Publications


Recent publications include:

  • 2018

Pantelis Natsiavas, Janne Rasmussen, Maja Voss-Knude, Κostas Votis, Luigi Coppolino, Paolo Campegiani, Isaac Cano, David Marí, Giuliana Faiella, Fabrizio Clemente, Marco Nalin, Evangelos Grivas, Oana Stan, Erol Gelenbe, Jos Dumortier, Jan Petersen, Dimitrios Tzovaras, Luigi Romano, Ioannis Komnios, Vassilis Koutkias, “Comprehensive user requirements engineering methodology for secure and interoperable health data exchange“, BMC medical informatics and decision making, pages 85.


Luigi Coppolino, Salvatore D’Antonio, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione, “Exploiting new CPU Extensions for Secure Exchange of eHealth Data at the EU level“, 2018 14th European Dependable Computing Conference (EDCC), pages 17-24.


Luigi Coppolino, Salvatore D’Antonio, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione, “An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems“, International Conference on Network-Based Information Systems, pages 952-959.


Mariacarla Staffa, Luigi Sgaglione, Giovanni Mazzeo, Luigi Coppolino, Salvatore D’Antonio, Luigi Romano, Erol Gelenbe, Oana Stan, Sergiu Carpov, Evangelos Grivas, Paolo Campegiani, Luigi Castaldo, Konstantinos Votis, Vassilis Koutkias, Ioannis Komnios, “An OpenNCP-based Solution for Secure eHealth Data Exchange“, Journal of Network and Computer Applications, pages 65-85.


Giovanni Mazzeo, Luigi Coppolino, Salvatore D’Antonio, Claudio Mazzariello, Luigi Romano, “SIL2 assessment of an Active/Standby COTS-based Safety-Related system“, Reliability Engineering & System Safety, pages 125-134


Luigi Coppolino, Salvatore D’Antonio, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione, “How to Protect Public Administration from Cybersecurity Threats: The COMPACT Project“, 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA), pages 573-578.


Luigi Coppolino, Salvatore D’Antonio, Giovanni Mazzeo, Gaetano Papale, Luigi Sgaglione, Ferdinando Campanile, “An Approach for Securing Critical Applications in Untrusted Clouds“, Parallel, Distributed and Network-based Processing (PDP), 2018 26th Euromicro International Conference on, pages 436-440.


  Mariacarla Staffa, Luigi Coppolino, Luigi Sgaglione, Erol Gelenbe, Ioannis Komnios, Evangelos Grivas, Oana Stan, Luigi Castaldo, “KONFIDO: An OpenNCP-based secure eHealth data exchange system“, International ISCIS Security Workshop, pages 11-27.


J Rasmussen, P Natsiavas, Konstantinos Votis, K Moschou, P Campegiani, Luigi Coppolino, I Cano, D Marí, G Faiella, O Stan, O Abdelrahman, M Nalin, I Baroni, M Voss-Knude, VA Vella, E Grivas, C Mesaritakis, J Dumortier, J Petersen, D Tzovaras, L Romano, I Komnios, V Koutkias, “Gap Analysis for Information Security in Interoperable Solutions at a Systemic Level: The KONFIDO Approach“, Precision Medicine Powered by pHealth and Connected Health, pages 75-79.

 

  • 2017

Raffaele Martino, Salvatore D’Antonio, Luigi Coppolino, Luigi Romano, “Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements“, Computer Software and Applications Conference (COMPSAC), 2017 IEEE 41st Annual, pages 317-322.


 Luigi Coppolino, Salvatore D’Antonio, Luigi Romano, Luigi Sgaglione, Mariacarla Staffa, “Addressing security issues in the eHeatlh domain relying on SIEM solutions“, Computer Software and Applications Conference (COMPSAC), 2017 IEEE 41st Annual, pages 510-515.

Luigi Coppolino, Salvatore D’Antonio, Luigi Romano, Mariacarla Staffa, “Konfido project: a secure infrastructure increasing interoperability on a systemic level among ehealth services across europe“, Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2017 IEEE International Conference on, pages 342-347.


Luigi Coppolino, Salvatore D’Antonio, Giovanni Mazzeo, Luigi Romano, “Cloud security: Emerging threats and current solutions“, Computers & Electrical Engineering, pages 126-140.


Ferdinando Campanile, Luigi Coppolino, Salvatore D’Antonio, Leonid Lev, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione, Francesco Tessitore, “Cloudifying Critical Applications: A Use Case from the Power Grid Domain“, Parallel, Distributed and Network-based Processing (PDP), 2017 25th Euromicro International Conference on, pages 363-370.


Luigi Coppolino, Salvatore D’Antonio, Luigi Romano, Fotis Aisopos, Konstantinos Tserpes, “Real-time QoS monitoring from the end user perspective in large scale social networks“, International Journal of Computational Science and Engineering, pages 93-104.

  • 2016

Luigi Coppolino, Salvatore D’Antonio, Valerio Formicola, Luigi Romano, “A framework for mastering heterogeneity in multi-layer security information and event correlation“, Journal of Systems Architecture, pages 78-88.

Gianfranco Cerullo, Luigi Coppolino, Salvatore D’Antonio, Valerio Formicola, Gaetano Papale, Bruno Ragucci, “Enabling convergence of physical and logical security through intelligent event correlation“, Intelligent Distributed Computing IX, pages 427-437.
  • 2015

Luigi Coppolino, D Salvatore, Luigi Romano, Gaetano Papale, Luigi Sgaglione, Ferdinando Campanile, “Direct Debit Transactions: a comprehensive analysis of emerging attack patterns“, 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), pages 713-717.


 Luigi Coppolino, Valerio DAlessandro, Salvatore DAntonio, Leonid Levy, Luigi Romano, “My smart home is under attack“, Computational Science and Engineering (CSE), 2015 IEEE 18th International Conference on, pages 145-151.


 Andre Rein, Roland Rieke, Michael Jäger, Nicolai Kuntze, Luigi Coppolino, “Trust Establishment in Cooperating Cyber-Physical Systems“, Security of industrial control systems and cyber physical systems, pages 31-47.


 Luigi Coppolino, Salvatore D’Antonio, Carmine Massei, Luigi Romano, “Efficient Supply Chain Management via Federation-Based Integration of Legacy ERP Systems“, International Conference on Intelligent Software Methodologies, Tools, and Techniques, pages 378-387.


 Fabio Baselice, Luigi Coppolino, Salvatore D’Antonio, Giampaolo Ferraioli, Luigi Sgaglione, “A DBSCAN based approach for jointly segment and classify brain MR images“, Engineering in Medicine and Biology Society (EMBC), 2015 37th Annual International Conference of the IEEE, pages 2993-2996.


 Giuseppe Cicotti, Luigi Coppolino, Salvatore D’Antonio, Luigi Romano, “Runtime Model Checking for SLA Compliance Monitoring and QoS Prediction“, JoWUA, pages 4-20.


 Luigi Coppolino, Salvatore D’Antonio, Valerio Formicola, Luigi Romano, “Applying extensions of evidence theory to detect frauds in financial infrastructures“, International Journal of Distributed Sensor Networks, page 16.


 Giuseppe Cicotti, Luigi Coppolino, Salvatore D’Antonio, Luigi Romano, “How to monitor QoS in cloud infrastructures: the QoSMONaaS approach”, International Journal of Computational Science and Engineering, 29-45. [Online]. Available: https://www.inderscienceonline.com/doi/abs/10.1504/IJCSE.2015.071359


Luigi Coppolino, Salvatore D’Antonio, Luigi Romano, Ferdinando Campanile, Alexandre Valle de Carvalho, “Effective visualization of a big data banking application”, Intelligent Interactive Multimedia Systems and Services, 57-68. [Online]. Available: https://link.springer.com/chapter/10.1007/978-3-319-19830-9_6


Luigi Coppolino, Salvatore D’Antonio, Valerio Formicola, Carmine Massei, Luigi Romano, “Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services”, Journal of Ambient Intelligence and Humanized Computing, 1-10. [Online] Available: https://link.springer.com/article/10.1007/s12652-015-0276-9


L. Coppolino, S. D’Antonio, V. Formicola, C. Massei, L. Romano, “Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study”, Intelligent Distributed Computing VIII, 465-474. [Online]. Available: http://dx.doi.org/10.1007/978-3-319-10422-5_48

  • 2014

L Coppolino, L Romano, “Exposing vulnerabilities in electric power grids: An experimental approach”,International Journal of Critical Infrastructure Protection 7 (1), 51-60.  [Online]. Available: http://dx.doi.org/10.1016/j.ijcip.2014.01.003


 Francesco Buccafurri, Luigi Coppolino, Salvatore D’Antonio, Alessia Garofalo, Gianluca Lax, Antonino Nocera, Luigi Romano, “Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks”, Computer Safety, Reliability, and Security, 214-229. [Online]. Available: http://dx.doi.org/10.1007/978-3-319-10506-2_15


Luigi Coppolino, Salvatore D’Antonio, Luigi Romano, Fotis Aisophttp://dx.doi.org/10.1007/978-3-319-10506-2_15os, Konstantinos Tserpes, “Effective QoS Monitoring in Large Scale Social Networks”, Intelligent Distributed Computing VII, 249-259,  [Online]. Available: http://dx.doi.org/10.1007/978-3-319-01571-2_30

  • 2013

Alessandro Cilardo, Nicola Mazzocca, Luigi Coppolino, “TrustedSIM: Towards Unified Mobile Security”, Ubiquitous Intelligence and Computing, 2013 IEEE 10th International Conference on and 10th International Conference on Autonomic and Trusted Computing (UIC/ATC).  [Online]. Available: http://dx.doi.org/10.1109/UIC-ATC.2013.74


Luigi Coppolino, Salvatore DAntonio, Alessia Garofalo, Luigi Romano, “Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks”, 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).  [Online]. Available: http://dx.doi.org/10.1109/3PGCIC.2013.43


Cesario Di Sarno, Valerio Formicola, Mario Sicuranza, Giovanni Paragliola, “Addressing Security Issues of Electronic Health Record systems through Enhanced SIEM Technology, ” The 8th International Conference on Availability, Reliability and Security (ARES 2013).  [Online]. Available: http://dx.doi.org/10.1109/ARES.2013.85


A. Garofalo, C. Di Sarno, and V. Formicola, “Enhancing intrusion detection in wireless sensor networks through decision trees,” in Dependable Computing, ser. Lecture Notes in Computer Science, M. Vieira and J. Cunha, Eds. Springer Berlin Heidelberg, 2013, vol. 7869, pp. 1–15. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-38789-0_1


 A. Garofalo, C. Di Sarno, L. Coppolino and S. D’Antonio, “A GPS Spoofing Resilient WAMS for Smart Grid,” in Dependable Computing, ser. Lecture Notes in Computer Science, M. Vieira and J. Cunha, Eds. Springer Berlin Heidelberg, 2013, vol. 7869, pp. 134–147. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-38789-0_12


S. D’Antonio, L. Coppolino and L. Romano, “Advanced SIEM Technology for Critical Infrastructure Protection”, in Advances in Security Information Management: Perceptions and Outcomes, ser. Computer Science, Technology and Applications, Computer Networks,  G. S. de Tangil and E. Palomar, Eds. Nova Science Publishers, 2013, isbn: 978-1-62417-204-5

  • 2012

Afzaal, M.; Di Sarno, C.; Dantonio, S.; Romano, L., “An Intrusion and Fault Tolerant Forensic Storage for a SIEM System,” Signal Image Technology and Internet Based Systems (SITIS), 2012 Eighth International Conference on , vol., no., pp.579,586, 25-29 Nov. 2012 doi: 10.1109/SITIS.2012.89


 Afzaal, M.; Di Sarno, C.; Coppolino, L.; D’Antonio, S.; Romano, L., “A Resilient Architecture for Forensic Storage of Events in Critical Infrastructures,” High-Assurance Systems Engineering (HASE), 2012 IEEE 14th International Symposium on , vol., no., pp.48,55, 25-27 Oct. 2012 doi: 10.1109/HASE.2012.9


V. Formicola, L. Romano, S. D’Antonio and L. Coppolino, “Enhancing SIEM technology to protect Critical Infrastructures”, Critical Information Infrastructure Security (CRITIS), 2012 7th International Conference on, 17-18 Sept. 2012


L. Romano, S. D’Antonio, V. Formicola, and L. Coppolino, “Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology”, in Computer Safety, Reliability, and Security, ser. Lecture Notes in Computer Science, F. Ortmeier and P. Daniel, Eds. Springer Berlin Heidelberg, 2012, vol. 7613, pp. 222–234. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-33675-1_20


C. Gibson, M. Melideo, L. Romano, and S. D’Antonio, “International Cooperation Experiences: Results Achieved, Lessons Learned, and Way Ahead”, in Computer Safety, Reliability, and Security, ser. Lecture Notes in Computer Science, F. Ortmeier and P. Daniel, Eds. Springer Berlin Heidelberg, 2012, vol. 7613, pp. 259–270. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-33675-1_23

 

  • 2011

E. Prieto, R. Diaz, L. Romano, R. Rieke, and M. Achemlal, “MASSIF: A Promising Solution to Enhance Olympic Games IT Security”, in Global Security, Safety and Sustainability & e-Democracy, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, C.K. Georgiadis, H. Jahankhani, E. Pimenidis, R. Bashroush, and A. Al-Nemrat, Eds. Springer Berlin Heidelberg, 2011, vol. 99, pp. 139–147. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-33448-1_20


L. Coppolino, S. D’Antonio, V. Formicola, and L. Romano, “Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study”, in Computer Safety, Reliability, and Security, ser. Lecture Notes in Computer Science, F. Flammini, S. Bologna, and V. Vittorini, Eds. Springer Berlin Heidelberg, 2011, vol. 6894, pp. 199–212. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-24270-0_15


Salvatore D’Antonio, Luigi Coppolino, Ivano Alessandro Elia, and Valerio Formicola. 2011. Security issues of a phasor data concentrator for smart grid infrastructure. In Proceedings of the 13th European Workshop on Dependable Computing (EWDC ’11). ACM, New York, NY, USA, 3-8. DOI=10.1145/1978582.1978584 . Available: http://doi.acm.org/10.1145/1978582.1978584


L. Coppolino, S. D’Antonio, I. Elia, and L. Romano, “Security Analysis of Smart Grid Data Collection Technologies”, in Computer Safety, Reliability, and Security, ser. Lecture Notes in Computer Science, F. Flammini, S. Bologna, and V. Vittorini, Eds. Springer Berlin Heidelberg, 2011, vol. 6894, pp. 143–156. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-24270-0_11