Cloud security: Emerging threats and current solutions L Coppolino, S D’Antonio, G Mazzeo, L Romano Computers & Electrical Engineering 59, 126-140, 2017 | 214 | 2017 |
Elliptic curve cryptography engineering A Cilardo, L Coppolino, N Mazzocca, L Romano Proceedings of the IEEE 94 (2), 395-406, 2006 | 109 | 2006 |
An intrusion detection system for critical information infrastructures using wireless sensor network technologies L Coppolino, S D'Antonio, L Romano, G Spagnuolo 2010 5th international conference on critical infrastructure (CRIS), 1-8, 2010 | 76 | 2010 |
A comprehensive survey of hardware-assisted security: From the edge to the cloud L Coppolino, S D’Antonio, G Mazzeo, L Romano Internet of Things 6, 100055, 2019 | 58 | 2019 |
Can-bus attack detection with deep learning F Amato, L Coppolino, F Mercaldo, F Moscato, R Nardone, A Santone IEEE Transactions on Intelligent Transportation Systems 22 (8), 5081-5090, 2021 | 56 | 2021 |
Applying data mining techniques to intrusion detection in wireless sensor networks L Coppolino, S DAntonio, A Garofalo, L Romano 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and …, 2013 | 54 | 2013 |
Comprehensive user requirements engineering methodology for secure and interoperable health data exchange P Natsiavas, J Rasmussen, M Voss-Knude, Κ Votis, L Coppolino, ... BMC medical informatics and decision making 18, 1-16, 2018 | 46 | 2018 |
A resilient architecture for forensic storage of events in critical infrastructures M Afzaal, C Di Sarno, L Coppolino, S D'Antonio, L Romano 2012 IEEE 14th international symposium on high-assurance systems engineering …, 2012 | 45 | 2012 |
An OpenNCP-based solution for secure eHealth data exchange M Staffa, L Sgaglione, G Mazzeo, L Coppolino, S d'Antonio, L Romano, ... Journal of Network and Computer Applications 116, 65-85, 2018 | 44 | 2018 |
QoS monitoring in a cloud services environment: the SRT-15 approach G Cicotti, L Coppolino, R Cristaldi, S D’Antonio, L Romano Euro-Par 2011: Parallel Processing Workshops: CCPI, CGWS, HeteroPar, HiBB …, 2012 | 44 | 2012 |
My smart home is under attack L Coppolino, V D'Alessandro, S D'Antonio, L Levy, L Romano 2015 IEEE 18th International Conference on Computational Science and …, 2015 | 40 | 2015 |
Adaptable parsing of real-time data streams F Campanile, A Cilardo, L Coppolino, L Romano 15th EUROMICRO International Conference on Parallel, Distributed and Network …, 2007 | 39 | 2007 |
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems L Coppolino, S D’Antonio, V Formicola, G Mazzeo, L Romano IEEE Transactions on Computers 70 (5), 711-724, 2020 | 35 | 2020 |
Enhancing SIEM technology to protect critical infrastructures L Coppolino, S D’Antonio, V Formicola, L Romano Critical Information Infrastructures Security: 7th International Workshop …, 2013 | 32 | 2013 |
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study L Coppolino, S D’Antonio, V Formicola, L Romano Computer Safety, Reliability, and Security: 30th International Conference …, 2011 | 32 | 2011 |
A weight-based symptom correlation approach to SQL injection attacks M Ficco, L Coppolino, L Romano 2009 Fourth Latin-American Symposium on Dependable Computing, 9-16, 2009 | 32 | 2009 |
Exploiting diversity and correlation to improve the performance of intrusion detection systems L Coppolino, L Romano, S D'Antonio, M Esposito 2009 International Conference on Network and Service Security, 1-5, 2009 | 31 | 2009 |
Exposing vulnerabilities in electric power grids: An experimental approach L Coppolino, L Romano International Journal of Critical Infrastructure Protection 7 (1), 51-60, 2014 | 30 | 2014 |
Security issues of a phasor data concentrator for smart grid infrastructure S D'Antonio, L Coppolino, IA Elia, V Formicola Proceedings of the 13th European Workshop on Dependable Computing, 3-8, 2011 | 30 | 2011 |
Web services workflow reliability estimation through reliability patterns L Coppolino, L Romano, N Mazzocca, S Salvi 2007 Third International Conference on Security and Privacy in …, 2007 | 30 | 2007 |