On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study. 2017 13th European Dependable Computing Conference (EDCC). 121–128.(2017).
Demonstrating a Tool for Injection Attack Prevention in MySQL. Dependable Systems and Networks (DSN), 2017 47th Annual IEEE/IFIP International Conference on. 551–558.(2017).
Secure and Dependable Multi-Cloud Network Virtualization. Proceedings of the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures. 2.(2017).
Secure Network Monitoring Using Programmable Data Planes. Third International Workshop on Security in NFV-SDN (IEEE NFV-SDN 2017).(2017).
Secure tera-scale data crunching with a small TCB. Dependable Systems and Networks (DSN), 2017 47th Annual IEEE/IFIP International Conference on. 169–180.(2017).
Secure Virtual Network Embedding in a Multi-Cloud Environment. arXiv preprint arXiv:1703.01313.(2017).
DEKANT: a static analysis tool that learns to detect web application vulnerabilities. Proceedings of the 25th International Symposium on Software Testing and Analysis. 1–11.(2016).
Detecting and removing web application vulnerabilities with static analysis and data mining. IEEE Transactions on Reliability. 65, 54–69.(2016).
Equipping WAP with weapons to detect vulnerabilities. Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.(2016).
Equipping WAP with WEAPONS to Detect Vulnerabilities: Practical Experience Report. Dependable Systems and Networks (DSN), 2016 46th Annual IEEE/IFIP International Conference on. 630–637.(2016).
Hacking the DBMS to Prevent Injection Attacks. Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy. 295–306.(2016).
JITeR: Just-in-time application-layer routing. Computer Networks. 104, 122–136.(2016).
(Literally) Above the clouds: Virtualizing the network over multiple clouds. NetSoft Conference and Workshops (NetSoft), 2016 IEEE. 112–115.(2016).
Secure and dependable virtual network embedding. arXiv preprint arXiv:1602.02268.(2016).
Secure Identification of Actively Executed Code on a Generic Trusted Component. Dependable Systems and Networks (DSN), 2016 46th Annual IEEE/IFIP International Conference on. 419–430.(2016).
Sieveq: A layered bft protection system for critical services. IEEE Transactions on Dependable and Secure Computing.(2016).
User-Centric Security and Dependability in the Clouds-of-Clouds. IEEE Cloud Computing. 3, 64–75.(2016).
Fault-Tolerant Precision Time Protocol for Smart Grids. Proceedings of the 7th Simposio de Informatica (INFORUM).(2015).
Securing Passive Replication Through Verification. Proceedings of the 34th Symposium on Reliable Distributed Systems (SRDS).(2015).
Analysis of operating system diversity for intrusion tolerance. Software: Practice and Experience. 44, 735–770.(2014).
Automatic detection and correction of web application vulnerabilities using data mining to predict false positives. Proceedings of the 23rd international conference on World wide web. 63–74.(2014).
SCFS: a shared cloud-backed file system. Usenix ATC.(2014).
Stopping a Rapid Tornado with a Puff. Security and Privacy (SP), 2014 IEEE Symposium on. 509–523.(2014).
Byzantine fault-tolerant consensus in wireless ad hoc networks. Mobile Computing, IEEE Transactions on. 12, 2441–2454.(2013).