2021
Articles
- F. Amato, L. Coppolino, G. Cozzolino, G. Mazzeo, F. Moscato, R. Nardone Enhancing random forest classification with NLP in DAMEH: A system for DAta Management in eHealth Domain (2021) 10.1016/j.neucom.2020.08.091
- L. Coppolino, S. D'Antonio, V. Formicola, G. Mazzeo, L. Romano VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems (2021) 10.1109/TC.2020.2995638
- F. Amato, L. Coppolino, F. Mercaldo, F. Moscato, R. Nardone, A. Santone CAN-Bus Attack Detection With Deep Learning (2021) 10.1109/TITS.2020.3046974
- L. Coppolino, S. D'Antonio, V. Formicola, G. Mazzeo, L. Romano VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems (2021) 10.1109/TC.2020.2995638
- L. Coppolino, S. D'Antonio, V. Formicola, G. Mazzeo, L. Romano VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems (2021) 10.1109/TC.2020.2995638
- F. Amato, L. Coppolino, G. Cozzolino, G. Mazzeo, F. Moscato, R. Nardone Enhancing random forest classification with NLP in DAMEH: A system for DAta Management in eHealth Domain (2021) 10.1016/j.neucom.2020.08.091
- L. Coppolino, S. D'Antonio, V. Formicola, G. Mazzeo, L. Romano VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems (2021) 10.1109/TC.2020.2995638
- G. Mazzeo, S. Arnautov, C. Fetzer, L. Romano SGXTuner: Performance Enhancement of Intel SGX Applications via Stochastic Optimization (2021) 10.1109/TDSC.2021.3064391
- F. Amato, L. Coppolino, G. Cozzolino, G. Mazzeo, F. Moscato, R. Nardone Enhancing random forest classification with NLP in DAMEH: A system for DAta Management in eHealth Domain (2021) 10.1016/j.neucom.2020.08.091
- S. Bernardi, U. Gentile, S. Marrone, J. Merseguer, R. Nardone Security modelling and formal verification of survivability properties: Application to cyber–physical systems (2021) 10.1016/j.jss.2020.110746
- F. Amato, L. Coppolino, F. Mercaldo, F. Moscato, R. Nardone, A. Santone CAN-Bus Attack Detection With Deep Learning (2021) 10.1109/TITS.2020.3046974
2020
Articles
- M. Choraś, S. D'Antonio, J. Keller, R. Kozik Progress in features, data, patterns and similarity analysis (2020)
- N. Rajabli, F. Flammini, R. Nardone, V. Vittorini Software Verification and Validation of Safe Autonomous Cars: A Systematic Literature Review (2020) 10.1109/ACCESS.2020.3048047
- R. Nardone, S. Marrone, U. Gentile, A. Amato, G. Barberio, M. Benerecetti, R. De Guglielmo, B. Di Martino, N. Mazzocca, A. Peron, G. Pisani, L. Velardi, V. Vittorini An OSLC-based environment for system-level functional testing of ERTMS/ETCS controllers (2020) 10.1016/j.jss.2019.110478
- F. Buccafurri, V. De Angelis, R. Nardone Securing MQTT by blockchain-based otp authentication (2020) 10.3390/s20072002
- C. Di Meo, M. Di Vaio, F. Flammini, R. Nardone, S. Santini, V. Vittorini ERTMS/ETCS Virtual Coupling: Proof of Concept and Numerical Analysis (2020) 10.1109/TITS.2019.2920290
- S. Bernardi, U. Gentile, R. Nardone, S. Marrone Advancements in knowledge elicitation for computer-based critical systems (2020) 10.1016/j.future.2020.03.035
- F. Flammini, S. Marrone, R. Nardone, M. Caporuscio, M. D'Angelo Safety integrity through self-adaptation for multi-sensor event detection: Methodology and case-study (2020) 10.1016/j.future.2020.06.036
- U. Gentile, S. Marrone, R. Nardone, E. Bellini Computer-aided security assessment of water networks monitoring platforms (2020) 10.1016/j.ijcip.2020.100390
- G. Mazzeo, M. Staffa TROS: Protecting Humanoids ROS from Privileged Attackers (2020) 10.1007/s12369-019-00581-4
- F. Amato, L. Coppolino, S. D'Antonio, N. Mazzocca, F. Moscato, L. Sgaglione An abstract reasoning architecture for privacy policies monitoring (2020) 10.1016/j.future.2020.01.019
- F. Amato, L. Coppolino, S. D'Antonio, N. Mazzocca, F. Moscato, L. Sgaglione An abstract reasoning architecture for privacy policies monitoring (2020) 10.1016/j.future.2020.01.019
- L. Coppolino, L. Romano, A. Scaletti, L. Sgaglione Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study (2020) 10.1080/09537325.2020.1850673
- L. Romano, F. Bruzelius, B. Jacobson Unsteady-state brush theory (2020) 10.1080/00423114.2020.1774625
- L. Romano, A. Sakhnevych, S. Strano, F. Timpone A hybrid tyre model for in-plane dynamics (2020) 10.1080/00423114.2019.1608365
- L. Coppolino, L. Romano, A. Scaletti, L. Sgaglione Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study (2020) 10.1080/09537325.2020.1850673
- F. Amato, L. Coppolino, S. D'Antonio, N. Mazzocca, F. Moscato, L. Sgaglione An abstract reasoning architecture for privacy policies monitoring (2020) 10.1016/j.future.2020.01.019
- L. Coppolino, L. Romano, A. Scaletti, L. Sgaglione Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study (2020) 10.1080/09537325.2020.1850673
Conferences
- R. Dirnfeld, F. Flammini, S. Marrone, R. Nardone, V. Vittorini Low-Power Wide-Area Networks in Intelligent Transportation: Review and Opportunities for Smart-Railways (2020) 10.1109/ITSC45102.2020.9294535
- A. Russo, F. Buccafurri, G. Lax, R. Nardone A blockchain-based system for tracking and collision avoidance of resident space objects (2020)
- R. Nardone, F. Buccafurri, V. De Angelis, C. Labrini, G. Lax, L. Musarella, A. Russo Model-driven engineering for swarm-based space exploration missions (2020)
2019
Articles
- L. Coppolino, S. D’Antonio, G. Mazzeo, L. Romano, L. Sgaglione An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems (2019) 10.1007/978-3-319-98530-5_87
- M. Benerecetti, U. Gentile, S. Marrone, R. Nardone, A. Peron, L.L.L. Starace, V. Vittorini From Dynamic State Machines to Promela (2019) 10.1007/978-3-030-30923-7_4
- A. Drago, S. Marrone, N. Mazzocca, R. Nardone, A. Tedesco, V. Vittorini A model-driven approach for vulnerability evaluation of modern physical protection systems (2019) 10.1007/s10270-016-0572-7
- S. Bernardi, S. Marrone, J. Merseguer, R. Nardone, V. Vittorini Towards a model-driven engineering approach for the assessment of non-functional properties using multi-formalism (2019) 10.1007/s10270-018-0663-8
- L. Coppolino, S. D’Antonio, G. Mazzeo, L. Romano, L. Sgaglione An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems (2019) 10.1007/978-3-319-98530-5_87
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain (2019) 10.1504/IJCCBS.2019.106818
- L. Sgaglione, G. Mazzeo A GDPR-compliant approach to real-time processing of sensitive data (2019) 10.1007/978-3-319-92231-7_5
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano A comparative analysis of emerging approaches for securing java software with Intel SGX (2019) 10.1016/j.future.2019.03.018
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain (2019) 10.1504/IJCCBS.2019.106818
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano A comparative analysis of emerging approaches for securing java software with Intel SGX (2019) 10.1016/j.future.2019.03.018
- S. Diamantopoulos, D. Karamitros, L. Romano, L. Coppolino, V. Koutkias, K. Votis, O. Stan, P. Campegiani, D.M. Martinez, M. Nalin, I. Baroni, F. Clemente, G. Faiella, C. Mesaritakis, E. Grivas, J. Rasmussen, J. Petersen, I. Cano, E. Puigdomenech, E. Gelenbe, J. Dumortier, M. Voss-Knudevoronkov Secure cross-border exchange of health related data: The KONFIDO approach (2019) 10.1007/978-3-030-34914-1_30
- L. Sgaglione, G. Mazzeo A GDPR-compliant approach to real-time processing of sensitive data (2019) 10.1007/978-3-319-92231-7_5
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain (2019) 10.1504/IJCCBS.2019.106818
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano A comparative analysis of emerging approaches for securing java software with Intel SGX (2019) 10.1016/j.future.2019.03.018
- L. Romano, A. Sakhnevych, S. Strano, F. Timpone A novel brush-model with flexible carcass for transient interactions (2019) 10.1007/s11012-019-01040-0
- D. Garcia-Pozuelo, O.A. Olatunbosun, L. Romano, S. Strano, M. Terzo, A.J. Tuononen, Y. Xiong Development and experimental validation of a real-time analytical model for different intelligent tyre concepts (2019) 10.1080/00423114.2019.1566560
- S. Diamantopoulos, D. Karamitros, L. Romano, L. Coppolino, V. Koutkias, K. Votis, O. Stan, P. Campegiani, D.M. Martinez, M. Nalin, I. Baroni, F. Clemente, G. Faiella, C. Mesaritakis, E. Grivas, J. Rasmussen, J. Petersen, I. Cano, E. Puigdomenech, E. Gelenbe, J. Dumortier, M. Voss-Knudevoronkov Secure cross-border exchange of health related data: The KONFIDO approach (2019) 10.1007/978-3-030-34914-1_30
- L. Coppolino, S. D’Antonio, G. Mazzeo, L. Romano, L. Sgaglione An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems (2019) 10.1007/978-3-319-98530-5_87
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain (2019) 10.1504/IJCCBS.2019.106818
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano A comparative analysis of emerging approaches for securing java software with Intel SGX (2019) 10.1016/j.future.2019.03.018
- L. Coppolino, S. D’Antonio, G. Mazzeo, L. Romano, L. Sgaglione An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems (2019) 10.1007/978-3-319-98530-5_87
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain (2019) 10.1504/IJCCBS.2019.106818
Conferences
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione, D. Cotroneo, A. Scognamiglio Privacy Preserving Intrusion Detection Via Homomorphic Encryption (2019) 10.1109/WETICE.2019.00073
- F. Buccafurri, G. Lax, L. Musarella, R. Nardone A novel query language for data extraction from social networks (2019) 10.5220/0008362503650371
- F. Buccafurri, L. Musarella, R. Nardone A routing algorithm increasing the transmission availability in smart grids (2019)
- F. Flammini, S. Marrone, R. Nardone, A. Petrillo, S. Santini, V. Vittorini Towards Railway Virtual Coupling (2019) 10.1109/ESARS-ITEC.2018.8607523
- F. Buccafurri, L. Musarella, R. Nardone Enabling propagation in web of trust by ethereum (2019) 10.1145/3331076.3331108
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione, D. Cotroneo, A. Scognamiglio Privacy Preserving Intrusion Detection Via Homomorphic Encryption (2019) 10.1109/WETICE.2019.00073
- L. De Simone, G. Mazzeo Isolating real-Time safety-critical embedded systems via sgx-based lightweight virtualization (2019) 10.1109/ISSREW.2019.00089
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione, D. Cotroneo, A. Scognamiglio Privacy Preserving Intrusion Detection Via Homomorphic Encryption (2019) 10.1109/WETICE.2019.00073
- L. Coppolino, S. D'Antonio, L. Romano, L. Sgaglione, M. Magliulo, R. Pacelli Protecting critical business processes of smart hospitals from cyber attacks (2019) 10.1109/SITIS.2019.00065
- L. Coppolino, S. D'Antonio, L. Romano, L. Sgaglione, M. Magliulo, R. Pacelli Protecting critical business processes of smart hospitals from cyber attacks (2019) 10.1109/SITIS.2019.00065
- S. Diamantopoulos, M. Nalin, I. Baroni, F. Clemente, G. Faiella, C. Mesaritakis, E. Grivas, J. Rasmussen, J. Petersen, I. Cano, E. Puigdomenech, D. Karamitros, E. Gelenbe, J. Dumortier, M. Voss-Knudevoronkov, L. Romano, L. Coppolino, V. Koutkias, K. Votis, O. Stan, P. Campegiani, D.M. Martinez Secure cross-border exchange of health related data: The KONFIDO approach (2019) 10.1109/EDCC.2019.00024
- G. Breglio, A. Irace, V.R. Marrazzo, M. Riccio, L. Romano, S. Strano, M. Terzo Feel-tire Unina: Development and Modeling of a Sensing System for Intelligent Tires (2019) 10.1109/RTSI.2019.8895537
- L. Coppolino, S. D'Antonio, L. Romano, L. Sgaglione, M. Magliulo, R. Pacelli Protecting critical business processes of smart hospitals from cyber attacks (2019) 10.1109/SITIS.2019.00065
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione, D. Cotroneo, A. Scognamiglio Privacy Preserving Intrusion Detection Via Homomorphic Encryption (2019) 10.1109/WETICE.2019.00073
- S. Diamantopoulos, M. Nalin, I. Baroni, F. Clemente, G. Faiella, C. Mesaritakis, E. Grivas, J. Rasmussen, J. Petersen, I. Cano, E. Puigdomenech, D. Karamitros, E. Gelenbe, J. Dumortier, M. Voss-Knudevoronkov, L. Romano, L. Coppolino, V. Koutkias, K. Votis, O. Stan, P. Campegiani, D.M. Martinez Secure cross-border exchange of health related data: The KONFIDO approach (2019) 10.1109/EDCC.2019.00024
- L. Coppolino, S. D'Antonio, L. Romano, L. Sgaglione, M. Magliulo, R. Pacelli Protecting critical business processes of smart hospitals from cyber attacks (2019) 10.1109/SITIS.2019.00065
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione, D. Cotroneo, A. Scognamiglio Privacy Preserving Intrusion Detection Via Homomorphic Encryption (2019) 10.1109/WETICE.2019.00073
2018
Articles
- M. Staffa, L. Sgaglione, G. Mazzeo, L. Coppolino, S. D'Antonio, L. Romano, E. Gelenbe, O. Stan, S. Carpov, E. Grivas, P. Campegiani, L. Castaldo, K. Votis, V. Koutkias, I. Komnios An OpenNCP-based Solution for Secure eHealth Data Exchange (2018) 10.1016/j.jnca.2018.05.012
- M. Staffa, L. Coppolino, L. Sgaglione, E. Gelenbe, I. Komnios, E. Grivas, O. Stan, L. Castaldo KONFIDO: An OpenNCP-based secure ehealth data exchange system (2018) 10.1007/978-3-319-95189-8_2
- P. Natsiavas, J. Rasmussen, M. Voss-Knude, K. Votis, L. Coppolino, P. Campegiani, I. Cano, D. Marí, G. Faiella, F. Clemente, M. Nalin, E. Grivas, O. Stan, E. Gelenbe, J. Dumortier, J. Petersen, D. Tzovaras, L. Romano, I. Komnios, V. Koutkias Comprehensive user requirements engineering methodology for secure and interoperable health data exchange 08 Information and Computing Sciences 0806 Information Systems (2018) 10.1186/s12911-018-0664-0
- M. Staffa, L. Sgaglione, G. Mazzeo, L. Coppolino, S. D'Antonio, L. Romano, E. Gelenbe, O. Stan, S. Carpov, E. Grivas, P. Campegiani, L. Castaldo, K. Votis, V. Koutkias, I. Komnios An OpenNCP-based Solution for Secure eHealth Data Exchange (2018) 10.1016/j.jnca.2018.05.012
- G. Mazzeo, L. Coppolino, S. D'Antonio, C. Mazzariello, L. Romano SIL2 assessment of an Active/Standby COTS-based Safety-Related system (2018) 10.1016/j.ress.2018.04.009
- M. Staffa, L. Coppolino, L. Sgaglione, E. Gelenbe, I. Komnios, E. Grivas, O. Stan, L. Castaldo KONFIDO: An OpenNCP-based secure ehealth data exchange system (2018) 10.1007/978-3-319-95189-8_2
- P. Natsiavas, J. Rasmussen, M. Voss-Knude, K. Votis, L. Coppolino, P. Campegiani, I. Cano, D. Marí, G. Faiella, F. Clemente, M. Nalin, E. Grivas, O. Stan, E. Gelenbe, J. Dumortier, J. Petersen, D. Tzovaras, L. Romano, I. Komnios, V. Koutkias Comprehensive user requirements engineering methodology for secure and interoperable health data exchange 08 Information and Computing Sciences 0806 Information Systems (2018) 10.1186/s12911-018-0664-0
- M. Staffa, L. Sgaglione, G. Mazzeo, L. Coppolino, S. D'Antonio, L. Romano, E. Gelenbe, O. Stan, S. Carpov, E. Grivas, P. Campegiani, L. Castaldo, K. Votis, V. Koutkias, I. Komnios An OpenNCP-based Solution for Secure eHealth Data Exchange (2018) 10.1016/j.jnca.2018.05.012
- G. Mazzeo, L. Coppolino, S. D'Antonio, C. Mazzariello, L. Romano SIL2 assessment of an Active/Standby COTS-based Safety-Related system (2018) 10.1016/j.ress.2018.04.009
- M. Staffa, L. Sgaglione, G. Mazzeo, L. Coppolino, S. D'Antonio, L. Romano, E. Gelenbe, O. Stan, S. Carpov, E. Grivas, P. Campegiani, L. Castaldo, K. Votis, V. Koutkias, I. Komnios An OpenNCP-based Solution for Secure eHealth Data Exchange (2018) 10.1016/j.jnca.2018.05.012
- G. Mazzeo, L. Coppolino, S. D'Antonio, C. Mazzariello, L. Romano SIL2 assessment of an Active/Standby COTS-based Safety-Related system (2018) 10.1016/j.ress.2018.04.009
- M. Staffa, L. Sgaglione, G. Mazzeo, L. Coppolino, S. D'Antonio, L. Romano, E. Gelenbe, O. Stan, S. Carpov, E. Grivas, P. Campegiani, L. Castaldo, K. Votis, V. Koutkias, I. Komnios An OpenNCP-based Solution for Secure eHealth Data Exchange (2018) 10.1016/j.jnca.2018.05.012
- G. Mazzeo, L. Coppolino, S. D'Antonio, C. Mazzariello, L. Romano SIL2 assessment of an Active/Standby COTS-based Safety-Related system (2018) 10.1016/j.ress.2018.04.009
- R. Schlick, M. Felderer, I. Majzik, R. Nardone, A. Raschke, C. Snook, V. Vittorini A proposal of an example and experiments repository to foster industrial adoption of formal methods (2018) 10.1007/978-3-030-03427-6_20
Conferences
- V. Russo, S. Pollone, G. Ceniccola, L. Romano Water-related built heritage in Campania, Italy. Knowledge for conservation of a sustainable vernacular architecture (2018)
- A. De Benedictis, N. Mazzocca, R. Nardone, S. Venticinque A model-Based evaluation methodology for smart energy systems (2018) 10.1109/SMARTCOMP.2018.00090
- R. Nardone, G. De Tommasi, N. Mazzocca, A. Pironti, V. Vittorini Automatic generation of formal models for diagnosability of des (2018) 10.1109/ETFA.2018.8502565
- L. Coppolino, S. D'Antonio, G. Mazzeo, G. Papale, L. Sgaglione, F. Campanile An Approach for Securing Critical Applications in Untrusted Clouds (2018) 10.1109/PDP2018.2018.00076
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione How to protect public administration from cybersecurity threats: The COMPACT project (2018) 10.1109/WAINA.2018.00147
- M. Staffa, G. Mazzeo, L. Sgaglione Hardening ROS via Hardware-assisted Trusted Execution Environment (2018) 10.1109/ROMAN.2018.8525696
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level (2018) 10.1109/EDCC.2018.00015
- L. Coppolino, S. D'Antonio, L. Romano, M. Staffa KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe (2018) 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.57
- S. D'Antonio, M. Choraś Message from the CSCIP-2017 Workshop Chairs (2018) 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.203
- L. Coppolino, S. D'Antonio, G. Mazzeo, G. Papale, L. Sgaglione, F. Campanile An Approach for Securing Critical Applications in Untrusted Clouds (2018) 10.1109/PDP2018.2018.00076
- L. Vollero, S. Dantonio Message from the SIS-SS 2018 Workshop Organizers (2018) 10.1109/COMPSAC.2018.10338
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione How to protect public administration from cybersecurity threats: The COMPACT project (2018) 10.1109/WAINA.2018.00147
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level (2018) 10.1109/EDCC.2018.00015
- J. Rasmussen, P. Natsiavas, K. Votis, K. Moschou, P. Campegiani, L. Coppolino, I. Cano, D. Marí, G. Faiella, O. Stan, O. Abdelrahman, M. Nalin, I. Baroni, M. Voss-Knude, V.A. Vella, E. Grivas, C. Mesaritakis, J. Dumortier, J. Petersen, D. Tzovaras, L. Romano, I. Komnios, V. Koutkias Gap analysis for information security in interoperable solutions at a systemic level: The KONFIDO approach (2018) 10.1007/978-981-10-7419-6_13
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level (2018) 10.1109/EDCC.2018.00015
- L. Coppolino, S. D'Antonio, L. Romano, M. Staffa KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe (2018) 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.57
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione How to protect public administration from cybersecurity threats: The COMPACT project (2018) 10.1109/WAINA.2018.00147
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level (2018) 10.1109/EDCC.2018.00015
- J. Rasmussen, P. Natsiavas, K. Votis, K. Moschou, P. Campegiani, L. Coppolino, I. Cano, D. Marí, G. Faiella, O. Stan, O. Abdelrahman, M. Nalin, I. Baroni, M. Voss-Knude, V.A. Vella, E. Grivas, C. Mesaritakis, J. Dumortier, J. Petersen, D. Tzovaras, L. Romano, I. Komnios, V. Koutkias Gap analysis for information security in interoperable solutions at a systemic level: The KONFIDO approach (2018) 10.1007/978-981-10-7419-6_13
- L. Coppolino, S. D'Antonio, L. Romano, M. Staffa KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level among eHealth Services Across Europe (2018) 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.57
- L. Coppolino, S. D'Antonio, G. Mazzeo, G. Papale, L. Sgaglione, F. Campanile An Approach for Securing Critical Applications in Untrusted Clouds (2018) 10.1109/PDP2018.2018.00076
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione How to protect public administration from cybersecurity threats: The COMPACT project (2018) 10.1109/WAINA.2018.00147
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level (2018) 10.1109/EDCC.2018.00015
- G. Papale, L. Sgaglione SDD Sentinel: A Support Tool for Detecting and Investigating Electronic Transaction Frauds (2018) 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.53
- L. Coppolino, S. D'Antonio, G. Mazzeo, G. Papale, L. Sgaglione, F. Campanile An Approach for Securing Critical Applications in Untrusted Clouds (2018) 10.1109/PDP2018.2018.00076
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano, L. Sgaglione How to protect public administration from cybersecurity threats: The COMPACT project (2018) 10.1109/WAINA.2018.00147
- M. Staffa, G. Mazzeo, L. Sgaglione Hardening ROS via Hardware-assisted Trusted Execution Environment (2018) 10.1109/ROMAN.2018.8525696
2017
Articles
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano Cloud security: Emerging threats and current solutions (2017) 10.1016/j.compeleceng.2016.03.004
- L. Coppolino, S. D'Antonio, L. Romano, F. Aisopos, K. Tserpes Real-time QoS monitoring from the end user perspective in large scale social networks (2017) 10.1504/IJCSE.2017.082875
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano Cloud security: Emerging threats and current solutions (2017) 10.1016/j.compeleceng.2016.03.004
- L. Coppolino, S. D'Antonio, L. Romano, F. Aisopos, K. Tserpes Real-time QoS monitoring from the end user perspective in large scale social networks (2017) 10.1504/IJCSE.2017.082875
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano Cloud security: Emerging threats and current solutions (2017) 10.1016/j.compeleceng.2016.03.004
- L. Coppolino, S. D'Antonio, L. Romano, F. Aisopos, K. Tserpes Real-time QoS monitoring from the end user perspective in large scale social networks (2017) 10.1504/IJCSE.2017.082875
- L. Coppolino, S. D'Antonio, G. Mazzeo, L. Romano Cloud security: Emerging threats and current solutions (2017) 10.1016/j.compeleceng.2016.03.004
- S. Brenner, T. Hundt, G. Mazzeo, R. Kapitza Secure cloud micro services using Intel SGX (2017) 10.1007/978-3-319-59665-5_13
- V. Casola, A. De Benedictis, R. Nardone Towards model-based security assessment of cloud applications (2017) 10.1007/978-3-319-57186-7_56
- R. Canonico, S. Marrone, R. Nardone, V. Vittorini A Framework to Evaluate 5G Networks for Smart and Fail-Safe Communications in ERTMS/ETCS (2017) 10.1007/978-3-319-68499-4_3
- M. Benerecetti, R. De Guglielmo, U. Gentile, S. Marrone, N. Mazzocca, R. Nardone, A. Peron, L. Velardi, V. Vittorini Dynamic state machines for modelling railway control systems (2017) 10.1016/j.scico.2016.09.002
Conferences
- L. Coppolino, S. Dantonio, L. Romano, L. Sgaglione, M. Staffa Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions (2017) 10.1109/COMPSAC.2017.45
- F. Campanile, L. Coppolino, S. Dantonio, L. Lev, G. Mazzeo, L. Romano, L. Sgaglione, F. Tessitore Cloudifying Critical Applications: A Use Case from the Power Grid Domain (2017) 10.1109/PDP.2017.50
- G. Cerullo, G. Guizzi, C. Massei, L. Sgaglione Efficient Supply Chain Management: Traceability and Transparency (2017) 10.1109/SITIS.2016.124
- R. Martino, S. Dantonio, L. Coppolino, L. Romano Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements (2017) 10.1109/COMPSAC.2017.209
- L. Coppolino, S. Dantonio, L. Romano, L. Sgaglione, M. Staffa Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions (2017) 10.1109/COMPSAC.2017.45
- F. Campanile, L. Coppolino, S. Dantonio, L. Lev, G. Mazzeo, L. Romano, L. Sgaglione, F. Tessitore Cloudifying Critical Applications: A Use Case from the Power Grid Domain (2017) 10.1109/PDP.2017.50
- R. Martino, S. Dantonio, L. Coppolino, L. Romano Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements (2017) 10.1109/COMPSAC.2017.209
- L. Coppolino, S. Dantonio, L. Romano, L. Sgaglione, M. Staffa Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions (2017) 10.1109/COMPSAC.2017.45
- C. Fetzer, G. Mazzeo, L. Romano, J. Oliver, M. Verburg Integrating reactive cloud applications in SERECA (2017) 10.1145/3098954.3105820
- F. Campanile, L. Coppolino, S. Dantonio, L. Lev, G. Mazzeo, L. Romano, L. Sgaglione, F. Tessitore Cloudifying Critical Applications: A Use Case from the Power Grid Domain (2017) 10.1109/PDP.2017.50
- R. Martino, S. Dantonio, L. Coppolino, L. Romano Security in Cross-Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements (2017) 10.1109/COMPSAC.2017.209
- L. Coppolino, S. Dantonio, L. Romano, L. Sgaglione, M. Staffa Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions (2017) 10.1109/COMPSAC.2017.45
- F. Campanile, L. Coppolino, S. Dantonio, L. Lev, G. Mazzeo, L. Romano, L. Sgaglione, F. Tessitore Cloudifying Critical Applications: A Use Case from the Power Grid Domain (2017) 10.1109/PDP.2017.50
- C. Fetzer, G. Mazzeo, L. Romano, J. Oliver, M. Verburg Integrating reactive cloud applications in SERECA (2017) 10.1145/3098954.3105820
- F. Campanile, L. Coppolino, S. Dantonio, L. Lev, G. Mazzeo, L. Romano, L. Sgaglione, F. Tessitore Cloudifying Critical Applications: A Use Case from the Power Grid Domain (2017) 10.1109/PDP.2017.50
- R. Nardone, R.J. Rodriguez, S. Marrone Formal security assessment of Modbus protocol (2017) 10.1109/ICITST.2016.7856685
Books
- G. Cerullo, G. Mazzeo, G. Papale, B. Ragucci, L. Sgaglione IoT and Sensor Networks Security (2017) 10.1016/B978-0-12-811373-8.00004-5
- G. Cerullo, G. Mazzeo, G. Papale, B. Ragucci, L. Sgaglione IoT and Sensor Networks Security (2017) 10.1016/B978-0-12-811373-8.00004-5
2016
Articles
- L. Coppolino, S. D'Antonio, V. Formicola, L. Romano A framework for mastering heterogeneity in multi-layer security information and event correlation (2016) 10.1016/j.sysarc.2015.11.010
- A. Rein, R. Rieke, M. Jäger, N. Kuntze, L. Coppolino Trust establishment in cooperating cyber-physical systems (2016) 10.1007/978-3-319-40385-4_3
- G. Cerullo, L. Coppolino, S. D’Antonio, V. Formicola, G. Papale, B. Ragucci Enabling convergence of physical and logical security through intelligent event correlation (2016) 10.1007/978-3-319-25017-5_40
- S. D’Antonio, G. Gugliara, C.F. Romano, L. Romano A workflow service mediator for automated information processing and scheduling delivery to an archive (2016) 10.1007/978-3-319-33313-7_9
- L. Coppolino, S. D'Antonio, V. Formicola, L. Romano A framework for mastering heterogeneity in multi-layer security information and event correlation (2016) 10.1016/j.sysarc.2015.11.010
- M. Ficco, S. D’Antonio 2ndworkshop on cyber security and resilience of large-scale systems (2016) 10.1007/978-3-319-25017-5_37
- S. D’Antonio, G. Gugliara, C.F. Romano, L. Romano A workflow service mediator for automated information processing and scheduling delivery to an archive (2016) 10.1007/978-3-319-33313-7_9
- L. Coppolino, S. D'Antonio, V. Formicola, L. Romano A framework for mastering heterogeneity in multi-layer security information and event correlation (2016) 10.1016/j.sysarc.2015.11.010
- G. Cerullo, L. Coppolino, S. D’Antonio, V. Formicola, G. Papale, B. Ragucci Enabling convergence of physical and logical security through intelligent event correlation (2016) 10.1007/978-3-319-25017-5_40
- U. Gentile, S. Marrone, N. Mazzocca, R. Nardone µGRIMOIRE: A tool for smart micro grids modelling and energy profiling (2016) 10.2174/1874110X01610010263
- U. Gentile, S. Marrone, N. Mazzocca, R. Nardone Cost-energy modelling and profiling of smart domestic grids (2016) 10.1504/IJGUC.2016.081012
- R. Nardone, U. Gentile, M. Benerecetti, A. Peron, V. Vittorini, S. Marrone, N. Mazzocca Modeling railway control systems in promela (2016) 10.1007/978-3-319-29510-7_7
Conferences
- F. Campanile, G. Cerullo, S. D'Antonio, G. Mazzeo, G. Papale, L. Sgaglione A multi-sensor data fusion approach for detecting direct debit frauds (2016) 10.1109/INCoS.2016.90
- G. Papale, L. Sgaglione, G. Cerullo, G. Mazzeo, P. Starace, F. Campanile Direct debit frauds: A novel detection approach (2016) 10.5220/0005933103800387
- L. Sgaglione, G. Papale, G. Mazzeo, G. Cerullo, P. Starace, F. Campanile Data collection framework: A flexible and efficient tool for heterogeneous data acquisition (2016) 10.5220/0005931103740379
- F. Campanile, G. Cerullo, S. D'Antonio, G. Mazzeo, G. Papale, L. Sgaglione A multi-sensor data fusion approach for detecting direct debit frauds (2016) 10.1109/INCoS.2016.90
- F. Campanile, G. Cerullo, S. D'Antonio, G. Mazzeo, G. Papale, L. Sgaglione A multi-sensor data fusion approach for detecting direct debit frauds (2016) 10.1109/INCoS.2016.90
- G. Papale, L. Sgaglione, G. Cerullo, G. Mazzeo, P. Starace, F. Campanile Direct debit frauds: A novel detection approach (2016) 10.5220/0005933103800387
- L. Sgaglione, G. Papale, G. Mazzeo, G. Cerullo, P. Starace, F. Campanile Data collection framework: A flexible and efficient tool for heterogeneous data acquisition (2016) 10.5220/0005931103740379
2015
Articles
- L. Coppolino, S. D’Antonio, L. Romano, F. Campanile, A.V. de Carvalho Effective visualization of a big data banking application (2015) 10.1007/978-3-319-19830-9_6
- R. Nardone, U. Gentile, A. Peron, M. Benerecetti, V. Vittorini, S. Marrone, R. De Guglielmo, N. Mazzocca, L. Velardi Dynamic state machines for formalizing railway control system specifications (2015) 10.1007/978-3-319-17581-2_7
- F. Amato, G. Cozzolino, A. D’Alessio, S. Marrone, N. Mazzocca, G. Mele, R. Nardone Towards model-driven assessment of clinical processes (2015) 10.1007/978-3-319-19830-9_11
- V. Vittorini, S. Marrone, N. Mazzocca, R. Nardone, A. Drago A model-driven process for physical protection system design and vulnerability evaluation (2015) 10.1007/978-3-319-04426-2_8
- S. Marrone, R.J. Rodriguez, R. Nardone, F. Flammini, V. Vittorini On synergies of cyber and physical security modelling in vulnerability assessment of railway systems (2015) 10.1016/j.compeleceng.2015.07.011
- L. Coppolino, S. D’Antonio, V. Formicola, C. Massei, L. Romano Use of the Dempster-Shafer theory for fraud detection: The mobile money transfer case study (2015) 10.1007/978-3-319-10422-5_48
- L. Coppolino, S. D’Antonio, L. Romano, F. Campanile, A.V. de Carvalho Effective visualization of a big data banking application (2015) 10.1007/978-3-319-19830-9_6
- G. Cicotti, L. Coppolino, S. D’Antonio, L. Romano Runtime model checking for sla compliance monitoring and qos prediction (2015)
- L. Coppolino, S. D’Antonio, C. Massei, L. Romano Efficient supply chain management via federation-based integration of legacy ERP systems (2015) 10.1007/978-3-319-22689-7_29
- L. Coppolino, S. D'Antonio, V. Formicola, L. Romano Applying extensions of evidence theory to detect frauds in financial infrastructures (2015) 10.1155/2015/980629
- G. Cicotti, L. Coppolino, S. D'Antonio, L. Romano How to monitor QoS in cloud infrastructures: The QoSMONaaS approach (2015) 10.1504/IJCSE.2015.071359
- L. Coppolino, S. D’Antonio, V. Formicola, C. Massei, L. Romano Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services (2015) 10.1007/s12652-015-0276-9
- L. Coppolino, S. D’Antonio, V. Formicola, C. Massei, L. Romano Use of the Dempster-Shafer theory for fraud detection: The mobile money transfer case study (2015) 10.1007/978-3-319-10422-5_48
- L. Coppolino, S. D’Antonio, V. Formicola, C. Massei, L. Romano Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services (2015) 10.1007/s12652-015-0276-9
- G. Cicotti, L. Coppolino, S. D’Antonio, L. Romano Runtime model checking for sla compliance monitoring and qos prediction (2015)
- L. Coppolino, S. D’Antonio, C. Massei, L. Romano Efficient supply chain management via federation-based integration of legacy ERP systems (2015) 10.1007/978-3-319-22689-7_29
- L. Coppolino, S. D'Antonio, V. Formicola, L. Romano Applying extensions of evidence theory to detect frauds in financial infrastructures (2015) 10.1155/2015/980629
- G. Cicotti, L. Coppolino, S. D'Antonio, L. Romano How to monitor QoS in cloud infrastructures: The QoSMONaaS approach (2015) 10.1504/IJCSE.2015.071359
- L. Coppolino, S. D’Antonio, V. Formicola, C. Massei, L. Romano Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services (2015) 10.1007/s12652-015-0276-9
- L. Coppolino, S. D’Antonio, V. Formicola, C. Massei, L. Romano Use of the Dempster-Shafer theory for fraud detection: The mobile money transfer case study (2015) 10.1007/978-3-319-10422-5_48
- L. Coppolino, S. D’Antonio, L. Romano, F. Campanile, A.V. de Carvalho Effective visualization of a big data banking application (2015) 10.1007/978-3-319-19830-9_6
- G. Cicotti, L. Coppolino, S. D’Antonio, L. Romano Runtime model checking for sla compliance monitoring and qos prediction (2015)
- L. Coppolino, S. D’Antonio, C. Massei, L. Romano Efficient supply chain management via federation-based integration of legacy ERP systems (2015) 10.1007/978-3-319-22689-7_29
- L. Coppolino, S. D'Antonio, V. Formicola, L. Romano Applying extensions of evidence theory to detect frauds in financial infrastructures (2015) 10.1155/2015/980629
- G. Cicotti, L. Coppolino, S. D'Antonio, L. Romano How to monitor QoS in cloud infrastructures: The QoSMONaaS approach (2015) 10.1504/IJCSE.2015.071359
Conferences
- F. Baselice, L. Coppolino, S. D'Antonio, G. Ferraioli, L. Sgaglione A DBSCAN based approach for jointly segment and classify brain MR images (2015) 10.1109/EMBC.2015.7319021
- L. Coppolino, S. D'Antonio, L. Romano, G. Papale, L. Sgaglione, F. Campanile Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns (2015) 10.1109/3PGCIC.2015.24
- F. Baselice, L. Coppolino, S. D'Antonio, G. Ferraioli, L. Sgaglione A DBSCAN based approach for jointly segment and classify brain MR images (2015) 10.1109/EMBC.2015.7319021
- L. Coppolino, V. Dalessandro, S. Dantonio, L. Levy, L. Romano My smart home is under attack (2015) 10.1109/CSE.2015.28
- L. Coppolino, S. D'Antonio, L. Romano, G. Papale, L. Sgaglione, F. Campanile Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns (2015) 10.1109/3PGCIC.2015.24
- D.L. Quoc, V. D'Alessandro, B. Park, L. Romano, C. Fetzer Scalable Network Traffic Classification Using Distributed Support Vector Machines (2015) 10.1109/CLOUD.2015.138
- L. Coppolino, V. Dalessandro, S. Dantonio, L. Levy, L. Romano My smart home is under attack (2015) 10.1109/CSE.2015.28
- L. Coppolino, S. D'Antonio, L. Romano, G. Papale, L. Sgaglione, F. Campanile Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns (2015) 10.1109/3PGCIC.2015.24
- F. Baselice, L. Coppolino, S. D'Antonio, G. Ferraioli, L. Sgaglione A DBSCAN based approach for jointly segment and classify brain MR images (2015) 10.1109/EMBC.2015.7319021
- L. Coppolino, V. Dalessandro, S. Dantonio, L. Levy, L. Romano My smart home is under attack (2015) 10.1109/CSE.2015.28
- L. Coppolino, S. D'Antonio, L. Romano, G. Papale, L. Sgaglione, F. Campanile Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns (2015) 10.1109/3PGCIC.2015.24
- F. Flammini, S. Marrone, N. Mazzocca, R. Nardone, V. Vittorini Using Bayesian Networks to evaluate the trustworthiness of '2 out of 3' decision fusion mechanisms in multi-sensor applications (2015) 10.1016/j.ifacol.2015.09.606
- S. Marrone, R. Nardone Automatic resource allocation for high availability cloud services (2015) 10.1016/j.procs.2015.05.176
- U. Gentile, S. Marrone, F. De Paola, R. Nardone, N. Mazzocca, M. Giugni Model-Based Water Quality Assurance in Ground and Surface Provisioning Systems (2015) 10.1109/3PGCIC.2015.97
Books
- M. Choraś, R. Kozik, S. D'Antonio, G. Iannello, A. Jedlitschka, K. Miesenberger, L. Vollero, A. Wołoszczuk Innovative solutions for inclusion of totally blind people (2015) 10.1201/b18520
2014
Articles
- L. Coppolino, S. D'Antonio, L. Romano Exposing vulnerabilities in electric power grids: An experimental approach (2014) 10.1016/j.ijcip.2014.01.003
- L. Coppolino, S. D'Antonio, L. Romano, F. Aisopos, K. Tserpes Effective QoS monitoring in large scale social networks (2014) 10.1007/978-3-319-01571-2_30
- F. Buccafurri, L. Coppolino, S. D'Antonio, A. Garofalo, G. Lax, A. Nocera, L. Romano Trust-based intrusion tolerant routing in wireless sensor networks (2014) 10.1007/978-3-319-10506-2_15
- L. Coppolino, S. D'Antonio, L. Romano Exposing vulnerabilities in electric power grids: An experimental approach (2014) 10.1016/j.ijcip.2014.01.003
- L. Coppolino, S. D'Antonio, L. Romano, F. Aisopos, K. Tserpes Effective QoS monitoring in large scale social networks (2014) 10.1007/978-3-319-01571-2_30
- F. Buccafurri, L. Coppolino, S. D'Antonio, A. Garofalo, G. Lax, A. Nocera, L. Romano Trust-based intrusion tolerant routing in wireless sensor networks (2014) 10.1007/978-3-319-10506-2_15
- L. Coppolino, S. D'Antonio, L. Romano Exposing vulnerabilities in electric power grids: An experimental approach (2014) 10.1016/j.ijcip.2014.01.003
- V. Formicola, A. Di Pietro, A. Alsubaie, J. Marti, S. D’Antonio Assessing the impact of cyber attackson wireless sensornodes that monitor interdependent physical systems (2014)
- L. Coppolino, S. D'Antonio, L. Romano, F. Aisopos, K. Tserpes Effective QoS monitoring in large scale social networks (2014) 10.1007/978-3-319-01571-2_30
- F. Buccafurri, L. Coppolino, S. D'Antonio, A. Garofalo, G. Lax, A. Nocera, L. Romano Trust-based intrusion tolerant routing in wireless sensor networks (2014) 10.1007/978-3-319-10506-2_15
- S. Marrone, F. Flammini, N. Mazzocca, R. Nardone, V. Vittorini Towards Model-Driven V&V assessment of railway control systems (2014) 10.1007/s10009-014-0320-7
- F. Flammini, U. Gentile, S. Marrone, R. Nardone, V. Vittorini A Petri Net pattern-oriented approach for the design of physical protection systems (2014) 10.1007/978-3-319-10506-2_16
- U. Gentile, S. Marrone, G. Mele, R. Nardone, A. Peron Test specification patterns for automatic generation of test sequences (2014) 10.1007/978-3-319-10702-8_12
- G. Barberio, B. Di Martino, N. Mazzocca, L. Velardi, A. Amato, R. De Guglielmo, U. Gentile, S. Marrone, R. Nardone, A. Peron, V. Vittorini An interoperable testing environment for ERTMS/ETCS control systems (2014) 10.1007/978-3-319-10557-4_18
Conferences
- L. Coppolino, S. D'Antonio, V. Formicola, L. Romano Real-time Security & Dependability monitoring: Make it a bundle (2014) 10.1109/CCST.2014.6987018
- L. Coppolino, S. D'Antonio, V. Formicola, L. Romano Real-time Security & Dependability monitoring: Make it a bundle (2014) 10.1109/CCST.2014.6987018
- L. Coppolino, S. D'Antonio, V. Formicola, L. Romano Real-time Security & Dependability monitoring: Make it a bundle (2014) 10.1109/CCST.2014.6987018
- U. Gentile, N. Mazzocca, R. Nardone, S. Marrone A cost-energy trade-off model in smart energy grids (2014) 10.1109/3PGCIC.2014.83
- D. Amalfitano, N. Amatucci, A.R. Fasolino, U. Gentile, G. Mele, R. Nardone, V. Vittorini, S. Marrone Improving code coverage in android apps testing by exploiting patterns and automatic test case generation (2014) 10.1145/2647648.2656426
2013
Articles
- L. Coppolino, S. D'Antonio, V. Formicola, L. Romano Enhancing SIEM technology to protect critical infrastructures (2013) 10.1007/978-3-642-41485-5_2
- A. Garofalo, C. Di Sarno, L. Coppolino, S. D'Antonio A GPS spoofing resilient WAMS for smart grid (2013) 10.1007/978-3-642-38789-0_12
- L. Coppolino, S. D'Antonio, V. Formicola, L. Romano Enhancing SIEM technology to protect critical infrastructures (2013) 10.1007/978-3-642-41485-5_2
- L. Coppolino, S. D'Antonio, V. Formicola, L. Romano Enhancing SIEM technology to protect critical infrastructures (2013) 10.1007/978-3-642-41485-5_2
- A. Garofalo, C. Di Sarno, L. Coppolino, S. D'Antonio A GPS spoofing resilient WAMS for smart grid (2013) 10.1007/978-3-642-38789-0_12
- G. Cicotti, S. D'Antonio, R. Cristaldi, A. Sergio How to monitor qos in cloud infrastructures: The QoSMONaaS approach (2013) 10.1007/978-3-642-32524-3_32
- M. D'Arienzo, M. Iacono, S. Marrone, R. Nardone Petri net based evaluation of energy consumption in wireless sensor nodes (2013) 10.3233/JHS-130482
- S. Marrone, R. Nardone, A. Tedesco, P. D'Amore, V. Vittorini, R. Setola, F. De Cillis, N. Mazzocca Vulnerability modeling and analysis for critical infrastructure protection applications (2013) 10.1016/j.ijcip.2013.10.001
- S. Bernardi, F. Flammini, S. Marrone, N. Mazzocca, J. Merseguer, R. Nardone, V. Vittorini Enabling the usage of UML in the verification of railway systems: The DAM-rail approach (2013) 10.1016/j.ress.2013.06.032
Conferences
- A. Cilardo, N. Mazzocca, L. Coppolino TrustedSIM: Towards unified mobile security (2013) 10.1109/UIC-ATC.2013.74
- L. Coppolino, S. D'Antonio, A. Garofalo, L. Romano Applying data mining techniques to Intrusion Detection in Wireless Sensor Networks (2013) 10.1109/3PGCIC.2013.43
- L. Coppolino, S. D'Antonio, A. Garofalo, L. Romano Applying data mining techniques to Intrusion Detection in Wireless Sensor Networks (2013) 10.1109/3PGCIC.2013.43
- L. Coppolino, S. D'Antonio, A. Garofalo, L. Romano Applying data mining techniques to Intrusion Detection in Wireless Sensor Networks (2013) 10.1109/3PGCIC.2013.43
- E. Battista, V. Casola, S. Marrone, N. Mazzocca, R. Nardone, V. Vittorini An integrated lifetime and network quality model of large WSNs (2013) 10.1109/IWMN.2013.6663791
- M. Darienzo, M. Iacono, S. Marrone, R. Nardone Estimation of the energy consumption of mobile sensors in wsn environmental monitoring applications (2013) 10.1109/WAINA.2013.33
- E. Battista, V. Casola, N. Mazzocca, R. Nardone, S. Marrone A compositional modelling approach for large Sensor Networks design (2013) 10.1109/3PGCIC.2013.71
Books
- S. D’Antonio, L. Coppolino, M. Choraś, R. Kozik Distributed framework for cybersecurity of critical infrastructures (2013) 10.1201/b14839
- S. D’Antonio, L. Coppolino, M. Choraś, R. Kozik Distributed framework for cybersecurity of critical infrastructures (2013) 10.1201/b14839
- R. Nardone, S. Marrone A model-driven methodology to evaluate performability of metro systems (2013) 10.4018/978-1-4666-4659-9.ch012
- S. Marrone, N. Mazzocca, R. Nardone, V. Vittorini Combining heterogeneity, compositionality, and automatic generation in formal modelling (2013) 10.4018/978-1-4666-4659-9.ch002
2012
Articles
- L. Romano, S. D'Antonio, V. Formicola, L. Coppolino Protecting the WSN zones of a critical infrastructure via enhanced SIEM technology (2012) 10.1007/978-3-642-33675-1_20
- L. Coppolino, L. Romano, A. Bondavalli, A. Daidone A hidden Markov model based intrusion detection system for wireless sensor networks (2012) 10.1504/IJCCBS.2012.050305
- G. Cicotti, L. Coppolino, R. Cristaldi, S. D'Antonio, L. Romano QoS monitoring in a cloud services environment: The SRT-15 approach (2012) 10.1007/978-3-642-29737-3_3
- R. Rieke, L. Coppolino, A. Hutchison, E. Prieto, C. Gaber Security and reliability requirements for advanced security event management (2012) 10.1007/978-3-642-33704-8_15
- E. Prieto, R. Diaz, L. Romano, R. Rieke, M. Achemlal MASSIF: A promising solution to enhance olympic games it security (2012) 10.1007/978-3-642-33448-1_20
- C. Gibson, M. Melideo, L. Romano, S. D'Antonio International cooperation experiences: Results achieved, lessons learned, and way ahead (2012) 10.1007/978-3-642-33675-1_23
- L. Romano, S. D'Antonio, V. Formicola, L. Coppolino Protecting the WSN zones of a critical infrastructure via enhanced SIEM technology (2012) 10.1007/978-3-642-33675-1_20
- L. Coppolino, L. Romano, A. Bondavalli, A. Daidone A hidden Markov model based intrusion detection system for wireless sensor networks (2012) 10.1504/IJCCBS.2012.050305
- G. Cicotti, L. Coppolino, R. Cristaldi, S. D'Antonio, L. Romano QoS monitoring in a cloud services environment: The SRT-15 approach (2012) 10.1007/978-3-642-29737-3_3
- C. Gibson, M. Melideo, L. Romano, S. D'Antonio International cooperation experiences: Results achieved, lessons learned, and way ahead (2012) 10.1007/978-3-642-33675-1_23
- L. Romano, S. D'Antonio, V. Formicola, L. Coppolino Protecting the WSN zones of a critical infrastructure via enhanced SIEM technology (2012) 10.1007/978-3-642-33675-1_20
- A. Amantini, M. Choraś, S. D'Antonio, E. Egozcue, D. Germanus, R. Hutter The human role in tools for improving robustness and resilience of critical infrastructures (2012) 10.1007/s10111-010-0171-2
- G. Cicotti, L. Coppolino, R. Cristaldi, S. D'Antonio, L. Romano QoS monitoring in a cloud services environment: The SRT-15 approach (2012) 10.1007/978-3-642-29737-3_3
- S. Marrone, N. Mazzocca, R. Nardone, R. Presta, S.P. Romano, V. Vittorini A SAN-based modeling approach to performance evaluation of an IMS-compliant conferencing framework (2012) 10.1007/978-3-642-35179-2_13
- F. Flammini, S. Marrone, N. Mazzocca, R. Nardone, V. Vittorini Model-driven V&V processes for computer based control systems: A unifying perspective (2012) 10.1007/978-3-642-34032-1_20
- S. Marrone, R. Nardone, A. Orazzo, I. Petrone, L. Velardi Improving verification process in driverless metro systems: The MBAT project (2012) 10.1007/978-3-642-34032-1_23
Conferences
- G.G. Granadillo, G. Jacob, H. Debar, L. Coppolino Combination approach to select optimal countermeasures based on the RORI index (2012) 10.1109/INTECH.2012.6457801
- O. Adinolfi, R. Cristaldi, L. Coppolino, L. Romano QoS-MONaaS: A portable architecture for QoS monitoring in the cloud (2012) 10.1109/SITIS.2012.82
- M. Afzaal, C. Di Sarno, L. Coppolino, S. D'Antonio, L. Romano A resilient architecture for forensic storage of events in critical infrastructures (2012) 10.1109/HASE.2012.9
- O. Adinolfi, R. Cristaldi, L. Coppolino, L. Romano QoS-MONaaS: A portable architecture for QoS monitoring in the cloud (2012) 10.1109/SITIS.2012.82
- M. Afzaal, C. Di Sarno, S. D'Antonio, L. Romano An intrusion and fault tolerant forensic storage for a SIEM system (2012) 10.1109/SITIS.2012.89
- M. Afzaal, C. Di Sarno, L. Coppolino, S. D'Antonio, L. Romano A resilient architecture for forensic storage of events in critical infrastructures (2012) 10.1109/HASE.2012.9
- M. Afzaal, C. Di Sarno, S. D'Antonio, L. Romano An intrusion and fault tolerant forensic storage for a SIEM system (2012) 10.1109/SITIS.2012.89
- M. Afzaal, C. Di Sarno, L. Coppolino, S. D'Antonio, L. Romano A resilient architecture for forensic storage of events in critical infrastructures (2012) 10.1109/HASE.2012.9
2011
Articles
- L. Coppolino, S. D'Antonio, V. Formicola, L. Romano Integration of a system for critical infrastructure protection with the OSSIM SIEM platform: A dam case study (2011) 10.1007/978-3-642-24270-0_15
- L. Coppolino, S. D'Antonio, I.A. Elia, L. Romano Security analysis of smart grid data collection technologies (2011) 10.1007/978-3-642-24270-0_11
- L. Coppolino, S. D'Antonio, V. Formicola, L. Romano Integration of a system for critical infrastructure protection with the OSSIM SIEM platform: A dam case study (2011) 10.1007/978-3-642-24270-0_15
- L. Coppolino, S. D'Antonio, I.A. Elia, L. Romano Security analysis of smart grid data collection technologies (2011) 10.1007/978-3-642-24270-0_11
- L. Coppolino, S. D'Antonio, V. Formicola, L. Romano Integration of a system for critical infrastructure protection with the OSSIM SIEM platform: A dam case study (2011) 10.1007/978-3-642-24270-0_15
- L. Coppolino, S. D'Antonio, I.A. Elia, L. Romano Security analysis of smart grid data collection technologies (2011) 10.1007/978-3-642-24270-0_11
- M. Choraś, S. D'Antonio, G. Iannello, A. Jedlitschka, R. Kozik, K. Miesenberger, A. Wołoszczuk Innovative man machine interfaces and solutions to support totally blind people (2011) 10.1007/978-3-642-23154-4_48
- A. Mazzeo, N. Mazzocca, R. Nardone, L. D'Acierno, B. Montella, V. Punzo, E. Quaglietta, I. Lamberti, P. Marmo An integrated approach for availability and QoS evaluation in railway systems (2011) 10.1007/978-3-642-24270-0_13
Conferences
- L. Coppolino, S. D'Antonio, V. Formicola, F. Oliviero, L. Romano On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project (2011) 10.1109/CRiSIS.2011.6061830
- S. D'Antonio, L. Coppolino, I.A. Elia, V. Formicola Security issues of a phasor data concentrator for smart grid infrastructure (2011) 10.1145/1978582.1978584
- M. Ficco, A. Daidone, L. Coppolino, L. Romano, A. Bondavalli An event correlation approach for fault diagnosis in SCADA infrastructures (2011) 10.1145/1978582.1978586
- M. Ficco, L. Romano A generic intrusion detection and diagnoser system based on complex event processing (2011) 10.1109/CCP.2011.43
- L. Romano, D. De Mari, Z. Jerzak, C. Fetzer A novel approach to QoS monitoring in the cloud (2011) 10.1109/CCP.2011.49
- L. Coppolino, S. D'Antonio, V. Formicola, F. Oliviero, L. Romano On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project (2011) 10.1109/CRiSIS.2011.6061830
- M. Ficco, A. Daidone, L. Coppolino, L. Romano, A. Bondavalli An event correlation approach for fault diagnosis in SCADA infrastructures (2011) 10.1145/1978582.1978586
- L. Coppolino, S. D'Antonio, V. Formicola, F. Oliviero, L. Romano On the security of the terminal operations for container shipping in multimodal transport: The SIS-TEMA project (2011) 10.1109/CRiSIS.2011.6061830
- S. D'Antonio, L. Coppolino, I.A. Elia, V. Formicola Security issues of a phasor data concentrator for smart grid infrastructure (2011) 10.1145/1978582.1978584
- E. Quaglietta, L. D'Acierno, V. Punzo, R. Nardone, N. Mazzocca A simulation framework for supporting design and real-time decisional phases in railway systems (2011) 10.1109/ITSC.2011.6082913
2010
Articles
- L. Coppolino, L. Romano Open Issues in IDS Design for Wireless Biomedical Sensor Networks (2010) 10.1007/978-3-642-14619-0_22
- L. Coppolino, L. Romano Open Issues in IDS Design for Wireless Biomedical Sensor Networks (2010) 10.1007/978-3-642-14619-0_22
- M. Ficco, L. Romano A correlation approach to intrusion detection (2010) 10.1007/978-3-642-16644-0_19
- S. Avallone, S. D'Antonio Using MPLS in a wireless mesh network to improve the resiliency of SCADA systems (2010) 10.1007/978-3-642-16644-0_38
Conferences
- L. Coppolino, S. D'Antonio, L. Romano, G. Spagnuolo An intrusion detection system for critical information infrastructures using wireless sensor network technologies (2010) 10.1109/CRIS.2010.5617547
- L. Coppolino, D. De Mari, L. Romano, V. Vianello SLA compliance monitoring through semantic processing (2010) 10.1109/GRID.2010.5697975
- L. Coppolino, S. D'Antonio, L. Romano, G. Spagnuolo An intrusion detection system for critical information infrastructures using wireless sensor network technologies (2010) 10.1109/CRIS.2010.5617547
- L. Coppolino, D. De Mari, L. Romano, V. Vianello SLA compliance monitoring through semantic processing (2010) 10.1109/GRID.2010.5697975
- S. Avallone, S. D'Antonio, F. Oliviero, S.P. Romano Use of traffic engineering techniques to increase resilience of SCADA networks (2010) 10.1109/CRIS.2010.5617562
- L. Coppolino, S. D'Antonio, L. Romano, G. Spagnuolo An intrusion detection system for critical information infrastructures using wireless sensor network technologies (2010) 10.1109/CRIS.2010.5617547
- S. D'Antonio, V. Formicola, C. Mazzariello, F. Oliviero, S.P. Romano Performance assessment of a distributed intrusion detection system in a real network scenario (2010) 10.1109/CRISIS.2010.5764922
- M. Choraś, S. D'Antonio, R. Kozik, W. Holubowicz Intersection approach to vulnerability handling (2010)
2009
Articles
- L. Coppolino, S. D'Antonio, I.A. Elia, L. Romano From intrusion detection to intrusion detection and diagnosis: An ontology-based approach (2009) 10.1007/978-3-642-10265-3_18
- L. Romano, L. Coppolino, I.A. Elia, G. Spagnuolo A healthcare real-time monitoring system for multiple sensors data collection and correlation (2009) 10.1007/978-3-642-02937-0_42
- L. Coppolino, S. D'Antonio, I.A. Elia, L. Romano From intrusion detection to intrusion detection and diagnosis: An ontology-based approach (2009) 10.1007/978-3-642-10265-3_18
- S. D'Antonio, L. Romano, A. Khelil, N. Suri INcreasing security and protection through infrastructure REsilience: The INSPIRE project (2009) 10.1007/978-3-642-03552-4_10
- L. Romano, L. Coppolino, I.A. Elia, G. Spagnuolo A healthcare real-time monitoring system for multiple sensors data collection and correlation (2009) 10.1007/978-3-642-02937-0_42
- S. D'Antonio, L. Romano, A. Khelil, N. Suri Increasing security and protection of SCADA systems through infrastructure resilience (2009) 10.1504/IJSSE.2009.031348
- L. Coppolino, S. D'Antonio, I.A. Elia, L. Romano From intrusion detection to intrusion detection and diagnosis: An ontology-based approach (2009) 10.1007/978-3-642-10265-3_18
- S. D'Antonio, L. Romano, A. Khelil, N. Suri INcreasing security and protection through infrastructure REsilience: The INSPIRE project (2009) 10.1007/978-3-642-03552-4_10
- S. D'Antonio, L. Romano, A. Khelil, N. Suri Increasing security and protection of SCADA systems through infrastructure resilience (2009) 10.1504/IJSSE.2009.031348
Conferences
- L. Coppolino, S. D'Antonio, M. Esposito, L. Romano Exploiting diversity and correlation to improve the performance of intrusion detection systems (2009)
- M. Ficco, L. Coppolino, L. Romano A weight-based symptom correlation approach to SQL injection attacks (2009) 10.1109/LADC.2009.14
- L. Coppolino, S. D'Antonio, M. Esposito, L. Romano Exploiting diversity and correlation to improve the performance of intrusion detection systems (2009)
- M. Ficco, L. Coppolino, L. Romano A weight-based symptom correlation approach to SQL injection attacks (2009) 10.1109/LADC.2009.14
- L. Coppolino, S. D'Antonio, M. Esposito, L. Romano Exploiting diversity and correlation to improve the performance of intrusion detection systems (2009)
Books
- S. Pierno, M. Magaldi, G.L. Supino, L. Bevilacqua, V.S. di Carlo, R. Russo, L. Romano Providing mobile multimodal social services using a grid architecture (2009) 10.4018/978-1-60566-386-9.ch017
2008
Articles
- F. Campanile, L. Coppolino, S. Giordano, L. Romano A business process monitor for a mobile phone recharging system (2008) 10.1016/j.sysarc.2008.02.005
- S. Pierno, L. Romano, L. Capuano, M. Magaldi, L. Bevilacqua Software innovation for e-government expansion (2008) 10.1007/978-3-540-88871-0_58
- F. Campanile, L. Coppolino, S. Giordano, L. Romano A business process monitor for a mobile phone recharging system (2008) 10.1016/j.sysarc.2008.02.005
- M. Magaldi, R. Russo, L. Bevilacqua, S. Pierno, V. Scotto di Carlo, F. Corvino, L. Romano, L. Capuano, I. De Furio A GRID approach to providing multimodal context-sensitive social service to mobile users (2008) 10.1007/978-3-540-88875-8_76
- S. D'Antonio, S.P. Romano, S. Simpson, P. Smith, D. Hutchison A semi-autonomic framework for intrusion tolerance in heterogeneous networks (2008) 10.1007/978-3-540-92157-8_20
Conferences
- A. Cilardo, N. Mazzocca, L. Coppolino Virtual scan chains far online testing of FPGA-based embedded systems (2008) 10.1109/DSD.2008.102
2007
Articles
- A. Cilardo, D. Cotroneo, C. Di Flora, A. Mazzeo, L. Romano, S. Russo Design and implementation of a high performance architecture for providing digital time stamping services to mobile devices (2007)
Conferences
- L. Coppolino, L. Romano, N. Mazzocca, S. Salvi Web services workflow reliability estimation through reliability patterns (2007) 10.1109/SECCOM.2007.4550316
- A. Cilardo, L. Coppolino, A. Mazzeo, L. Romano Performance evaluation of security services: An experimental approach (2007) 10.1109/PDP.2007.64
- A. Cilardo, L. Coppolino, A. Mazzeo, L. Romano Combining programmable hardware and Web Services technologies for delivering high-performance and interoperable security (2007) 10.1109/PDP.2007.30
- F. Campanile, A. Cilardo, L. Coppolino, L. Romano Adaptable parsing of real-time data streams (2007) 10.1109/PDP.2007.16
- L. Coppolino, L. Romano, N. Mazzocca, S. Salvi Web services workflow reliability estimation through reliability patterns (2007) 10.1109/SECCOM.2007.4550316
- G. Cattaneo, L. Catuogno, F. Petagna, G.D. Matteo, L. Romano iToken: A wireless smart card reader which provides handhelds with desk top equivalent security (2007) 10.1109/SECCOM.2007.4550315
- A. Cilardo, L. Coppolino, A. Mazzeo, L. Romano Performance evaluation of security services: An experimental approach (2007) 10.1109/PDP.2007.64
- A. Cilardo, L. Coppolino, A. Mazzeo, L. Romano Combining programmable hardware and Web Services technologies for delivering high-performance and interoperable security (2007) 10.1109/PDP.2007.30
- F. Campanile, A. Cilardo, L. Coppolino, L. Romano Adaptable parsing of real-time data streams (2007) 10.1109/PDP.2007.16
- S. Avallone, S. D'Antonio, S.P. Romano A semantic approach to policy-based management : Linking policies to ontologies (2007)
2006
Articles
- A. Cilardo, L. Coppolino, N. Mazzocca, L. Romano Elliptic curve cryptography engineering (2006) 10.1109/JPROC.2005.862438
- A. Cilardo, L. Coppolino, N. Mazzocca, L. Romano Elliptic curve cryptography engineering (2006) 10.1109/JPROC.2005.862438
- M. Melgara, L. Romano, F. Rocca, A. Sanna, D. Marino, R. Serafin Innovative healthcare services for nomadic users (2006) 10.1007/11915034_124
- G. Frattini, L. Romano, V.S. di Carlo, P. Petriccione, G. Supino, G. Leone, C. Autiero Multimodal architectures: Issues and experiences (2006) 10.1007/11915034_122
- S. D'Antonio, F. Oliviero, R. Setola High-speed intrusion detection in support of critical infrastructure protection (2006) 10.1007/11962977_18
- M. Molina, A. Chiosi, S. D'Antonio, G. Ventre Design principles and algorithms for effective high-speed IP flow monitoring (2006) 10.1016/j.comcom.2005.07.024
- L. Angrisani, S. D'Antonio, M. Esposito, M. Vadursi Techniques for available bandwidth measurement in IP networks: A performance comparison (2006) 10.1016/j.comnet.2005.06.003
- S. D'Antonio, M. Esposito, F. Oliviero, S.P. Romano, D. Salvi Behavioral network engineering: Making intrusion detection become autonomic (2006) 10.1007/BF03219885
- S. Avallone, S. D'Antonio, M. Esposito, S.P. Romano, G. Ventre Resource allocation in multi-domain networks based on service level specifications (2006) 10.1109/jcn.2006.6182910
Conferences
- V. Casola, L. Coppolino, A. Mazzeo, N. Mazzocca, M. Rak Design and implementation of TruMan, a Trust Manager component for distributed systems (2006) 10.1109/SECPERU.2006.7
- S. D'Antonio, M. Esposito, S.P. Romano Pinball caching: Improving performance of a framework for dynamic web-content adaptation and delivery (2006) 10.1109/ISCC.2006.129
2005
Articles
- A. Cilardo, L. Coppolino, A. Mazzeo, L. Romano High-performance and interoperable security services for mobile environments (2005) 10.1007/11557654_118
- A. Cilardo, L. Coppolino, A. Mazzeo, L. Romano High-performance and interoperable security services for mobile environments (2005) 10.1007/11557654_118
- S. D'Antonio, M. Esposito, S.P. Romano, G. Ventre Time-aware admission control on top of time-unaware network infrastructures (2005) 10.1016/j.comcom.2004.08.017
Conferences
- A. Cilardo, A. Mazzeo, N. Mazzocca, L. Romano A novel unified architecture for public-key cryptography (2005) 10.1109/DATE.2005.28
- A. Cilardo, A. Mazzeo, L. Romano, G.P. Saggese An FPGA-based key-store for improving the dependability of security services (2005) 10.1109/WORDS.2005.16
- A. Botta, S. D'Antonio, A. Pescapé, G. Ventre BET: A hybrid bandwidth estimation tool (2005) 10.1109/ICPADS.2005.103
- E. Boschi, S. D'Antonio, P. Malone, C. Schmoll INTERMON: An architecture for inter-domain monitoring, modelling and simulation (2005) 10.1007/11422778_123
Books
- A. Cilardo, A. Mazzeo, L. Romano, G.P. Saggese Architecture and FPGA implementation of a digit-serial RSA processor (2005) 10.1007/1-4020-3128-9_17
2004
Articles
- G.P. Saggese, L. Romano, N. Mazzocca, A. Mazzeo A tamper resistant hardware accelerator for RSA cryptographic applications (2004) 10.1016/j.sysarc.2004.04.002
- A. Cilardo, A. Mazzeo, L. Romano, G.P. Saggese Exploring the design-space for FPGA-based implementation of RSA (2004) 10.1016/j.micpro.2004.03.009
- A. Bondavalli, S. Chiaradonna, D. Cotroneo, L. Romano Effective fault treatment for improving the dependability of COTS and legacy-based applications (2004) 10.1109/TDSC.2004.40
- S. D'Antonio, M. D'Arienzo, M. Esposito, S.P. Romano, G. Ventre Managing service level agreements in Premium IP networks: A business-oriented approach (2004) 10.1016/j.comnet.2004.06.024
Conferences
- A. Cilardo, A. Mazzeo, L. Romano, G.P. Saggese Carry-save Montgomery modular exponentiation on reconfigurable hardware (2004) 10.1109/DATE.2004.1269231
- G.P. Saggese, C. Basile, L. Romano, Z. Kalbarczyk, R.K. Iyer Hardware support for high performance, intrusion- And fault-tolerant systems (2004) 10.1109/RELDIS.2004.1353020
- A. Cilardo, A. Mazzeo, L. Romano, G.P. Saggese Carry-save montgomery modular exponentiation on reconfigurable hardware (2004) 10.1109/DATE.2004.1269231
- S. D'Antonio, M. Esposito, S.P. Romano, G. Ventre Assessing the scalability of component-based frameworks: The CADENUS case study (2004) 10.1145/1052305.1052311
- S. D'Antonio, M. D'Arienzo, A. Pescapé, G. Ventre An architecture for automatic configuration of integrated networks (2004)
- S. D'Antonio, M. D'Arienzo, A. Pescapé, S.P. Romano, G. Ventre Using metadata in SLA negotiation over premium IP networks (2004) 10.1109/icdcsw.2004.1284005
2003
Articles
- A. Coronato, G. De Pietro, A. Mazzeo, L. Romano Improving the QoS of MPEG2 streaming over wireless LANs (2003) 10.1016/j.simpat.2003.08.001
- D. Cotroneo, A. Mazzeo, L. Romano, S. Russo An architecture for security-oriented perfective maintenance of legacy software (2003) 10.1016/S0950-5849(03)00049-1
- A. Bondavalli, S. Chiaradonna, D. Cotroneo, L. Romano A fault-tolerant distributed legacy-based system and its evaluation (2003) 10.1007/978-3-540-45214-0_22
- A. Cilardo, A. Mazzeo, L. Romano, G.P. Saggese, G. Cattaneo Using Web Services technology for inter-enterprise integration of digital time stamping (2003) 10.1007/978-3-540-39962-9_93
- S. D'Antonio, M. D'Arienzo, M. Gargiulo, S.P. Romano, G. Ventre Service level Indication: A proposal for QoS monitoring in SLA -based multidomain networks (2003)
- G. Cortese, R. Fiutem, P. Cremonese, S. D'Antonio, M. Esposito, S.P. Romano, A. Diaconescu CADENUS: Creation and deployment of end-user services in premium IP networks (2003) 10.1109/MCOM.2003.1166654
- G. Karlsson, J. Roberts, I. Stavrakakis, A. Alves, S. Avallone, F. Boavida, S. D'Antonio, M. Esposito, V. Fodor, M. Gargiulo, J. Harju, Y. Koucheryavy, F. Li, I. Marsh, I.M. Ivars, D. Moltchanov, E. Monteiro, A. Panagakis, A. Pescapé, G. Quadros, S.P. Romano, G. Ventre Traffic management (2003) 10.1007/978-3-540-45190-7_2
Conferences
- A. Mazzeo, L. Romano, G.P. Saggese, N. Mazzocca FPGA-based implementation of a serial RSA processor (2003) 10.1109/DATE.2003.1253671
- D. Cotroneo, C. Di Flora, A. Mazzeo, L. Romano, S. Russo, G.P. Saggese Providing digital time stamping services to mobile devices (2003) 10.1109/WORDS.2003.1267495
- L. Angrisani, S. D'Antonio, M. Vadursi, G. Ventre Performance comparison of different techniques for available bandwidth measurement in packet switched network (2003) 10.1109/VECIMS.2003.1227057
2002
Articles
- D. Cotroneo, N. Mazzocca, L. Romano, S. Russo A fault tolerant tolerant access to legacy database systems using CORBA technology (2002)
- D. Cotroneo, N. Mazzocca, L. Romano, S. Russo Building a dependable system from a legacy application with CORBA (2002) 10.1016/S1383-7621(02)00093-0
- D. Cotroneo, A. Mazzeo, L. Romano, S. Russo Implementing a CORBA-based architecture for leveraging the security level of existing applications (2002) 10.1007/3-540-36124-3_49
Conferences
- L. Romano, A. Bondavalli, S. Chiaradonna, D. Cotroneo Implementation of threshold-based diagnostic mechanisms for COTS-based applications (2002)
- S. D'Antonio, B. Fadini, S.P. Romano, G. Ventre Designing service negotiation entities for the electronic market-place (2002) 10.1145/568760.568875
2001
Conferences
- G.B. Barone, N. Margarita, A. Mazzeo, N. Mazzocca, L. Romano Secure access to personalized web services (2001) 10.1109/PRDC.2001.992707
2000
Conferences
- L. Romano, N. Mazzocca, A. Coronato, G. De Pietro Dependability analysis of transmission techniques for MPEG-2 streams (2000) 10.1109/PRDC.2000.897294
- D. Cotroneo, L. Romano, S. Russo, N. Mazzocca CORBA-based architecture for adding dependability to legacy servers (2000)