Luigi Coppolino
Orcid: 0000-0002-2079-8713
According to our database1,
Luigi Coppolino
authored at least 85 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
2025
0
5
10
1
1
3
4
1
3
3
2
1
4
2
1
1
1
1
1
5
3
3
5
4
6
3
4
5
6
1
3
1
4
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Neurocomputing, 2025
2024
An Experimental Evaluation of TEE technology Evolution: Benchmarking Transparent Approaches based on SGX, SEV, and TDX.
CoRR, 2024
Exploiting Data Spaces to Enable Privacy Preserving Data Exchange in the Energy Supply Chain.
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024
2023
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2023
Enhancing Cybersecurity Proactive Decision-Making Through Attack Tree Analysis and MITRE Framework.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Risk Assessment Driven Use of Advanced SIEM Technology for Cyber Protection of Critical e-Health Processes.
SN Comput. Sci., 2022
J. Netw. Comput. Appl., 2022
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants.
Comput. Ind., 2022
2021
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems.
IEEE Trans. Computers, 2021
Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study.
Technol. Anal. Strateg. Manag., 2021
Enhancing random forest classification with NLP in DAMEH: A system for DAta Management in eHealth Domain.
Neurocomputing, 2021
Facing the Blockchain Endpoint Vulnerability, an SGX-based Solution for Secure eHealth Auditing.
Proceedings of the Italian Conference on Cybersecurity, 2021
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021
2020
Future Gener. Comput. Syst., 2020
2019
Internet Things, 2019
Securing the weak link of federated systems via trusted execution: a case study from the eHealth domain.
Int. J. Crit. Comput. Based Syst., 2019
A comparative analysis of emerging approaches for securing java software with Intel SGX.
Future Gener. Comput. Syst., 2019
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019
Proceedings of the 15th International Conference on Signal-Image Technology & Internet-Based Systems, 2019
Proceedings of the Internet and Distributed Computing Systems, 2019
2018
Reliab. Eng. Syst. Saf., 2018
Comprehensive user requirements engineering methodology for secure and interoperable health data exchange.
BMC Medical Informatics Decis. Mak., 2018
J. Netw. Comput. Appl., 2018
Proceedings of the 26th Euromicro International Conference on Parallel, 2018
Proceedings of the Advances in Network-Based Information Systems, 2018
Proceedings of the Security in Computer and Information Sciences, 2018
Proceedings of the 14th European Dependable Computing Conference, 2018
How to Protect Public Administration from Cybersecurity Threats: The COMPACT Project.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018
2017
Real-time QoS monitoring from the end user perspective in large scale social networks.
Int. J. Comput. Sci. Eng., 2017
Proceedings of the 25th Euromicro International Conference on Parallel, 2017
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level Among eHealth Services Across Europe.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017
Security in Cross - Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
2016
A framework for mastering heterogeneity in multi-layer security information and event correlation.
J. Syst. Archit., 2016
2015
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015
Use of the Dempster-Shafer theory to detect account takeovers in mobile money transfer services.
J. Ambient Intell. Humaniz. Comput., 2015
Applying Extensions of Evidence Theory to Detect Frauds in Financial Infrastructures.
Int. J. Distributed Sens. Networks, 2015
Int. J. Comput. Sci. Eng., 2015
Efficient Supply Chain Management via Federation-Based Integration of Legacy ERP Systems.
Proceedings of the Intelligent Software Methodologies, Tools and Techniques, 2015
Enabling Convergence of Physical and Logical Security Through Intelligent Event Correlation.
Proceedings of the Intelligent Distributed Computing IX - Proceedings of the 9th International Symposium on Intelligent Distributed Computing, 2015
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015
Proceedings of the 18th IEEE International Conference on Computational Science and Engineering, 2015
Proceedings of the 10th International Conference on P2P, 2015
2014
Int. J. Crit. Infrastructure Prot., 2014
CoRR, 2014
Proceedings of the Computer Safety, Reliability, and Security, 2014
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study.
Proceedings of the Intelligent Distributed Computing VIII, 2014
Proceedings of the International Carnahan Conference on Security Technology, 2014
2013
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
Proceedings of the Intelligent Distributed Computing VII, 2013
Proceedings of the Dependable Computing - 14th European Workshop, 2013
Proceedings of the Eighth International Conference on P2P, 2013
2012
Int. J. Crit. Comput. Based Syst., 2012
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012
Proceedings of the Computer Safety, Reliability, and Security, 2012
Proceedings of the Computer Network Security, 2012
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012
Proceedings of the Critical Information Infrastructures Security, 2012
2011
J. Softw. Eng. Appl., 2011
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study.
Proceedings of the Computer Safety, Reliability, and Security, 2011
Proceedings of the Computer Safety, Reliability, and Security, 2011
Proceedings of the 13th European Workshop on Dependable Computing, 2011
Proceedings of the 13th European Workshop on Dependable Computing, 2011
Proceedings of the Euro-Par 2011: Parallel Processing Workshops - CCPI, CGWS, HeteroPar, HiBB, HPCVirt, HPPC, HPSS, MDGS, ProPer, Resilience, UCHPC, VHPC, Bordeaux, France, August 29, 2011
On the Security of the Terminal Operations for Container Shipping in Multimodal Transport: the SIS-TEMA Project.
Proceedings of the CRiSIS 2011, 2011
2010
Proceedings of the 2010 11th IEEE/ACM International Conference on Grid Computing, 2010
2009
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2009
Proceedings of the Fourth Latin-American Symposium on Dependable Computing, 2009
A healthcare real-time monitoring system for multiple sensors data collection and correlation.
Proceedings of the New Directions in Intelligent Interactive Multimedia Systems and Services, 2009
2008
J. Syst. Archit., 2008
Proceedings of the 11th Euromicro Conference on Digital System Design: Architectures, 2008
2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the 15th Euromicro International Conference on Parallel, 2007
Combining Programmable Hardware and Web Services Technologies for Delivering High-Performance and Interoperable Security.
Proceedings of the 15th Euromicro International Conference on Parallel, 2007
Proceedings of the 15th Euromicro International Conference on Parallel, 2007
2006
Design and implementation of TruMan, a Trust Manager Component for Distributed Systems.
Proceedings of the Second International Workshop on Security, 2006
2005
Proceedings of the High Performance Computing and Communications, 2005