Follow
Angelo Liguori
Title
Cited by
Cited by
Year
Information security and threats in mobile appliances
A Tedeschi, A Liguori, F Benedetto
Recent Patents on Computer Science 7 (1), 3-11, 2014
152014
Analysis and monitoring of hidden TCP traffic based on an open-source covert timing channel
A Liguori, F Benedetto, G Giunta, N Kopal, A Wacker
2015 IEEE Conference on Communications and Network Security (CNS), 667-674, 2015
92015
A novel multiple independent levels of security/safety cross domain solution
A Liguori
MILCOM 2015-2015 IEEE Military Communications Conference, 1578-1583, 2015
52015
A novel method for securing critical infrastructures by detecting hidden flows of data
F Benedetto, G Giunta, A Liguori, A Wacker
2015 IEEE Conference on Communications and Network Security (CNS), 648-654, 2015
52015
SoftGap: a multi independent levels of security cross-domain solution
A Liguori, F Benedetto, G Giunta, N Kopal, A Wacker
2015 3rd International Conference on Future Internet of Things and Cloud …, 2015
42015
Mind the shift: secure migration of containerized processes in edge computing
A Liguori, P Schoo, M Winandy
2019 6th IEEE International Conference on Cyber Security and Cloud Computing …, 2019
32019
The Diamond Approach for SDN Security
A Liguori, M Winandy
IEEE Softwarization, 2018
32018
Design and implementation of multilevel security architectures
A Liguori
Università degli studi Roma Tre, 2016
22016
Mitigating cyber-security risks using MILS
A Liguori, F Benedetto, M Liguori
2017 40th International Conference on Telecommunications and Signal …, 2017
2017
From multilevel security to multiple independent levels of security/safety: the evolution illustrated through a novel cross-domain architecture
A Liguori
Int. J. Mobile Network Design and Innovation 7 (1), 22-36, 2017
2017
Testing di oggetti matematici in java. Introduzione a JUnit
A Simonetta, MC Paoletti, A Liguori
Universitalia, 2013
2013
Memmi, Gerard 7 Müller, Tilo 89
O Abdulkader, F Abdulraheem Alzahrani, O Akinrolabu, A Algawi, ...
The system can't perform the operation now. Try again later.
Articles 1–12