Aniello Castiglione

According to our database1, Aniello Castiglione
  • authored at least 140 papers between 2006 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Computational Intelligence and its Applications in New Computing Models.
Inf. Sci., 2018

Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes.
Future Generation Comp. Syst., 2018

Controlling and filtering users data in Intelligent Transportation System.
Future Generation Comp. Syst., 2018

A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation.
Future Generation Comp. Syst., 2018

Information theoretic-based detection and removal of slander and/or false-praise attacks for robust trust management with Dempster-Shafer combination of linguistic fuzzy terms.
Concurrency and Computation: Practice and Experience, 2018

On the protection of consumer genomic data in the Internet of Living Things.
Computers & Security, 2018

Recognizing human behaviours in online social networks.
Computers & Security, 2018

Human-Driven Edge Computing and Communication: Part 2.
IEEE Communications Magazine, 2018

Context Aware Ubiquitous Biometrics in Edge of Military Things.
IEEE Cloud Computing, 2018

2017
Exploiting Battery-Drain Vulnerabilities in Mobile Smart Devices.
T-SUSC, 2017

On-Board Format-Independent Security of Functional Magnetic Resonance Images.
ACM Trans. Embedded Comput. Syst., 2017

A Multiobjective Wavelength Routing Approach Combining Network and Traffic Engineering With Energy Awareness.
IEEE Systems Journal, 2017

Layered multicast for reliable event notification over large-scale networks.
Inf. Sci., 2017

Supporting dynamic updates in storage clouds with the Akl-Taylor scheme.
Inf. Sci., 2017

Securing Information Exchange in VANETs by Using Pairing-Based Cryptography.
Int. J. Found. Comput. Sci., 2017

Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design.
Future Generation Comp. Syst., 2017

Improving the gossiping effectiveness with distributed strategic learning (Invited paper).
Future Generation Comp. Syst., 2017

A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants.
Future Generation Comp. Syst., 2017

A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy.
Concurrency and Computation: Practice and Experience, 2017

Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner.
Computers & Security, 2017

Security and privacy for cloud-based data management in the health network service chain: a microservice approach.
IEEE Communications Magazine, 2017

Human-Driven Edge Computing and Communication: Part 1.
IEEE Communications Magazine, 2017

Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective.
IEEE Cloud Computing, 2017

Evidence and Forensics in the Cloud: Challenges and Future Research Directions.
IEEE Cloud Computing, 2017

Biometrics in the Cloud: Challenges and Research Opportunities.
IEEE Cloud Computing, 2017

Flaw Recovery in Cloud Based Bio-inspired Peer-to-Peer Systems for Smart Cities.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Detection of Lurkers in Online Social Networks.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
Cryptographic Hierarchical Access Control for Dynamic Structures.
IEEE Trans. Information Forensics and Security, 2016

Hierarchical and Shared Access Control.
IEEE Trans. Information Forensics and Security, 2016

Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory.
IEEE Trans. Computers, 2016

Human continuous activity recognition based on energy-efficient schemes considering cloud security technology.
Security and Communication Networks, 2016

A secure payment system for multimedia on demand on mobile VANET clouds.
Security and Communication Networks, 2016

A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment.
IJDWM, 2016

GRASP-based resource re-optimization for effective big data access in federated clouds.
Future Generation Comp. Syst., 2016

An HLA-based framework for simulation of large-scale critical systems.
Concurrency and Computation: Practice and Experience, 2016

Cloud Manufacturing: Security, Privacy, and Forensic Concerns.
IEEE Cloud Computing, 2016

Challenges in Delivering Software in the Cloud as Microservices.
IEEE Cloud Computing, 2016

Encryption-Based Solution for Data Sovereignty in Federated Clouds.
IEEE Cloud Computing, 2016

Enhanced Network Support for Federated Cloud Infrastructures.
IEEE Cloud Computing, 2016

Healthcare-Related Data in the Cloud: Challenges and Opportunities.
IEEE Cloud Computing, 2016

A cloud-based architecture for emergency management and first responders localization in smart city environments.
Computers & Electrical Engineering, 2016

Greedy Probability-Based Routing Protocol for Incompletely Predictable Vehicular Ad-hoc Network.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

Optimal Data Replica Placement in Large-Scale Federated Architectures.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

Privacy-Aware Routing for Sharing Sensitive Information across Wide-Area Networks.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

Distributed strategic learning for effective gossiping in wireless networks.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Distributed Strategic Learning for Building Network Embedded Coding to Achieve Reliable Event Notification.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

Interoperable Access Control by Means of a Semantic Approach.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

Putting the User in Control of the Intelligent Transportation System.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
A triadic closure and homophily-based recommendation system for online social networks.
World Wide Web, 2015

Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures.
The Journal of Supercomputing, 2015

Modeling performances of concurrent big data applications.
Softw., Pract. Exper., 2015

Secure and reliable data communication in developing regions and rural areas.
Pervasive and Mobile Computing, 2015

A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing.
Knowl.-Based Syst., 2015

Energy efficiency of elastic frequency grids in multilayer IP/MPLS-over-flexgrid networks.
J. Network and Computer Applications, 2015

Modeling energy-efficient secure communications in multi-mode wireless mobile devices.
J. Comput. Syst. Sci., 2015

Cloud-based adaptive compression and secure management services for 3D healthcare data.
Future Generation Comp. Syst., 2015

Modeling security requirements for cloud-based system development.
Concurrency and Computation: Practice and Experience, 2015

A Kuramoto Model Based Approach to Extract and Assess Influence Relations.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

Analysis of Network Management and Monitoring Using Cloud Computing.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

A Game-Theoretic Approach to Network Embedded FEC over Large-Scale Networks.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

The untrusted handover security of the S-PMIPv6 on LTE-A.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Supporting First Responders Localization during Crisis Management.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

A honeypot system with honeyword-driven fake interactive sessions.
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015

Dealing with Reliable Event-Based Communications by Means of Layered Multicast.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Cyber Threats to Industrial Control Systems.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

Heterogeneous Network Handover Using 3GPP ANDSF.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

On the Protection of fMRI Images in Multi-domain Environments.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

Format-Independent Protection of DNA Microarray Images.
Proceedings of the 10th International Conference on P2P, 2015

Reversible Copyright Protection for DNA Microarray Images.
Proceedings of the 10th International Conference on P2P, 2015

2014
A secure file sharing service for distributed computing environments.
The Journal of Supercomputing, 2014

A Denial of Service Attack to UMTS Networks Using SIM-Less Devices.
IEEE Trans. Dependable Sec. Comput., 2014

Soft computing for security services in smart and ubiquitous environments.
Soft Comput., 2014

Hybrid indoor and outdoor location services for new generation mobile terminals.
Personal and Ubiquitous Computing, 2014

A botnet-based command and control approach relying on swarm intelligence.
J. Network and Computer Applications, 2014

Prosperity of IT security technologies in homeland defense.
J. Ambient Intelligence and Humanized Computing, 2014

Secure and distributed video surveillance via portable devices.
J. Ambient Intelligence and Humanized Computing, 2014

A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems.
International Journal of Parallel Programming, 2014

Editorial.
IJCNDS, 2014

Exploiting mean field analysis to model performances of big data architectures.
Future Generation Comp. Syst., 2014

A distributed approach to network anomaly detection based on independent component analysis.
Concurrency and Computation: Practice and Experience, 2014

Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Industrial Control System Cyber Threats Indicators in Smart Grid Technology.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Protection of Microscopy Images through Digital Watermarking Techniques.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

The Role of Trust and Co-partnership in the Societal Digital Security Culture Approach.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

Friendship Recommendations in Online Social Networks.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

Adaptive Stealth Energy-Related DoS Attacks against Cloud Data Centers.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Multimedia-based battery drain attacks for Android devices.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
Modeling energy consumption in next-generation wireless access-over-WDM networks with hybrid power sources.
Mathematical and Computer Modelling, 2013

An intelligent security architecture for distributed firewalling environments.
J. Ambient Intelligence and Humanized Computing, 2013

Special issue on cloud, wireless and e-commerce security.
J. Ambient Intelligence and Humanized Computing, 2013

Experimentations with source camera identification and Online Social Networks.
J. Ambient Intelligence and Humanized Computing, 2013

Network anomaly detection with the restricted Boltzmann machine.
Neurocomputing, 2013

Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks.
Comput. Sci. Inf. Syst., 2013

Interconnecting Federated Clouds by Using Publish-Subscribe Service.
Cluster Computing, 2013

On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines.
Appl. Soft Comput., 2013

Automated Production of Predetermined Digital Evidence.
IEEE Access, 2013

An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Text Compression and Encryption through Smart Devices for Mobile Communication.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

On Secure Data Management in Health-Care Environment.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Trustworthy Opportunistic Access to the Internet of Services.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Forensically-Sound Methods to Collect Live Network Evidence.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

Analyzing the Internet Stability in Presence of Disasters.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Condensation-based routing in mobile ad-hoc networks.
Mobile Information Systems, 2012

Engineering a secure mobile messaging framework.
Computers & Security, 2012

An asynchronous covert channel using spam.
Computers & Mathematics with Applications, 2012

Virtual lab: A concrete experience in building multi-purpose virtualized labs for Computer Science Education.
Proceedings of the 20th International Conference on Software, 2012

The Digital Profiling Techniques Applied to the Analysis of a GPS Navigation Device.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Device Tracking in Private Networks via NAPT Log Analysis.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

The Forensic Analysis of a False Digital Alibi.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

How to Forge a Digital Alibi on Mac OS X.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

A Secure Distributed Video Surveillance System Based on Portable Devices.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
Automatic security assessment for next generation wireless mobile networks.
Mobile Information Systems, 2011

Hiding Information into OOXML Documents: New Steganographic Perspectives.
JoWUA, 2011

The AVQ Algorithm: Watermarking and Compression Performances.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Characterizing and Classifying Card-Sharing Traffic through Wavelet Analysis.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

A Forensic Analysis of Images on Online Social Networks.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

On the Construction of a False Digital Alibi on the Android OS.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

E-mail-Based Covert Channels for Asynchronous Message Steganography.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

SECR3T: Secure End-to-End Communication over 3G Telecommunication Networks.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Steganography and Secure Communication on Online Social Networks and Online Photo Sharing.
Proceedings of the 2011 International Conference on Broadband, 2011

Automatic, Selective and Secure Deletion of Digital Evidence.
Proceedings of the 2011 International Conference on Broadband, 2011

A Novel Anti-forensics Technique for the Android OS.
Proceedings of the 2011 International Conference on Broadband, 2011

Automated Construction of a False Digital Alibi.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

New Steganographic Techniques for the OOXML File Format.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
Security and privacy issues in the Portable Document Format.
Journal of Systems and Software, 2010

Towards a Lawfully Secure and Privacy Preserving Video Surveillance System.
Proceedings of the E-Commerce and Web Technologies, 11th International Conference, 2010

An Extensible Framework for Efficient Secure SMS.
Proceedings of the CISIS 2010, 2010

An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

Source Camera Identification in Real Practice: A Preliminary Experimentation.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
Do You Trust Your Phone?
Proceedings of the E-Commerce and Web Technologies, 10th International Conference, 2009

A Multi-scheme and Multi-channel Framework for Micropayment Systems.
Proceedings of the E-Commerce and Web Technologies, 10th International Conference, 2009

2007
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata.
Journal of Systems and Software, 2007

2006
SPEECH: Secure Personal End-to-End Communication with Handheld.
Proceedings of the ISSE 2006, 2006


  Loading...