default search action
Valerio Formicola
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2021
- [j5]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Giovanni Mazzeo, Luigi Romano:
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems. IEEE Trans. Computers 70(5): 711-724 (2021) - 2018
- [j4]Saurabh Jha, Valerio Formicola, Catello Di Martino, Mark Dalton, William T. Kramer, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Resiliency of HPC Interconnects: A Case Study of Interconnect Failures and Recovery in Blue Waters. IEEE Trans. Dependable Secur. Comput. 15(6): 915-930 (2018) - 2016
- [j3]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano:
A framework for mastering heterogeneity in multi-layer security information and event correlation. J. Syst. Archit. 62: 78-88 (2016) - 2015
- [j2]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano:
Applying Extensions of Evidence Theory to Detect Frauds in Financial Infrastructures. Int. J. Distributed Sens. Networks 11: 980629:1-980629:16 (2015) - [j1]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Carmine Massei, Luigi Romano:
Use of the Dempster-Shafer theory to detect account takeovers in mobile money transfer services. J. Ambient Intell. Humaniz. Comput. 6(6): 753-762 (2015)
Conference and Workshop Papers
- 2022
- [c20]Abdul Manan, Ziran Min, Charif Mahmoudi, Valerio Formicola:
Extending 5G services with Zero Trust security pillars: a modular approach. AICCSA 2022: 1-6 - [c19]Cihan Tunc, James Durflinger, Charif Mahmoudi, Valerio Formicola:
Autonomic ZTA-based Network Management Engine (AZNME). ISSRE Workshops 2022: 25-30 - [c18]Akram Hakiri, Aniruddha S. Gokhale, Yogesh D. Barve, Valerio Formicola, Shashank Shekhar, Charif Mahmoudi, Mohammad Ashiqur Rahman, Uttam Ghosh, Syed Rafay Hasan, Terry N. Guo:
Techniques for Realizing Secure, Resilient and Differentiated 5G Operations. WMNC 2022: 113-117 - [c17]Ziran Min, Shashank Shekhar, Charif Mahmoudi, Valerio Formicola, Swapna S. Gokhale, Aniruddha Gokhale:
Software-defined Dynamic 5G Network Slice Management for Industrial Internet of Things. NCA 2022: 251-259 - [c16]Md Ali Reza Al Amin, Sachin Shetty, Valerio Formicola, Martin Otto:
Assessing the Quality of Differentially Private Synthetic Data for Intrusion Detection. SecureComm 2022: 473-490 - 2021
- [c15]Yuta Akiya, Kyle Thomas Le, Megan Luong, Justin C. Wilson, Anas Salah Eddin, Valerio Formicola, Mohamed El-Hadedy:
SHA-3-LPHP: Hardware Acceleration of SHA-3 for Low-Power High-Performance Systems. ISSRE Workshops 2021: 393-398 - 2016
- [c14]Key-whan Chung, Valerio Formicola, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Alexander Withers, Adam J. Slagell:
Attacking supercomputers through targeted alteration of environmental control: A data driven case study. CNS 2016: 406-410 - 2015
- [c13]Gianfranco Cerullo, Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Gaetano Papale, Bruno Ragucci:
Enabling Convergence of Physical and Logical Security Through Intelligent Event Correlation. IDC 2015: 427-437 - 2014
- [c12]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano:
Real-time Security & Dependability monitoring: Make it a bundle. ICCST 2014: 1-6 - [c11]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Carmine Massei, Luigi Romano:
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study. IDC 2014: 465-474 - [c10]Valerio Formicola, Antonio Di Pietro, Abdullah Alsubaie, Salvatore D'Antonio, José R. Martí:
Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems. Critical Infrastructure Protection 2014: 213-229 - 2013
- [c9]Cesario Di Sarno, Valerio Formicola, Mario Sicuranza, Giovanni Paragliola:
Addressing Security Issues of Electronic Health Record Systems through Enhanced SIEM Technology. ARES 2013: 646-653 - [c8]Alessia Garofalo, Cesario Di Sarno, Valerio Formicola:
Enhancing Intrusion Detection in Wireless Sensor Networks through Decision Trees. EWDC 2013: 1-15 - 2012
- [c7]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano:
Enhancing SIEM Technology to Protect Critical Infrastructures. CRITIS 2012: 10-21 - [c6]Luigi Romano, Salvatore D'Antonio, Valerio Formicola, Luigi Coppolino:
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology. SAFECOMP Workshops 2012: 222-234 - 2011
- [c5]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Francesco Oliviero, Luigi Romano:
On the Security of the Terminal Operations for Container Shipping in Multimodal Transport: the SIS-TEMA Project. CRiSIS 2011: 94-99 - [c4]Salvatore D'Antonio, Luigi Coppolino, Ivano Alessandro Elia, Valerio Formicola:
Security issues of a phasor data concentrator for smart grid infrastructure. EWDC 2011: 3-8 - [c3]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano:
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study. SAFECOMP 2011: 199-212 - 2010
- [c2]Salvatore D'Antonio, Valerio Formicola, Claudio Mazzariello, Francesco Oliviero, Simon Pietro Romano:
Performance assessment of a distributed intrusion detection system in a real network scenario. CRiSIS 2010: 1-8 - [c1]Francesco Cece, Valerio Formicola, Francesco Oliviero, Simon Pietro Romano:
An extended ns-2 for validation of load balancing algorithms in Content Delivery Networks. SimuTools 2010: 32
Informal and Other Publications
- 2022
- [i5]Ziran Min, Shashank Shekhar, Charif Mahmoudi, Valerio Formicola, Swapna S. Gokhale, Aniruddha Gokhale:
Dynamic 5G Network Slice Management Middleware for Industrial Internet of Things: Industry Paper. CoRR abs/2207.07219 (2022) - 2019
- [i4]Valerio Formicola, Saurabh Jha, Daniel Chen, Fei Deng, Amanda Bonnie, Mike Mason, Jim M. Brandt, Ann C. Gentile, Larry Kaplan, Jason Repik, Jeremy Enos, Mike Showerman, Annette Greiner, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Bill Kramer:
Understanding Fault Scenarios and Impacts through Fault Injection Experiments in Cielo. CoRR abs/1907.01019 (2019) - [i3]Vincenzo Giuliano, Valerio Formicola:
ICSrange: A Simulation-based Cyber Range Platform for Industrial Control Systems. CoRR abs/1909.01910 (2019) - 2014
- [i2]Gianfranco Cerullo, Valerio Formicola, Pietro Iamiglio, Luigi Sgaglione:
Critical Infrastructure Protection: having SIEM technology cope with network heterogeneity. CoRR abs/1404.7563 (2014) - [i1]Alessia Garofalo, Cesario Di Sarno, Ilaria Matteucci, Marco Vallini, Valerio Formicola:
Closing the loop of SIEM analysis to Secure Critical Infrastructures. CoRR abs/1405.2995 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint