Salvatore D'Antonio
Orcid: 0000-0001-9327-0138
According to our database1,
Salvatore D'Antonio
authored at least 106 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Evaluating the necessity of the multiple metrics for assessing explainable AI: A critical examination.
Neurocomputing, 2024
An Experimental Evaluation of TEE technology Evolution: Benchmarking Transparent Approaches based on SGX, SEV, and TDX.
CoRR, 2024
Comparative Analysis of AI-Based Methods for Enhancing Cybersecurity Monitoring Systems.
Proceedings of the Computational Science and Its Applications - ICCSA 2024 Workshops, 2024
Proceedings of the Advances in Internet, Data & Web Technologies, 2024
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
A Novel Approach for Securing Federated Learning: Detection and Defense Against Model Poisoning Attacks.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
Proceedings of the Second International Conference on Advances in Computing Research, 2024
A Novel Approach to the Use of Explainability to Mine Network Intrusion Detection Rules.
Proceedings of the Intelligent Information and Database Systems - 16th Asian Conference, 2024
Enhancing Network Security Through Granular Computing: A Clustering-by-Time Approach to NetFlow Traffic Analysis.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Proceedings of the 31st Euromicro International Conference on Parallel, 2023
Effective Rules for a Rule-Based SIEM System in Detecting DoS Attacks: An Association Rule Mining Approach.
Proceedings of the Applied Intelligence - First International Conference, 2023
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
2022
Risk Assessment Driven Use of Advanced SIEM Technology for Cyber Protection of Critical e-Health Processes.
SN Comput. Sci., 2022
J. Netw. Comput. Appl., 2022
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants.
Comput. Ind., 2022
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
2021
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems.
IEEE Trans. Computers, 2021
Facing the Blockchain Endpoint Vulnerability, an SGX-based Solution for Secure eHealth Auditing.
Proceedings of the Italian Conference on Cybersecurity, 2021
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021
2020
J. Univers. Comput. Sci., 2020
J. Univers. Comput. Sci., 2020
Future Gener. Comput. Syst., 2020
2019
Internet Things, 2019
Securing the weak link of federated systems via trusted execution: a case study from the eHealth domain.
Int. J. Crit. Comput. Based Syst., 2019
A comparative analysis of emerging approaches for securing java software with Intel SGX.
Future Gener. Comput. Syst., 2019
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019
Proceedings of the 15th International Conference on Signal-Image Technology & Internet-Based Systems, 2019
2018
Reliab. Eng. Syst. Saf., 2018
J. Netw. Comput. Appl., 2018
Proceedings of the 26th Euromicro International Conference on Parallel, 2018
Proceedings of the Advances in Network-Based Information Systems, 2018
Proceedings of the 14th European Dependable Computing Conference, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
How to Protect Public Administration from Cybersecurity Threats: The COMPACT Project.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018
2017
Real-time QoS monitoring from the end user perspective in large scale social networks.
Int. J. Comput. Sci. Eng., 2017
Proceedings of the 25th Euromicro International Conference on Parallel, 2017
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level Among eHealth Services Across Europe.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017
Security in Cross - Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
2016
A framework for mastering heterogeneity in multi-layer security information and event correlation.
J. Syst. Archit., 2016
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
2015
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015
Use of the Dempster-Shafer theory to detect account takeovers in mobile money transfer services.
J. Ambient Intell. Humaniz. Comput., 2015
Applying Extensions of Evidence Theory to Detect Frauds in Financial Infrastructures.
Int. J. Distributed Sens. Networks, 2015
Int. J. Comput. Sci. Eng., 2015
Efficient Supply Chain Management via Federation-Based Integration of Legacy ERP Systems.
Proceedings of the Intelligent Software Methodologies, Tools and Techniques, 2015
Proceedings of the Intelligent Distributed Computing IX - Proceedings of the 9th International Symposium on Intelligent Distributed Computing, 2015
Enabling Convergence of Physical and Logical Security Through Intelligent Event Correlation.
Proceedings of the Intelligent Distributed Computing IX - Proceedings of the 9th International Symposium on Intelligent Distributed Computing, 2015
A Workflow Service Mediator for Automated Information Processing and Scheduling Delivery to an Archive.
Proceedings of the Advances in Service-Oriented and Cloud Computing, 2015
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015
Proceedings of the 18th IEEE International Conference on Computational Science and Engineering, 2015
Proceedings of the 10th International Conference on P2P, 2015
2014
Int. J. Crit. Infrastructure Prot., 2014
Monitoring service quality: methods and solutions to implement a managerial dash-board to improve software development.
CoRR, 2014
CoRR, 2014
Proceedings of the Computer Safety, Reliability, and Security, 2014
Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems.
Proceedings of the Critical Infrastructure Protection VIII, 2014
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study.
Proceedings of the Intelligent Distributed Computing VIII, 2014
Proceedings of the International Carnahan Conference on Security Technology, 2014
2013
Proceedings of the Intelligent Distributed Computing VII, 2013
Proceedings of the Dependable Computing - 14th European Workshop, 2013
Proceedings of the Eighth International Conference on P2P, 2013
2012
The human role in tools for improving robustness and resilience of critical infrastructures.
Cogn. Technol. Work., 2012
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012
Proceedings of the Computer Safety, Reliability, and Security, 2012
International Cooperation Experiences: Results Achieved, Lessons Learned, and Way Ahead.
Proceedings of the Computer Safety, Reliability, and Security, 2012
Proceedings of the Intelligent Distributed Computing VI - Proceedings of the 6th International Symposium on Intelligent Distributed Computing, 2012
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012
Proceedings of the Critical Information Infrastructures Security, 2012
2011
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study.
Proceedings of the Computer Safety, Reliability, and Security, 2011
Proceedings of the Computer Safety, Reliability, and Security, 2011
Proceedings of the Image Processing and Communications Challenges 3, 2011
Proceedings of the 13th European Workshop on Dependable Computing, 2011
Proceedings of the Euro-Par 2011: Parallel Processing Workshops - CCPI, CGWS, HeteroPar, HiBB, HPCVirt, HPPC, HPSS, MDGS, ProPer, Resilience, UCHPC, VHPC, Bordeaux, France, August 29, 2011
On the Security of the Terminal Operations for Container Shipping in Multimodal Transport: the SIS-TEMA Project.
Proceedings of the CRiSIS 2011, 2011
2010
Intersection Approach to Vulnerability Handling.
Proceedings of the WEBIST 2010, 2010
Proceedings of the Mobile Lightweight Wireless Systems, 2010
Performance assessment of a distributed intrusion detection system in a real network scenario.
Proceedings of the CRiSIS 2010, 2010
2009
Increasing security and protection of SCADA systems through infrastructure resilience.
Int. J. Syst. Syst. Eng., 2009
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2009
2008
Proceedings of the Self-Organizing Systems, Third International Workshop, 2008
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project.
Proceedings of the Critical Information Infrastructure Security, 2008
2007
A Semantic Approach to Policy-based Management - Linking Policies to Ontologies.
Proceedings of the WINSYS 2007, 2007
2006
J. Commun. Networks, 2006
Comput. Commun., 2006
Techniques for available bandwidth measurement in IP networks: A performance comparison.
Comput. Networks, 2006
Ann. des Télécommunications, 2006
Pinball Caching: Improving Performance of a Framework for Dynamic Web-Content Adaptation and Deliver.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006
Proceedings of the Critical Information Infrastructures Security, 2006
2005
Comput. Commun., 2005
Proceedings of the NETWORKING 2005: Networking Technologies, 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
2004
SIGMETRICS Perform. Evaluation Rev., 2004
Managing service level agreements in Premium IP networks: a business-oriented approach.
Comput. Networks, 2004
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004
2003
IEEE Commun. Mag., 2003
Performance comparison of different techniques for available bandwidth measurement in packet switched network.
Proceedings of the IEEE International Conference on Virtual Environments, 2003
Proceedings of the Quality of Future Internet Services, COST Action 263 Final Report, 2003
2002
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002
Service Level Indication - A Proposal for QoS Monitoring in SLA-based Multidomain Networks.
Proceedings of the Converged Networking: Data and Real-time Communications over IP, 2002