Scientific publications


2021

Articles

  1. F. Amato, L. Coppolino, G. Cozzolino, G. Mazzeo, F. Moscato, R. Nardone Enhancing random forest classification with NLP in DAMEH: A system for DAta Management in eHealth Domain (2021) 10.1016/j.neucom.2020.08.091
  2. L. Coppolino, S. D'Antonio, V. Formicola, G. Mazzeo, L. Romano VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems (2021) 10.1109/TC.2020.2995638
  3. F. Amato, L. Coppolino, F. Mercaldo, F. Moscato, R. Nardone, A. Santone CAN-Bus Attack Detection With Deep Learning (2021) 10.1109/TITS.2020.3046974
  4. L. Coppolino, S. D'Antonio, V. Formicola, G. Mazzeo, L. Romano VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems (2021) 10.1109/TC.2020.2995638
  5. L. Coppolino, S. D'Antonio, V. Formicola, G. Mazzeo, L. Romano VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems (2021) 10.1109/TC.2020.2995638
  6. F. Amato, L. Coppolino, G. Cozzolino, G. Mazzeo, F. Moscato, R. Nardone Enhancing random forest classification with NLP in DAMEH: A system for DAta Management in eHealth Domain (2021) 10.1016/j.neucom.2020.08.091
  7. L. Coppolino, S. D'Antonio, V. Formicola, G. Mazzeo, L. Romano VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems (2021) 10.1109/TC.2020.2995638
  8. G. Mazzeo, S. Arnautov, C. Fetzer, L. Romano SGXTuner: Performance Enhancement of Intel SGX Applications via Stochastic Optimization (2021) 10.1109/TDSC.2021.3064391
  9. F. Amato, L. Coppolino, G. Cozzolino, G. Mazzeo, F. Moscato, R. Nardone Enhancing random forest classification with NLP in DAMEH: A system for DAta Management in eHealth Domain (2021) 10.1016/j.neucom.2020.08.091
  10. S. Bernardi, U. Gentile, S. Marrone, J. Merseguer, R. Nardone Security modelling and formal verification of survivability properties: Application to cyber–physical systems (2021) 10.1016/j.jss.2020.110746
  11. F. Amato, L. Coppolino, F. Mercaldo, F. Moscato, R. Nardone, A. Santone CAN-Bus Attack Detection With Deep Learning (2021) 10.1109/TITS.2020.3046974

2020

Articles

  1. F. Amato, L. Coppolino, S. D'Antonio, N. Mazzocca, F. Moscato, L. Sgaglione An abstract reasoning architecture for privacy policies monitoring (2020) 10.1016/j.future.2020.01.019
  2. L. Coppolino, L. Romano, A. Scaletti, L. Sgaglione Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study (2020) 10.1080/09537325.2020.1850673
  3. F. Amato, L. Coppolino, S. D'Antonio, N. Mazzocca, F. Moscato, L. Sgaglione An abstract reasoning architecture for privacy policies monitoring (2020) 10.1016/j.future.2020.01.019
  4. L. Coppolino, L. Romano, A. Scaletti, L. Sgaglione Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study (2020) 10.1080/09537325.2020.1850673
  5. L. Romano, A. Sakhnevych, S. Strano, F. Timpone A hybrid tyre model for in-plane dynamics (2020) 10.1080/00423114.2019.1608365
  6. L. Romano, F. Bruzelius, B. Jacobson Unsteady-state brush theory (2020) 10.1080/00423114.2020.1774625
  7. L. Coppolino, L. Romano, A. Scaletti, L. Sgaglione Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study (2020) 10.1080/09537325.2020.1850673
  8. F. Amato, L. Coppolino, S. D'Antonio, N. Mazzocca, F. Moscato, L. Sgaglione An abstract reasoning architecture for privacy policies monitoring (2020) 10.1016/j.future.2020.01.019
  9. M. Choraś, S. D'Antonio, J. Keller, R. Kozik Progress in features, data, patterns and similarity analysis (2020)
  10. G. Mazzeo, M. Staffa TROS: Protecting Humanoids ROS from Privileged Attackers (2020) 10.1007/s12369-019-00581-4
  11. U. Gentile, S. Marrone, R. Nardone, E. Bellini Computer-aided security assessment of water networks monitoring platforms (2020) 10.1016/j.ijcip.2020.100390
  12. F. Flammini, S. Marrone, R. Nardone, M. Caporuscio, M. D'Angelo Safety integrity through self-adaptation for multi-sensor event detection: Methodology and case-study (2020) 10.1016/j.future.2020.06.036
  13. S. Bernardi, U. Gentile, R. Nardone, S. Marrone Advancements in knowledge elicitation for computer-based critical systems (2020) 10.1016/j.future.2020.03.035
  14. C. Di Meo, M. Di Vaio, F. Flammini, R. Nardone, S. Santini, V. Vittorini ERTMS/ETCS Virtual Coupling: Proof of Concept and Numerical Analysis (2020) 10.1109/TITS.2019.2920290
  15. F. Buccafurri, V. De Angelis, R. Nardone Securing MQTT by blockchain-based otp authentication (2020) 10.3390/s20072002
  16. R. Nardone, S. Marrone, U. Gentile, A. Amato, G. Barberio, M. Benerecetti, R. De Guglielmo, B. Di Martino, N. Mazzocca, A. Peron, G. Pisani, L. Velardi, V. Vittorini An OSLC-based environment for system-level functional testing of ERTMS/ETCS controllers (2020) 10.1016/j.jss.2019.110478
  17. N. Rajabli, F. Flammini, R. Nardone, V. Vittorini Software Verification and Validation of Safe Autonomous Cars: A Systematic Literature Review (2020) 10.1109/ACCESS.2020.3048047

Conferences

  1. R. Dirnfeld, F. Flammini, S. Marrone, R. Nardone, V. Vittorini Low-Power Wide-Area Networks in Intelligent Transportation: Review and Opportunities for Smart-Railways (2020) 10.1109/ITSC45102.2020.9294535
  2. A. Russo, F. Buccafurri, G. Lax, R. Nardone A blockchain-based system for tracking and collision avoidance of resident space objects (2020)
  3. R. Nardone, F. Buccafurri, V. De Angelis, C. Labrini, G. Lax, L. Musarella, A. Russo Model-driven engineering for swarm-based space exploration missions (2020)

2019

Articles

  1. L. Sgaglione, G. Mazzeo A GDPR-compliant approach to real-time processing of sensitive data (2019) 10.1007/978-3-319-92231-7_5
  2. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain (2019) 10.1504/IJCCBS.2019.106818
  3. L. Coppolino, S. D’Antonio, G. Mazzeo, L. Romano, L. Sgaglione An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems (2019) 10.1007/978-3-319-98530-5_87
  4. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano A comparative analysis of emerging approaches for securing java software with Intel SGX (2019) 10.1016/j.future.2019.03.018
  5. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain (2019) 10.1504/IJCCBS.2019.106818
  6. L. Coppolino, S. D’Antonio, G. Mazzeo, L. Romano, L. Sgaglione An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems (2019) 10.1007/978-3-319-98530-5_87
  7. S. Diamantopoulos, D. Karamitros, L. Romano, L. Coppolino, V. Koutkias, K. Votis, O. Stan, P. Campegiani, D.M. Martinez, M. Nalin, I. Baroni, F. Clemente, G. Faiella, C. Mesaritakis, E. Grivas, J. Rasmussen, J. Petersen, I. Cano, E. Puigdomenech, E. Gelenbe, J. Dumortier, M. Voss-Knudevoronkov Secure cross-border exchange of health related data: The KONFIDO approach (2019) 10.1007/978-3-030-34914-1_30
  8. D. Garcia-Pozuelo, O.A. Olatunbosun, L. Romano, S. Strano, M. Terzo, A.J. Tuononen, Y. Xiong Development and experimental validation of a real-time analytical model for different intelligent tyre concepts (2019) 10.1080/00423114.2019.1566560
  9. L. Romano, A. Sakhnevych, S. Strano, F. Timpone A novel brush-model with flexible carcass for transient interactions (2019) 10.1007/s11012-019-01040-0
  10. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano A comparative analysis of emerging approaches for securing java software with Intel SGX (2019) 10.1016/j.future.2019.03.018
  11. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain (2019) 10.1504/IJCCBS.2019.106818
  12. L. Coppolino, S. D’Antonio, G. Mazzeo, L. Romano, L. Sgaglione An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems (2019) 10.1007/978-3-319-98530-5_87
  13. S. Diamantopoulos, D. Karamitros, L. Romano, L. Coppolino, V. Koutkias, K. Votis, O. Stan, P. Campegiani, D.M. Martinez, M. Nalin, I. Baroni, F. Clemente, G. Faiella, C. Mesaritakis, E. Grivas, J. Rasmussen, J. Petersen, I. Cano, E. Puigdomenech, E. Gelenbe, J. Dumortier, M. Voss-Knudevoronkov Secure cross-border exchange of health related data: The KONFIDO approach (2019) 10.1007/978-3-030-34914-1_30
  14. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano A comparative analysis of emerging approaches for securing java software with Intel SGX (2019) 10.1016/j.future.2019.03.018
  15. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain (2019) 10.1504/IJCCBS.2019.106818
  16. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano A comparative analysis of emerging approaches for securing java software with Intel SGX (2019) 10.1016/j.future.2019.03.018
  17. L. Sgaglione, G. Mazzeo A GDPR-compliant approach to real-time processing of sensitive data (2019) 10.1007/978-3-319-92231-7_5
  18. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain (2019) 10.1504/IJCCBS.2019.106818
  19. L. Coppolino, S. D’Antonio, G. Mazzeo, L. Romano, L. Sgaglione An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems (2019) 10.1007/978-3-319-98530-5_87
  20. S. Bernardi, S. Marrone, J. Merseguer, R. Nardone, V. Vittorini Towards a model-driven engineering approach for the assessment of non-functional properties using multi-formalism (2019) 10.1007/s10270-018-0663-8
  21. A. Drago, S. Marrone, N. Mazzocca, R. Nardone, A. Tedesco, V. Vittorini A model-driven approach for vulnerability evaluation of modern physical protection systems (2019) 10.1007/s10270-016-0572-7
  22. M. Benerecetti, U. Gentile, S. Marrone, R. Nardone, A. Peron, L.L.L. Starace, V. Vittorini From Dynamic State Machines to Promela (2019) 10.1007/978-3-030-30923-7_4

Conferences

  1. L. Coppolino, S. D'Antonio, L. Romano, L. Sgaglione, M. Magliulo, R. Pacelli Protecting critical business processes of smart hospitals from cyber attacks (2019) 10.1109/SITIS.2019.00065
  2. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione, D. Cotroneo, A. Scognamiglio Privacy Preserving Intrusion Detection Via Homomorphic Encryption (2019) 10.1109/WETICE.2019.00073
  3. L. Coppolino, S. D'Antonio, L. Romano, L. Sgaglione, M. Magliulo, R. Pacelli Protecting critical business processes of smart hospitals from cyber attacks (2019) 10.1109/SITIS.2019.00065
  4. S. Diamantopoulos, M. Nalin, I. Baroni, F. Clemente, G. Faiella, C. Mesaritakis, E. Grivas, J. Rasmussen, J. Petersen, I. Cano, E. Puigdomenech, D. Karamitros, E. Gelenbe, J. Dumortier, M. Voss-Knudevoronkov, L. Romano, L. Coppolino, V. Koutkias, K. Votis, O. Stan, P. Campegiani, D.M. Martinez Secure cross-border exchange of health related data: The KONFIDO approach (2019) 10.1109/EDCC.2019.00024
  5. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione, D. Cotroneo, A. Scognamiglio Privacy Preserving Intrusion Detection Via Homomorphic Encryption (2019) 10.1109/WETICE.2019.00073
  6. L. Coppolino, S. D'Antonio, L. Romano, L. Sgaglione, M. Magliulo, R. Pacelli Protecting critical business processes of smart hospitals from cyber attacks (2019) 10.1109/SITIS.2019.00065
  7. G. Breglio, A. Irace, V.R. Marrazzo, M. Riccio, L. Romano, S. Strano, M. Terzo Feel-tire Unina: Development and Modeling of a Sensing System for Intelligent Tires (2019) 10.1109/RTSI.2019.8895537
  8. S. Diamantopoulos, M. Nalin, I. Baroni, F. Clemente, G. Faiella, C. Mesaritakis, E. Grivas, J. Rasmussen, J. Petersen, I. Cano, E. Puigdomenech, D. Karamitros, E. Gelenbe, J. Dumortier, M. Voss-Knudevoronkov, L. Romano, L. Coppolino, V. Koutkias, K. Votis, O. Stan, P. Campegiani, D.M. Martinez Secure cross-border exchange of health related data: The KONFIDO approach (2019) 10.1109/EDCC.2019.00024
  9. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione, D. Cotroneo, A. Scognamiglio Privacy Preserving Intrusion Detection Via Homomorphic Encryption (2019) 10.1109/WETICE.2019.00073
  10. L. Coppolino, S. D'Antonio, L. Romano, L. Sgaglione, M. Magliulo, R. Pacelli Protecting critical business processes of smart hospitals from cyber attacks (2019) 10.1109/SITIS.2019.00065
  11. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione, D. Cotroneo, A. Scognamiglio Privacy Preserving Intrusion Detection Via Homomorphic Encryption (2019) 10.1109/WETICE.2019.00073
  12. L. De Simone, G. Mazzeo Isolating real-Time safety-critical embedded systems via sgx-based lightweight virtualization (2019) 10.1109/ISSREW.2019.00089
  13. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione, D. Cotroneo, A. Scognamiglio Privacy Preserving Intrusion Detection Via Homomorphic Encryption (2019) 10.1109/WETICE.2019.00073
  14. F. Buccafurri, L. Musarella, R. Nardone Enabling propagation in web of trust by ethereum (2019) 10.1145/3331076.3331108
  15. F. Flammini, S. Marrone, R. Nardone, A. Petrillo, S. Santini, V. Vittorini Towards Railway Virtual Coupling (2019) 10.1109/ESARS-ITEC.2018.8607523
  16. F. Buccafurri, L. Musarella, R. Nardone A routing algorithm increasing the transmission availability in smart grids (2019)
  17. F. Buccafurri, G. Lax, L. Musarella, R. Nardone A novel query language for data extraction from social networks (2019) 10.5220/0008362503650371

2018

Articles

  1. M. Staffa, L. Sgaglione, G. Mazzeo, L. Coppolino, S. D'Antonio, L. Romano, E. Gelenbe, O. Stan, S. Carpov, E. Grivas, P. Campegiani, L. Castaldo, K. Votis, V. Koutkias, I. Komnios An OpenNCP-based Solution for Secure eHealth Data Exchange (2018) 10.1016/j.jnca.2018.05.012
  2. M. Staffa, L. Coppolino, L. Sgaglione, E. Gelenbe, I. Komnios, E. Grivas, O. Stan, L. Castaldo KONFIDO: An OpenNCP-based secure ehealth data exchange system (2018) 10.1007/978-3-319-95189-8_2
  3. P. Natsiavas, J. Rasmussen, M. Voss-Knude, K. Votis, L. Coppolino, P. Campegiani, I. Cano, D. Marí, G. Faiella, F. Clemente, M. Nalin, E. Grivas, O. Stan, E. Gelenbe, J. Dumortier, J. Petersen, D. Tzovaras, L. Romano, I. Komnios, V. Koutkias Comprehensive user requirements engineering methodology for secure and interoperable health data exchange 08 Information and Computing Sciences 0806 Information Systems (2018) 10.1186/s12911-018-0664-0
  4. M. Staffa, L. Sgaglione, G. Mazzeo, L. Coppolino, S. D'Antonio, L. Romano, E. Gelenbe, O. Stan, S. Carpov, E. Grivas, P. Campegiani, L. Castaldo, K. Votis, V. Koutkias, I. Komnios An OpenNCP-based Solution for Secure eHealth Data Exchange (2018) 10.1016/j.jnca.2018.05.012
  5. G. Mazzeo, L. Coppolino, S. D'Antonio, C. Mazzariello, L. Romano SIL2 assessment of an Active/Standby COTS-based Safety-Related system (2018) 10.1016/j.ress.2018.04.009
  6. M. Staffa, L. Coppolino, L. Sgaglione, E. Gelenbe, I. Komnios, E. Grivas, O. Stan, L. Castaldo KONFIDO: An OpenNCP-based secure ehealth data exchange system (2018) 10.1007/978-3-319-95189-8_2
  7. P. Natsiavas, J. Rasmussen, M. Voss-Knude, K. Votis, L. Coppolino, P. Campegiani, I. Cano, D. Marí, G. Faiella, F. Clemente, M. Nalin, E. Grivas, O. Stan, E. Gelenbe, J. Dumortier, J. Petersen, D. Tzovaras, L. Romano, I. Komnios, V. Koutkias Comprehensive user requirements engineering methodology for secure and interoperable health data exchange 08 Information and Computing Sciences 0806 Information Systems (2018) 10.1186/s12911-018-0664-0
  8. M. Staffa, L. Sgaglione, G. Mazzeo, L. Coppolino, S. D'Antonio, L. Romano, E. Gelenbe, O. Stan, S. Carpov, E. Grivas, P. Campegiani, L. Castaldo, K. Votis, V. Koutkias, I. Komnios An OpenNCP-based Solution for Secure eHealth Data Exchange (2018) 10.1016/j.jnca.2018.05.012
  9. G. Mazzeo, L. Coppolino, S. D'Antonio, C. Mazzariello, L. Romano SIL2 assessment of an Active/Standby COTS-based Safety-Related system (2018) 10.1016/j.ress.2018.04.009
  10. M. Staffa, L. Sgaglione, G. Mazzeo, L. Coppolino, S. D'Antonio, L. Romano, E. Gelenbe, O. Stan, S. Carpov, E. Grivas, P. Campegiani, L. Castaldo, K. Votis, V. Koutkias, I. Komnios An OpenNCP-based Solution for Secure eHealth Data Exchange (2018) 10.1016/j.jnca.2018.05.012
  11. G. Mazzeo, L. Coppolino, S. D'Antonio, C. Mazzariello, L. Romano SIL2 assessment of an Active/Standby COTS-based Safety-Related system (2018) 10.1016/j.ress.2018.04.009
  12. M. Staffa, L. Sgaglione, G. Mazzeo, L. Coppolino, S. D'Antonio, L. Romano, E. Gelenbe, O. Stan, S. Carpov, E. Grivas, P. Campegiani, L. Castaldo, K. Votis, V. Koutkias, I. Komnios An OpenNCP-based Solution for Secure eHealth Data Exchange (2018) 10.1016/j.jnca.2018.05.012
  13. G. Mazzeo, L. Coppolino, S. D'Antonio, C. Mazzariello, L. Romano SIL2 assessment of an Active/Standby COTS-based Safety-Related system (2018) 10.1016/j.ress.2018.04.009
  14. R. Schlick, M. Felderer, I. Majzik, R. Nardone, A. Raschke, C. Snook, V. Vittorini A proposal of an example and experiments repository to foster industrial adoption of formal methods (2018) 10.1007/978-3-030-03427-6_20

Conferences

  1. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level (2018) 10.1109/EDCC.2018.00015
  2. M. Staffa, G. Mazzeo, L. Sgaglione Hardening ROS via Hardware-assisted Trusted Execution Environment (2018) 10.1109/ROMAN.2018.8525696
  3. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione How to protect public administration from cybersecurity threats: The COMPACT project (2018) 10.1109/WAINA.2018.00147
  4. L. Coppolino, S. D'Antonio, G. Mazzeo, G. Papale, L. Sgaglione, F. Campanile An Approach for Securing Critical Applications in Untrusted Clouds (2018) 10.1109/PDP2018.2018.00076
  5. G. Papale, L. Sgaglione SDD Sentinel: A Support Tool for Detecting and Investigating Electronic Transaction Frauds (2018) 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.53
  6. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level (2018) 10.1109/EDCC.2018.00015
  7. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione How to protect public administration from cybersecurity threats: The COMPACT project (2018) 10.1109/WAINA.2018.00147
  8. L. Coppolino, S. D'Antonio, G. Mazzeo, G. Papale, L. Sgaglione, F. Campanile An Approach for Securing Critical Applications in Untrusted Clouds (2018) 10.1109/PDP2018.2018.00076
  9. L. Coppolino, S. D'Antonio, L. Romano, M. Staffa KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe (2018) 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.57
  10. J. Rasmussen, P. Natsiavas, K. Votis, K. Moschou, P. Campegiani, L. Coppolino, I. Cano, D. Marí, G. Faiella, O. Stan, O. Abdelrahman, M. Nalin, I. Baroni, M. Voss-Knude, V.A. Vella, E. Grivas, C. Mesaritakis, J. Dumortier, J. Petersen, D. Tzovaras, L. Romano, I. Komnios, V. Koutkias Gap analysis for information security in interoperable solutions at a systemic level: The KONFIDO approach (2018) 10.1007/978-981-10-7419-6_13
  11. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level (2018) 10.1109/EDCC.2018.00015
  12. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione How to protect public administration from cybersecurity threats: The COMPACT project (2018) 10.1109/WAINA.2018.00147
  13. L. Coppolino, S. D'Antonio, L. Romano, M. Staffa KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe (2018) 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.57
  14. V. Russo, S. Pollone, G. Ceniccola, L. Romano Water-related built heritage in Campania, Italy. Knowledge for conservation of a sustainable vernacular architecture (2018)
  15. J. Rasmussen, P. Natsiavas, K. Votis, K. Moschou, P. Campegiani, L. Coppolino, I. Cano, D. Marí, G. Faiella, O. Stan, O. Abdelrahman, M. Nalin, I. Baroni, M. Voss-Knude, V.A. Vella, E. Grivas, C. Mesaritakis, J. Dumortier, J. Petersen, D. Tzovaras, L. Romano, I. Komnios, V. Koutkias Gap analysis for information security in interoperable solutions at a systemic level: The KONFIDO approach (2018) 10.1007/978-981-10-7419-6_13
  16. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level (2018) 10.1109/EDCC.2018.00015
  17. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione How to protect public administration from cybersecurity threats: The COMPACT project (2018) 10.1109/WAINA.2018.00147
  18. L. Vollero, S. Dantonio Message from the SIS-SS 2018 Workshop Organizers (2018) 10.1109/COMPSAC.2018.10338
  19. L. Coppolino, S. D'Antonio, G. Mazzeo, G. Papale, L. Sgaglione, F. Campanile An Approach for Securing Critical Applications in Untrusted Clouds (2018) 10.1109/PDP2018.2018.00076
  20. S. D'Antonio, M. Choraś Message from the CSCIP-2017 Workshop Chairs (2018) 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.203
  21. L. Coppolino, S. D'Antonio, L. Romano, M. Staffa KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe (2018) 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.57
  22. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level (2018) 10.1109/EDCC.2018.00015
  23. M. Staffa, G. Mazzeo, L. Sgaglione Hardening ROS via Hardware-assisted Trusted Execution Environment (2018) 10.1109/ROMAN.2018.8525696
  24. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione How to protect public administration from cybersecurity threats: The COMPACT project (2018) 10.1109/WAINA.2018.00147
  25. L. Coppolino, S. D'Antonio, G. Mazzeo, G. Papale, L. Sgaglione, F. Campanile An Approach for Securing Critical Applications in Untrusted Clouds (2018) 10.1109/PDP2018.2018.00076
  26. R. Nardone, G. De Tommasi, N. Mazzocca, A. Pironti, V. Vittorini Automatic generation of formal models for diagnosability of des (2018) 10.1109/ETFA.2018.8502565
  27. A. De Benedictis, N. Mazzocca, R. Nardone, S. Venticinque A model-Based evaluation methodology for smart energy systems (2018) 10.1109/SMARTCOMP.2018.00090

2017

Articles

  1. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano Cloud security: Emerging threats and current solutions (2017) 10.1016/j.compeleceng.2016.03.004
  2. L. Coppolino, S. D'Antonio, L. Romano, F. Aisopos, K. Tserpes Real-time QoS monitoring from the end user perspective in large scale social networks (2017) 10.1504/IJCSE.2017.082875
  3. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano Cloud security: Emerging threats and current solutions (2017) 10.1016/j.compeleceng.2016.03.004
  4. L. Coppolino, S. D'Antonio, L. Romano, F. Aisopos, K. Tserpes Real-time QoS monitoring from the end user perspective in large scale social networks (2017) 10.1504/IJCSE.2017.082875
  5. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano Cloud security: Emerging threats and current solutions (2017) 10.1016/j.compeleceng.2016.03.004
  6. L. Coppolino, S. D'Antonio, L. Romano, F. Aisopos, K. Tserpes Real-time QoS monitoring from the end user perspective in large scale social networks (2017) 10.1504/IJCSE.2017.082875
  7. L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano Cloud security: Emerging threats and current solutions (2017) 10.1016/j.compeleceng.2016.03.004
  8. S. Brenner, T. Hundt, G. Mazzeo, R. Kapitza Secure cloud micro services using Intel SGX (2017) 10.1007/978-3-319-59665-5_13
  9. V. Casola, A. De Benedictis, R. Nardone Towards model-based security assessment of cloud applications (2017) 10.1007/978-3-319-57186-7_56
  10. R. Canonico, S. Marrone, R. Nardone, V. Vittorini A Framework to Evaluate 5G Networks for Smart and Fail-Safe Communications in ERTMS/ETCS (2017) 10.1007/978-3-319-68499-4_3
  11. M. Benerecetti, R. De Guglielmo, U. Gentile, S. Marrone, N. Mazzocca, R. Nardone, A. Peron, L. Velardi, V. Vittorini Dynamic state machines for modelling railway control systems (2017) 10.1016/j.scico.2016.09.002

Conferences

  1. L. Coppolino, S. Dantonio, L. Romano, L. Sgaglione, M. Staffa Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions (2017) 10.1109/COMPSAC.2017.45
  2. F. Campanile, L. Coppolino, S. Dantonio, L. Lev, G. Mazzeo, L. Romano, L. Sgaglione, F. Tessitore Cloudifying Critical Applications: A Use Case from the Power Grid Domain (2017) 10.1109/PDP.2017.50
  3. G. Cerullo, G. Guizzi, C. Massei, L. Sgaglione Efficient Supply Chain Management: Traceability and Transparency (2017) 10.1109/SITIS.2016.124
  4. R. Martino, S. Dantonio, L. Coppolino, L. Romano Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements (2017) 10.1109/COMPSAC.2017.209
  5. L. Coppolino, S. Dantonio, L. Romano, L. Sgaglione, M. Staffa Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions (2017) 10.1109/COMPSAC.2017.45
  6. F. Campanile, L. Coppolino, S. Dantonio, L. Lev, G. Mazzeo, L. Romano, L. Sgaglione, F. Tessitore Cloudifying Critical Applications: A Use Case from the Power Grid Domain (2017) 10.1109/PDP.2017.50
  7. R. Martino, S. Dantonio, L. Coppolino, L. Romano Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements (2017) 10.1109/COMPSAC.2017.209
  8. L. Coppolino, S. Dantonio, L. Romano, L. Sgaglione, M. Staffa Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions (2017) 10.1109/COMPSAC.2017.45
  9. C. Fetzer, G. Mazzeo, L. Romano, J. Oliver, M. Verburg Integrating reactive cloud applications in SERECA (2017) 10.1145/3098954.3105820
  10. F. Campanile, L. Coppolino, S. Dantonio, L. Lev, G. Mazzeo, L. Romano, L. Sgaglione, F. Tessitore Cloudifying Critical Applications: A Use Case from the Power Grid Domain (2017) 10.1109/PDP.2017.50
  11. R. Martino, S. Dantonio, L. Coppolino, L. Romano Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements (2017) 10.1109/COMPSAC.2017.209
  12. L. Coppolino, S. Dantonio, L. Romano, L. Sgaglione, M. Staffa Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions (2017) 10.1109/COMPSAC.2017.45
  13. F. Campanile, L. Coppolino, S. Dantonio, L. Lev, G. Mazzeo, L. Romano, L. Sgaglione, F. Tessitore Cloudifying Critical Applications: A Use Case from the Power Grid Domain (2017) 10.1109/PDP.2017.50
  14. C. Fetzer, G. Mazzeo, L. Romano, J. Oliver, M. Verburg Integrating reactive cloud applications in SERECA (2017) 10.1145/3098954.3105820
  15. F. Campanile, L. Coppolino, S. Dantonio, L. Lev, G. Mazzeo, L. Romano, L. Sgaglione, F. Tessitore Cloudifying Critical Applications: A Use Case from the Power Grid Domain (2017) 10.1109/PDP.2017.50
  16. R. Nardone, R.J. Rodriguez, S. Marrone Formal security assessment of Modbus protocol (2017) 10.1109/ICITST.2016.7856685

Books

  1. G. Cerullo, G. Mazzeo, G. Papale, B. Ragucci, L. Sgaglione IoT and Sensor Networks Security (2017) 10.1016/B978-0-12-811373-8.00004-5
  2. G. Cerullo, G. Mazzeo, G. Papale, B. Ragucci, L. Sgaglione IoT and Sensor Networks Security (2017) 10.1016/B978-0-12-811373-8.00004-5

2016

Articles

  1. L. Coppolino, S. D'Antonio, V. Formicola, L. Romano A framework for mastering heterogeneity in multi-layer security information and event correlation (2016) 10.1016/j.sysarc.2015.11.010
  2. A. Rein, R. Rieke, M. Jäger, N. Kuntze, L. Coppolino Trust establishment in cooperating cyber-physical systems (2016) 10.1007/978-3-319-40385-4_3
  3. G. Cerullo, L. Coppolino, S. D’Antonio, V. Formicola, G. Papale, B. Ragucci Enabling convergence of physical and logical security through intelligent event correlation (2016) 10.1007/978-3-319-25017-5_40
  4. S. D’Antonio, G. Gugliara, C.F. Romano, L. Romano A workflow service mediator for automated information processing and scheduling delivery to an archive (2016) 10.1007/978-3-319-33313-7_9
  5. L. Coppolino, S. D'Antonio, V. Formicola, L. Romano A framework for mastering heterogeneity in multi-layer security information and event correlation (2016) 10.1016/j.sysarc.2015.11.010
  6. M. Ficco, S. D’Antonio 2ndworkshop on cyber security and resilience of large-scale systems (2016) 10.1007/978-3-319-25017-5_37
  7. S. D’Antonio, G. Gugliara, C.F. Romano, L. Romano A workflow service mediator for automated information processing and scheduling delivery to an archive (2016) 10.1007/978-3-319-33313-7_9
  8. L. Coppolino, S. D'Antonio, V. Formicola, L. Romano A framework for mastering heterogeneity in multi-layer security information and event correlation (2016) 10.1016/j.sysarc.2015.11.010
  9. G. Cerullo, L. Coppolino, S. D’Antonio, V. Formicola, G. Papale, B. Ragucci Enabling convergence of physical and logical security through intelligent event correlation (2016) 10.1007/978-3-319-25017-5_40
  10. U. Gentile, S. Marrone, N. Mazzocca, R. Nardone µGRIMOIRE: A tool for smart micro grids modelling and energy profiling (2016) 10.2174/1874110X01610010263
  11. U. Gentile, S. Marrone, N. Mazzocca, R. Nardone Cost-energy modelling and profiling of smart domestic grids (2016) 10.1504/IJGUC.2016.081012
  12. R. Nardone, U. Gentile, M. Benerecetti, A. Peron, V. Vittorini, S. Marrone, N. Mazzocca Modeling railway control systems in promela (2016) 10.1007/978-3-319-29510-7_7

Conferences

  1. F. Campanile, G. Cerullo, S. D'Antonio, G. Mazzeo, G. Papale, L. Sgaglione A multi-sensor data fusion approach for detecting direct debit frauds (2016) 10.1109/INCoS.2016.90
  2. G. Papale, L. Sgaglione, G. Cerullo, G. Mazzeo, P. Starace, F. Campanile Direct debit frauds: A novel detection approach (2016) 10.5220/0005933103800387
  3. L. Sgaglione, G. Papale, G. Mazzeo, G. Cerullo, P. Starace, F. Campanile Data collection framework: A flexible and efficient tool for heterogeneous data acquisition (2016) 10.5220/0005931103740379
  4. F. Campanile, G. Cerullo, S. D'Antonio, G. Mazzeo, G. Papale, L. Sgaglione A multi-sensor data fusion approach for detecting direct debit frauds (2016) 10.1109/INCoS.2016.90
  5. F. Campanile, G. Cerullo, S. D'Antonio, G. Mazzeo, G. Papale, L. Sgaglione A multi-sensor data fusion approach for detecting direct debit frauds (2016) 10.1109/INCoS.2016.90
  6. G. Papale, L. Sgaglione, G. Cerullo, G. Mazzeo, P. Starace, F. Campanile Direct debit frauds: A novel detection approach (2016) 10.5220/0005933103800387
  7. L. Sgaglione, G. Papale, G. Mazzeo, G. Cerullo, P. Starace, F. Campanile Data collection framework: A flexible and efficient tool for heterogeneous data acquisition (2016) 10.5220/0005931103740379

2015

Articles

  1. L. Coppolino, S. D’Antonio, V. Formicola, C. Massei, L. Romano Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services (2015) 10.1007/s12652-015-0276-9
  2. G. Cicotti, L. Coppolino, S. D'Antonio, L. Romano How to monitor QoS in cloud infrastructures: The QoSMONaaS approach (2015) 10.1504/IJCSE.2015.071359
  3. L. Coppolino, S. D'Antonio, V. Formicola, L. Romano Applying extensions of evidence theory to detect frauds in financial infrastructures (2015) 10.1155/2015/980629
  4. L. Coppolino, S. D’Antonio, C. Massei, L. Romano Efficient supply chain management via federation-based integration of legacy ERP systems (2015) 10.1007/978-3-319-22689-7_29
  5. G. Cicotti, L. Coppolino, S. D’Antonio, L. Romano Runtime model checking for sla compliance monitoring and qos prediction (2015)
  6. L. Coppolino, S. D’Antonio, L. Romano, F. Campanile, A.V. de Carvalho Effective visualization of a big data banking application (2015) 10.1007/978-3-319-19830-9_6
  7. L. Coppolino, S. D’Antonio, V. Formicola, C. Massei, L. Romano Use of the Dempster-Shafer theory for fraud detection: The mobile money transfer case study (2015) 10.1007/978-3-319-10422-5_48
  8. L. Coppolino, S. D’Antonio, V. Formicola, C. Massei, L. Romano Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services (2015) 10.1007/s12652-015-0276-9
  9. G. Cicotti, L. Coppolino, S. D'Antonio, L. Romano How to monitor QoS in cloud infrastructures: The QoSMONaaS approach (2015) 10.1504/IJCSE.2015.071359
  10. L. Coppolino, S. D'Antonio, V. Formicola, L. Romano Applying extensions of evidence theory to detect frauds in financial infrastructures (2015) 10.1155/2015/980629
  11. L. Coppolino, S. D’Antonio, C. Massei, L. Romano Efficient supply chain management via federation-based integration of legacy ERP systems (2015) 10.1007/978-3-319-22689-7_29
  12. G. Cicotti, L. Coppolino, S. D’Antonio, L. Romano Runtime model checking for sla compliance monitoring and qos prediction (2015)
  13. L. Coppolino, S. D’Antonio, L. Romano, F. Campanile, A.V. de Carvalho Effective visualization of a big data banking application (2015) 10.1007/978-3-319-19830-9_6
  14. L. Coppolino, S. D’Antonio, V. Formicola, C. Massei, L. Romano Use of the Dempster-Shafer theory for fraud detection: The mobile money transfer case study (2015) 10.1007/978-3-319-10422-5_48
  15. L. Coppolino, S. D’Antonio, V. Formicola, C. Massei, L. Romano Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services (2015) 10.1007/s12652-015-0276-9
  16. G. Cicotti, L. Coppolino, S. D'Antonio, L. Romano How to monitor QoS in cloud infrastructures: The QoSMONaaS approach (2015) 10.1504/IJCSE.2015.071359
  17. L. Coppolino, S. D'Antonio, V. Formicola, L. Romano Applying extensions of evidence theory to detect frauds in financial infrastructures (2015) 10.1155/2015/980629
  18. L. Coppolino, S. D’Antonio, C. Massei, L. Romano Efficient supply chain management via federation-based integration of legacy ERP systems (2015) 10.1007/978-3-319-22689-7_29
  19. G. Cicotti, L. Coppolino, S. D’Antonio, L. Romano Runtime model checking for sla compliance monitoring and qos prediction (2015)
  20. L. Coppolino, S. D’Antonio, L. Romano, F. Campanile, A.V. de Carvalho Effective visualization of a big data banking application (2015) 10.1007/978-3-319-19830-9_6
  21. L. Coppolino, S. D’Antonio, V. Formicola, C. Massei, L. Romano Use of the Dempster-Shafer theory for fraud detection: The mobile money transfer case study (2015) 10.1007/978-3-319-10422-5_48
  22. S. Marrone, R.J. Rodriguez, R. Nardone, F. Flammini, V. Vittorini On synergies of cyber and physical security modelling in vulnerability assessment of railway systems (2015) 10.1016/j.compeleceng.2015.07.011
  23. V. Vittorini, S. Marrone, N. Mazzocca, R. Nardone, A. Drago A model-driven process for physical protection system design and vulnerability evaluation (2015) 10.1007/978-3-319-04426-2_8
  24. F. Amato, G. Cozzolino, A. D’Alessio, S. Marrone, N. Mazzocca, G. Mele, R. Nardone Towards model-driven assessment of clinical processes (2015) 10.1007/978-3-319-19830-9_11
  25. R. Nardone, U. Gentile, A. Peron, M. Benerecetti, V. Vittorini, S. Marrone, R. De Guglielmo, N. Mazzocca, L. Velardi Dynamic state machines for formalizing railway control system specifications (2015) 10.1007/978-3-319-17581-2_7

Conferences

  1. F. Baselice, L. Coppolino, S. D'Antonio, G. Ferraioli, L. Sgaglione A DBSCAN based approach for jointly segment and classify brain MR images (2015) 10.1109/EMBC.2015.7319021
  2. L. Coppolino, S. D'Antonio, L. Romano, G. Papale, L. Sgaglione, F. Campanile Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns (2015) 10.1109/3PGCIC.2015.24
  3. F. Baselice, L. Coppolino, S. D'Antonio, G. Ferraioli, L. Sgaglione A DBSCAN based approach for jointly segment and classify brain MR images (2015) 10.1109/EMBC.2015.7319021
  4. L. Coppolino, V. Dalessandro, S. Dantonio, L. Levy, L. Romano My smart home is under attack (2015) 10.1109/CSE.2015.28
  5. L. Coppolino, S. D'Antonio, L. Romano, G. Papale, L. Sgaglione, F. Campanile Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns (2015) 10.1109/3PGCIC.2015.24
  6. D.L. Quoc, V. D'Alessandro, B. Park, L. Romano, C. Fetzer Scalable Network Traffic Classification Using Distributed Support Vector Machines (2015) 10.1109/CLOUD.2015.138
  7. L. Coppolino, V. Dalessandro, S. Dantonio, L. Levy, L. Romano My smart home is under attack (2015) 10.1109/CSE.2015.28
  8. L. Coppolino, S. D'Antonio, L. Romano, G. Papale, L. Sgaglione, F. Campanile Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns (2015) 10.1109/3PGCIC.2015.24
  9. F. Baselice, L. Coppolino, S. D'Antonio, G. Ferraioli, L. Sgaglione A DBSCAN based approach for jointly segment and classify brain MR images (2015) 10.1109/EMBC.2015.7319021
  10. L. Coppolino, V. Dalessandro, S. Dantonio, L. Levy, L. Romano My smart home is under attack (2015) 10.1109/CSE.2015.28
  11. L. Coppolino, S. D'Antonio, L. Romano, G. Papale, L. Sgaglione, F. Campanile Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns (2015) 10.1109/3PGCIC.2015.24
  12. F. Flammini, S. Marrone, N. Mazzocca, R. Nardone, V. Vittorini Using Bayesian Networks to evaluate the trustworthiness of '2 out of 3' decision fusion mechanisms in multi-sensor applications (2015) 10.1016/j.ifacol.2015.09.606
  13. S. Marrone, R. Nardone Automatic resource allocation for high availability cloud services (2015) 10.1016/j.procs.2015.05.176
  14. U. Gentile, S. Marrone, F. De Paola, R. Nardone, N. Mazzocca, M. Giugni Model-Based Water Quality Assurance in Ground and Surface Provisioning Systems (2015) 10.1109/3PGCIC.2015.97

Books

  1. M. Choraś, R. Kozik, S. D'Antonio, G. Iannello, A. Jedlitschka, K. Miesenberger, L. Vollero, A. Wołoszczuk Innovative solutions for inclusion of totally blind people (2015) 10.1201/b18520

2014

Articles

  1. L. Coppolino, S. D'Antonio, L. Romano Exposing vulnerabilities in electric power grids: An experimental approach (2014) 10.1016/j.ijcip.2014.01.003
  2. L. Coppolino, S. D'Antonio, L. Romano, F. Aisopos, K. Tserpes Effective QoS monitoring in large scale social networks (2014) 10.1007/978-3-319-01571-2_30
  3. F. Buccafurri, L. Coppolino, S. D'Antonio, A. Garofalo, G. Lax, A. Nocera, L. Romano Trust-based intrusion tolerant routing in wireless sensor networks (2014) 10.1007/978-3-319-10506-2_15
  4. L. Coppolino, S. D'Antonio, L. Romano Exposing vulnerabilities in electric power grids: An experimental approach (2014) 10.1016/j.ijcip.2014.01.003
  5. L. Coppolino, S. D'Antonio, L. Romano, F. Aisopos, K. Tserpes Effective QoS monitoring in large scale social networks (2014) 10.1007/978-3-319-01571-2_30
  6. F. Buccafurri, L. Coppolino, S. D'Antonio, A. Garofalo, G. Lax, A. Nocera, L. Romano Trust-based intrusion tolerant routing in wireless sensor networks (2014) 10.1007/978-3-319-10506-2_15
  7. L. Coppolino, S. D'Antonio, L. Romano Exposing vulnerabilities in electric power grids: An experimental approach (2014) 10.1016/j.ijcip.2014.01.003
  8. V. Formicola, A. Di Pietro, A. Alsubaie, J. Marti, S. D’Antonio Assessing the impact of cyber attackson wireless sensornodes that monitor interdependent physical systems (2014)
  9. L. Coppolino, S. D'Antonio, L. Romano, F. Aisopos, K. Tserpes Effective QoS monitoring in large scale social networks (2014) 10.1007/978-3-319-01571-2_30
  10. F. Buccafurri, L. Coppolino, S. D'Antonio, A. Garofalo, G. Lax, A. Nocera, L. Romano Trust-based intrusion tolerant routing in wireless sensor networks (2014) 10.1007/978-3-319-10506-2_15
  11. S. Marrone, F. Flammini, N. Mazzocca, R. Nardone, V. Vittorini Towards Model-Driven V&V assessment of railway control systems (2014) 10.1007/s10009-014-0320-7
  12. F. Flammini, U. Gentile, S. Marrone, R. Nardone, V. Vittorini A Petri Net pattern-oriented approach for the design of physical protection systems (2014) 10.1007/978-3-319-10506-2_16
  13. U. Gentile, S. Marrone, G. Mele, R. Nardone, A. Peron Test specification patterns for automatic generation of test sequences (2014) 10.1007/978-3-319-10702-8_12
  14. G. Barberio, B. Di Martino, N. Mazzocca, L. Velardi, A. Amato, R. De Guglielmo, U. Gentile, S. Marrone, R. Nardone, A. Peron, V. Vittorini An interoperable testing environment for ERTMS/ETCS control systems (2014) 10.1007/978-3-319-10557-4_18

Conferences

  1. L. Coppolino, S. D'Antonio, V. Formicola, L. Romano Real-time Security & Dependability monitoring: Make it a bundle (2014) 10.1109/CCST.2014.6987018
  2. L. Coppolino, S. D'Antonio, V. Formicola, L. Romano Real-time Security & Dependability monitoring: Make it a bundle (2014) 10.1109/CCST.2014.6987018
  3. L. Coppolino, S. D'Antonio, V. Formicola, L. Romano Real-time Security & Dependability monitoring: Make it a bundle (2014) 10.1109/CCST.2014.6987018
  4. U. Gentile, N. Mazzocca, R. Nardone, S. Marrone A cost-energy trade-off model in smart energy grids (2014) 10.1109/3PGCIC.2014.83
  5. D. Amalfitano, N. Amatucci, A.R. Fasolino, U. Gentile, G. Mele, R. Nardone, V. Vittorini, S. Marrone Improving code coverage in android apps testing by exploiting patterns and automatic test case generation (2014) 10.1145/2647648.2656426

2013

Articles

  1. L. Coppolino, S. D'Antonio, V. Formicola, L. Romano Enhancing SIEM technology to protect critical infrastructures (2013) 10.1007/978-3-642-41485-5_2
  2. A. Garofalo, C. Di Sarno, L. Coppolino, S. D'Antonio A GPS spoofing resilient WAMS for smart grid (2013) 10.1007/978-3-642-38789-0_12
  3. L. Coppolino, S. D'Antonio, V. Formicola, L. Romano Enhancing SIEM technology to protect critical infrastructures (2013) 10.1007/978-3-642-41485-5_2
  4. L. Coppolino, S. D'Antonio, V. Formicola, L. Romano Enhancing SIEM technology to protect critical infrastructures (2013) 10.1007/978-3-642-41485-5_2
  5. A. Garofalo, C. Di Sarno, L. Coppolino, S. D'Antonio A GPS spoofing resilient WAMS for smart grid (2013) 10.1007/978-3-642-38789-0_12
  6. G. Cicotti, S. D'Antonio, R. Cristaldi, A. Sergio How to monitor qos in cloud infrastructures: The QoSMONaaS approach (2013) 10.1007/978-3-642-32524-3_32
  7. M. D'Arienzo, M. Iacono, S. Marrone, R. Nardone Petri net based evaluation of energy consumption in wireless sensor nodes (2013) 10.3233/JHS-130482
  8. S. Marrone, R. Nardone, A. Tedesco, P. D'Amore, V. Vittorini, R. Setola, F. De Cillis, N. Mazzocca Vulnerability modeling and analysis for critical infrastructure protection applications (2013) 10.1016/j.ijcip.2013.10.001
  9. S. Bernardi, F. Flammini, S. Marrone, N. Mazzocca, J. Merseguer, R. Nardone, V. Vittorini Enabling the usage of UML in the verification of railway systems: The DAM-rail approach (2013) 10.1016/j.ress.2013.06.032

Conferences

  1. A. Cilardo, N. Mazzocca, L. Coppolino TrustedSIM: Towards unified mobile security (2013) 10.1109/UIC-ATC.2013.74
  2. L. Coppolino, S. D'Antonio, A. Garofalo, L. Romano Applying data mining techniques to Intrusion Detection in Wireless Sensor Networks (2013) 10.1109/3PGCIC.2013.43
  3. L. Coppolino, S. D'Antonio, A. Garofalo, L. Romano Applying data mining techniques to Intrusion Detection in Wireless Sensor Networks (2013) 10.1109/3PGCIC.2013.43
  4. L. Coppolino, S. D'Antonio, A. Garofalo, L. Romano Applying data mining techniques to Intrusion Detection in Wireless Sensor Networks (2013) 10.1109/3PGCIC.2013.43
  5. E. Battista, V. Casola, S. Marrone, N. Mazzocca, R. Nardone, V. Vittorini An integrated lifetime and network quality model of large WSNs (2013) 10.1109/IWMN.2013.6663791
  6. M. Darienzo, M. Iacono, S. Marrone, R. Nardone Estimation of the energy consumption of mobile sensors in wsn environmental monitoring applications (2013) 10.1109/WAINA.2013.33
  7. E. Battista, V. Casola, N. Mazzocca, R. Nardone, S. Marrone A compositional modelling approach for large Sensor Networks design (2013) 10.1109/3PGCIC.2013.71

Books

  1. S. D’Antonio, L. Coppolino, M. Choraś, R. Kozik Distributed framework for cybersecurity of critical infrastructures (2013) 10.1201/b14839
  2. S. D’Antonio, L. Coppolino, M. Choraś, R. Kozik Distributed framework for cybersecurity of critical infrastructures (2013) 10.1201/b14839
  3. R. Nardone, S. Marrone A model-driven methodology to evaluate performability of metro systems (2013) 10.4018/978-1-4666-4659-9.ch012
  4. S. Marrone, N. Mazzocca, R. Nardone, V. Vittorini Combining heterogeneity, compositionality, and automatic generation in formal modelling (2013) 10.4018/978-1-4666-4659-9.ch002

2012

Articles

  1. L. Romano, S. D'Antonio, V. Formicola, L. Coppolino Protecting the WSN zones of a critical infrastructure via enhanced SIEM technology (2012) 10.1007/978-3-642-33675-1_20
  2. L. Coppolino, L. Romano, A. Bondavalli, A. Daidone A hidden Markov model based intrusion detection system for wireless sensor networks (2012) 10.1504/IJCCBS.2012.050305
  3. G. Cicotti, L. Coppolino, R. Cristaldi, S. D'Antonio, L. Romano QoS monitoring in a cloud services environment: The SRT-15 approach (2012) 10.1007/978-3-642-29737-3_3
  4. R. Rieke, L. Coppolino, A. Hutchison, E. Prieto, C. Gaber Security and reliability requirements for advanced security event management (2012) 10.1007/978-3-642-33704-8_15
  5. E. Prieto, R. Diaz, L. Romano, R. Rieke, M. Achemlal MASSIF: A promising solution to enhance olympic games it security (2012) 10.1007/978-3-642-33448-1_20
  6. C. Gibson, M. Melideo, L. Romano, S. D'Antonio International cooperation experiences: Results achieved, lessons learned, and way ahead (2012) 10.1007/978-3-642-33675-1_23
  7. L. Romano, S. D'Antonio, V. Formicola, L. Coppolino Protecting the WSN zones of a critical infrastructure via enhanced SIEM technology (2012) 10.1007/978-3-642-33675-1_20
  8. L. Coppolino, L. Romano, A. Bondavalli, A. Daidone A hidden Markov model based intrusion detection system for wireless sensor networks (2012) 10.1504/IJCCBS.2012.050305
  9. G. Cicotti, L. Coppolino, R. Cristaldi, S. D'Antonio, L. Romano QoS monitoring in a cloud services environment: The SRT-15 approach (2012) 10.1007/978-3-642-29737-3_3
  10. C. Gibson, M. Melideo, L. Romano, S. D'Antonio International cooperation experiences: Results achieved, lessons learned, and way ahead (2012) 10.1007/978-3-642-33675-1_23
  11. L. Romano, S. D'Antonio, V. Formicola, L. Coppolino Protecting the WSN zones of a critical infrastructure via enhanced SIEM technology (2012) 10.1007/978-3-642-33675-1_20
  12. A. Amantini, M. Choraś, S. D'Antonio, E. Egozcue, D. Germanus, R. Hutter The human role in tools for improving robustness and resilience of critical infrastructures (2012) 10.1007/s10111-010-0171-2
  13. G. Cicotti, L. Coppolino, R. Cristaldi, S. D'Antonio, L. Romano QoS monitoring in a cloud services environment: The SRT-15 approach (2012) 10.1007/978-3-642-29737-3_3
  14. S. Marrone, N. Mazzocca, R. Nardone, R. Presta, S.P. Romano, V. Vittorini A SAN-based modeling approach to performance evaluation of an IMS-compliant conferencing framework (2012) 10.1007/978-3-642-35179-2_13
  15. F. Flammini, S. Marrone, N. Mazzocca, R. Nardone, V. Vittorini Model-driven V&V processes for computer based control systems: A unifying perspective (2012) 10.1007/978-3-642-34032-1_20
  16. S. Marrone, R. Nardone, A. Orazzo, I. Petrone, L. Velardi Improving verification process in driverless metro systems: The MBAT project (2012) 10.1007/978-3-642-34032-1_23

Conferences

  1. G.G. Granadillo, G. Jacob, H. Debar, L. Coppolino Combination approach to select optimal countermeasures based on the RORI index (2012) 10.1109/INTECH.2012.6457801
  2. O. Adinolfi, R. Cristaldi, L. Coppolino, L. Romano QoS-MONaaS: A portable architecture for QoS monitoring in the cloud (2012) 10.1109/SITIS.2012.82
  3. M. Afzaal, C. Di Sarno, L. Coppolino, S. D'Antonio, L. Romano A resilient architecture for forensic storage of events in critical infrastructures (2012) 10.1109/HASE.2012.9
  4. O. Adinolfi, R. Cristaldi, L. Coppolino, L. Romano QoS-MONaaS: A portable architecture for QoS monitoring in the cloud (2012) 10.1109/SITIS.2012.82
  5. M. Afzaal, C. Di Sarno, S. D'Antonio, L. Romano An intrusion and fault tolerant forensic storage for a SIEM system (2012) 10.1109/SITIS.2012.89
  6. M. Afzaal, C. Di Sarno, L. Coppolino, S. D'Antonio, L. Romano A resilient architecture for forensic storage of events in critical infrastructures (2012) 10.1109/HASE.2012.9
  7. M. Afzaal, C. Di Sarno, S. D'Antonio, L. Romano An intrusion and fault tolerant forensic storage for a SIEM system (2012) 10.1109/SITIS.2012.89
  8. M. Afzaal, C. Di Sarno, L. Coppolino, S. D'Antonio, L. Romano A resilient architecture for forensic storage of events in critical infrastructures (2012) 10.1109/HASE.2012.9

2011

Articles

  1. L. Coppolino, S. D'Antonio, V. Formicola, L. Romano Integration of a system for critical infrastructure protection with the OSSIM SIEM platform: A dam case study (2011) 10.1007/978-3-642-24270-0_15
  2. L. Coppolino, S. D'Antonio, I.A. Elia, L. Romano Security analysis of smart grid data collection technologies (2011) 10.1007/978-3-642-24270-0_11
  3. L. Coppolino, S. D'Antonio, V. Formicola, L. Romano Integration of a system for critical infrastructure protection with the OSSIM SIEM platform: A dam case study (2011) 10.1007/978-3-642-24270-0_15
  4. L. Coppolino, S. D'Antonio, I.A. Elia, L. Romano Security analysis of smart grid data collection technologies (2011) 10.1007/978-3-642-24270-0_11
  5. L. Coppolino, S. D'Antonio, V. Formicola, L. Romano Integration of a system for critical infrastructure protection with the OSSIM SIEM platform: A dam case study (2011) 10.1007/978-3-642-24270-0_15
  6. L. Coppolino, S. D'Antonio, I.A. Elia, L. Romano Security analysis of smart grid data collection technologies (2011) 10.1007/978-3-642-24270-0_11
  7. M. Choraś, S. D'Antonio, G. Iannello, A. Jedlitschka, R. Kozik, K. Miesenberger, A. Wołoszczuk Innovative man machine interfaces and solutions to support totally blind people (2011) 10.1007/978-3-642-23154-4_48
  8. A. Mazzeo, N. Mazzocca, R. Nardone, L. D'Acierno, B. Montella, V. Punzo, E. Quaglietta, I. Lamberti, P. Marmo An integrated approach for availability and QoS evaluation in railway systems (2011) 10.1007/978-3-642-24270-0_13

Conferences

  1. L. Coppolino, S. D'Antonio, V. Formicola, F. Oliviero, L. Romano On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project (2011) 10.1109/CRiSIS.2011.6061830
  2. S. D'Antonio, L. Coppolino, I.A. Elia, V. Formicola Security issues of a phasor data concentrator for smart grid infrastructure (2011) 10.1145/1978582.1978584
  3. M. Ficco, A. Daidone, L. Coppolino, L. Romano, A. Bondavalli An event correlation approach for fault diagnosis in SCADA infrastructures (2011) 10.1145/1978582.1978586
  4. M. Ficco, L. Romano A generic intrusion detection and diagnoser system based on complex event processing (2011) 10.1109/CCP.2011.43
  5. L. Romano, D. De Mari, Z. Jerzak, C. Fetzer A novel approach to QoS monitoring in the cloud (2011) 10.1109/CCP.2011.49
  6. L. Coppolino, S. D'Antonio, V. Formicola, F. Oliviero, L. Romano On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project (2011) 10.1109/CRiSIS.2011.6061830
  7. M. Ficco, A. Daidone, L. Coppolino, L. Romano, A. Bondavalli An event correlation approach for fault diagnosis in SCADA infrastructures (2011) 10.1145/1978582.1978586
  8. L. Coppolino, S. D'Antonio, V. Formicola, F. Oliviero, L. Romano On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project (2011) 10.1109/CRiSIS.2011.6061830
  9. S. D'Antonio, L. Coppolino, I.A. Elia, V. Formicola Security issues of a phasor data concentrator for smart grid infrastructure (2011) 10.1145/1978582.1978584
  10. E. Quaglietta, L. D'Acierno, V. Punzo, R. Nardone, N. Mazzocca A simulation framework for supporting design and real-time decisional phases in railway systems (2011) 10.1109/ITSC.2011.6082913

2010

Articles

  1. L. Coppolino, L. Romano Open Issues in IDS Design for Wireless Biomedical Sensor Networks (2010) 10.1007/978-3-642-14619-0_22
  2. L. Coppolino, L. Romano Open Issues in IDS Design for Wireless Biomedical Sensor Networks (2010) 10.1007/978-3-642-14619-0_22
  3. M. Ficco, L. Romano A correlation approach to intrusion detection (2010) 10.1007/978-3-642-16644-0_19
  4. S. Avallone, S. D'Antonio Using MPLS in a wireless mesh network to improve the resiliency of SCADA systems (2010) 10.1007/978-3-642-16644-0_38

Conferences

  1. L. Coppolino, S. D'Antonio, L. Romano, G. Spagnuolo An intrusion detection system for critical information infrastructures using wireless sensor network technologies (2010) 10.1109/CRIS.2010.5617547
  2. L. Coppolino, D. De Mari, L. Romano, V. Vianello SLA compliance monitoring through semantic processing (2010) 10.1109/GRID.2010.5697975
  3. L. Coppolino, S. D'Antonio, L. Romano, G. Spagnuolo An intrusion detection system for critical information infrastructures using wireless sensor network technologies (2010) 10.1109/CRIS.2010.5617547
  4. L. Coppolino, D. De Mari, L. Romano, V. Vianello SLA compliance monitoring through semantic processing (2010) 10.1109/GRID.2010.5697975
  5. S. Avallone, S. D'Antonio, F. Oliviero, S.P. Romano Use of traffic engineering techniques to increase resilience of SCADA networks (2010) 10.1109/CRIS.2010.5617562
  6. L. Coppolino, S. D'Antonio, L. Romano, G. Spagnuolo An intrusion detection system for critical information infrastructures using wireless sensor network technologies (2010) 10.1109/CRIS.2010.5617547
  7. S. D'Antonio, V. Formicola, C. Mazzariello, F. Oliviero, S.P. Romano Performance assessment of a distributed intrusion detection system in a real network scenario (2010) 10.1109/CRISIS.2010.5764922
  8. M. Choraś, S. D'Antonio, R. Kozik, W. Holubowicz Intersection approach to vulnerability handling (2010)

2009

Articles

  1. L. Coppolino, S. D'Antonio, I.A. Elia, L. Romano From intrusion detection to intrusion detection and diagnosis: An ontology-based approach (2009) 10.1007/978-3-642-10265-3_18
  2. L. Romano, L. Coppolino, I.A. Elia, G. Spagnuolo A healthcare real-time monitoring system for multiple sensors data collection and correlation (2009) 10.1007/978-3-642-02937-0_42
  3. L. Coppolino, S. D'Antonio, I.A. Elia, L. Romano From intrusion detection to intrusion detection and diagnosis: An ontology-based approach (2009) 10.1007/978-3-642-10265-3_18
  4. S. D'Antonio, L. Romano, A. Khelil, N. Suri INcreasing security and protection through infrastructure REsilience: The INSPIRE project (2009) 10.1007/978-3-642-03552-4_10
  5. L. Romano, L. Coppolino, I.A. Elia, G. Spagnuolo A healthcare real-time monitoring system for multiple sensors data collection and correlation (2009) 10.1007/978-3-642-02937-0_42
  6. S. D'Antonio, L. Romano, A. Khelil, N. Suri Increasing security and protection of SCADA systems through infrastructure resilience (2009) 10.1504/IJSSE.2009.031348
  7. L. Coppolino, S. D'Antonio, I.A. Elia, L. Romano From intrusion detection to intrusion detection and diagnosis: An ontology-based approach (2009) 10.1007/978-3-642-10265-3_18
  8. S. D'Antonio, L. Romano, A. Khelil, N. Suri INcreasing security and protection through infrastructure REsilience: The INSPIRE project (2009) 10.1007/978-3-642-03552-4_10
  9. S. D'Antonio, L. Romano, A. Khelil, N. Suri Increasing security and protection of SCADA systems through infrastructure resilience (2009) 10.1504/IJSSE.2009.031348

Conferences

  1. L. Coppolino, S. D'Antonio, M. Esposito, L. Romano Exploiting diversity and correlation to improve the performance of intrusion detection systems (2009)
  2. M. Ficco, L. Coppolino, L. Romano A weight-based symptom correlation approach to SQL injection attacks (2009) 10.1109/LADC.2009.14
  3. L. Coppolino, S. D'Antonio, M. Esposito, L. Romano Exploiting diversity and correlation to improve the performance of intrusion detection systems (2009)
  4. M. Ficco, L. Coppolino, L. Romano A weight-based symptom correlation approach to SQL injection attacks (2009) 10.1109/LADC.2009.14
  5. L. Coppolino, S. D'Antonio, M. Esposito, L. Romano Exploiting diversity and correlation to improve the performance of intrusion detection systems (2009)

Books

  1. S. Pierno, M. Magaldi, G.L. Supino, L. Bevilacqua, V.S. di Carlo, R. Russo, L. Romano Providing mobile multimodal social services using a grid architecture (2009) 10.4018/978-1-60566-386-9.ch017

2008

Articles

  1. F. Campanile, L. Coppolino, S. Giordano, L. Romano A business process monitor for a mobile phone recharging system (2008) 10.1016/j.sysarc.2008.02.005
  2. S. Pierno, L. Romano, L. Capuano, M. Magaldi, L. Bevilacqua Software innovation for e-government expansion (2008) 10.1007/978-3-540-88871-0_58
  3. F. Campanile, L. Coppolino, S. Giordano, L. Romano A business process monitor for a mobile phone recharging system (2008) 10.1016/j.sysarc.2008.02.005
  4. M. Magaldi, R. Russo, L. Bevilacqua, S. Pierno, V. Scotto di Carlo, F. Corvino, L. Romano, L. Capuano, I. De Furio A GRID approach to providing multimodal context-sensitive social service to mobile users (2008) 10.1007/978-3-540-88875-8_76
  5. S. D'Antonio, S.P. Romano, S. Simpson, P. Smith, D. Hutchison A semi-autonomic framework for intrusion tolerance in heterogeneous networks (2008) 10.1007/978-3-540-92157-8_20

Conferences

  1. A. Cilardo, N. Mazzocca, L. Coppolino Virtual scan chains far online testing of FPGA-based embedded systems (2008) 10.1109/DSD.2008.102

2007

Articles

  1. A. Cilardo, D. Cotroneo, C. Di Flora, A. Mazzeo, L. Romano, S. Russo Design and implementation of a high performance architecture for providing digital time stamping services to mobile devices (2007)

Conferences

  1. L. Coppolino, L. Romano, N. Mazzocca, S. Salvi Web services workflow reliability estimation through reliability patterns (2007) 10.1109/SECCOM.2007.4550316
  2. A. Cilardo, L. Coppolino, A. Mazzeo, L. Romano Performance evaluation of security services: An experimental approach (2007) 10.1109/PDP.2007.64
  3. A. Cilardo, L. Coppolino, A. Mazzeo, L. Romano Combining programmable hardware and Web Services technologies for delivering high-performance and interoperable security (2007) 10.1109/PDP.2007.30
  4. F. Campanile, A. Cilardo, L. Coppolino, L. Romano Adaptable parsing of real-time data streams (2007) 10.1109/PDP.2007.16
  5. L. Coppolino, L. Romano, N. Mazzocca, S. Salvi Web services workflow reliability estimation through reliability patterns (2007) 10.1109/SECCOM.2007.4550316
  6. G. Cattaneo, L. Catuogno, F. Petagna, G.D. Matteo, L. Romano iToken: A wireless smart card reader which provides handhelds with desk top equivalent security (2007) 10.1109/SECCOM.2007.4550315
  7. A. Cilardo, L. Coppolino, A. Mazzeo, L. Romano Performance evaluation of security services: An experimental approach (2007) 10.1109/PDP.2007.64
  8. A. Cilardo, L. Coppolino, A. Mazzeo, L. Romano Combining programmable hardware and Web Services technologies for delivering high-performance and interoperable security (2007) 10.1109/PDP.2007.30
  9. F. Campanile, A. Cilardo, L. Coppolino, L. Romano Adaptable parsing of real-time data streams (2007) 10.1109/PDP.2007.16
  10. S. Avallone, S. D'Antonio, S.P. Romano A semantic approach to policy-based management : Linking policies to ontologies (2007)

2006

Articles

  1. A. Cilardo, L. Coppolino, N. Mazzocca, L. Romano Elliptic curve cryptography engineering (2006) 10.1109/JPROC.2005.862438
  2. A. Cilardo, L. Coppolino, N. Mazzocca, L. Romano Elliptic curve cryptography engineering (2006) 10.1109/JPROC.2005.862438
  3. M. Melgara, L. Romano, F. Rocca, A. Sanna, D. Marino, R. Serafin Innovative healthcare services for nomadic users (2006) 10.1007/11915034_124
  4. G. Frattini, L. Romano, V.S. di Carlo, P. Petriccione, G. Supino, G. Leone, C. Autiero Multimodal architectures: Issues and experiences (2006) 10.1007/11915034_122
  5. S. D'Antonio, F. Oliviero, R. Setola High-speed intrusion detection in support of critical infrastructure protection (2006) 10.1007/11962977_18
  6. M. Molina, A. Chiosi, S. D'Antonio, G. Ventre Design principles and algorithms for effective high-speed IP flow monitoring (2006) 10.1016/j.comcom.2005.07.024
  7. L. Angrisani, S. D'Antonio, M. Esposito, M. Vadursi Techniques for available bandwidth measurement in IP networks: A performance comparison (2006) 10.1016/j.comnet.2005.06.003
  8. S. D'Antonio, M. Esposito, F. Oliviero, S.P. Romano, D. Salvi Behavioral network engineering: Making intrusion detection become autonomic (2006) 10.1007/BF03219885
  9. S. Avallone, S. D'Antonio, M. Esposito, S.P. Romano, G. Ventre Resource allocation in multi-domain networks based on service level specifications (2006) 10.1109/jcn.2006.6182910

Conferences

  1. V. Casola, L. Coppolino, A. Mazzeo, N. Mazzocca, M. Rak Design and implementation of TruMan, a Trust Manager component for distributed systems (2006) 10.1109/SECPERU.2006.7
  2. S. D'Antonio, M. Esposito, S.P. Romano Pinball caching: Improving performance of a framework for dynamic web-content adaptation and delivery (2006) 10.1109/ISCC.2006.129

2005

Articles

  1. A. Cilardo, L. Coppolino, A. Mazzeo, L. Romano High-performance and interoperable security services for mobile environments (2005) 10.1007/11557654_118
  2. A. Cilardo, L. Coppolino, A. Mazzeo, L. Romano High-performance and interoperable security services for mobile environments (2005) 10.1007/11557654_118
  3. S. D'Antonio, M. Esposito, S.P. Romano, G. Ventre Time-aware admission control on top of time-unaware network infrastructures (2005) 10.1016/j.comcom.2004.08.017

Conferences

  1. A. Cilardo, A. Mazzeo, N. Mazzocca, L. Romano A novel unified architecture for public-key cryptography (2005) 10.1109/DATE.2005.28
  2. A. Cilardo, A. Mazzeo, L. Romano, G.P. Saggese An FPGA-based key-store for improving the dependability of security services (2005) 10.1109/WORDS.2005.16
  3. A. Botta, S. D'Antonio, A. Pescapé, G. Ventre BET: A hybrid bandwidth estimation tool (2005) 10.1109/ICPADS.2005.103
  4. E. Boschi, S. D'Antonio, P. Malone, C. Schmoll INTERMON: An architecture for inter-domain monitoring, modelling and simulation (2005) 10.1007/11422778_123

Books

  1. A. Cilardo, A. Mazzeo, L. Romano, G.P. Saggese Architecture and FPGA implementation of a digit-serial RSA processor (2005) 10.1007/1-4020-3128-9_17

2004

Articles

  1. G.P. Saggese, L. Romano, N. Mazzocca, A. Mazzeo A tamper resistant hardware accelerator for RSA cryptographic applications (2004) 10.1016/j.sysarc.2004.04.002
  2. A. Cilardo, A. Mazzeo, L. Romano, G.P. Saggese Exploring the design-space for FPGA-based implementation of RSA (2004) 10.1016/j.micpro.2004.03.009
  3. A. Bondavalli, S. Chiaradonna, D. Cotroneo, L. Romano Effective fault treatment for improving the dependability of COTS and legacy-based applications (2004) 10.1109/TDSC.2004.40
  4. S. D'Antonio, M. D'Arienzo, M. Esposito, S.P. Romano, G. Ventre Managing service level agreements in Premium IP networks: A business-oriented approach (2004) 10.1016/j.comnet.2004.06.024

Conferences

  1. A. Cilardo, A. Mazzeo, L. Romano, G.P. Saggese Carry-save Montgomery modular exponentiation on reconfigurable hardware (2004) 10.1109/DATE.2004.1269231
  2. G.P. Saggese, C. Basile, L. Romano, Z. Kalbarczyk, R.K. Iyer Hardware support for high performance, intrusion- And fault-tolerant systems (2004) 10.1109/RELDIS.2004.1353020
  3. A. Cilardo, A. Mazzeo, L. Romano, G.P. Saggese Carry-save montgomery modular exponentiation on reconfigurable hardware (2004) 10.1109/DATE.2004.1269231
  4. S. D'Antonio, M. Esposito, S.P. Romano, G. Ventre Assessing the scalability of component-based frameworks: The CADENUS case study (2004) 10.1145/1052305.1052311
  5. S. D'Antonio, M. D'Arienzo, A. Pescapé, G. Ventre An architecture for automatic configuration of integrated networks (2004)
  6. S. D'Antonio, M. D'Arienzo, A. Pescapé, S.P. Romano, G. Ventre Using metadata in SLA negotiation over premium IP networks (2004) 10.1109/icdcsw.2004.1284005

2003

Articles

  1. A. Coronato, G. De Pietro, A. Mazzeo, L. Romano Improving the QoS of MPEG2 streaming over wireless LANs (2003) 10.1016/j.simpat.2003.08.001
  2. D. Cotroneo, A. Mazzeo, L. Romano, S. Russo An architecture for security-oriented perfective maintenance of legacy software (2003) 10.1016/S0950-5849(03)00049-1
  3. A. Bondavalli, S. Chiaradonna, D. Cotroneo, L. Romano A fault-tolerant distributed legacy-based system and its evaluation (2003) 10.1007/978-3-540-45214-0_22
  4. A. Cilardo, A. Mazzeo, L. Romano, G.P. Saggese, G. Cattaneo Using Web Services technology for inter-enterprise integration of digital time stamping (2003) 10.1007/978-3-540-39962-9_93
  5. S. D'Antonio, M. D'Arienzo, M. Gargiulo, S.P. Romano, G. Ventre Service level Indication: A proposal for QoS monitoring in SLA -based multidomain networks (2003)
  6. G. Cortese, R. Fiutem, P. Cremonese, S. D'Antonio, M. Esposito, S.P. Romano, A. Diaconescu CADENUS: Creation and deployment of end-user services in premium IP networks (2003) 10.1109/MCOM.2003.1166654
  7. G. Karlsson, J. Roberts, I. Stavrakakis, A. Alves, S. Avallone, F. Boavida, S. D'Antonio, M. Esposito, V. Fodor, M. Gargiulo, J. Harju, Y. Koucheryavy, F. Li, I. Marsh, I.M. Ivars, D. Moltchanov, E. Monteiro, A. Panagakis, A. Pescapé, G. Quadros, S.P. Romano, G. Ventre Traffic management (2003) 10.1007/978-3-540-45190-7_2

Conferences

  1. A. Mazzeo, L. Romano, G.P. Saggese, N. Mazzocca FPGA-based implementation of a serial RSA processor (2003) 10.1109/DATE.2003.1253671
  2. D. Cotroneo, C. Di Flora, A. Mazzeo, L. Romano, S. Russo, G.P. Saggese Providing digital time stamping services to mobile devices (2003) 10.1109/WORDS.2003.1267495
  3. L. Angrisani, S. D'Antonio, M. Vadursi, G. Ventre Performance comparison of different techniques for available bandwidth measurement in packet switched network (2003) 10.1109/VECIMS.2003.1227057

2002

Articles

  1. D. Cotroneo, N. Mazzocca, L. Romano, S. Russo A fault tolerant tolerant access to legacy database systems using CORBA technology (2002)
  2. D. Cotroneo, N. Mazzocca, L. Romano, S. Russo Building a dependable system from a legacy application with CORBA (2002) 10.1016/S1383-7621(02)00093-0
  3. D. Cotroneo, A. Mazzeo, L. Romano, S. Russo Implementing a CORBA-based architecture for leveraging the security level of existing applications (2002) 10.1007/3-540-36124-3_49

Conferences

  1. L. Romano, A. Bondavalli, S. Chiaradonna, D. Cotroneo Implementation of threshold-based diagnostic mechanisms for COTS-based applications (2002)
  2. S. D'Antonio, B. Fadini, S.P. Romano, G. Ventre Designing service negotiation entities for the electronic market-place (2002) 10.1145/568760.568875

2001

Conferences

  1. G.B. Barone, N. Margarita, A. Mazzeo, N. Mazzocca, L. Romano Secure access to personalized web services (2001) 10.1109/PRDC.2001.992707

2000

Conferences

  1. L. Romano, N. Mazzocca, A. Coronato, G. De Pietro Dependability analysis of transmission techniques for MPEG-2 streams (2000) 10.1109/PRDC.2000.897294
  2. D. Cotroneo, L. Romano, S. Russo, N. Mazzocca CORBA-based architecture for adding dependability to legacy servers (2000)