VISE : Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems | 0 | 0.34 | 2021 |
The protection of LP-WAN Endpoints via TEE: a Chemical Storage Case Study | 0 | 0.34 | 2021 |
An abstract reasoning architecture for privacy policies monitoring | 1 | 0.35 | 2020 |
A comparative analysis of emerging approaches for securing java software with Intel SGX | 2 | 0.40 | 2019 |
Message from the SIS-SS 2018 Workshop Organizers. | 0 | 0.34 | 2018 |
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level | 1 | 0.41 | 2018 |
An OpenNCP-based Solution for Secure eHealth Data Exchange. | 6 | 0.66 | 2018 |
How to Protect Public Administration from Cybersecurity Threats: The COMPACT Project. | 0 | 0.34 | 2018 |
An Approach for Securing Critical Applications in Untrusted Clouds | 0 | 0.34 | 2018 |
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems. | 1 | 0.36 | 2018 |
SIL2 assessment of an Active/Standby COTS-based Safety-Related system. | 3 | 0.39 | 2018 |
Security in Cross - Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements | 0 | 0.34 | 2017 |
Cloudifying Critical Applications: A Use Case from the Power Grid Domain | 3 | 0.41 | 2017 |
Cloud security: Emerging threats and current solutions. | 15 | 0.82 | 2017 |
Addressing Security Issues In The Eheatlh Domain Relying On Siem Solutions | 1 | 0.39 | 2017 |
Real-time QoS monitoring from the end user perspective in large scale social networks. | 0 | 0.34 | 2017 |
A framework for mastering heterogeneity in multi-layer security information and event correlation. | 1 | 0.35 | 2016 |
Efficient Supply Chain Management via Federation-Based Integration of Legacy ERP Systems. | 0 | 0.34 | 2015 |
My Smart Home is Under Attack | 4 | 0.40 | 2015 |
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services | 3 | 0.44 | 2015 |
How to Monitor QoS in Cloud Infrastructures: The QoSMONaaS Approach | 1 | 0.38 | 2015 |
Monitoring service quality: methods and solutions to implement a managerial dash-board to improve software development. | 0 | 0.34 | 2014 |
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks | 1 | 0.35 | 2014 |
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking. | 0 | 0.34 | 2014 |
Exposing vulnerabilities in electric power grids: An experimental approach. | 9 | 0.82 | 2014 |
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study. | 5 | 0.51 | 2014 |
Effective QoS Monitoring in Large Scale Social Networks. | 7 | 0.50 | 2013 |
Flow Selection Techniques. | 0 | 0.34 | 2013 |
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks | 6 | 0.58 | 2013 |
A GPS Spoofing Resilient WAMS for Smart Grid. | 5 | 0.72 | 2013 |
International cooperation experiences: results achieved, lessons learned, and way ahead | 0 | 0.34 | 2012 |
An Intrusion and Fault Tolerant Forensic Storage for a SIEM System | 1 | 0.43 | 2012 |
Enhancing SIEM Technology to Protect Critical Infrastructures. | 10 | 0.74 | 2012 |
A Resilient Architecture for Forensic Storage of Events in Critical Infrastructures | 11 | 0.72 | 2012 |
Protecting the WSN zones of a critical infrastructure via enhanced SIEM technology | 2 | 0.40 | 2012 |
Security issues of a phasor data concentrator for smart grid infrastructure | 6 | 0.64 | 2011 |
Security analysis of smart grid data collection technologies | 5 | 0.73 | 2011 |
QoS monitoring in a cloud services environment: the SRT-15 approach | 17 | 1.36 | 2011 |
Integration of a system for critical infrastructure protection with the OSSIM SIEM platform: a dam case study | 12 | 0.80 | 2011 |
Using MPLS in a Wireless Mesh Network to Improve the Resiliency of SCADA Systems | 0 | 0.34 | 2010 |
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach | 6 | 0.68 | 2009 |
Increasing security and protection of SCADA systems through infrastructure resilience | 2 | 0.54 | 2009 |
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project | 3 | 0.61 | 2008 |
A Semi-Autonomic Framework for Intrusion Tolerance in Heterogeneous Networks | 3 | 0.52 | 2008 |
Resource allocation in multi-domain networks based on service level specifications. | 0 | 0.34 | 2006 |
High-speed intrusion detection in support of critical infrastructure protection | 8 | 0.78 | 2006 |
Behavioral network engineering: making intrusion detection become autonomic. | 2 | 0.38 | 2006 |
Techniques for available bandwidth measurement in IP networks: a performance comparison | 15 | 0.85 | 2006 |
INTERMON: an architecture for inter-domain monitoring, modelling and simulation | 2 | 0.45 | 2005 |
An architecture for automatic configuration of integrated networks | 2 | 0.44 | 2004 |