The impact of memory subsystem resource sharing on datacenter applications
In this paper we study the impact of sharing memory resources on five Google datacenter
applications: a web search engine, bigtable, content analyzer, image stitching, and protocol …
applications: a web search engine, bigtable, content analyzer, image stitching, and protocol …
My smart home is under attack
L Coppolino, V D'Alessandro… - 2015 IEEE 18th …, 2015 - ieeexplore.ieee.org
Home Automation is becoming more and more common in everyday life. In order to permit a
remote control of domestic devices a bridge between the Internet network and the Home …
remote control of domestic devices a bridge between the Internet network and the Home …
Enhancing SIEM technology to protect critical infrastructures
Coordinated and targeted cyber-attacks on Critical Infrastructures (CIs) and Supervisory
Control And Data Acquisition (SCADA) systems are increasing and becoming more …
Control And Data Acquisition (SCADA) systems are increasing and becoming more …
A weight-based symptom correlation approach to SQL injection attacks
M Ficco, L Coppolino, L Romano - 2009 Fourth Latin-American …, 2009 - ieeexplore.ieee.org
Web applications are vulnerable to a variety of new security threats. SQL injection attacks
(SQLIAs) are one of the most significant of such threats. Researchers have proposed a wide …
(SQLIAs) are one of the most significant of such threats. Researchers have proposed a wide …
Exploiting diversity and correlation to improve the performance of intrusion detection systems
L Coppolino, L Romano, S D'Antonio… - … on Network and …, 2009 - ieeexplore.ieee.org
Intrusion detection systems (IDSs) are one of the most widely used technologies for
computer security. Regrettably, current solutions are far from perfect, since they either …
computer security. Regrettably, current solutions are far from perfect, since they either …
An event correlation approach for fault diagnosis in scada infrastructures
M Ficco, A Daidone, L Coppolino, L Romano… - proceedings of the 13th …, 2011 - dl.acm.org
Supervisory Control and Data Acquisition (SCADA) systems control and monitor industrial
and critical infrastructure functions, including gas, water, electricity, and railway. Despite a …
and critical infrastructure functions, including gas, water, electricity, and railway. Despite a …
MASSIF: A promising solution to enhance olympic games IT security
Abstract Nowadays, Olympic Games have become one of the most profitable global media
events, becoming at the same way more and more attractive target from the terrorist …
events, becoming at the same way more and more attractive target from the terrorist …
From intrusion detection to intrusion detection and diagnosis: An ontology-based approach
Currently available products only provide some support in terms of Intrusion Prevention and
Intrusion Detection, but they very much lack Intrusion Diagnosis features. We discuss the …
Intrusion Detection, but they very much lack Intrusion Diagnosis features. We discuss the …
Addressing security issues of electronic health record systems through enhanced siem technology
C Di Sarno, V Formicola, M Sicuranza… - … reliability and security, 2013 - ieeexplore.ieee.org
Electronic Health Records (EHR) are digital documents containing citizen medical
information that can be used for advanced eHealth services, like emergency patient …
information that can be used for advanced eHealth services, like emergency patient …
A Markov chain-based Approximation of CCN caching Systems
HB Ammar, SA Chellouche… - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
To address the challenges raised by the Internet usage evolution over the last years, the
Content-Centric Networking (CCN) has been proposed. One key feature provided by CCN to …
Content-Centric Networking (CCN) has been proposed. One key feature provided by CCN to …