Name
Affiliation
Papers
SALVATORE D'ANTONIO
Unvivers Naples Parthenope, Naples, Italy
50
Collaborators
Citations 
PageRank 
73
182
25.04
Referers 
Referees 
References 
438
752
330
Search Limit
100752
Title
Citations
PageRank
Year
VISE : Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems00.342021
The protection of LP-WAN Endpoints via TEE: a Chemical Storage Case Study00.342021
An abstract reasoning architecture for privacy policies monitoring10.352020
A comparative analysis of emerging approaches for securing java software with Intel SGX20.402019
Message from the SIS-SS 2018 Workshop Organizers.00.342018
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level10.412018
An OpenNCP-based Solution for Secure eHealth Data Exchange.60.662018
How to Protect Public Administration from Cybersecurity Threats: The COMPACT Project.00.342018
An Approach for Securing Critical Applications in Untrusted Clouds00.342018
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems.10.362018
SIL2 assessment of an Active/Standby COTS-based Safety-Related system.30.392018
Security in Cross - Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements00.342017
Cloudifying Critical Applications: A Use Case from the Power Grid Domain30.412017
Cloud security: Emerging threats and current solutions.150.822017
Addressing Security Issues In The Eheatlh Domain Relying On Siem Solutions10.392017
Real-time QoS monitoring from the end user perspective in large scale social networks.00.342017
A framework for mastering heterogeneity in multi-layer security information and event correlation.10.352016
Efficient Supply Chain Management via Federation-Based Integration of Legacy ERP Systems.00.342015
My Smart Home is Under Attack40.402015
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services30.442015
How to Monitor QoS in Cloud Infrastructures: The QoSMONaaS Approach10.382015
Monitoring service quality: methods and solutions to implement a managerial dash-board to improve software development.00.342014
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks10.352014
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking.00.342014
Exposing vulnerabilities in electric power grids: An experimental approach.90.822014
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study.50.512014
Effective QoS Monitoring in Large Scale Social Networks.70.502013
Flow Selection Techniques.00.342013
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks60.582013
A GPS Spoofing Resilient WAMS for Smart Grid.50.722013
International cooperation experiences: results achieved, lessons learned, and way ahead00.342012
An Intrusion and Fault Tolerant Forensic Storage for a SIEM System10.432012
Enhancing SIEM Technology to Protect Critical Infrastructures.100.742012
A Resilient Architecture for Forensic Storage of Events in Critical Infrastructures110.722012
Protecting the WSN zones of a critical infrastructure via enhanced SIEM technology20.402012
Security issues of a phasor data concentrator for smart grid infrastructure60.642011
Security analysis of smart grid data collection technologies50.732011
QoS monitoring in a cloud services environment: the SRT-15 approach171.362011
Integration of a system for critical infrastructure protection with the OSSIM SIEM platform: a dam case study120.802011
Using MPLS in a Wireless Mesh Network to Improve the Resiliency of SCADA Systems00.342010
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach60.682009
Increasing security and protection of SCADA systems through infrastructure resilience20.542009
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project30.612008
A Semi-Autonomic Framework for Intrusion Tolerance in Heterogeneous Networks30.522008
Resource allocation in multi-domain networks based on service level specifications.00.342006
High-speed intrusion detection in support of critical infrastructure protection80.782006
Behavioral network engineering: making intrusion detection become autonomic.20.382006
Techniques for available bandwidth measurement in IP networks: a performance comparison150.852006
INTERMON: an architecture for inter-domain monitoring, modelling and simulation20.452005
An architecture for automatic configuration of integrated networks20.442004