default search action
Danilo Valeros Bernardo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [c17]Danilo Valeros Bernardo, Bee Bee Chua:
Introduction and Analysis of SDN and NFV Security Architecture (SN-SECA). AINA 2015: 796-801 - 2013
- [c16]Bee Bee Chua, Danilo Valeros Bernardo:
Open Source Developer Download Tiers: A Survival Framework. ICITCS 2013: 1-5 - [c15]Danilo Valeros Bernardo, Bee Bee Chua:
Random validation and fault detection method in systems implementations. ISDA 2013: 172-176 - [c14]Danilo Valeros Bernardo:
Utilizing Security Risk Approach in Managing Cloud Computing Services. NBiS 2013: 119-125 - 2012
- [b1]Danilo Valeros Bernardo:
Network security mechanisms and implementations for the next generation reliable fast data transfer protocol - UDT. University of Technology Sydney, Australia, 2012 - [j2]Danilo Valeros Bernardo, Doan B. Hoang:
Multi-layer security analysis and experimentation of high speed protocol data transfer for GRID. Int. J. Grid Util. Comput. 3(2/3): 81-88 (2012) - [j1]Danilo Valeros Bernardo:
Security risk assessment: toward a comprehensive practical risk management. Int. J. Inf. Comput. Secur. 5(2): 77-104 (2012) - [c13]Danilo Valeros Bernardo, Doan B. Hoang:
Symbolic Analysis of the Proposed UDT Security Architecture. AINA Workshops 2012: 171-176 - [c12]Danilo Valeros Bernardo, Doan B. Hoang:
Compositional Logic for Proof of Correctness of Proposed UDT Security Mechanisms. AINA 2012: 686-694 - [c11]Danilo Valeros Bernardo:
Securing the Cloud, Dispelling Fears: Ways to Combat Climate Change. NBiS 2012: 787-793 - 2011
- [c10]Danilo Valeros Bernardo, Doan B. Hoang:
Empirical Survey: Experimentation and Implementations of High Speed Protocol Data Transfer for GRID. AINA Workshops 2011: 335-340 - [c9]Danilo Valeros Bernardo, Doan B. Hoang:
Formalization and Information-Theoretic Soundness in the Development of Security Architecture for Next Generation Network Protocol - UDT. FGIT-SecTech 2011: 183-194 - [c8]Bee Bee Chua, Danilo Valeros Bernardo:
Integrating scholarly articles within e-learning courses: a framework. ITiCSE 2011: 392 - 2010
- [c7]Danilo Valeros Bernardo:
UDT -Authentication Option field: An approach. IAS 2010: 277-281 - [c6]Danilo Valeros Bernardo, Doan B. Hoang:
End-to-End Security Methods for UDT Data Transmissions. FGIT 2010: 383-393 - [c5]Bee Bee Chua, Danilo Valeros Bernardo, June M. Verner:
Understanding the Use of Elicitation Approaches for Effective Requirements Gathering. ICSEA 2010: 325-330 - [c4]Danilo Valeros Bernardo, Doan Hoang:
Protecting Next Generation High Speed Network Protocol - UDT through Generic Security Service Application Program Interface - GSS-API. SECURWARE 2010: 266-272 - [c3]Danilo Valeros Bernardo, Doan B. Hoang:
Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol. AST/UCMA/ISA/ACN 2010: 100-114 - [i1]Danilo Valeros Bernardo, Doan B. Hoang:
Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characterization. CoRR abs/1010.4845 (2010)
2000 – 2009
- 2009
- [c2]Danilo Valeros Bernardo, Bee Bee Chua, Doan B. Hoang:
Quantitative Security Risk Assessment (SRA) Method: An Empirical Case Study. NaBIC 2009: 972-977 - 2008
- [c1]Bee Bee Chua, Danilo Valeros Bernardo, June M. Verner:
Criteria for Estimating Effort for Requirements Changes. EuroSPI 2008: 36-46
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint