Luigi Sgaglione

According to our database1, Luigi Sgaglione authored at least 27 papers between 2014 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Risk Assessment Driven Use of Advanced SIEM Technology for Cyber Protection of Critical e-Health Processes.
SN Comput. Sci., 2022

<i>PriSIEM</i>: Enabling privacy-preserving Managed Security Services.
J. Netw. Comput. Appl., 2022

2021
Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study.
Technol. Anal. Strateg. Manag., 2021

2020
An abstract reasoning architecture for privacy policies monitoring.
Future Gener. Comput. Syst., 2020

2019
Securing the weak link of federated systems via trusted execution: a case study from the eHealth domain.
Int. J. Crit. Comput. Based Syst., 2019

Privacy Preserving Intrusion Detection Via Homomorphic Encryption.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

Protecting Critical Business Processes of Smart Hospitals from Cyber Attacks.
Proceedings of the 15th International Conference on Signal-Image Technology & Internet-Based Systems, 2019

2018
An OpenNCP-based Solution for Secure eHealth Data Exchange.
J. Netw. Comput. Appl., 2018

Hardening ROS via Hardware-assisted Trusted Execution Environment.
Proceedings of the 27th IEEE International Symposium on Robot and Human Interactive Communication, 2018

An Approach for Securing Critical Applications in Untrusted Clouds.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018

An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems.
Proceedings of the Advances in Network-Based Information Systems, 2018

A GDPR-Compliant Approach to Real-Time Processing of Sensitive Data.
Proceedings of the Intelligent Interactive Multimedia Systems and Services, 2018

KONFIDO: An OpenNCP-Based Secure eHealth Data Exchange System.
Proceedings of the Security in Computer and Information Sciences, 2018

Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level.
Proceedings of the 14th European Dependable Computing Conference, 2018

How to Protect Public Administration from Cybersecurity Threats: The COMPACT Project.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

2017
Cloudifying Critical Applications: A Use Case from the Power Grid Domain.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

SDD Sentinel: A Support Tool for Detecting and Investigating Electronic Transaction Frauds.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
A Secure Cloud-Based SCADA Application: The Use Case of a Water Supply Network.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2016

Efficient Supply Chain Management: Traceability and Transparency.
Proceedings of the 12th International Conference on Signal-Image Technology & Internet-Based Systems, 2016

A Multi-sensor Data Fusion Approach for Detecting Direct Debit Frauds.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016


Data Collection Framework - A Flexible and Efficient Tool for Heterogeneous Data Acquisition.
Proceedings of the CLOSER 2016, 2016

Direct Debit Frauds: A Novel Detection Approach.
Proceedings of the CLOSER 2016, 2016

2015
A DBSCAN based approach for jointly segment and classify brain MR images.
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015

Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns.
Proceedings of the 10th International Conference on P2P, 2015

2014
Critical Infrastructure Protection: having SIEM technology cope with network heterogeneity.
CoRR, 2014


  Loading...