Publications
Found 127 results
“Exploiting content spatial distribution to improve detection of intrusions”, ACM Transactions on Internet Technology, vol. 18, no. 2, 2018.
, “A Hierarchical Hybrid Framework for Modelling Anomalous Behaviours”, Simulation Modelling Practice and Theory, vol. 82, pp. 103-115, 2018.
, Il Futuro della Cybersecurity in Italia: Ambiti Progettuali Strategici. Consorzio Interuniversitario Nazionale per l'Informatica - CINI, 2018, pp. 1–226.
, “Using CalcuList To MapReduce Jsons”, in 22nd International Database Engineering & Applications Symposium (IDEAS 2018), 2018.
, “Verification and Control of Hybrid Systems under Safety Requirements”, in Joint 9th IFAC Symposium on Robust Control Design and 2nd IFAC Workshop on Linear Parameter Varying Systems, 2018.
, “2D Motif Basis Applied to the Classification of Digital Images”, The Computer Journal, vol. 60, no. 7, pp. 1096-1109, 2017.
, “CalcuList: a Functional Language Extended with Imperative Features”, 25th International Workshop on Functional and Logic Programming. Wuerzburg, Germany, 2017.
, “A cloud based framework for Emergency Management: experiences in Calabria Region”, in Italian Symposium on Advanced Database Systems, 2017.
, “Using Virtual Environments for the Assessment of Cybersecurity Issues in IoT Scenarios”, Simulation Modelling Practice and Theory, vol. 73, pp. 43-54, 2017.
, “Extending GOReM Through the RAMSoS Method for Supporting Modeling and Virtual Evaluation of the Systemic Risk”, in Proceedings of the 2nd INCOSE Italia Conference on Systems Engineering Turin, Italy, November 14-16, 2016, pp. 16-25.
, “Honeypot-powered Malware Reverse Engineering”, in 3rd IEEE International Symposium on Software Defined Systems (SDS-2016), Berlin, Germany, 2016, pp. 65-69.
, “Modeling cyber systemic risk for the business continuity plan of a Bank”, in The International Cross Domain Conference and Workshop (CD-ARES 2016), vol. 9817, Salzburg, Austria: Springer, 2016, pp. 158 – 174.
, “Requirements specification of a Cloud Service for Cyber Security Compliance Analysis”, in 2nd IEEE International Conference on Cloud Computing Technologies and Applications (CloudTech 2016), Marrakesh, Morocco, 2016, pp. 205 - 212.
, “ResDevOps: A Software Engineering Framework for Achieving Long-lasting Complex Systems”, in 24 IEEE International Requirements Engineering Conference (RE'16), Beijing, China, 2016, p. 246 -- 255.
, “SmallWorld: A Test and Training System for the Cyber-Security”, European Scientific Journal, pp. 139-145, 2016.
, “A Virtual Environment for the Enactment of Realistic Cyber Security Scenarios”, in 2nd IEEE International Conference on Cloud Computing Technologies and Applications (CloudTech 2016), Marrakesh, Morocco, 2016, pp. 351 - 358.
, “An Analytical Processing Approach to Supporting Cyber-Security Compliance Assessment”, in The 8th International Conference on Security of Information and Networks, Sochi, Russia, 2015, pp. 46-53.
, “Exploiting n-gram location for intrusion detection”, in 27th IEEE International Conference on Tools with Artificial Intelligence (ICTAI), Vietri sul Mare (SA), Italy, 2015, pp. 1093-1098.
, “A Hybrid Real-Time Command Governor Supervisory Scheme for Constrained Control Systems”, IEEE Transactions on Control Systems Technology, vol. 23, no. 3, pp. 924 - 936, 2015.
, “A multi-protocol framework for the development of collaborative virtual environments”, in 19th IEEE International Conference on Computer Supported Cooperative Work in Design, Calabria, Italy, 2015, pp. 449-454.
, “A safe supervisory flight control scheme in the presence of constraints and anomalies”, International Journal of Applied Mathematics and Computer Science, vol. 25, no. 1, pp. 39-51, 2015.
, “A Simulation Model for the Analysis of DDoS Amplification Attacks”, in UKSim-AMSS 17th International Conference on Modelling and Simulation , Cambridge, UK, 2015, pp. 267-272.
, “Mastering Concept Exploration in Large Industrial Research Projects”, in Proceedings of the INCOSE Italia Conference on Systems Engineering, CIISE 2014, Rome, Italy, November 24-25, 2014., 2014, pp. 26 - 37.
, “Modelling and Simulation of a Defense Strategy to Face Indirect DDoS Flooding Attacks”, in Internet and Distributed Computing Systems, vol. 8729, Springer International Publishing, 2014, pp. 263-274.
, “Towards Security as a Service (SecaaS): On the modeling of Security Services for Cloud Computing”, in Security Technology (ICCST), 2014 International Carnahan Conference on, Rome, Italy, 2014.
,