Valerio Formicola

Orcid: 0000-0003-1166-4729

According to our database1, Valerio Formicola authored at least 30 papers between 2010 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Dynamic 5G Network Slice Management Middleware for Industrial Internet of Things: Industry Paper.
CoRR, 2022

Assessing the Quality of Differentially Private Synthetic Data for Intrusion Detection.
Proceedings of the Security and Privacy in Communication Networks, 2022

Software-defined Dynamic 5G Network Slice Management for Industrial Internet of Things.
Proceedings of the 21st IEEE International Symposium on Network Computing and Applications, 2022

Techniques for Realizing Secure, Resilient and Differentiated 5G Operations.
Proceedings of the 14th IFIP Wireless and Mobile Networking Conference, 2022

Autonomic ZTA-based Network Management Engine (AZNME).
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022

Extending 5G services with Zero Trust security pillars: a modular approach.
Proceedings of the 19th IEEE/ACS International Conference on Computer Systems and Applications, 2022

2021
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems.
IEEE Trans. Computers, 2021

SHA-3-LPHP: Hardware Acceleration of SHA-3 for Low-Power High-Performance Systems.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

2019
ICSrange: A Simulation-based Cyber Range Platform for Industrial Control Systems.
CoRR, 2019

Understanding Fault Scenarios and Impacts through Fault Injection Experiments in Cielo.
CoRR, 2019

2018
Resiliency of HPC Interconnects: A Case Study of Interconnect Failures and Recovery in Blue Waters.
IEEE Trans. Dependable Secur. Comput., 2018

2016
A framework for mastering heterogeneity in multi-layer security information and event correlation.
J. Syst. Archit., 2016

Attacking supercomputers through targeted alteration of environmental control: A data driven case study.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Use of the Dempster-Shafer theory to detect account takeovers in mobile money transfer services.
J. Ambient Intell. Humaniz. Comput., 2015

Applying Extensions of Evidence Theory to Detect Frauds in Financial Infrastructures.
Int. J. Distributed Sens. Networks, 2015

Enabling Convergence of Physical and Logical Security Through Intelligent Event Correlation.
Proceedings of the Intelligent Distributed Computing IX - Proceedings of the 9th International Symposium on Intelligent Distributed Computing, 2015

2014
Closing the loop of SIEM analysis to Secure Critical Infrastructures.
CoRR, 2014

Critical Infrastructure Protection: having SIEM technology cope with network heterogeneity.
CoRR, 2014

Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems.
Proceedings of the Critical Infrastructure Protection VIII, 2014

Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study.
Proceedings of the Intelligent Distributed Computing VIII, 2014

Real-time Security & Dependability monitoring: Make it a bundle.
Proceedings of the International Carnahan Conference on Security Technology, 2014

2013
Enhancing Intrusion Detection in Wireless Sensor Networks through Decision Trees.
Proceedings of the Dependable Computing - 14th European Workshop, 2013

Addressing Security Issues of Electronic Health Record Systems through Enhanced SIEM Technology.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology.
Proceedings of the Computer Safety, Reliability, and Security, 2012

Enhancing SIEM Technology to Protect Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2012

2011
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study.
Proceedings of the Computer Safety, Reliability, and Security, 2011

Security issues of a phasor data concentrator for smart grid infrastructure.
Proceedings of the 13th European Workshop on Dependable Computing, 2011

On the Security of the Terminal Operations for Container Shipping in Multimodal Transport: the SIS-TEMA Project.
Proceedings of the CRiSIS 2011, 2011

2010
An extended ns-2 for validation of load balancing algorithms in Content Delivery Networks.
Proceedings of the 3rd International Conference on Simulation Tools and Techniques, 2010

Performance assessment of a distributed intrusion detection system in a real network scenario.
Proceedings of the CRiSIS 2010, 2010


  Loading...