This paper introduces a proposal aimed at defining a novel methodology for run-time monitoring of Fog applications which is both policy-driven and app-agnostic. The first feature grants the possibility to define security policies that are enforced at run-time on a single or a set of Fog applications. The latter allows to enforce the security...
-
2019 (v1)PublicationUploaded on: April 14, 2023
-
2023 (v1)Publication
No description
Uploaded on: February 14, 2024 -
2024 (v1)Publication
No description
Uploaded on: July 3, 2024 -
2023 (v1)Publication
No description
Uploaded on: January 31, 2024 -
2019 (v1)Publication
Cybersecurity attacks are on the rise, and the current response is not effective enough. The need for a competent workforce, able to face attackers, is increasing. At the moment, the gap between academia and real-world skills is huge and academia cannot provide students with skills that match those of an attacker. To pass on these skills,...
Uploaded on: April 14, 2023 -
2023 (v1)Publication
No description
Uploaded on: July 3, 2024