Conference, ICTSS 2020, Naples, Italy, December 9-11, 2020, Proceedings. Lecture Notes in Computer Science 12543, Springer 2020, ISBN 978-3-030-64880-0 [contents]
2010 – 2019
- 2019
- [j14]Mario Barbareschi, Alessandra De Benedictis, Erasmo La Montagna, Antonino Mazzeo, Nicola Mazzocca:
A PUF-based mutual authentication scheme for Cloud-Edges IoT systems. Future Gener. Comput. Syst. 101: 246-261 (2019) - [j13]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano, Erkuden Rios, Angel Rego, Giancarlo Capone:
Model-based deployment of secure multi-cloud applications. Int. J. Grid Util. Comput. 10(6): 639-653 (2019) - [j12]Valentina Casola, Alessandra De Benedictis, Antonio Riccio, Diego Rivera, Wissam Mallouli, Edgardo Montes de Oca:
A security monitoring system for internet of things. Internet Things 7 (2019) - [j11]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
Toward the automation of threat modeling and risk assessment in IoT systems. Internet Things 7 (2019) - [c33]Valentina Casola, Alessandra De Benedictis, Umberto Villano:
Enabling Technologies: Infrastructure for Collaborative Enterprises Editorial for WETICE 2019 Conference. WETICE 2019: 14-15 - [c32]Mario Barbareschi, Alessandra De Benedictis, Erasmo La Montagna, Antonino Mazzeo, Nicola Mazzocca:
PUF-Enabled Authentication-as-a-Service in Fog-IoT Systems. WETICE 2019: 58-63 - [c31]Valentina Casola, Rosario Catelli, Alessandra De Benedictis:
A First Step Towards an ISO-Based Information Security Domain Ontology. WETICE 2019: 334-339 - 2018
- [j10]Valentina Casola, Alessandra De Benedictis, Jolanda Modic, Massimiliano Rak, Umberto Villano:
Per-service security SLAs for cloud security management: model and implementation. Int. J. Grid Util. Comput. 9(2): 128-138 (2018) - [j9]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
Security-by-design in multi-cloud applications: An optimization approach. Inf. Sci. 454-455: 344-362 (2018) - [j8]Mario Barbareschi, Alessandra De Benedictis, Nicola Mazzocca:
A PUF-based hardware mutual authentication protocol. J. Parallel Distributed Comput. 119: 107-120 (2018) - [c30]Massimiliano Rak, Valentina Casola, Alessandra De Benedictis, Umberto Villano:
Automated Risk Analysis for IoT Systems. 3PGCIC 2018: 265-275 - [c29]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
A Security SLA-Driven Moving Target Defense Framework to Secure Cloud Applications. MTD@CCS 2018: 48-56 - [c28]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
A Proposal of a Cloud-Oriented Security and Performance Simulator Provided as-a-Service. CISIS 2018: 1002-1011 - [c27]Alessandra De Benedictis, Nicola Mazzocca, Roberto Nardone, Salvatore Venticinque:
A Model-Based Evaluation Methodology for Smart Energy Systems. SMARTCOMP 2018: 187-194 - [c26]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
Towards Automated Penetration Testing for Cloud Applications. WETICE 2018: 24-29 - 2017
- [j7]Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
SLAs for cloud applications: agreement protocol and REST-based implementation. Int. J. Grid Util. Comput. 8(2): 120-132 (2017) - [j6]Valentina Casola, Alessandra De Benedictis, Madalina Erascu, Jolanda Modic, Massimiliano Rak:
Automatically Enforcing Security SLAs in the Cloud. IEEE Trans. Serv. Comput. 10(5): 741-755 (2017) - [c25]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
A Security Metric Catalogue for Cloud Applications. CISIS 2017: 854-863 - [c24]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
An Automatic Tool for Benchmark Testing of Cloud Applications. CLOSER 2017: 701-708 - [c23]Valentina Casola, Alessandra De Benedictis, Roberto Nardone:
Towards Model-Based Security Assessment of Cloud Applications. GPC 2017: 773-785 - [c22]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano, Erkuden Rios, Angel Rego, Giancarlo Capone:
MUSA Deployer: Deployment of Multi-cloud Applications. WETICE 2017: 107-112 - 2016
- [j5]Alessandra De Benedictis, Massimiliano Rak, Mauro Turtur, Umberto Villano:
A framework for cloud-aware development of bag-of-tasks scientific applications. Int. J. Grid Util. Comput. 7(2): 130-140 (2016) - [j4]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
SLA-based Secure Cloud Application Development. Scalable Comput. Pract. Exp. 17(4): 271-284 (2016) - [c21]Valentina Casola, Alessandra De Benedictis, Madalina Erascu, Massimiliano Rak, Umberto Villano:
A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services. CISIS 2016: 549-554 - [c20]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Erkuden Rios:
Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications. Cloud Forward 2016: 53-62 - [c19]Alessandra De Benedictis, Valentina Casola, Massimiliano Rak, Umberto Villano:
Cloud Security: From Per-Provider to Per-Service Security SLAs. INCoS 2016: 469-474 - [c18]Valentina Casola, Alessandra De Benedictis, Jolanda Modic, Massimiliano Rak, Umberto Villano:
Per-Service Security SLa: A New Model for Security Management in Clouds. WETICE 2016: 83-88 - 2015
- [c17]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
DoS Protection in the Cloud through the SPECS Services. 3PGCIC 2015: 677-682 - [c16]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak:
Security Monitoring in the Cloud: An SLA-Based Approach. ARES 2015: 749-755 - [c15]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
SLA-Based Secure Cloud Application Development: The SPECS Framework. SYNASC 2015: 337-344 - [c14]Alessandra De Benedictis, Massimiliano Rak, Mauro Turtur, Umberto Villano:
REST-Based SLA Management for Cloud Applications. WETICE 2015: 93-98 - 2014
- [j3]Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Don J. Torrieri:
A probabilistic framework for jammer identification in MANETs. Ad Hoc Networks 14: 84-94 (2014) - [j2]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Giuseppe Aversano, Umberto Villano:
An SLA-based brokering platform to provide sensor networks as-a-service. Int. J. Bus. Process. Integr. Manag. 7(2): 114-127 (2014) - [c13]Mario Barbareschi, Alessandra De Benedictis, Antonino Mazzeo, Antonino Vespoli:
Mobile Traffic Analysis Exploiting a Cloud Infrastructure and Hardware Accelerators. 3PGCIC 2014: 414-419 - [c12]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak:
On the Adoption of Security SLAs in the Cloud. A4Cloud 2014: 45-62 - [c11]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
Preliminary Design of a Platform-as-a-Service to Provide Security in Cloud. CLOSER 2014: 752-757 - [c10]Alessandra De Benedictis, Massimiliano Rak, Mauro Turtur, Umberto Villano:
Cloud-Aware Development of Scientific Applications. WETICE 2014: 149-154 - 2013
- [b1]Alessandra De Benedictis:
Change to survive: a Moving Target Defense approach to secure resource-constrained distributed devices. University of Naples Federico II, Italy, 2013 - [j1]Valentina Casola, Alessandra De Benedictis, Annarita Drago, Nicola Mazzocca:
SeNsiM-SEC: secure sensor networks integration to monitor rail freight transport. Int. J. Syst. Syst. Eng. 4(3/4): 291-316 (2013) - [c9]Jesus Luna, Tsvetoslava Vateva-Gurova, Neeraj Suri, Massimiliano Rak, Alessandra De Benedictis:
SecLA-Based Negotiation and Brokering of Cloud Resources. CLOSER (Selected Papers) 2013: 1-18 - [c8]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Giuseppe Aversano, Umberto Villano:
An SLA-Based Approach to Manage Sensor Networks as-a-Service. CloudCom (1) 2013: 191-197 - [c7]Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Kun Sun:
A moving target defense mechanism for MANETs based on identity virtualization. CNS 2013: 278-286 - [c6]Valentina Casola, Alessandra De Benedictis, Massimiliano Albanese:
A moving target defense approach for protecting resource-constrained distributed devices. IRI 2013: 22-29 - [c5]Valentina Casola, Alessandra De Benedictis, Massimiliano Albanese:
A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices. IRI (best papers) 2013: 299-324 - [c4]Alessandra De Benedictis, Behzad Koosha, Massimiliano Albanese, Valentina Casola:
A Probabilistic Framework for Distributed Localization of Attackers in MANETs. STM 2013: 49-64 - 2012
- [c3]Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Paulo Shakarian:
A Probabilistic Framework for Localization of Attackers in MANETs. ESORICS 2012: 145-162 - 2011
- [c2]Valentina Casola, Alessandra De Benedictis, Annarita Drago, Nicola Mazzocca:
Analysis and Comparison of Security Protocols in Wireless Sensor Networks. SRDS Workshops 2011: 52-56 - 2010
- [c1]Alessandra De Benedictis, Andrea Gaglione, Nicola Mazzocca:
Securing a tiered re-taskable sensing system. IAS 2010: 260-264
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint