Giovanni Mazzeo

Orcid: 0000-0002-0238-5616

According to our database1, Giovanni Mazzeo authored at least 36 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Comprehensive Trusted Runtime for WebAssembly with Intel SGX.
CoRR, 2023

Awesome Trusted Execution Environment.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

The Alliance of HE and TEE to Enhance their Performance and Security.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Enabling Trusted TEE-as-a-Service Models with Privacy Preserving Automatons.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023

2022
SGXTuner: Performance Enhancement of Intel SGX Applications Via Stochastic Optimization.
IEEE Trans. Dependable Secur. Comput., 2022

<i>PriSIEM</i>: Enabling privacy-preserving Managed Security Services.
J. Netw. Comput. Appl., 2022

A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants.
Comput. Ind., 2022

2021
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems.
IEEE Trans. Computers, 2021

Enhancing random forest classification with NLP in DAMEH: A system for DAta Management in eHealth Domain.
Neurocomputing, 2021

Facing the Blockchain Endpoint Vulnerability, an SGX-based Solution for Secure eHealth Auditing.
Proceedings of the Italian Conference on Cybersecurity, 2021

The protection of LP-WAN Endpoints via TEE: a Chemical Storage Case Study.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

Privacy-Preserving Credit Scoring via Functional Encryption.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021

2020
TROS: Protecting Humanoids ROS from Privileged Attackers.
Int. J. Soc. Robotics, 2020

2019
A comprehensive survey of hardware-assisted security: From the edge to the cloud.
Internet Things, 2019

Securing the weak link of federated systems via trusted execution: a case study from the eHealth domain.
Int. J. Crit. Comput. Based Syst., 2019

A comparative analysis of emerging approaches for securing java software with Intel SGX.
Future Gener. Comput. Syst., 2019

Privacy Preserving Intrusion Detection Via Homomorphic Encryption.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

Isolating Real-Time Safety-Critical Embedded Systems via SGX-Based Lightweight Virtualization.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019

2018
SIL2 assessment of an Active/Standby COTS-based Safety-Related system.
Reliab. Eng. Syst. Saf., 2018

An OpenNCP-based Solution for Secure eHealth Data Exchange.
J. Netw. Comput. Appl., 2018

Hardening ROS via Hardware-assisted Trusted Execution Environment.
Proceedings of the 27th IEEE International Symposium on Robot and Human Interactive Communication, 2018

An Approach for Securing Critical Applications in Untrusted Clouds.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018

An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems.
Proceedings of the Advances in Network-Based Information Systems, 2018

A GDPR-Compliant Approach to Real-Time Processing of Sensitive Data.
Proceedings of the Intelligent Interactive Multimedia Systems and Services, 2018

Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level.
Proceedings of the 14th European Dependable Computing Conference, 2018

How to Protect Public Administration from Cybersecurity Threats: The COMPACT Project.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

2017
Cloud security: Emerging threats and current solutions.
Comput. Electr. Eng., 2017

Cloudifying Critical Applications: A Use Case from the Power Grid Domain.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

Secure Cloud Micro Services Using Intel SGX.
Proceedings of the Distributed Applications and Interoperable Systems, 2017

Integrating Reactive Cloud Applications in SERECA.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
A Secure Cloud-Based SCADA Application: The Use Case of a Water Supply Network.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2016

A Multi-sensor Data Fusion Approach for Detecting Direct Debit Frauds.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Data Collection Framework - A Flexible and Efficient Tool for Heterogeneous Data Acquisition.
Proceedings of the CLOSER 2016, 2016

Direct Debit Frauds: A Novel Detection Approach.
Proceedings of the CLOSER 2016, 2016

2014
Effective Hamiltonian for the hybrid double quantum dot qubit.
Quantum Inf. Process., 2014

2005
Realization and performance analysis of deep-UV photodetectors based on wide bandgap semiconductors.
PhD thesis, 2005


  Loading...