Salvatore D'Antonio

Orcid: 0000-0001-9327-0138

According to our database1, Salvatore D'Antonio authored at least 106 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Evaluating the necessity of the multiple metrics for assessing explainable AI: A critical examination.
Neurocomputing, 2024

An Experimental Evaluation of TEE technology Evolution: Benchmarking Transparent Approaches based on SGX, SEV, and TDX.
CoRR, 2024

Comparative Analysis of AI-Based Methods for Enhancing Cybersecurity Monitoring Systems.
Proceedings of the Computational Science and Its Applications - ICCSA 2024 Workshops, 2024

An Innovative Approach to Real-Time Concept Drift Detection in Network Security.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024

Enhancing Healthcare Data Confidentiality through Decentralized TEE Attestation.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

A Novel Approach for Securing Federated Learning: Detection and Defense Against Model Poisoning Attacks.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

Towards Hybrid NIDS: Combining Rule-Based SIEM with AI-Based Intrusion Detectors.
Proceedings of the Second International Conference on Advances in Computing Research, 2024

A Novel Approach to the Use of Explainability to Mine Network Intrusion Detection Rules.
Proceedings of the Intelligent Information and Database Systems - 16th Asian Conference, 2024

Enhancing Network Security Through Granular Computing: A Clustering-by-Time Approach to NetFlow Traffic Analysis.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
A Tamper-Resistant Storage Framework for Smart Grid security.
Proceedings of the 31st Euromicro International Conference on Parallel, 2023

Effective Rules for a Rule-Based SIEM System in Detecting DoS Attacks: An Association Rule Mining Approach.
Proceedings of the Applied Intelligence - First International Conference, 2023

The Alliance of HE and TEE to Enhance their Performance and Security.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Detection of Radio Frequency Interference in Satellite Ground Segments.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

A Practical and Scalable Privacy-preserving Framework.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
Risk Assessment Driven Use of Advanced SIEM Technology for Cyber Protection of Critical e-Health Processes.
SN Comput. Sci., 2022

<i>PriSIEM</i>: Enabling privacy-preserving Managed Security Services.
J. Netw. Comput. Appl., 2022

A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants.
Comput. Ind., 2022

Data Provenance for healthcare: a blockchain-based approach.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

2021
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems.
IEEE Trans. Computers, 2021

Facing the Blockchain Endpoint Vulnerability, an SGX-based Solution for Secure eHealth Auditing.
Proceedings of the Italian Conference on Cybersecurity, 2021

The protection of LP-WAN Endpoints via TEE: a Chemical Storage Case Study.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

Privacy-Preserving Credit Scoring via Functional Encryption.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021

2020
Progress in Features, Data, Patterns and Similarity Analysis.
J. Univers. Comput. Sci., 2020

Practical Applications of Data Analysis, Classification and Anomaly Detection.
J. Univers. Comput. Sci., 2020

An abstract reasoning architecture for privacy policies monitoring.
Future Gener. Comput. Syst., 2020

2019
A comprehensive survey of hardware-assisted security: From the edge to the cloud.
Internet Things, 2019

Securing the weak link of federated systems via trusted execution: a case study from the eHealth domain.
Int. J. Crit. Comput. Based Syst., 2019

A comparative analysis of emerging approaches for securing java software with Intel SGX.
Future Gener. Comput. Syst., 2019

Privacy Preserving Intrusion Detection Via Homomorphic Encryption.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

Protecting Critical Business Processes of Smart Hospitals from Cyber Attacks.
Proceedings of the 15th International Conference on Signal-Image Technology & Internet-Based Systems, 2019

2018
SIL2 assessment of an Active/Standby COTS-based Safety-Related system.
Reliab. Eng. Syst. Saf., 2018

An OpenNCP-based Solution for Secure eHealth Data Exchange.
J. Netw. Comput. Appl., 2018

An Approach for Securing Critical Applications in Untrusted Clouds.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018

An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems.
Proceedings of the Advances in Network-Based Information Systems, 2018

Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level.
Proceedings of the 14th European Dependable Computing Conference, 2018

Message from the SIS-SS 2018 Workshop Organizers.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

How to Protect Public Administration from Cybersecurity Threats: The COMPACT Project.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

2017
Real-time QoS monitoring from the end user perspective in large scale social networks.
Int. J. Comput. Sci. Eng., 2017

Cloud security: Emerging threats and current solutions.
Comput. Electr. Eng., 2017

Cloudifying Critical Applications: A Use Case from the Power Grid Domain.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level Among eHealth Services Across Europe.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

Security in Cross - Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
A framework for mastering heterogeneity in multi-layer security information and event correlation.
J. Syst. Archit., 2016

A Multi-sensor Data Fusion Approach for Detecting Direct Debit Frauds.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

2015
Runtime Model Checking for SLA Compliance Monitoring and QoS Prediction.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

Use of the Dempster-Shafer theory to detect account takeovers in mobile money transfer services.
J. Ambient Intell. Humaniz. Comput., 2015

Applying Extensions of Evidence Theory to Detect Frauds in Financial Infrastructures.
Int. J. Distributed Sens. Networks, 2015

How to monitor QoS in cloud infrastructures: the QoSMONaaS approach.
Int. J. Comput. Sci. Eng., 2015

Efficient Supply Chain Management via Federation-Based Integration of Legacy ERP Systems.
Proceedings of the Intelligent Software Methodologies, Tools and Techniques, 2015

2nd Workshop on Cyber Security and Resilience of Large-Scale Systems.
Proceedings of the Intelligent Distributed Computing IX - Proceedings of the 9th International Symposium on Intelligent Distributed Computing, 2015

Enabling Convergence of Physical and Logical Security Through Intelligent Event Correlation.
Proceedings of the Intelligent Distributed Computing IX - Proceedings of the 9th International Symposium on Intelligent Distributed Computing, 2015

A Workflow Service Mediator for Automated Information Processing and Scheduling Delivery to an Archive.
Proceedings of the Advances in Service-Oriented and Cloud Computing, 2015

A DBSCAN based approach for jointly segment and classify brain MR images.
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015

My Smart Home is Under Attack.
Proceedings of the 18th IEEE International Conference on Computational Science and Engineering, 2015

Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns.
Proceedings of the 10th International Conference on P2P, 2015

2014
Exposing vulnerabilities in electric power grids: An experimental approach.
Int. J. Crit. Infrastructure Prot., 2014

Monitoring service quality: methods and solutions to implement a managerial dash-board to improve software development.
CoRR, 2014

Big Data Analytics for QoS Prediction Through Probabilistic Model Checking.
CoRR, 2014

Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks.
Proceedings of the Computer Safety, Reliability, and Security, 2014

Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems.
Proceedings of the Critical Infrastructure Protection VIII, 2014

Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study.
Proceedings of the Intelligent Distributed Computing VIII, 2014

Real-time Security & Dependability monitoring: Make it a bundle.
Proceedings of the International Carnahan Conference on Security Technology, 2014

2013
Flow Selection Techniques.
RFC, September, 2013

Effective QoS Monitoring in Large Scale Social Networks.
Proceedings of the Intelligent Distributed Computing VII, 2013

A GPS Spoofing Resilient WAMS for Smart Grid.
Proceedings of the Dependable Computing - 14th European Workshop, 2013

Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks.
Proceedings of the Eighth International Conference on P2P, 2013

2012
The human role in tools for improving robustness and resilience of critical infrastructures.
Cogn. Technol. Work., 2012

An Intrusion and Fault Tolerant Forensic Storage for a SIEM System.
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012

Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology.
Proceedings of the Computer Safety, Reliability, and Security, 2012

International Cooperation Experiences: Results Achieved, Lessons Learned, and Way Ahead.
Proceedings of the Computer Safety, Reliability, and Security, 2012

How to Monitor QoS in Cloud Infrastructures: The QoSMONaaS Approach.
Proceedings of the Intelligent Distributed Computing VI - Proceedings of the 6th International Symposium on Intelligent Distributed Computing, 2012

A Resilient Architecture for Forensic Storage of Events in Critical Infrastructures.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

Enhancing SIEM Technology to Protect Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2012

2011
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study.
Proceedings of the Computer Safety, Reliability, and Security, 2011

Security Analysis of Smart Grid Data Collection Technologies.
Proceedings of the Computer Safety, Reliability, and Security, 2011

Innovative Man Machine Interfaces and Solutions to Support Totally Blind People.
Proceedings of the Image Processing and Communications Challenges 3, 2011

Security issues of a phasor data concentrator for smart grid infrastructure.
Proceedings of the 13th European Workshop on Dependable Computing, 2011

QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach.
Proceedings of the Euro-Par 2011: Parallel Processing Workshops - CCPI, CGWS, HeteroPar, HiBB, HPCVirt, HPPC, HPSS, MDGS, ProPer, Resilience, UCHPC, VHPC, Bordeaux, France, August 29, 2011

On the Security of the Terminal Operations for Container Shipping in Multimodal Transport: the SIS-TEMA Project.
Proceedings of the CRiSIS 2011, 2011

2010
Intersection Approach to Vulnerability Handling.
Proceedings of the WEBIST 2010, 2010

Using MPLS in a Wireless Mesh Network to Improve the Resiliency of SCADA Systems.
Proceedings of the Mobile Lightweight Wireless Systems, 2010

Performance assessment of a distributed intrusion detection system in a real network scenario.
Proceedings of the CRiSIS 2010, 2010

2009
Increasing security and protection of SCADA systems through infrastructure resilience.
Int. J. Syst. Syst. Eng., 2009

From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2009

2008
A Semi-Autonomic Framework for Intrusion Tolerance in Heterogeneous Networks.
Proceedings of the Self-Organizing Systems, Third International Workshop, 2008

INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project.
Proceedings of the Critical Information Infrastructure Security, 2008

2007
A Semantic Approach to Policy-based Management - Linking Policies to Ontologies.
Proceedings of the WINSYS 2007, 2007

2006
Resource allocation in multi-domain networks based on service level specifications.
J. Commun. Networks, 2006

Design principles and algorithms for effective high-speed IP flow monitoring.
Comput. Commun., 2006

Techniques for available bandwidth measurement in IP networks: A performance comparison.
Comput. Networks, 2006

Behavioral network engineering: making intrusion detection become autonomic.
Ann. des Télécommunications, 2006

Pinball Caching: Improving Performance of a Framework for Dynamic Web-Content Adaptation and Deliver.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

High-Speed Intrusion Detection in Support of Critical Infrastructure Protection.
Proceedings of the Critical Information Infrastructures Security, 2006

2005
Time-aware admission control on top of time-unaware network infrastructures.
Comput. Commun., 2005

INTERMON: An Architecture for Inter-domain Monitoring, Modelling and Simulation.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

BET: A Hybrid Bandwidth Estimation Tool.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

2004
Assessing the scalability of component-based frameworks: the CADENUS case study.
SIGMETRICS Perform. Evaluation Rev., 2004

Managing service level agreements in Premium IP networks: a business-oriented approach.
Comput. Networks, 2004

An architecture for automatic configuration of integrated networks.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

Using Metadata in SLA Negotiation over Premium IP Networks.
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004

2003
Cadenus: creation and deployment of end-user services in premium IP networks.
IEEE Commun. Mag., 2003

Performance comparison of different techniques for available bandwidth measurement in packet switched network.
Proceedings of the IEEE International Conference on Virtual Environments, 2003


2002
Designing service negotiation entities for the electronic market-place.
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002

Service Level Indication - A Proposal for QoS Monitoring in SLA-based Multidomain Networks.
Proceedings of the Converged Networking: Data and Real-time Communications over IP, 2002


  Loading...