Alberto Ferrante

According to our database1, Alberto Ferrante authored at least 42 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Relational Inductive Biases for Object-Centric Image Generation.
CoRR, 2023

2022
Precise Agriculture: Effective Deep Learning Strategies to Detect Pest Insects.
IEEE CAA J. Autom. Sinica, 2022

2019
Time, accuracy and power consumption tradeoff in mobile malware detection systems.
Comput. Secur., 2019

2018
Time Series Kernel Similarities for Predicting Paroxysmal Atrial Fibrillation from ECGs.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

2017
Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

2016
A Friend or a Foe? Detecting Malware using Memory and CPU Features.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Runtime Classification of Mobile Malware for Resource-Constrained Devices.
Proceedings of the E-Business and Telecommunications - 13th International Joint Conference, 2016

MalAware: Effective and Efficient Run-Time Mobile Malware Detector.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

What does the memory say? Towards the most indicative features for efficient malware detection.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
A general practitioner or a specialist for your infected smartphone?
CoRR, 2015

2014
Modeling Requirements for Security-enhanced Design of Embedded Systems.
Proceedings of the SECRYPT 2014, 2014

Risk Assessment of Atrial Fibrillation: a Failure Prediction Approach.
Proceedings of the Computing in Cardiology, CinC 2014, 2014

A Resource-Optimized Approach to Efficient Early Detection of Mobile Malware.
Proceedings of the Ninth International Conference on Availability, 2014

2013
An Algorithm for Extended Dynamic Range Video in Embedded Systems.
Proceedings of the SENSORNETS 2013, 2013

A Security-enhanced Design Methodology for Embedded Systems.
Proceedings of the SECRYPT 2013, 2013

2012
Security Enhanced Linux on embedded systems: A hardware-accelerated implementation.
Proceedings of the 17th Asia and South Pacific Design Automation Conference, 2012

2011
System policies for gradual tuning of security and workload in wireless sensor networks.
Proceedings of the 2011 Wireless Telecommunications Symposium, 2011

A Framework for Security and Workload Gradual Adaptation.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

A Framework for Dynamic Optimization of Security and Performances.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

2010
Gradual adaptation of security for sensor networks.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

QoS and Security in Energy-harvesting Wireless Sensor Networks.
Proceedings of the SECRYPT 2010, 2010

Dynamic Adaptation of Security and QoS in Energy-Harvesting Sensors Nodes.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

Security and Packets Delivery Trade-Off for WSN.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

Hardware-assisted security enhanced Linux in embedded systems: a proposal.
Proceedings of the 5th Workshop on Embedded Systems Security, 2010

2009
Enabling self-adaptivity in component-based streaming applications.
SIGBED Rev., 2009

Coordinated management of hardware and software self-adaptivity.
J. Syst. Archit., 2009

Run-time selection of security algorithms for networked devices.
Proceedings of the Q2SWinet'09, Proceedings of the Fifth ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Tenerife, Canary Islands, Spain, 2009

A Security Service Protocol for MANETs.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

Negotiation of security services: a multi-criteria decision approach.
Proceedings of the 4th Workshop on Embedded Systems Security, 2009

2008
A Protocol for Pervasive Distributed Computing Reliability.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

Network Interface Sharing Techniques for Area Optimized NoC Architectures.
Proceedings of the 11th Euromicro Conference on Digital System Design: Architectures, 2008

2007
Scheduling Small Packets in IPSec Multi-accelerator Based Systems.
J. Commun., 2007

A Query Unit for The IPSec Databases.
Proceedings of the SECRYPT 2007, 2007

Self-adaptive Security at Application Level: a Proposal.
Proceedings of the 3rd International Workshop on Reconfigurable Communication-centric Systems-on-Chip, 2007

IPSec Database Query Acceleration.
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007

A Memory Unit for Priority Management in IPSec Accelerators.
Proceedings of IEEE International Conference on Communications, 2007

2006
A design methodology for HW/SW security protocols.
PhD thesis, 2006

Scheduling small packets in IPSec-based systems.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

2005
Application-Driven Optimization of VLIW Architectures: A Hardware-Software Approach.
Proceedings of the 11th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2005), 2005

A QoS-enabled packet scheduling algorithm for IPSec multi-accelerator based systems.
Proceedings of the Second Conference on Computing Frontiers, 2005

2004
A Packet Scheduling Algorithm for IPSec Multi-Accelerator Based Systems.
Proceedings of the 15th IEEE International Conference on Application-Specific Systems, 2004


  Loading...