Publications
Found 117 results
“Honeypot-powered Malware Reverse Engineering”, in 3rd IEEE International Symposium on Software Defined Systems (SDS-2016), Berlin, Germany, 2016, pp. 65-69.
, “Modeling cyber systemic risk for the business continuity plan of a Bank”, in The International Cross Domain Conference and Workshop (CD-ARES 2016), vol. 9817, Salzburg, Austria: Springer, 2016, pp. 158 – 174.
, “Requirements specification of a Cloud Service for Cyber Security Compliance Analysis”, in 2nd IEEE International Conference on Cloud Computing Technologies and Applications (CloudTech 2016), Marrakesh, Morocco, 2016, pp. 205 - 212.
, “ResDevOps: A Software Engineering Framework for Achieving Long-lasting Complex Systems”, in 24 IEEE International Requirements Engineering Conference (RE'16), Beijing, China, 2016, p. 246 -- 255.
, “SmallWorld: A Test and Training System for the Cyber-Security”, European Scientific Journal, pp. 139-145, 2016.
, “A Virtual Environment for the Enactment of Realistic Cyber Security Scenarios”, in 2nd IEEE International Conference on Cloud Computing Technologies and Applications (CloudTech 2016), Marrakesh, Morocco, 2016, pp. 351 - 358.
, “An Analytical Processing Approach to Supporting Cyber-Security Compliance Assessment”, in The 8th International Conference on Security of Information and Networks, Sochi, Russia, 2015, pp. 46-53.
, “Exploiting n-gram location for intrusion detection”, in 27th IEEE International Conference on Tools with Artificial Intelligence (ICTAI), Vietri sul Mare (SA), Italy, 2015, pp. 1093-1098.
, “A Hybrid Real-Time Command Governor Supervisory Scheme for Constrained Control Systems”, IEEE Transactions on Control Systems Technology, vol. 23, no. 3, pp. 924 - 936, 2015.
, “A multi-protocol framework for the development of collaborative virtual environments”, in 19th IEEE International Conference on Computer Supported Cooperative Work in Design, Calabria, Italy, 2015, pp. 449-454.
, “A safe supervisory flight control scheme in the presence of constraints and anomalies”, International Journal of Applied Mathematics and Computer Science, vol. 25, no. 1, pp. 39-51, 2015.
, “A Simulation Model for the Analysis of DDoS Amplification Attacks”, in UKSim-AMSS 17th International Conference on Modelling and Simulation , Cambridge, UK, 2015, pp. 267-272.
, “Mastering Concept Exploration in Large Industrial Research Projects”, in Proceedings of the INCOSE Italia Conference on Systems Engineering, CIISE 2014, Rome, Italy, November 24-25, 2014., 2014, pp. 26 - 37.
, “Modelling and Simulation of a Defense Strategy to Face Indirect DDoS Flooding Attacks”, in Internet and Distributed Computing Systems, vol. 8729, Springer International Publishing, 2014, pp. 263-274.
, “Towards Security as a Service (SecaaS): On the modeling of Security Services for Cloud Computing”, in Security Technology (ICCST), 2014 International Carnahan Conference on, Rome, Italy, 2014.
, “Agent methodological layers in Repast Simphony”, in Proc. of 27th European Conference on Modelling and Simulation (ECMS'2013), Alesund, Norway, 2013.
, “Application of the Artificial Neural Network for blood pressure evaluation with smartphones”, in 7th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), 2013, 2013.
, “An hybrid command governor supervisory scheme for flight control systems subject to unpredictable anomalies”, in Control and Fault-Tolerant Systems (SysTol), 2013 Conference on, 2013.
, “Image Classification Based on 2D Feature Motifs”, in Flexible Query Answering Systems - 10th International Conference, FQAS 2013, Granada, Spain, September 18-20, 2013. Proceedings, Granada, Spain, 2013, pp. 340 - 351.
, “Modelling Java concurrency: An approach and a UPPAAL library”, in 2013 Federated Conference on Computer Science and Information Systems, FedCSIS 2013 , 2013, pp. 1373-1380.
, “Using time stream Petri nets for workflow modelling analysis and enactment”, SIMULATION, vol. 89, pp. 68-86, 2013.
, “Agents Over The Grid: An Experience Using The Globus Toolkit 4”, in Proc. of the 26th European Conference on Modelling and Simulation (ECMS'2012), Koblenz, Germany, 2012, pp. 78–85.
, “Development of a Schedulability Analysis Framework Based on pTPN and UPPAAL with Stopwatches”, in Proc. of IEEE/ACM 16th International Symposium on Distributed Simulation and Real Time Applications (DS-RT 2012), Dublin, Ireland, 2012, pp. 57–64.
, “Model checking time-dependent system specifications using Time Stream Petri Nets and Uppaal”, Applied Mathematics and Computation, vol. 218, pp. 8160 - 8186, 2012.
, “Dynamic Sociality Minority Game”, in Proc. of European Conference on Modelling and Simulation, Krakow, 2011, pp. 27–35.
,