Antonino Rullo

Orcid: 0000-0002-6030-0027

According to our database1, Antonino Rullo authored at least 30 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Kalis2.0 - A SECaaS-Based Context-Aware Self-Adaptive Intrusion Detection System for IoT.
IEEE Internet Things J., April, 2024

2023
Guest Editorial Special Issue on Intrusion Detection for the Internet of Things.
IEEE Internet Things J., May, 2023

Editorial: Security and privacy for the Internet of Things.
Frontiers Comput. Sci., 2023

Security of IoT Devices with PUF-Based ID Tags: Preventing Hardware Substitution by Combining SRAM Cells Pattern Signature and ML Techniques.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Deep Learning/PUF-based Item Identification for Supply Chain Management in a Distributed Ledger Framework.
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023

2022
Machine learning methods for generating high dimensional discrete datasets.
WIREs Data Mining Knowl. Discov., 2022

Process mining applications in the healthcare domain: A comprehensive review.
WIREs Data Mining Knowl. Discov., 2022

Generating Synthetic Discrete Datasets with Machine Learning.
Proceedings of the 30th Italian Symposium on Advanced Database Systems, 2022

2021
A multi-perspective approach for the analysis of complex business processes behavior.
Expert Syst. Appl., 2021

Exploiting Silicon Fingerprint for Device Authentication Using CMOS-PUF and ECC.
Proceedings of the IEEE International Conference on Smart Internet of Things, 2021

Multi-Sorted Inverse Frequent Itemsets Mining for Generating Realistic No-SQL Datasets (Discussion Paper).
Proceedings of the 29th Italian Symposium on Advanced Database Systems, 2021

PUF-based Smart Tags for Supply Chain Management.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
A Framework for the Multi-modal Analysis of Novel Behavior in Business Processes.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2020, 2020

2019
Extending inverse frequent itemsets mining to generate realistic datasets: complexity, accuracy and emerging applications.
Data Min. Knowl. Discov., 2019

Optimal Placement of Security Resources for the Internet of Things.
Proceedings of the Internet of Things for Smart Urban Ecosystems., 2019

2018
Redundancy as a Measure of Fault-Tolerance for the Internet of Things: A Review.
Proceedings of the Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, 2018

PAST: Protocol-Adaptable Security Tool for Heterogeneous IoT Ecosystems.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
Malevolent Activity Detection with Hypergraph-Based Models.
IEEE Trans. Knowl. Data Eng., 2017

Pareto Optimal Security Resource Allocation for Internet of Things.
ACM Trans. Priv. Secur., 2017

A Game of Things: Strategic Allocation of Security Resources for IoT.
Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, 2017

Shortfall-Based Optimal Security Provisioning for Internet of Things.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Kalis - A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Strategic Security Resource Allocation for Internet of Things.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

2015
Pareto-Optimal Adversarial Defense of Enterprise Systems.
ACM Trans. Inf. Syst. Secur., 2015

The AC-Index: Fast Online Detection of Correlated Alerts.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015

2014
PADUA: Parallel Architecture to Detect Unexplained Activities.
ACM Trans. Internet Techn., 2014

Hypergraph-Based Attack Models for Network Intrusion Detection.
Proceedings of the 22nd Italian Symposium on Advanced Database Systems, 2014

2013
Intrusion Detection with Hypergraph-Based Attack Models.
Proceedings of the Graph Structures for Knowledge Representation and Reasoning, 2013

2012
Think before you Act! Minimising Action Execution in Wrappers.
Proceedings of the Second International Workshop on Searching and Integrating New Web Data Sources, 2012


  Loading...