Coppolino, Luigi
20  results:
Search for persons X
?
1

Exploiting Digital Twin technology for Cybersecurity Monito..:

, In: Proceedings of the 18th International Conference on Availability, Reliability and Security,
 
?
2

Detection of Radio Frequency Interference in Satellite Grou..:

, In: 2023 IEEE International Conference on Cyber Security and Resilience (CSR),
 
?
3

Awesome Trusted Execution Environment:

, In: 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S),
 
?
4

Critical Infrastructure Protection: Where Convergence of Lo..:

, In: Springer Series in Reliability Engineering; System Dependability and Analytics,
 
?
5

The protection of LP-WAN Endpoints via TEE: a Chemical Stor..:

, In: 2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW),
 
?
6

Privacy-Preserving Credit Scoring via Functional Encryption:

, In: Computational Science and Its Applications – ICCSA 2021; Lecture Notes in Computer Science,
 
?
7

Secure Cross-Border Exchange of Health Related Data: The KO..:

, In: 2019 15th European Dependable Computing Conference (EDCC),
 
?
8

Privacy Preserving Intrusion Detection Via Homomorphic Encr..:

, In: 2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE),
 
?
9

Protecting Critical Business Processes of Smart Hospitals f..:

, In: 2019 15th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS),
 
?
10

Secure Cross-Border Exchange of Health Related Data: The KO..:

, In: Internet and Distributed Computing Systems; Lecture Notes in Computer Science,
 
?
11

Exploiting New CPU Extensions for Secure Exchange of eHealt..:

, In: 2018 14th European Dependable Computing Conference (EDCC),
 
?
12

KONFIDO: An OpenNCP-Based Secure eHealth Data Exchange Syst..:

, In: Communications in Computer and Information Science; Security in Computer and Information Sciences,
 
?
13

An Approach for Securing Cloud-Based Wide Area Monitoring o..:

, In: Advances in Network-Based Information Systems; Lecture Notes on Data Engineering and Communications Technologies,
 
?
14

Security in Cross - Border Medical Data Interchange: A Tech..:

, In: 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC),
 
?
15

KONFIDO Project: A Secure Infrastructure Increasing Interop..:

, In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData),
 
1-15