Luigi Romano

Orcid: 0000-0001-8435-7696

According to our database1, Luigi Romano authored at least 122 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An Experimental Evaluation of TEE technology Evolution: Benchmarking Transparent Approaches based on SGX, SEV, and TDX.
CoRR, 2024

Exploiting Data Spaces to Enable Privacy Preserving Data Exchange in the Energy Supply Chain.
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024

2023
Development of the Västra Götaland Operating Cycle for Long-Haul Heavy-Duty Vehicles.
IEEE Access, 2023

Securing FIWARE with TEE Technology.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2023

Awesome Trusted Execution Environment.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

Exploiting Digital Twin technology for Cybersecurity Monitoring in Smart Grids.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
SGXTuner: Performance Enhancement of Intel SGX Applications Via Stochastic Optimization.
IEEE Trans. Dependable Secur. Comput., 2022

Risk Assessment Driven Use of Advanced SIEM Technology for Cyber Protection of Critical e-Health Processes.
SN Comput. Sci., 2022

<i>PriSIEM</i>: Enabling privacy-preserving Managed Security Services.
J. Netw. Comput. Appl., 2022

A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants.
Comput. Ind., 2022

A Classification Method of Road Transport Missions and Applications Using the Operating Cycle Format.
IEEE Access, 2022

2021
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems.
IEEE Trans. Computers, 2021

Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study.
Technol. Anal. Strateg. Manag., 2021

Facing the Blockchain Endpoint Vulnerability, an SGX-based Solution for Secure eHealth Auditing.
Proceedings of the Italian Conference on Cybersecurity, 2021

The protection of LP-WAN Endpoints via TEE: a Chemical Storage Case Study.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

Privacy-Preserving Credit Scoring via Functional Encryption.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021

2019
A comprehensive survey of hardware-assisted security: From the edge to the cloud.
Internet Things, 2019

Securing the weak link of federated systems via trusted execution: a case study from the eHealth domain.
Int. J. Crit. Comput. Based Syst., 2019

A comparative analysis of emerging approaches for securing java software with Intel SGX.
Future Gener. Comput. Syst., 2019

Privacy Preserving Intrusion Detection Via Homomorphic Encryption.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

Protecting Critical Business Processes of Smart Hospitals from Cyber Attacks.
Proceedings of the 15th International Conference on Signal-Image Technology & Internet-Based Systems, 2019

A Model-Based Observer for Intelligent Tire Concepts.
Proceedings of the 5th IEEE International forum on Research and Technology for Society and Industry, 2019

Feel-tire Unina: Development and Modeling of a Sensing System for Intelligent Tires.
Proceedings of the 5th IEEE International forum on Research and Technology for Society and Industry, 2019


2018
SIL2 assessment of an Active/Standby COTS-based Safety-Related system.
Reliab. Eng. Syst. Saf., 2018

Comprehensive user requirements engineering methodology for secure and interoperable health data exchange.
BMC Medical Informatics Decis. Mak., 2018

An OpenNCP-based Solution for Secure eHealth Data Exchange.
J. Netw. Comput. Appl., 2018

An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems.
Proceedings of the Advances in Network-Based Information Systems, 2018

Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level.
Proceedings of the 14th European Dependable Computing Conference, 2018

How to Protect Public Administration from Cybersecurity Threats: The COMPACT Project.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

2017
Real-time QoS monitoring from the end user perspective in large scale social networks.
Int. J. Comput. Sci. Eng., 2017

Cloud security: Emerging threats and current solutions.
Comput. Electr. Eng., 2017

Cloudifying Critical Applications: A Use Case from the Power Grid Domain.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level Among eHealth Services Across Europe.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

Security in Cross - Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Integrating Reactive Cloud Applications in SERECA.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
A framework for mastering heterogeneity in multi-layer security information and event correlation.
J. Syst. Archit., 2016

2015
Runtime Model Checking for SLA Compliance Monitoring and QoS Prediction.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

Use of the Dempster-Shafer theory to detect account takeovers in mobile money transfer services.
J. Ambient Intell. Humaniz. Comput., 2015

Applying Extensions of Evidence Theory to Detect Frauds in Financial Infrastructures.
Int. J. Distributed Sens. Networks, 2015

How to monitor QoS in cloud infrastructures: the QoSMONaaS approach.
Int. J. Comput. Sci. Eng., 2015

Efficient Supply Chain Management via Federation-Based Integration of Legacy ERP Systems.
Proceedings of the Intelligent Software Methodologies, Tools and Techniques, 2015

A Workflow Service Mediator for Automated Information Processing and Scheduling Delivery to an Archive.
Proceedings of the Advances in Service-Oriented and Cloud Computing, 2015

My Smart Home is Under Attack.
Proceedings of the 18th IEEE International Conference on Computational Science and Engineering, 2015

Scalable Network Traffic Classification Using Distributed Support Vector Machines.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns.
Proceedings of the 10th International Conference on P2P, 2015

2014
Exposing vulnerabilities in electric power grids: An experimental approach.
Int. J. Crit. Infrastructure Prot., 2014

Big Data Analytics for QoS Prediction Through Probabilistic Model Checking.
CoRR, 2014

Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks.
Proceedings of the Computer Safety, Reliability, and Security, 2014

Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study.
Proceedings of the Intelligent Distributed Computing VIII, 2014

Real-time Security & Dependability monitoring: Make it a bundle.
Proceedings of the International Carnahan Conference on Security Technology, 2014

A Tool for Assessing Collaborative Learning - At School and Online.
Proceedings of the IEEE 14th International Conference on Advanced Learning Technologies, 2014

2013
Effective QoS Monitoring in Large Scale Social Networks.
Proceedings of the Intelligent Distributed Computing VII, 2013

Methodology and Software Support for Evaluating Teams' level of collaboration.
Proceedings of the 19th International Conference on Distributed Multimedia Systems, 2013

Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks.
Proceedings of the Eighth International Conference on P2P, 2013

2012
A hidden Markov model based intrusion detection system for wireless sensor networks.
Int. J. Crit. Comput. Based Syst., 2012

An Intrusion and Fault Tolerant Forensic Storage for a SIEM System.
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012

QoS-MONaaS: A Portable Architecture for QoS Monitoring in the Cloud.
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012

Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology.
Proceedings of the Computer Safety, Reliability, and Security, 2012

International Cooperation Experiences: Results Achieved, Lessons Learned, and Way Ahead.
Proceedings of the Computer Safety, Reliability, and Security, 2012

A Resilient Architecture for Forensic Storage of Events in Critical Infrastructures.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

Enhancing SIEM Technology to Protect Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2012

2011
Security Engineering of SOA Applications Via Reliability Patterns.
J. Softw. Eng. Appl., 2011

Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study.
Proceedings of the Computer Safety, Reliability, and Security, 2011

Security Analysis of Smart Grid Data Collection Technologies.
Proceedings of the Computer Safety, Reliability, and Security, 2011

MASSIF: A Promising Solution to Enhance Olympic Games IT Security.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

An event correlation approach for fault diagnosis in SCADA infrastructures.
Proceedings of the 13th European Workshop on Dependable Computing, 2011

QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach.
Proceedings of the Euro-Par 2011: Parallel Processing Workshops - CCPI, CGWS, HeteroPar, HiBB, HPCVirt, HPPC, HPSS, MDGS, ProPer, Resilience, UCHPC, VHPC, Bordeaux, France, August 29, 2011

Tool and Method for Evaluating Students Working on E-Learning Platforms.
Proceedings of the 17th International Conference on Distributed Multimedia Systems, 2011

On the Security of the Terminal Operations for Container Shipping in Multimodal Transport: the SIS-TEMA Project.
Proceedings of the CRiSIS 2011, 2011

A Novel Approach to QoS Monitoring in the Cloud.
Proceedings of the First International Conference on Data Compression, 2011

A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing.
Proceedings of the First International Conference on Data Compression, 2011

2010
A Correlation Approach to Intrusion Detection.
Proceedings of the Mobile Lightweight Wireless Systems, 2010

SLA compliance monitoring through semantic processing.
Proceedings of the 2010 11th IEEE/ACM International Conference on Grid Computing, 2010

2009
Increasing security and protection of SCADA systems through infrastructure resilience.
Int. J. Syst. Syst. Eng., 2009

From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2009

A Weight-Based Symptom Correlation Approach to SQL Injection Attacks.
Proceedings of the Fourth Latin-American Symposium on Dependable Computing, 2009

A healthcare real-time monitoring system for multiple sensors data collection and correlation.
Proceedings of the New Directions in Intelligent Interactive Multimedia Systems and Services, 2009

Fast Abstracts.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
A business process monitor for a mobile phone recharging system.
J. Syst. Archit., 2008

Software Innovation for E-Government Expansion.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

A GRID Approach to Providing Multimodal Context-Sensitive Social Service to Mobile Users.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008 Workshops, 2008

INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project.
Proceedings of the Critical Information Infrastructure Security, 2008

2007
Design and implementation of a high performance architecture for providing digital time stamping services to mobile devices.
Comput. Syst. Sci. Eng., 2007

Web Services workflow reliability estimation through reliability patterns.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

iToken: aWireless smart card reader which provides handhelds with desk top equivalent security.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Performance Evaluation of Security Services: An Experimental Approach.
Proceedings of the 15th Euromicro International Conference on Parallel, 2007

Combining Programmable Hardware and Web Services Technologies for Delivering High-Performance and Interoperable Security.
Proceedings of the 15th Euromicro International Conference on Parallel, 2007

Adaptable Parsing of Real-Time Data Streams.
Proceedings of the 15th Euromicro International Conference on Parallel, 2007

2006
Elliptic Curve Cryptography Engineering.
Proc. IEEE, 2006

Innovative Healthcare Services for Nomadic Users.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Multimodal Architectures: Issues and Experiences.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

2005
An FPGA-based Key-Store for Improving the Dependability of Security Services.
Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2005), 2005

High-Performance and Interoperable Security Services for Mobile Environments.
Proceedings of the High Performance Computing and Communications, 2005

A Novel Unified Architecture for Public-Key Cryptography.
Proceedings of the 2005 Design, 2005

2004
Effective Fault Treatment for Improving the Dependability of COTS and Legacy-Based Applications.
IEEE Trans. Dependable Secur. Comput., 2004

Exploring the design-space for FPGA-based implementation of RSA.
Microprocess. Microsystems, 2004

A Web Services Based Architecture for Digital Time Stamping.
J. Web Eng., 2004

A tamper resistant hardware accelerator for RSA cryptographic applications.
J. Syst. Archit., 2004

Dependability in Web Services.
Proceedings of the 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 2004

Hardware Support for High Performance, Intrusion- and Fault-Tolerant Systems.
Proceedings of the 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 2004

Carry-Save Montgomery Modular Exponentiation on Reconfigurable Hardware.
Proceedings of the 2004 Design, 2004

2003
Improving the QoS of MPEG2 streaming over wireless LANs.
Simul. Model. Pract. Theory, 2003

An architecture for security-oriented perfective maintenance of legacy software.
Inf. Softw. Technol., 2003

Providing Digital Time Stamping Services to Mobile Devices.
Proceedings of the 9th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS Fall 2003), 2003

Using Web Services Technology for Inter-enterprise Integration of Digital Time Stamping.
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003

A Fault-Tolerant Distributed Legacy-Based System and Its Evaluation.
Proceedings of the Dependable Computing, First Latin-American Symposium, 2003

FPGA-Based Implementation of a Serial RSA Processor.
Proceedings of the 2003 Design, 2003

2002
Building a dependable system from a legacy application with CORBA.
J. Syst. Archit., 2002

A fault tolerant access to legacy database systems using CORBA technology.
Comput. Syst. Sci. Eng., 2002

Implementation of Threshold-based Diagnostic Mechanisms for COTS-Based Applications.
Proceedings of the 21st Symposium on Reliable Distributed Systems (SRDS 2002), 2002

Integration of Legacy Client-Server Applications in a Secure Multi-Tier Architecture.
Proceedings of the 10th Euromicro Workshop on Parallel, 2002

Implementing a CORBA-Based Architecture for Leveraging the Security Level of Existing Applications.
Proceedings of the On the Move to Meaningful Internet Systems, 2002 - DOA/CoopIS/ODBASE 2002 Confederated International Conferences DOA, CoopIS and ODBASE 2002 Irvine, California, USA, October 30, 2002

2001
Secure Access to Personalized Web Services.
Proceedings of the 8th Pacific Rim International Symposium on Dependable Computing (PRDC 2001), 2001

2000
Dependability analysis of transmission techniques for MPEG-2 streams.
Proceedings of the 2000 Pacific Rim International Symposium on Dependable Computing (PRDC 2000), 2000

A CORBA-Based Architecture for Adding Dependability to Legacy Servers.
Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, 2000

Experimental Evaluation of the Recovery Strategies of a Distributed VoD Application.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000

1999
A Simulated Fault Injection Tool for Dependable VoD Application Design.
Proceedings of the 1999 Pacific Rim International Symposium on Dependable Computing (PRDC 1999), 1999

A Design Tool for Dependable Video on Demand Applications.
Proceedings of the 25th EUROMICRO '99 Conference, 1999

SECURE: A Simulation Tool for PKI Design.
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999

1998
A Hierarchical Approach for Dependability Analysis of a Commercial Cache-Based RAID Storage Architecture.
Proceedings of the Digest of Papers: FTCS-28, 1998


  Loading...