default search action
Salvatore D'Antonio
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Marek Pawlicki, Aleksandra Pawlicka, Federica Uccello, Sebastian Szelest, Salvatore D'Antonio, Rafal Kozik, Michal Choras:
Evaluating the necessity of the multiple metrics for assessing explainable AI: A critical examination. Neurocomputing 602: 128282 (2024) - [c70]Mikolaj Komisarek, Marek Pawlicki, Salvatore D'Antonio, Rafal Kozik, Aleksandra Pawlicka, Michal Choras:
Enhancing Network Security Through Granular Computing: A Clustering-by-Time Approach to NetFlow Traffic Analysis. ARES 2024: 93:1-93:8 - [c69]Federica Uccello, Marek Pawlicki, Salvatore D'Antonio, Rafal Kozik, Michal Choras:
A Novel Approach to the Use of Explainability to Mine Network Intrusion Detection Rules. ACIIDS (1) 2024: 70-81 - [c68]Federica Uccello, Marek Pawlicki, Salvatore D'Antonio, Rafal Kozik, Michal Choras:
Towards Hybrid NIDS: Combining Rule-Based SIEM with AI-Based Intrusion Detectors. ACR 2024: 244-255 - [c67]Giovanni Maria Cristiano, Salvatore D'Antonio, Federica Uccello:
A Novel Approach for Securing Federated Learning: Detection and Defense Against Model Poisoning Attacks. CSR 2024: 664-669 - [c66]Salvatore D'Antonio, Jonah Giglio, Giovanni Mazzeo, Federica Uccello, Teresa Mannarino:
Enhancing Healthcare Data Confidentiality through Decentralized TEE Attestation. CSR 2024: 676-681 - [c65]Federica Uccello, Marek Pawlicki, Salvatore D'Antonio, Rafal Kozik, Michal Choras:
An Innovative Approach to Real-Time Concept Drift Detection in Network Security. EIDWT 2024: 130-139 - [c64]Federica Uccello, Marek Pawlicki, Salvatore D'Antonio, Rafal Kozik, Michal Choras:
Comparative Analysis of AI-Based Methods for Enhancing Cybersecurity Monitoring Systems. ICCSA (Workshops 2) 2024: 100-112 - [i5]Luigi Coppolino, Salvatore D'Antonio, Davide Iasio, Giovanni Mazzeo, Luigi Romano:
An Experimental Evaluation of TEE technology Evolution: Benchmarking Transparent Approaches based on SGX, SEV, and TDX. CoRR abs/2408.00443 (2024) - 2023
- [c63]Nikos Avgerinos, Salvatore D'Antonio, Irene Kamara, Christos Kotselidis, Ioannis Lazarou, Teresa Mannarino, Georgios Meditskos, Konstantina Papachristopoulou, Angelos Papoutsis, Paolo Roccetti, Martin Zuber:
A Practical and Scalable Privacy-preserving Framework. CSR 2023: 598-603 - [c62]Salvatore D'Antonio, Giannis Lazarou, Giovanni Mazzeo, Oana Stan, Martin Zuber, Ioannis Tsavdaridis:
The Alliance of HE and TEE to Enhance their Performance and Security. CSR 2023: 641-647 - [c61]Luigi Coppolino, Salvatore D'Antonio, Federica Uccello, Anastasios Lyratzis, Constantinos Bakalis, Souzana Touloumtzi, Ioannis Papoutsis:
Detection of Radio Frequency Interference in Satellite Ground Segments. CSR 2023: 648-653 - [c60]Federica Uccello, Marek Pawlicki, Salvatore D'Antonio, Rafal Kozik, Michal Choras:
Effective Rules for a Rule-Based SIEM System in Detecting DoS Attacks: An Association Rule Mining Approach. ICAI (2) 2023: 236-246 - [c59]Salvatore D'Antonio, Roberto Nardone, Nicola Russo, Federica Uccello:
A Tamper-Resistant Storage Framework for Smart Grid security. PDP 2023: 100-103 - 2022
- [j30]Luigi Coppolino, Salvatore D'Antonio, Vincenzo Giuliano, Giovanni Mazzeo, Luigi Romano:
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants. Comput. Ind. 136: 103589 (2022) - [j29]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione:
PriSIEM: Enabling privacy-preserving Managed Security Services. J. Netw. Comput. Appl. 203: 103397 (2022) - [j28]Luigi Coppolino, Luigi Sgaglione, Salvatore D'Antonio, Mario Magliulo, Luigi Romano, Roberto Pacelli:
Risk Assessment Driven Use of Advanced SIEM Technology for Cyber Protection of Critical e-Health Processes. SN Comput. Sci. 3(1): 16 (2022) - [c58]Salvatore D'Antonio, Federica Uccello:
Data Provenance for healthcare: a blockchain-based approach. COMPSAC 2022: 1655-1660 - 2021
- [j27]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Giovanni Mazzeo, Luigi Romano:
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems. IEEE Trans. Computers 70(5): 711-724 (2021) - [c57]Lorenzo Andolfo, Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Matthew Ficke, Arne Hollum, Darshan Vaydia:
Privacy-Preserving Credit Scoring via Functional Encryption. ICCSA (8) 2021: 31-43 - [c56]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Irene Bonetti, Elena Spagnuolo:
The protection of LP-WAN Endpoints via TEE: a Chemical Storage Case Study. ISSRE Workshops 2021: 345-352 - [c55]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Paolo Campegiani:
Facing the Blockchain Endpoint Vulnerability, an SGX-based Solution for Secure eHealth Auditing. ITASEC 2021: 298-308 - [i4]Lorenzo Andolfo, Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Matthew Ficke, Arne Hollum, Darshan Vaydia:
Privacy-preserving Credit Scoring via Functional Encryption. CoRR abs/2109.10606 (2021) - 2020
- [j26]Flora Amato, Luigi Coppolino, Salvatore D'Antonio, Nicola Mazzocca, Francesco Moscato, Luigi Sgaglione:
An abstract reasoning architecture for privacy policies monitoring. Future Gener. Comput. Syst. 106: 393-400 (2020) - [j25]Michal Choras, Salvatore D'Antonio, Jörg Keller, Rafal Kozik:
Practical Applications of Data Analysis, Classification and Anomaly Detection. J. Univers. Comput. Sci. 26(4): 432-433 (2020) - [j24]Michal Choras, Salvatore D'Antonio, Jörg Keller, Rafal Kozik:
Progress in Features, Data, Patterns and Similarity Analysis. J. Univers. Comput. Sci. 26(6): 647-648 (2020)
2010 – 2019
- 2019
- [j23]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano:
A comparative analysis of emerging approaches for securing java software with Intel SGX. Future Gener. Comput. Syst. 97: 620-633 (2019) - [j22]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione:
Securing the weak link of federated systems via trusted execution: a case study from the eHealth domain. Int. J. Crit. Comput. Based Syst. 9(4): 293-317 (2019) - [j21]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano:
A comprehensive survey of hardware-assisted security: From the edge to the cloud. Internet Things 6 (2019) - [c54]Luigi Coppolino, Salvatore D'Antonio, Luigi Romano, Luigi Sgaglione, Mario Magliulo, Roberto Pacelli:
Protecting Critical Business Processes of Smart Hospitals from Cyber Attacks. SITIS 2019: 363-367 - [c53]Luigi Sgaglione, Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Domenico Cotroneo, Andrea Scognamiglio:
Privacy Preserving Intrusion Detection Via Homomorphic Encryption. WETICE 2019: 321-326 - 2018
- [j20]Mariacarla Staffa, Luigi Sgaglione, Giovanni Mazzeo, Luigi Coppolino, Salvatore D'Antonio, Luigi Romano, Erol Gelenbe, Oana Stan, Sergiu Carpov, Evangelos Grivas, Paolo Campegiani, Luigi Castaldo, Konstantinos Votis, Vassilis Koutkias, Ioannis Komnios:
An OpenNCP-based Solution for Secure eHealth Data Exchange. J. Netw. Comput. Appl. 116: 65-85 (2018) - [j19]Giovanni Mazzeo, Luigi Coppolino, Salvatore D'Antonio, Claudio Mazzariello, Luigi Romano:
SIL2 assessment of an Active/Standby COTS-based Safety-Related system. Reliab. Eng. Syst. Saf. 176: 125-134 (2018) - [c52]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione:
How to Protect Public Administration from Cybersecurity Threats: The COMPACT Project. AINA Workshops 2018: 573-578 - [c51]Luca Vollero, Salvatore D'Antonio:
Message from the SIS-SS 2018 Workshop Organizers. COMPSAC (2) 2018: 789 - [c50]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione:
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level. EDCC 2018: 17-24 - [c49]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione:
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems. NBiS 2018: 952-959 - [c48]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Gaetano Papale, Luigi Sgaglione, Ferdinando Campanile:
An Approach for Securing Critical Applications in Untrusted Clouds. PDP 2018: 436-440 - 2017
- [j18]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano:
Cloud security: Emerging threats and current solutions. Comput. Electr. Eng. 59: 126-140 (2017) - [j17]Luigi Coppolino, Salvatore D'Antonio, Luigi Romano, Fotis Aisopos, Konstantinos Tserpes:
Real-time QoS monitoring from the end user perspective in large scale social networks. Int. J. Comput. Sci. Eng. 14(2): 93-104 (2017) - [c47]Raffaele Martino, Salvatore D'Antonio, Luigi Coppolino, Luigi Romano:
Security in Cross - Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements. COMPSAC (2) 2017: 317-322 - [c46]Luigi Coppolino, Salvatore D'Antonio, Luigi Romano, Luigi Sgaglione, Mariacarla Staffa:
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions. COMPSAC (2) 2017: 510-515 - [c45]Luigi Coppolino, Salvatore D'Antonio, Luigi Romano, Mariacarla Staffa:
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level Among eHealth Services Across Europe. iThings/GreenCom/CPSCom/SmartData 2017: 342-347 - [c44]Ferdinando Campanile, Luigi Coppolino, Salvatore D'Antonio, Leonid Lev, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione, Francesco Tessitore:
Cloudifying Critical Applications: A Use Case from the Power Grid Domain. PDP 2017: 363-370 - 2016
- [j16]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano:
A framework for mastering heterogeneity in multi-layer security information and event correlation. J. Syst. Archit. 62: 78-88 (2016) - [c43]Ferdinando Campanile, Gianfranco Cerullo, Salvatore D'Antonio, Giovanni Mazzeo, Gaetano Papale, Luigi Sgaglione:
A Multi-sensor Data Fusion Approach for Detecting Direct Debit Frauds. INCoS 2016: 480-485 - 2015
- [j15]Giuseppe Cicotti, Luigi Coppolino, Salvatore D'Antonio, Luigi Romano:
How to monitor QoS in cloud infrastructures: the QoSMONaaS approach. Int. J. Comput. Sci. Eng. 11(1): 29-45 (2015) - [j14]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano:
Applying Extensions of Evidence Theory to Detect Frauds in Financial Infrastructures. Int. J. Distributed Sens. Networks 11: 980629:1-980629:16 (2015) - [j13]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Carmine Massei, Luigi Romano:
Use of the Dempster-Shafer theory to detect account takeovers in mobile money transfer services. J. Ambient Intell. Humaniz. Comput. 6(6): 753-762 (2015) - [j12]Giuseppe Cicotti, Luigi Coppolino, Salvatore D'Antonio, Luigi Romano:
Runtime Model Checking for SLA Compliance Monitoring and QoS Prediction. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(2): 4-20 (2015) - [c42]Luigi Coppolino, Salvatore D'Antonio, Luigi Romano, Gaetano Papale, Luigi Sgaglione, Ferdinando Campanile:
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns. 3PGCIC 2015: 713-717 - [c41]Luigi Coppolino, Valerio D'Alessandro, Salvatore D'Antonio, Leonid Lev, Luigi Romano:
My Smart Home is Under Attack. CSE 2015: 145-151 - [c40]Fabio Baselice, Luigi Coppolino, Salvatore D'Antonio, Giampaolo Ferraioli, Luigi Sgaglione:
A DBSCAN based approach for jointly segment and classify brain MR images. EMBC 2015: 2993-2996 - [c39]Salvatore D'Antonio, Giuliano Gugliara, Carlo Francesco Romano, Luigi Romano:
A Workflow Service Mediator for Automated Information Processing and Scheduling Delivery to an Archive. ESOCC Workshops 2015: 126-140 - [c38]Massimo Ficco, Salvatore D'Antonio:
2nd Workshop on Cyber Security and Resilience of Large-Scale Systems. IDC 2015: 401 - [c37]Gianfranco Cerullo, Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Gaetano Papale, Bruno Ragucci:
Enabling Convergence of Physical and Logical Security Through Intelligent Event Correlation. IDC 2015: 427-437 - [c36]Luigi Coppolino, Salvatore D'Antonio, Carmine Massei, Luigi Romano:
Efficient Supply Chain Management via Federation-Based Integration of Legacy ERP Systems. SoMeT 2015: 378-387 - 2014
- [j11]Luigi Coppolino, Salvatore D'Antonio, Luigi Romano:
Exposing vulnerabilities in electric power grids: An experimental approach. Int. J. Crit. Infrastructure Prot. 7(1): 51-60 (2014) - [c35]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano:
Real-time Security & Dependability monitoring: Make it a bundle. ICCST 2014: 1-6 - [c34]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Carmine Massei, Luigi Romano:
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study. IDC 2014: 465-474 - [c33]Valerio Formicola, Antonio Di Pietro, Abdullah Alsubaie, Salvatore D'Antonio, José R. Martí:
Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems. Critical Infrastructure Protection 2014: 213-229 - [c32]Francesco Buccafurri, Luigi Coppolino, Salvatore D'Antonio, Alessia Garofalo, Gianluca Lax, Antonino Nocera, Luigi Romano:
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks. SAFECOMP 2014: 214-229 - [i3]David Luigi Fuschi, Manuela Tvaronaviciene, Salvatore D'Antonio:
Monitoring service quality: methods and solutions to implement a managerial dash-board to improve software development. CoRR abs/1404.7558 (2014) - [i2]Giuseppe Cicotti, Luigi Coppolino, Salvatore D'Antonio, Luigi Romano:
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking. CoRR abs/1405.0327 (2014) - 2013
- [c31]Luigi Coppolino, Salvatore D'Antonio, Alessia Garofalo, Luigi Romano:
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks. 3PGCIC 2013: 247-254 - [c30]Alessia Garofalo, Cesario Di Sarno, Luigi Coppolino, Salvatore D'Antonio:
A GPS Spoofing Resilient WAMS for Smart Grid. EWDC 2013: 134-147 - [c29]Luigi Coppolino, Salvatore D'Antonio, Luigi Romano, Fotis Aisopos, Konstantinos Tserpes:
Effective QoS Monitoring in Large Scale Social Networks. IDC 2013: 249-259 - [i1]Salvatore D'Antonio, Tanja Zseby, Christian Henke, Lorenzo Peluso:
Flow Selection Techniques. RFC 7014: 1-33 (2013) - 2012
- [j10]Aladino Amantini, Michal Choras, Salvatore D'Antonio, Elyoenai Egozcue, Daniel Germanus, Reinhard Hutter:
The human role in tools for improving robustness and resilience of critical infrastructures. Cogn. Technol. Work. 14(2): 143-155 (2012) - [c28]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano:
Enhancing SIEM Technology to Protect Critical Infrastructures. CRITIS 2012: 10-21 - [c27]Muhammad Afzaal, Cesario Di Sarno, Luigi Coppolino, Salvatore D'Antonio, Luigi Romano:
A Resilient Architecture for Forensic Storage of Events in Critical Infrastructures. HASE 2012: 48-55 - [c26]Giuseppe Cicotti, Salvatore D'Antonio, Rosario Cristaldi, Antonio Sergio:
How to Monitor QoS in Cloud Infrastructures: The QoSMONaaS Approach. IDC 2012: 253-262 - [c25]Luigi Romano, Salvatore D'Antonio, Valerio Formicola, Luigi Coppolino:
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology. SAFECOMP Workshops 2012: 222-234 - [c24]Craig Gibson, Matteo Melideo, Luigi Romano, Salvatore D'Antonio:
International Cooperation Experiences: Results Achieved, Lessons Learned, and Way Ahead. SAFECOMP Workshops 2012: 259-270 - [c23]Muhammad Afzaal, Cesario Di Sarno, Salvatore D'Antonio, Luigi Romano:
An Intrusion and Fault Tolerant Forensic Storage for a SIEM System. SITIS 2012: 579-586 - 2011
- [c22]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Francesco Oliviero, Luigi Romano:
On the Security of the Terminal Operations for Container Shipping in Multimodal Transport: the SIS-TEMA Project. CRiSIS 2011: 94-99 - [c21]Giuseppe Cicotti, Luigi Coppolino, Rosario Cristaldi, Salvatore D'Antonio, Luigi Romano:
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach. Euro-Par Workshops (1) 2011: 15-24 - [c20]Salvatore D'Antonio, Luigi Coppolino, Ivano Alessandro Elia, Valerio Formicola:
Security issues of a phasor data concentrator for smart grid infrastructure. EWDC 2011: 3-8 - [c19]Michal Choras, Salvatore D'Antonio, Giulio Iannello, Andreas Jedlitschka, Rafal Kozik, Klaus Miesenberger, Adam Woloszczuk:
Innovative Man Machine Interfaces and Solutions to Support Totally Blind People. IP&C 2011: 437-444 - [c18]Luigi Coppolino, Salvatore D'Antonio, Ivano Alessandro Elia, Luigi Romano:
Security Analysis of Smart Grid Data Collection Technologies. SAFECOMP 2011: 143-156 - [c17]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano:
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study. SAFECOMP 2011: 199-212 - 2010
- [c16]Salvatore D'Antonio, Valerio Formicola, Claudio Mazzariello, Francesco Oliviero, Simon Pietro Romano:
Performance assessment of a distributed intrusion detection system in a real network scenario. CRiSIS 2010: 1-8 - [c15]Stefano Avallone, Salvatore D'Antonio:
Using MPLS in a Wireless Mesh Network to Improve the Resiliency of SCADA Systems. MOBILIGHT 2010: 440-450 - [c14]Michal Choras, Salvatore D'Antonio, Rafal Kozik, Witold Holubowicz:
Intersection Approach to Vulnerability Handling. WEBIST (1) 2010: 171-174
2000 – 2009
- 2009
- [j9]Salvatore D'Antonio, Luigi Romano, Abdelmajid Khelil, Neeraj Suri:
Increasing security and protection of SCADA systems through infrastructure resilience. Int. J. Syst. Syst. Eng. 1(4): 401-413 (2009) - [c13]Luigi Coppolino, Salvatore D'Antonio, Ivano Alessandro Elia, Luigi Romano:
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach. SEUS 2009: 192-202 - 2008
- [c12]Salvatore D'Antonio, Luigi Romano, Abdelmajid Khelil, Neeraj Suri:
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project. CRITIS 2008: 109-118 - [c11]Salvatore D'Antonio, Simon Pietro Romano, Steven Simpson, Paul Smith, David Hutchison:
A Semi-Autonomic Framework for Intrusion Tolerance in Heterogeneous Networks. IWSOS 2008: 230-241 - 2007
- [c10]Stefano Avallone, Salvatore D'Antonio, Simon Pietro Romano:
A Semantic Approach to Policy-based Management - Linking Policies to Ontologies. WINSYS 2007: 311-317 - 2006
- [j8]Salvatore D'Antonio, Marcello Esposito, Francesco Oliviero, Simon Pietro Romano, Dario Salvi:
Behavioral network engineering: making intrusion detection become autonomic. Ann. des Télécommunications 61(9-10): 1136-1148 (2006) - [j7]Leopoldo Angrisani, Salvatore D'Antonio, Marcello Esposito, Michele Vadursi:
Techniques for available bandwidth measurement in IP networks: A performance comparison. Comput. Networks 50(3): 332-349 (2006) - [j6]Maurizio Molina, Agostino Chiosi, Salvatore D'Antonio, Giorgio Ventre:
Design principles and algorithms for effective high-speed IP flow monitoring. Comput. Commun. 29(10): 1653-1664 (2006) - [j5]Stefano Avallone, Salvatore D'Antonio, Marcello Esposito, Simon Pietro Romano, Giorgio Ventre:
Resource allocation in multi-domain networks based on service level specifications. J. Commun. Networks 8(1): 106-115 (2006) - [c9]Salvatore D'Antonio, Francesco Oliviero, Roberto Setola:
High-Speed Intrusion Detection in Support of Critical Infrastructure Protection. CRITIS 2006: 222-234 - [c8]Salvatore D'Antonio, Marcello Esposito, Simon Pietro Romano:
Pinball Caching: Improving Performance of a Framework for Dynamic Web-Content Adaptation and Deliver. ISCC 2006: 768-773 - 2005
- [j4]Salvatore D'Antonio, Marcello Esposito, Simon Pietro Romano, Giorgio Ventre:
Time-aware admission control on top of time-unaware network infrastructures. Comput. Commun. 28(4): 405-416 (2005) - [c7]Alessio Botta, Salvatore D'Antonio, Antonio Pescapè, Giorgio Ventre:
BET: A Hybrid Bandwidth Estimation Tool. ICPADS (2) 2005: 520-524 - [c6]Elisa Boschi, Salvatore D'Antonio, Paul Malone, Carsten Schmoll:
INTERMON: An Architecture for Inter-domain Monitoring, Modelling and Simulation. NETWORKING 2005: 1397-1400 - 2004
- [j3]Salvatore D'Antonio, Maurizio D'Arienzo, Marcello Esposito, Simon Pietro Romano, Giorgio Ventre:
Managing service level agreements in Premium IP networks: a business-oriented approach. Comput. Networks 46(6): 853-866 (2004) - [j2]Salvatore D'Antonio, Marcello Esposito, Simon Pietro Romano, Giorgio Ventre:
Assessing the scalability of component-based frameworks: the CADENUS case study. SIGMETRICS Perform. Evaluation Rev. 32(3): 34-43 (2004) - [c5]Salvatore D'Antonio, Maurizio D'Arienzo, Antonio Pescapè, Simon Pietro Romano, Giorgio Ventre:
Using Metadata in SLA Negotiation over Premium IP Networks. ICDCS Workshops 2004: 30-35 - [c4]Salvatore D'Antonio, Maurizio D'Arienzo, Antonio Pescapè, Giorgio Ventre:
An architecture for automatic configuration of integrated networks. NOMS (1) 2004: 351-364 - 2003
- [j1]Giovanni Cortese, Roberto Fiutem, Piergiorgio Cremonese, Salvatore D'Antonio, Marcello Esposito, Simon Pietro Romano, Ada Diaconescu:
Cadenus: creation and deployment of end-user services in premium IP networks. IEEE Commun. Mag. 41(1): 54-60 (2003) - [c3]Leopoldo Angrisani, Salvatore D'Antonio, Michele Vadursi, Giorgio Ventre:
Performance comparison of different techniques for available bandwidth measurement in packet switched network. VECIMS 2003: 212-217 - [p1]Gunnar Karlsson, James Roberts, Ioannis Stavrakakis, Antonio Alves, Stefano Avallone, Fernando Boavida, Salvatore D'Antonio, Marcello Esposito, Viktória Fodor, Mauro Gargiulo, Jarmo Harju, Yevgeni Koucheryavy, Fengyi Li, Ian Marsh, Ignacio Más Ivars, Dmitri Moltchanov, Edmundo Monteiro, Antonis Panagakis, Antonio Pescapè, Gonçalo Quadros, Simon Pietro Romano, Giorgio Ventre:
Traffic Management. QofIS Final Report 2003: 10-79 - 2002
- [c2]Salvatore D'Antonio, Maurizio D'Arienzo, Mauro Gargiulo, Simon Pietro Romano, Giorgio Ventre:
Service Level Indication - A Proposal for QoS Monitoring in SLA-based Multidomain Networks. INTERWORKING 2002: 67-78 - [c1]Salvatore D'Antonio, B. Fadini, Simon Pietro Romano, Giorgio Ventre:
Designing service negotiation entities for the electronic market-place. SEKE 2002: 665-672
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint