Andrea Ceccarelli

Orcid: 0000-0002-2291-2428

According to our database1, Andrea Ceccarelli authored at least 120 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Detection Latencies of Anomaly Detectors: An Overlooked Perspective ?
CoRR, 2024

ROSpace: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical System.
CoRR, 2024

2023
Safe Maintenance of Railways using COTS Mobile Devices: The Remote Worker Dashboard.
ACM Trans. Cyber Phys. Syst., October, 2023

Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection.
Comput. Secur., April, 2023

RGB Cameras Failures and Their Effects in Autonomous Driving Applications.
IEEE Trans. Dependable Secur. Comput., 2023

On the Efficacy of Metrics to Describe Adversarial Attacks.
CoRR, 2023

Evaluating Object (Mis)Detection From a Safety and Reliability Perspective: Discussion and Measures.
IEEE Access, 2023

Tolerate Failures of the Visual Camera With Robust Image Classifiers.
IEEE Access, 2023

Detection of Adversarial Attacks by Observing Deep Features with Structured Data Algorithms.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

Anomaly Detectors for Self-Aware Edge and IoT Devices.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

Towards Robust Visual Odometry Systems Against Camera Lens Failures.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, ISSRE 2023, 2023

Intrusion detection without attack knowledge: generating out-of-distribution tabular data.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

Ensembling Uncertainty Measures to Improve Safety of Black-Box Classifiers.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

2022
FUSION - Fog Computing and Blockchain for Trusted Industrial Internet of Things.
IEEE Trans. Engineering Management, 2022

A cyber-physical-social approach for engineering Functional Safety Requirements for automotive systems.
J. Syst. Softw., 2022

Safety-aware metrics for object detectors in autonomous driving.
CoRR, 2022

Prepare for Trouble and Make it Double. Supervised and Unsupervised Stacking for AnomalyBased Intrusion Detection.
CoRR, 2022

Attacks and Faults Injection in Self-Driving Agents on the Carla Simulator - Experience Report.
CoRR, 2022

Towards a General Model for Intrusion Detection: An Exploratory Study.
Proceedings of the Machine Learning and Principles and Practice of Knowledge Discovery in Databases, 2022

Federated and Generative Data Sharing for Data-Driven Security: Challenges and Approach.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

Failure modes and failure mitigation in GPGPUs: a reference model and its application.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

2021
MADneSs: A Multi-Layer Anomaly Detection Framework for Complex Dynamic Systems.
IEEE Trans. Dependable Secur. Comput., 2021

Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape.
Trans. Data Sci., 2021

A model to discipline autonomy in cyber-physical systems-of-systems and its application.
J. Softw. Evol. Process., 2021

Prepare for trouble and make it double! Supervised - Unsupervised stacking for anomaly-based intrusion detection.
J. Netw. Comput. Appl., 2021

Development and validation of a safe communication protocol compliant to railway standards.
J. Braz. Comput. Soc., 2021

Unsupervised Algorithms to Detect Zero-Day Attacks: Strategy and Application.
IEEE Access, 2021

Detect Adversarial Attacks Against Deep Neural Networks With GPU Monitoring.
IEEE Access, 2021

Attack and Fault Injection in Self-driving Agents on the Carla Simulator - Experience Report.
Proceedings of the Computer Safety, Reliability, and Security, 2021

Detecting Intrusions by Voting Diverse Machine Learners: Is It Really Worth?
Proceedings of the 26th IEEE Pacific Rim International Symposium on Dependable Computing, 2021

Feature Rankers to Predict Classification Performance of Unsupervised Intrusion Detectors.
Proceedings of the 10th Latin-American Symposium on Dependable Computing, 2021

Reliable Traffic Sign Recognition System.
Proceedings of the 10th Latin-American Symposium on Dependable Computing, 2021

2020
On the educated selection of unsupervised algorithms via attacks and anomaly classes.
J. Inf. Secur. Appl., 2020

Governance & Autonomy: Towards a Governance-based Analysis of Autonomy in Cyber-Physical Systems-of-Systems.
Proceedings of the 15th IEEE International Conference of System of Systems Engineering, 2020

Using Metamodels to Improve Model-Based Testing of Service Orchestrations.
Proceedings of the 25th IEEE Pacific Rim International Symposium on Dependable Computing, 2020

On failures of RGB cameras and their effects in autonomous driving applications.
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020

Model-Driven Fault Injection in Java Source Code.
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020

Into the Unknown: Unsupervised Machine Learning Algorithms for Anomaly-Based Intrusion Detection.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020

2019
Threat Analysis in Systems-of-Systems: An Emergence-Oriented Approach.
ACM Trans. Cyber Phys. Syst., 2019

Design, implementation, and assessment of a usable multi-biometric continuous authentication system.
Int. J. Crit. Comput. Based Syst., 2019

An Initial Investigation on Sliding Windows for Anomaly-Based Intrusion Detection.
Proceedings of the 2019 IEEE World Congress on Services, 2019

The SISTER Approach for Verification and Validation: A Lightweight Process for Reusable Results.
Proceedings of the Computer Safety, Reliability, and Security, 2019

Quantitative comparison of unsupervised anomaly detection algorithms for intrusion detection.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Practical Experience Report: Implementation, Verification and Validation of a Safe and Secure Communication Protocol for the Railway Domain.
Proceedings of the 9th Latin-American Symposium on Dependable Computing, 2019

Evaluation of Anomaly Detection Algorithms Made Easy with RELOAD.
Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering, 2019

Engineering Functional Safety Requirements for Automotive Systems: A Cyber-Physical-Social Approach.
Proceedings of the 19th IEEE International Symposium on High Assurance Systems Engineering, 2019

Exploiting MDE for Platform-Independent Testing of Service Orchestrations.
Proceedings of the 15th European Dependable Computing Conference, 2019

The SAMBA Approach for Self-Adaptive Model-Based Online Testing of Services Orchestrations.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
Labelling relevant events to support the crisis management operator.
J. Softw. Evol. Process., 2018

Systems-of-systems modeling using a comprehensive viewpoint-based SysML profile.
J. Softw. Evol. Process., 2018

System-of-Systems to Support Mobile Safety Critical Applications: Open Challenges and Viable Solutions.
IEEE Syst. J., 2018

On Algorithms Selection for Unsupervised Anomaly Detection.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

A Model-Based Approach for Analyzing the Autonomy Levels for Cyber-Physical Systems-of-Systems.
Proceedings of the 8th Latin-American Symposium on Dependable Computing, 2018

2017
Identification of critical situations via Event Processing and Event Trust Analysis.
Knowl. Inf. Syst., 2017

A Tool for Evolutionary Threat Analysis of Smart Grids.
Proceedings of the Smart Grid Inspired Future Technologies, 2017

A Modeling Framework to Support Resilient Evolution Planning of Smart Grids.
Proceedings of the Smart Grid Inspired Future Technologies, 2017

Exploring anomaly detection in systems of systems.
Proceedings of the Symposium on Applied Computing, 2017

Towards Security Requirements: Iconicity as a Feature of an Informal Modeling Language.
Proceedings of the Joint Proceedings of REFSQ-2017 Workshops, 2017

Assessing the Impact of Cascading Failures in Urban Electricity Networks.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

Risk Assessment of a Biometric Continuous Authentication Protocol for Internet Services.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017

RADIANCE Welcome.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

Dealing with Functional Safety Requirements for Automotive Systems: A Cyber-Physical-Social Approach.
Proceedings of the Critical Information Infrastructures Security, 2017

Continuous Biometric Verification for Non-Repudiation of Remote Services.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Basic Concepts on Systems of Systems.
Proceedings of the Cyber-Physical Systems of Systems - Foundations, 2016

Time and Resilient Master Clocks in Cyber-Physical Systems.
Proceedings of the Cyber-Physical Systems of Systems - Foundations, 2016

Managing Dynamicity in SoS.
Proceedings of the Cyber-Physical Systems of Systems - Foundations, 2016

System and Network Security: Anomaly Detection and Monitoring.
J. Electr. Comput. Eng., 2016

On the impact of emergent properties on SoS security.
Proceedings of the 11th System of Systems Engineering Conference, 2016

Challenging Anomaly Detection in Complex Dynamic Systems.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

Continuous Authentication and Non-repudiation for the Security of Critical Systems.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

Threat Navigator: Grouping and Ranking Malicious External Threats to Current and Future Urban Smart Grids.
Proceedings of the Smart Grid Inspired Future Technologies, 2016

Context-Awareness to Improve Anomaly Detection in Dynamic Service Oriented Architectures.
Proceedings of the Computer Safety, Reliability, and Security, 2016

A multi-criteria ranking of security countermeasures.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Usability Assessment in a Multi-Biometric Continuous Authentication System.
Proceedings of the 2016 Seventh Latin-American Symposium on Dependable Computing, 2016

Presenting the Proper Data to the Crisis Management Operator: A Relevance Labelling Strategy.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

A Holistic Viewpoint-Based SysML Profile to Design Systems-of-Systems.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

Introduction to RADIANCE 2016.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

A Hazus-Based Method for Assessing Robustness of Electricity Supply to Critical Smart Grid Consumers during Flood Events.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Continuous and Transparent User Identity Verification for Secure Internet Services.
IEEE Trans. Dependable Secur. Comput., 2015

On trustworthy measurements when testing dependable systems: a discussion and experiences.
Int. J. Crit. Comput. Based Syst., 2015

A Multi-layer Anomaly Detector for Dynamic Service-Based Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2015

Analysis of Companies Gaps in the Application of Standards for Safety-Critical Software.
Proceedings of the Computer Safety, Reliability, and Security, 2015

Continuous User Identity Verification for Trusted Operators in Control Rooms.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Introducing Meta-Requirements for Describing System of Systems.
Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering, 2015

Workshop on Recent Advances in the DependabIlity AssessmeNt of Complex systEms (RADIANCE).
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

2014
Insider Threat Assessment: a Model-Based Methodology.
ACM SIGOPS Oper. Syst. Rev., 2014

Model-based Evaluation of Scalability and Security Tradeoffs: a Case Study on a Multi-Service Platform.
Proceedings of the Seventh International Workshop on the Practical Application of Stochastic Modelling, 2014

A Complex Event Processing Approach for Crisis-Management Systems.
CoRR, 2014

Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities.
CoRR, 2014

On Security Countermeasures Ranking through Threat Analysis.
Proceedings of the Computer Safety, Reliability, and Security, 2014

Cost-Effective Testing for Critical Off-the-Shelf Services.
Proceedings of the Computer Safety, Reliability, and Security, 2014

A Testbed for Evaluating Anomaly Detection Monitors through Fault Injection.
Proceedings of the 17th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2014

2013
Resilient estimation of synchronisation uncertainty through software clocks.
Int. J. Crit. Comput. Based Syst., 2013

A methodology and supporting techniques for the quantitative assessment of insider threats.
Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing, 2013

Experimental analysis of the first order time difference of indicators used in the monitoring of complex systems.
Proceedings of the 2nd IEEE International Workshop on Measurements & Networking, 2013

Qualitative comparison of aerospace standards: An objective approach.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

A monitoring and testing framework for critical off-the-shelf applications and services.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

Meeting the challenges in the design and evaluation of a trackside real-time safety-critical system.
Proceedings of the 16th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2013

2012
Analysis of critical systems through rigorous, reproducible and comparable experimental assessment.
PhD thesis, 2012

Improving Security of Internet Services through Continuous and Transparent User Identity Verification.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

GPS and Electronic Fence Data Fusion for Positioning within Railway Worksite Scenarios.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

Design and Implementation of Real-Time Wearable Devices for a Safety-Critical Track Warning System.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

Timed Broadcast via Off-the-Shelf WLAN Distributed Coordination Function for Safety-Critical Systems.
Proceedings of the 2012 Ninth European Dependable Computing Conference, 2012

Foundations of Metrology in the Observation of Critical Systems.
Proceedings of the Resilience Assessment and Evaluation of Computing Systems, 2012

2011
RACME: A Framework to Support V&V and Certification.
Proceedings of the 5th Latin-American Symposium on Dependable Computing, 2011

Localization errors of low-cost GPS devices in railway worksite-like scenarios.
Proceedings of the IEEE International Workshop on Measurement and Networking, 2011

A Service Discovery Approach for Testing Dynamic SOAs.
Proceedings of the 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2011

A Testing Service for Lifelong Validation of Dynamic SOA.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011

2010
A New Approach and a Related Tool for Dependability Measurements on Distributed Systems.
IEEE Trans. Instrum. Meas., 2010

Experimental Validation of a Synchronization Uncertainty-Aware Software Clock.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

Improving Robustness of Network Fault Diagnosis to Uncertainty in Observations.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010

Towards a Framework for Self-Adaptive Reliable Network Services in Highly-Uncertain Environments.
Proceedings of the 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2010

2009
An Experimental Framework for the Analysis and Validation of Software Clocks.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2009

Trustworthy Evaluation of a Safe Driver Machine Interface through Software-Implemented Fault Injection.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Architecting and Validating Dependable Systems: Experiences and Visions.
Proceedings of the Architecting Dependable Systems VII, 2009

2008
Assuring Resilient Time Synchronization.
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008

A Resilient SIL 2 Driver Machine Interface for Train Control Systems.
Proceedings of the Third International Conference on Dependability of Computer Systems, 2008

2007
A Self-Aware Clock for Pervasive Computing Systems.
Proceedings of the 15th Euromicro International Conference on Parallel, 2007

Towards Making NekoStat a Proper Measurement Tool for the Validation of Distributed Systems.
Proceedings of the International Symposium on Autonomous Decentralized Systems (ISADS 2007), 2007

Foundations of Measurement Theory Applied to the Evaluation of Dependability Attributes.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007


  Loading...