Antonio Pecchia

Orcid: 0000-0003-2869-8423

According to our database1, Antonio Pecchia authored at least 68 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Successful intrusion detection with a single deep autoencoder: theory and practice.
Softw. Qual. J., March, 2024

Exploring the effect of training-time randomness on the performance of deep neural networks for intrusion detection.
Soft Comput., February, 2024

DEFEDGE: Threat-Driven Security Testing and Proactive Defense Identification for Edge-Cloud Systems.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
CPS-GUARD: Intrusion detection for cyber-physical systems and IoT devices using outlier-aware deep autoencoders.
Comput. Secur., June, 2023

Machine Learning on Public Intrusion Datasets: Academic Hype or Concrete Advances in NIDS?
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

Traditional vs Federated Learning with Deep Autoencoders: a Study in IoT Intrusion Detection.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023

A Case Study with CICIDS2017 on the Robustness of Machine Learning against Adversarial Attacks in Intrusion Detection.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Microservices Monitoring with Event Logs and Black Box Execution Tracing.
IEEE Trans. Serv. Comput., 2022

Transferability of machine learning models learned from public intrusion detection datasets: the CICIDS2017 case study.
Softw. Qual. J., 2022

Micro2vec: Anomaly detection in microservices systems by mining numeric representations of computer logs.
J. Netw. Comput. Appl., 2022

No more DoS? An empirical study on defense techniques for web server Denial of Service mitigation.
J. Netw. Comput. Appl., 2022

AutoLog: Anomaly detection by deep autoencoding of system logs.
Expert Syst. Appl., 2022

Simpler Is Better: On the Use of Autoencoders for Intrusion Detection.
Proceedings of the Quality of Information and Communications Technology, 2022

Botnet Detection in the Internet of Things through All-in-one Deep Autoencoding.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Demystifying the role of public intrusion datasets: A replication study of DoS network traffic data.
Comput. Secur., 2021

A Critique on the Use of Machine Learning on Public Datasets for Intrusion Detection.
Proceedings of the Quality of Information and Communications Technology, 2021

On the Quality of Network Flow Records for IDS Evaluation: A Collaborative Filtering Approach.
Proceedings of the Testing Software and Systems, 2021

USB-IDS-1: a Public Multilayer Dataset of Labeled Network Flows for IDS Evaluation.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

2020
Assessing Invariant Mining Techniques for Cloud-Based Utility Computing Systems.
IEEE Trans. Serv. Comput., 2020

Security Log Analysis in Critical Industrial Systems Exploiting Game Theoretic Feature Selection and Evidence Combination.
IEEE Trans. Ind. Informatics, 2020

Discovering process models for the analysis of application failures under uncertainty of event logs.
Knowl. Based Syst., 2020

Contextual filtering and prioritization of computer application logs for security situational awareness.
Future Gener. Comput. Syst., 2020

An empirical analysis of error propagation in critical software systems.
Empir. Softw. Eng., 2020

Towards a Framework for Improving Experiments on DoS Attacks.
Proceedings of the Quality of Information and Communications Technology, 2020

Measurement-Based Analysis of a DoS Defense Module for an Open Source Web Server.
Proceedings of the Testing Software and Systems, 2020

A case study on the representativeness of public DoS network traffic data for cybersecurity research.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Empirical Analysis and Validation of Security Alerts Filtering Techniques.
IEEE Trans. Dependable Secur. Comput., 2019

A framework for on-line timing error detection in software systems.
Future Gener. Comput. Syst., 2019

Advancing Monitoring in Microservices Systems.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019

Discovering Hidden Errors from Application Log Traces with Process Mining.
Proceedings of the 15th European Dependable Computing Conference, 2019

RT-CASEs: Container-Based Virtualization for Temporally Separated Mixed-Criticality Task Sets.
Proceedings of the 31st Euromicro Conference on Real-Time Systems, 2019

Towards Cognitive Security Defense from Data.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
Multiobjective Testing Resource Allocation Under Uncertainty.
IEEE Trans. Evol. Comput., 2018

Guest Editors' Introduction: Special Issue on Data-Driven Dependability and Security.
IEEE Trans. Dependable Secur. Comput., 2018

Challenges and Directions in Security Information and Event Management (SIEM).
Proceedings of the 2018 IEEE International Symposium on Software Reliability Engineering Workshops, 2018

Contextual Anomaly Detection for a Critical Industrial System Based on Logs and Metrics.
Proceedings of the 14th European Dependable Computing Conference, 2018

An Exploratory Study on Zeroconf Monitoring of Microservices Systems.
Proceedings of the 14th European Dependable Computing Conference, 2018

2017
Debugging-workflow-aware software reliability growth analysis.
Softw. Test. Verification Reliab., 2017

On the injection of hardware faults in virtualized multicore systems.
J. Parallel Distributed Comput., 2017

Entropy-Based Security Analytics: Measurements from a Critical Information System.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Characterizing Direct Monitoring Techniques in Software Systems.
IEEE Trans. Reliab., 2016

Automated root cause identification of security alerts: Evaluation in a SaaS Cloud.
Future Gener. Comput. Syst., 2016

Introduction to RSDA 2016.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

Measuring Resiliency through Field Data: Techniques, Tools and Challenges.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

2015
Industry Practices and Event Logging: Assessment of a Critical Software Development Process.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

2014
Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities.
CoRR, 2014

Filtering Security Alerts for the Analysis of a Production SaaS Cloud.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

Assessing Direct Monitoring Techniques to Analyze Failures of Critical Industrial Systems.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering, 2014

Event Logging in an Industrial Development Process: Practices and Reengineering Challenges.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

NAPOLI FUTURA: Novel Approaches for Protecting Critical Infrastructures from Cyber Attacks.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

On the Impact of Debugging on Software Reliability Growth Analysis: A Case Study.
Proceedings of the Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimarães, Portugal, June 30, 2014

What Logs Should You Look at When an Application Fails? Insights from an Industrial Case Study.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2013
Event Logs for the Analysis of Software Failures: A Rule-Based Approach.
IEEE Trans. Software Eng., 2013

Design of a CDD-Based Fault Injection Framework for AUTOSAR Systems.
Proceedings of the SAFECOMP 2013, 2013

Workshop on reliability and security data analysis RSDA 2013.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

Towards secure monitoring and control systems: Diversify!
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2012
A Preliminary Fault Injection Framework for Evaluating Multicore Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2012

Assessing AUTOSAR Systems Using Fault Injection.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering Workshops, 2012

Detection of Software Failures through Event Logs: An Experimental Study.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering, 2012

2011
On the use of event logs for the analysis of system failures.
PhD thesis, 2011

Identifying Compromised Users in Shared Computing Infrastructures: A Data-Driven Bayesian Network Approach.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), 2011

Criticality-Driven Component Integration in Complex Software Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2011

Architecture-Based Criticality Assessment of Software Systems.
Proceedings of the 5th Latin-American Symposium on Dependable Computing, 2011

Improving Log-based Field Failure Data Analysis of multi-node computing systems.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

2010
Memory leak analysis of mission-critical middleware.
J. Syst. Softw., 2010

A Method to Support Fault Tolerance Design in Service Oriented Computing Systems.
Int. J. Syst. Serv. Oriented Eng., 2010

Assessing and improving the effectiveness of logs for the analysis of software faults.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

2008
An experiment in memory leak analysis with a mission-critical middleware for air traffic control.
Proceedings of the IEEE International Conference on Software Reliability Engineering Workshops, 2008


  Loading...