Healthcare-related data in the cloud: Challenges and opportunities V Casola, A Castiglione, KKR Choo, C Esposito IEEE cloud computing 3 (6), 10-14, 2016 | 120 | 2016 |
Security as a service using an SLA-based approach via SPECS M Rak, N Suri, J Luna, D Petcu, V Casola, U Villano 2013 IEEE 5th International Conference on Cloud Computing Technology and …, 2013 | 101 | 2013 |
An on-demand web tool for the unsupervised retrieval of earth’s surface deformation from SAR data: The P-SBAS service within the ESA G-POD environment C De Luca, R Cuccu, S Elefante, I Zinno, M Manunta, V Casola, G Rivolta, ... Remote Sensing 7 (11), 15630-15650, 2015 | 93 | 2015 |
A novel Security-by-Design methodology: modeling and assessing security by SLA with a quantitative approach V Casola, A De Benedictis, M Rak, U Villano Journal of Systems and Software, 110537, 2020 | 79 | 2020 |
Toward the automation of threat modeling and risk assessment in IoT systems V Casola, A De Benedictis, M Rak, U Villano Internet of Things 7, 100056, 2019 | 78 | 2019 |
A moving target defense approach for protecting resource-constrained distributed devices V Casola, A De Benedictis, M Albanese 2013 IEEE 14th International Conference on Information Reuse & Integration …, 2013 | 74 | 2013 |
Crosslingual named entity recognition for clinical de-identification applied to a COVID-19 Italian data set R Catelli, F Gargiulo, V Casola, G De Pietro, H Fujita, M Esposito Applied soft computing 97, 106779, 2020 | 71 | 2020 |
Automatically enforcing security slas in the cloud V Casola, A De Benedictis, M Eraşcu, J Modic, M Rak IEEE Transactions on Services Computing 10 (5), 741-755, 2016 | 62 | 2016 |
A SLA evaluation methodology in Service Oriented Architectures V Casola, A Mazzeo, N Mazzocca, M Rak Quality of Protection: Security Measurements and Metrics, 119-130, 2006 | 59 | 2006 |
A Reference Model for Security Level Evaluation: Policy and Fuzzy Techniques. V Casola, R Preziosi, M Rak, L Troiano J. Univers. Comput. Sci. 11 (1), 150-174, 2005 | 57 | 2005 |
Combining contextualized word representation and sub-document level analysis through Bi-LSTM+ CRF architecture for clinical de-identification R Catelli, V Casola, G De Pietro, H Fujita, M Esposito Knowledge-Based Systems 213, 106649, 2021 | 55 | 2021 |
A policy-based methodology for security evaluation: A security metric for public key infrastructures V Casola, A Mazzeo, N Mazzocca, V Vittorini Journal of Computer Security 15 (2), 197-229, 2007 | 54 | 2007 |
Cloud computing for earth surface deformation analysis via spaceborne radar imaging: A case study I Zinno, L Mossucca, S Elefante, C De Luca, V Casola, O Terzo, F Casu, ... IEEE Transactions on Cloud Computing 4 (1), 104-118, 2015 | 52 | 2015 |
An fpga-based smart classifier for decision support systems F Amato, M Barbareschi, V Casola, A Mazzeo Intelligent Distributed Computing VII: Proceedings of the 7th International …, 2014 | 49 | 2014 |
The CloudGrid approach: Security analysis and performance evaluation V Casola, A Cuomo, M Rak, U Villano Future Generation Computer Systems 29 (1), 387-401, 2013 | 49 | 2013 |
Security-by-design in clouds: a security-SLA driven methodology to build secure cloud applications V Casola, A De Benedictis, M Rak, E Rios Procedia Computer Science 97, 53-62, 2016 | 47 | 2016 |
Manipulating the attacker's view of a system's attack surface M Albanese, E Battista, S Jajodia, V Casola 2014 IEEE Conference on Communications and Network Security, 472-480, 2014 | 46 | 2014 |
A security monitoring system for internet of things V Casola, A De Benedictis, A Riccio, D Rivera, W Mallouli, EM de Oca Internet of Things 7, 100080, 2019 | 43 | 2019 |
A semantic enriched data model for sensor network interoperability F Amato, V Casola, A Gaglione, A Mazzeo Simulation Modelling Practice and Theory 19 (8), 1745-1757, 2011 | 42 | 2011 |
Security monitoring in the cloud: an SLA-based approach V Casola, A De Benedictis, M Rak 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 41 | 2015 |