Christian Esposito

Orcid: 0000-0002-0085-0748

Affiliations:
  • University of Salerno, Italy


According to our database1, Christian Esposito authored at least 143 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Editorial: Artificial intelligence in biomedical big data and digital healthcare.
Future Gener. Comput. Syst., March, 2024

2023
Detecting malicious reviews and users affecting social reviewing systems: A survey.
Comput. Secur., October, 2023

Multi-modal Biometrics Based Implicit Driver Identification System Using Multi-TF Images of ECG and EMG.
Comput. Biol. Medicine, June, 2023

Assessing the Solid Protocol in Relation to Security and Privacy Obligations.
Inf., 2023

Green Operations of SWIPT Networks: The Role of End-User Devices.
CoRR, 2023

Self-Sovereign Identity (SSI) Attribute-Based Web Authentication.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Design and Implementation of a Blockchain-based e-Voting system by using the Algorand platform.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

Using Knowledge Graphs to ensure Privacy Policies in decentralized data collection systems.
Proceedings of the 2023 International Conference on Research in Adaptive and Convergent Systems, 2023

A Decentralized Smart City Using Solid and Self-Sovereign Identity.
Proceedings of the Computational Science and Its Applications - ICCSA 2023 Workshops, 2023

2022
Trustworthiness Assessment of Users in Social Reviewing Systems.
IEEE Trans. Syst. Man Cybern. Syst., 2022

FUSION - Fog Computing and Blockchain for Trusted Industrial Internet of Things.
IEEE Trans. Engineering Management, 2022

Trustworthiness Evaluation-Based Routing Protocol for Incompletely Predictable Vehicular Ad Hoc Networks.
IEEE Trans. Big Data, 2022

Adaptive Optimization Method in Digital Twin Conveyor Systems via Range-Inspection Control.
IEEE Trans Autom. Sci. Eng., 2022

Introduction to Special Issue on Misinformation, Fake News and Rumor Detection in Low-Resource Languages.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2022

Multi-criteria assessment of user trust in Social Reviewing Systems with subjective logic fusion.
Inf. Fusion, 2022

Graph-powered learning for social networks.
Neurocomputing, 2022

Assessing the Solid Protocol in Relation to Security & Privacy Obligations.
CoRR, 2022

Smart Unmanned Aerial Vehicles as base stations placement to improve the mobile network operations.
Comput. Commun., 2022

Energy-Optimal RAN Configurations for SWIPT IoT.
Proceedings of the 20th International Symposium on Modeling and Optimization in Mobile, 2022

Toward the Adoption of Secure Cyber Digital Twins to Enhance Cyber-Physical Systems Security.
Proceedings of the Quality of Information and Communications Technology, 2022

On Attacks To Federated Learning and a Blockchain-empowered Protection.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

Help From Above: UAV-Empowered Network Resiliency in Post-Disaster Scenarios.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
NeuCheck: A more practical Ethereum smart contract security analysis tool.
Softw. Pract. Exp., 2021

Interoperable Blockchains for Highly-Integrated Supply Chains in Collaborative Manufacturing.
Sensors, 2021

Evolutionary game theoretical on-line event detection over tweet streams.
Knowl. Based Syst., 2021

Blockchain-based authentication and authorization for smart city applications.
Inf. Process. Manag., 2021

An intelligent system for focused crawling from Big Data sources.
Expert Syst. Appl., 2021

Storage service for edge computing.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Data Mining for Animal Health to Improve Human Quality of Life: Insights from a University Veterinary Hospital.
Proceedings of the 10th International Conference on Data Science, 2021

2020
Emergency Networks for Post-Disaster Scenarios.
Proceedings of the Guide to Disaster-Resilient Communication Networks, 2020

Routing in Post-Disaster Scenarios.
Proceedings of the Guide to Disaster-Resilient Communication Networks, 2020

Resilience of 5G Mobile Communication Systems to Massive Disruptions.
Proceedings of the Guide to Disaster-Resilient Communication Networks, 2020

Editorial: IEEE Transactions on Sustainable Computing, Special Issue on Cryptography and Data Security in Sustainable Computing (Part 2).
IEEE Trans. Sustain. Comput., 2020

Editorial: IEEE Transactions on Sustainable Computing, Special Issue on Cryptography and Data Security in Sustainable Computing (Part 1).
IEEE Trans. Sustain. Comput., 2020

Security Log Analysis in Critical Industrial Systems Exploiting Game Theoretic Feature Selection and Evidence Combination.
IEEE Trans. Ind. Informatics, 2020

Distributed Group Key Management for Event Notification Confidentiality Among Sensors.
IEEE Trans. Dependable Secur. Comput., 2020

Process mining as support to simulation modeling: A hospital-based case study.
Simul. Model. Pract. Theory, 2020

A Night at the OPERA: A Conceptual Framework for an Integrated Distributed Sensor Network-Based System to Figure out Safety Protocols for Animals under Risk of Fire.
Sensors, 2020

Robust Decentralised Trust Management for the Internet of Things by Using Game Theory.
Inf. Process. Manag., 2020

Blockchain-empowered decentralised trust management for the Internet of Vehicles security.
Comput. Electr. Eng., 2020

A Localization Based on Unscented Kalman Filter and Particle Filter Localization Algorithms.
IEEE Access, 2020

Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios.
IEEE Access, 2020

Summarizing social media content via bio-inspired influence maximization algorithms.
Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17, 2020

Situation awareness via information hovering in post-disaster communications.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Multimodal Neuroimaging Game Theoretic Data Fusion in Adversarial Conditions.
Proceedings of the RACS '20: International Conference on Research in Adaptive and Convergent Systems, 2020

Trust Is in the Air: A New Adaptive Method to Evaluate Mobile Wireless Networks.
Proceedings of the Testing Software and Systems, 2020

2019
An Edge Intelligence Empowered Recommender System Enabling Cultural Heritage Applications.
IEEE Trans. Ind. Informatics, 2019

CNN-based anti-spoofing two-tier multi-factor authentication system.
Pattern Recognit. Lett., 2019

On Data Sovereignty in Cloud-Based Computation Offloading for Smart Cities Applications.
IEEE Internet Things J., 2019

Application of soft computing and machine learning in the big data analytics for smart cities and factories.
Int. J. Inf. Manag., 2019

Metamorphic malicious code behavior detection using probabilistic inference methods.
Cogn. Syst. Res., 2019

Localization and Detection of Targets in Underwater Wireless Sensor Using Distance and Angle Based Algorithms.
IEEE Access, 2019

Vulnerability Analysis Challenges of the Mouse Data Based on Machine Learning for Image-Based User Authentication.
IEEE Access, 2019

IEEE Access Special Section Editorial: Recent Advances on Radio Access and Security Methods in 5G Networks.
IEEE Access, 2019

An Effective Retrieval Approach for Documents Related to Past Civil Engineering Projects.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

Accurate and Lightweight Range-Free Localization for Wireless Sensor Networks.
Proceedings of the Pervasive Systems, Algorithms and Networks, 2019

On Designing a Content Management System for the Documents Related to Past Civil Engineering Projects or Call-for-Tender Responses.
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019

Asymptotic Load Balancing Algorithm for Many Task Scheduling.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 2019

Game Theoretic Optimal User Association in Emergency Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 2019

Floater: Post-disaster Communications via Floating Content.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 2019

2018
Securing Collaborative Deep Learning in Industrial Applications Within Adversarial Scenarios.
IEEE Trans. Ind. Informatics, 2018

Integrity for an Event Notification Within the Industrial Internet of Things by Using Group Signatures.
IEEE Trans. Ind. Informatics, 2018

Introduction to special issue on sustainable computing for bio-energy: Intelligent computing models and analytics.
Sustain. Comput. Informatics Syst., 2018

Advanced services for efficient management of smart farms.
J. Parallel Distributed Comput., 2018

Event-based sensor data exchange and fusion in the Internet of Things environments.
J. Parallel Distributed Comput., 2018

Distributed strategic learning and game theoretic formulation of network embedded coding.
J. Comput. Sci., 2018

Interoperable, dynamic and privacy-preserving access control for cloud data storage when integrating heterogeneous organizations.
J. Netw. Comput. Appl., 2018

Building a network embedded FEC protocol by using game theory.
Inf. Sci., 2018

Loss-Tolerant Event Communications Within Industrial Internet of Things by Leveraging on Game Theoretic Intelligence.
IEEE Internet Things J., 2018

Power domain NOMA to support group communication in public safety networks.
Future Gener. Comput. Syst., 2018

A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation.
Future Gener. Comput. Syst., 2018

On the optimal tuning and placement of FEC codecs within multicasting trees for resilient publish/subscribe services in edge-IoT architectures.
Future Gener. Comput. Syst., 2018

Information theoretic-based detection and removal of slander and/or false-praise attacks for robust trust management with Dempster-Shafer combination of linguistic fuzzy terms.
Concurr. Comput. Pract. Exp., 2018

Intelligent Power Equipment Management Based on Distributed Context-Aware Inference in Smart Cities.
IEEE Commun. Mag., 2018

Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy?
IEEE Cloud Comput., 2018

Cloud Message Queueing and Notification: Challenges and Opportunities.
IEEE Cloud Comput., 2018

Cloud Reliability: Possible Sources of Security and Legal Issues?
IEEE Cloud Comput., 2018

Trust Management in Fog/Edge Computing by Means of Blockchain Technologies.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

How to Assess the Dependability of Applications on Top of the Blockchain: Novel Research Challenges.
Proceedings of the 14th European Dependable Computing Conference, 2018

2017
Signaling game based strategy for secure positioning in wireless sensor networks.
Pervasive Mob. Comput., 2017

Layered multicast for reliable event notification over large-scale networks.
Inf. Sci., 2017

Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design.
Future Gener. Comput. Syst., 2017

Improving the gossiping effectiveness with distributed strategic learning (Invited paper).
Future Gener. Comput. Syst., 2017

A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants.
Future Gener. Comput. Syst., 2017

A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy.
Concurr. Comput. Pract. Exp., 2017

Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems.
IEEE Commun. Mag., 2017

Security and privacy for cloud-based data management in the health network service chain: a microservice approach.
IEEE Commun. Mag., 2017

Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective.
IEEE Cloud Comput., 2017

Evidence and Forensics in the Cloud: Challenges and Future Research Directions.
IEEE Cloud Comput., 2017

Secure crisis information sharing through an interoperability framework among first responders: The SECTOR practical experience.
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017

A Trust Application in Participatory Sensing: Elder Reintegration.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Selection-Based Scheduling Algorithms under Service Level Agreement Constraints.
Proceedings of the 21st International Conference on Control Systems and Computer Science, 2017

2016
Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory.
IEEE Trans. Computers, 2016

Recent Developments on Security and Reliability in Large-Scale Data Processing with MapReduce.
Int. J. Data Warehous. Min., 2016

Live Migration in Emerging Cloud Paradigms.
IEEE Cloud Comput., 2016

Cloud Manufacturing: Security, Privacy, and Forensic Concerns.
IEEE Cloud Comput., 2016

Challenges in Delivering Software in the Cloud as Microservices.
IEEE Cloud Comput., 2016

Encryption-Based Solution for Data Sovereignty in Federated Clouds.
IEEE Cloud Comput., 2016

Healthcare-Related Data in the Cloud: Challenges and Opportunities.
IEEE Cloud Comput., 2016

Greedy Probability-Based Routing Protocol for Incompletely Predictable Vehicular Ad-hoc Network.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

Optimal Data Replica Placement in Large-Scale Federated Architectures.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

A survey of strategies for communication networks to protect against large-scale natural disasters.
Proceedings of the 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM), 2016

Privacy-Aware Routing for Sharing Sensitive Information across Wide-Area Networks.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

Distributed strategic learning for effective gossiping in wireless networks.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Distributed Strategic Learning for Building Network Embedded Coding to Achieve Reliable Event Notification.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

Interoperable Access Control by Means of a Semantic Approach.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

2015
A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing.
Knowl. Based Syst., 2015

On Security in Publish/Subscribe Services: A Survey.
IEEE Commun. Surv. Tutorials, 2015

A Game-Theoretic Approach to Network Embedded FEC over Large-Scale Networks.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

A collaboration platform for data sharing among heterogeneous relief organizations for disaster management.
Proceedings of the 12th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2015

Dealing with Reliable Event-Based Communications by Means of Layered Multicast.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

SECTOR: Secure Common Information Space for the Interoperability of First Responders.
Proceedings of the Conference on ENTERprise Information Systems/International Conference on Project MANagement/Conference on Health and Social Care Information Systems and Technologies, 2015

A Reliable Crisis Information System to Share Data after the Event of a Large-Scale Disaster.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Reliable and Timely Event Notification for Publish/Subscribe Services Over the Internet.
IEEE/ACM Trans. Netw., 2014

Calibrating Indoor Positioning Systemswith Low Efforts.
IEEE Trans. Mob. Comput., 2014

An event-based notification approach for the delivery of patient medical information.
Inf. Syst., 2014

On Reliability and Security in Knowledge Grids.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
A federated interoperability architecture for health information systems.
Int. J. Internet Protoc. Technol., 2013

Secure healthcare data sharing among federated health information systems.
Int. J. Crit. Comput. Based Syst., 2013

On reliability in publish/subscribe services.
Comput. Networks, 2013

Interconnecting Federated Clouds by Using Publish-Subscribe Service.
Clust. Comput., 2013

A Hierarchical Event-based Architecture for the Notification of Medical Document Availability.
Proceedings of the International Work-Conference on Bioinformatics and Biomedical Engineering, 2013

2012
On data dissemination for large-scale complex critical infrastructures.
Comput. Networks, 2012

Leveraging Power of Transmission for Range-Free Localization of Tiny Sensors.
Proceedings of the Web and Wireless Geographical Information Systems, 2012

Introduction to DESEC4LCCI 2012.
Proceedings of the Computer Safety, Reliability, and Security, 2012

On Securing Communications among Federated Health Information Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2012

Achieving Reliable and Timely Event Dissemination over WAN.
Proceedings of the Distributed Computing and Networking - 13th International Conference, 2012

Notifying medical data in health information systems.
Proceedings of the Sixth ACM International Conference on Distributed Event-Based Systems, 2012

A tutorial on reliability in publish/subscribe services.
Proceedings of the Sixth ACM International Conference on Distributed Event-Based Systems, 2012

2011
Deployment of RSS-Based Indoor Positioning Systems.
Int. J. Wirel. Inf. Networks, 2011

ROCRSSI++: An Efficient Localization Algorithm for Wireless Sensor Networks.
Int. J. Adapt. Resilient Auton. Syst., 2011

On the Benefit of Network Coding for Timely and Reliable Event Dissemination in WAN.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops, 2011

Automatic Robustness Assessment of DDS-Compliant Middleware.
Proceedings of the 17th IEEE Pacific Rim International Symposium on Dependable Computing, 2011

Investigation on Safety-Related Standards for Critical Systems.
Proceedings of the 2011 First International Workshop on Software Certification, WoSoCER 2011, Hiroshima, Japan, November 29, 2011

2010
Architectural Evolution of Monitor and Control Systems - Issues and Challenges.
Netw. Protoc. Algorithms, 2010

Resilient and Timely Event Dissemination in Publish/Subscribe Middleware.
Int. J. Adapt. Resilient Auton. Syst., 2010

An Investigation on Flexible Communications in Publish/Subscribe Services.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2010

Reliable Event Dissemination over Wide-Area Networks without Severe Performance Fluctuations.
Proceedings of the 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2010

2009
Reliable Event Dissemination for Time-sensible Applications over Wide-Area Networks.
PhD thesis, 2009

Calibrating RSS-Based Indoor Positioning Systems.
Proceedings of the 5th IEEE International Conference on Wireless and Mobile Computing, 2009

Reliable publish/subscribe middleware for time-sensitive internet-scale applications.
Proceedings of the Third ACM International Conference on Distributed Event-Based Systems, 2009

2008
Performance assessment of OMG compliant data distribution middleware.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008


  Loading...