Luigi Coppolino

According to our database1, Luigi Coppolino authored at least 67 papers between 2005 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
An abstract reasoning architecture for privacy policies monitoring.
Future Gener. Comput. Syst., 2020

2019
A comprehensive survey of hardware-assisted security: From the edge to the cloud.
Internet Things, 2019

Securing the weak link of federated systems via trusted execution: a case study from the eHealth domain.
Int. J. Crit. Comput. Based Syst., 2019

A comparative analysis of emerging approaches for securing java software with Intel SGX.
Future Gener. Comput. Syst., 2019

Privacy Preserving Intrusion Detection Via Homomorphic Encryption.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

Protecting Critical Business Processes of Smart Hospitals from Cyber Attacks.
Proceedings of the 15th International Conference on Signal-Image Technology & Internet-Based Systems, 2019


2018
SIL2 assessment of an Active/Standby COTS-based Safety-Related system.
Reliab. Eng. Syst. Saf., 2018

Comprehensive user requirements engineering methodology for secure and interoperable health data exchange.
BMC Medical Informatics Decis. Mak., 2018

An OpenNCP-based Solution for Secure eHealth Data Exchange.
J. Netw. Comput. Appl., 2018

An Approach for Securing Critical Applications in Untrusted Clouds.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018

An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems.
Proceedings of the Advances in Network-Based Information Systems, 2018

KONFIDO: An OpenNCP-Based Secure eHealth Data Exchange System.
Proceedings of the Security in Computer and Information Sciences, 2018

Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level.
Proceedings of the 14th European Dependable Computing Conference, 2018

How to Protect Public Administration from Cybersecurity Threats: The COMPACT Project.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

2017
Real-time QoS monitoring from the end user perspective in large scale social networks.
Int. J. Comput. Sci. Eng., 2017

Cloud security: Emerging threats and current solutions.
Comput. Electr. Eng., 2017

Cloudifying Critical Applications: A Use Case from the Power Grid Domain.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level Among eHealth Services Across Europe.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

Security in Cross - Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
A framework for mastering heterogeneity in multi-layer security information and event correlation.
J. Syst. Archit., 2016

2015
Runtime Model Checking for SLA Compliance Monitoring and QoS Prediction.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

Use of the Dempster-Shafer theory to detect account takeovers in mobile money transfer services.
J. Ambient Intell. Humaniz. Comput., 2015

Applying Extensions of Evidence Theory to Detect Frauds in Financial Infrastructures.
Int. J. Distributed Sens. Networks, 2015

How to monitor QoS in cloud infrastructures: the QoSMONaaS approach.
Int. J. Comput. Sci. Eng., 2015

Efficient Supply Chain Management via Federation-Based Integration of Legacy ERP Systems.
Proceedings of the Intelligent Software Methodologies, Tools and Techniques, 2015

Enabling Convergence of Physical and Logical Security Through Intelligent Event Correlation.
Proceedings of the Intelligent Distributed Computing IX - Proceedings of the 9th International Symposium on Intelligent Distributed Computing, 2015

Trust Establishment in Cooperating Cyber-Physical Systems.
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015

A DBSCAN based approach for jointly segment and classify brain MR images.
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015

My Smart Home is Under Attack.
Proceedings of the 18th IEEE International Conference on Computational Science and Engineering, 2015

Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns.
Proceedings of the 10th International Conference on P2P, 2015

2014
Exposing vulnerabilities in electric power grids: An experimental approach.
Int. J. Crit. Infrastructure Prot., 2014

Big Data Analytics for QoS Prediction Through Probabilistic Model Checking.
CoRR, 2014

Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks.
Proceedings of the Computer Safety, Reliability, and Security, 2014

Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study.
Proceedings of the Intelligent Distributed Computing VIII, 2014

Real-time Security & Dependability monitoring: Make it a bundle.
Proceedings of the International Carnahan Conference on Security Technology, 2014

2013
TrustedSIM: Towards Unified Mobile Security.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

Effective QoS Monitoring in Large Scale Social Networks.
Proceedings of the Intelligent Distributed Computing VII, 2013

A GPS Spoofing Resilient WAMS for Smart Grid.
Proceedings of the Dependable Computing - 14th European Workshop, 2013

Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks.
Proceedings of the Eighth International Conference on P2P, 2013

2012
A hidden Markov model based intrusion detection system for wireless sensor networks.
Int. J. Crit. Comput. Based Syst., 2012

QoS-MONaaS: A Portable Architecture for QoS Monitoring in the Cloud.
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012

Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology.
Proceedings of the Computer Safety, Reliability, and Security, 2012

Security and Reliability Requirements for Advanced Security Event Management.
Proceedings of the Computer Network Security, 2012

A Resilient Architecture for Forensic Storage of Events in Critical Infrastructures.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

Enhancing SIEM Technology to Protect Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2012

2011
Security Engineering of SOA Applications Via Reliability Patterns.
J. Softw. Eng. Appl., 2011

Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study.
Proceedings of the Computer Safety, Reliability, and Security, 2011

Security Analysis of Smart Grid Data Collection Technologies.
Proceedings of the Computer Safety, Reliability, and Security, 2011

An event correlation approach for fault diagnosis in SCADA infrastructures.
Proceedings of the 13th European Workshop on Dependable Computing, 2011

Security issues of a phasor data concentrator for smart grid infrastructure.
Proceedings of the 13th European Workshop on Dependable Computing, 2011

QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach.
Proceedings of the Euro-Par 2011: Parallel Processing Workshops - CCPI, CGWS, HeteroPar, HiBB, HPCVirt, HPPC, HPSS, MDGS, ProPer, Resilience, UCHPC, VHPC, Bordeaux, France, August 29, 2011

On the Security of the Terminal Operations for Container Shipping in Multimodal Transport: the SIS-TEMA Project.
Proceedings of the CRiSIS 2011, 2011

2010
SLA compliance monitoring through semantic processing.
Proceedings of the 2010 11th IEEE/ACM International Conference on Grid Computing, 2010

2009
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2009

A Weight-Based Symptom Correlation Approach to SQL Injection Attacks.
Proceedings of the Fourth Latin-American Symposium on Dependable Computing, 2009

A healthcare real-time monitoring system for multiple sensors data collection and correlation.
Proceedings of the New Directions in Intelligent Interactive Multimedia Systems and Services, 2009

2008
A business process monitor for a mobile phone recharging system.
J. Syst. Archit., 2008

Virtual Scan Chains for Online Testing of FPGA-based Embedded Systems.
Proceedings of the 11th Euromicro Conference on Digital System Design: Architectures, 2008

2007
Web Services workflow reliability estimation through reliability patterns.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Performance Evaluation of Security Services: An Experimental Approach.
Proceedings of the 15th Euromicro International Conference on Parallel, 2007

Combining Programmable Hardware and Web Services Technologies for Delivering High-Performance and Interoperable Security.
Proceedings of the 15th Euromicro International Conference on Parallel, 2007

Adaptable Parsing of Real-Time Data Streams.
Proceedings of the 15th Euromicro International Conference on Parallel, 2007

2006
Elliptic Curve Cryptography Engineering.
Proc. IEEE, 2006

Design and implementation of TruMan, a Trust Manager Component for Distributed Systems.
Proceedings of the Second International Workshop on Security, 2006

2005
High-Performance and Interoperable Security Services for Mobile Environments.
Proceedings of the High Performance Computing and Communications, 2005


  Loading...