The impact of memory subsystem resource sharing on datacenter applications

L Tang, J Mars, N Vachharajani, R Hundt… - ACM SIGARCH …, 2011 - dl.acm.org
In this paper we study the impact of sharing memory resources on five Google datacenter
applications: a web search engine, bigtable, content analyzer, image stitching, and protocol …

My smart home is under attack

L Coppolino, V D'Alessandro… - 2015 IEEE 18th …, 2015 - ieeexplore.ieee.org
Home Automation is becoming more and more common in everyday life. In order to permit a
remote control of domestic devices a bridge between the Internet network and the Home …

Enhancing SIEM technology to protect critical infrastructures

L Coppolino, S D'Antonio, V Formicola… - … Security: 7th International …, 2013 - Springer
Coordinated and targeted cyber-attacks on Critical Infrastructures (CIs) and Supervisory
Control And Data Acquisition (SCADA) systems are increasing and becoming more …

A weight-based symptom correlation approach to SQL injection attacks

M Ficco, L Coppolino, L Romano - 2009 Fourth Latin-American …, 2009 - ieeexplore.ieee.org
Web applications are vulnerable to a variety of new security threats. SQL injection attacks
(SQLIAs) are one of the most significant of such threats. Researchers have proposed a wide …

Exploiting diversity and correlation to improve the performance of intrusion detection systems

L Coppolino, L Romano, S D'Antonio… - … on Network and …, 2009 - ieeexplore.ieee.org
Intrusion detection systems (IDSs) are one of the most widely used technologies for
computer security. Regrettably, current solutions are far from perfect, since they either …

An event correlation approach for fault diagnosis in scada infrastructures

M Ficco, A Daidone, L Coppolino, L Romano… - proceedings of the 13th …, 2011 - dl.acm.org
Supervisory Control and Data Acquisition (SCADA) systems control and monitor industrial
and critical infrastructure functions, including gas, water, electricity, and railway. Despite a …

MASSIF: A promising solution to enhance olympic games IT security

E Prieto, R Diaz, L Romano, R Rieke… - … Conference on e …, 2011 - Springer
Abstract Nowadays, Olympic Games have become one of the most profitable global media
events, becoming at the same way more and more attractive target from the terrorist …

From intrusion detection to intrusion detection and diagnosis: An ontology-based approach

L Coppolino, S D'Antonio, IA Elia, L Romano - Software Technologies for …, 2009 - Springer
Currently available products only provide some support in terms of Intrusion Prevention and
Intrusion Detection, but they very much lack Intrusion Diagnosis features. We discuss the …

Addressing security issues of electronic health record systems through enhanced siem technology

C Di Sarno, V Formicola, M Sicuranza… - … reliability and security, 2013 - ieeexplore.ieee.org
Electronic Health Records (EHR) are digital documents containing citizen medical
information that can be used for advanced eHealth services, like emergency patient …

A Markov chain-based Approximation of CCN caching Systems

HB Ammar, SA Chellouche… - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
To address the challenges raised by the Internet usage evolution over the last years, the
Content-Centric Networking (CCN) has been proposed. One key feature provided by CCN to …