Francesco Oliviero

According to our database1, Francesco Oliviero authored at least 16 papers between 2005 and 2013.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
A Distributed Control Law for Load Balancing in Content Delivery Networks.
IEEE/ACM Trans. Netw., 2013

2012
Energy- and Delay-Efficient Routing in Mobile Ad Hoc Networks.
Mob. Networks Appl., 2012

Optimised balancing algorithm for content delivery networks.
IET Commun., 2012

Can cooperation improve energy efficiency in ad hoc wireless networks?
Comput. Commun., 2012

2011
On the Use of Cooperation as an Energy-Saving Incentive in Ad Hoc Wireless Networks.
Proceedings of the Green Communications and Networking - First International Conference, 2011

Protecting Critical Infrastructures from Stealth Attacks: A Closed-Loop Approach Involving Detection and Remediation - (Short Paper).
Proceedings of the Critical Information Infrastructure Security, 2011

On the Security of the Terminal Operations for Container Shipping in Multimodal Transport: the SIS-TEMA Project.
Proceedings of the CRiSIS 2011, 2011

2010
An extended ns-2 for validation of load balancing algorithms in Content Delivery Networks.
Proceedings of the 3rd International Conference on Simulation Tools and Techniques, 2010

Performance assessment of a distributed intrusion detection system in a real network scenario.
Proceedings of the CRiSIS 2010, 2010

2008
REFACING: An autonomic approach to network security based on multidimensional trustworthiness.
Comput. Networks, 2008

A Reputation-Based Metric for Secure Routing in Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2006
Behavioral network engineering: making intrusion detection become autonomic.
Ann. des Télécommunications, 2006

An Autonomic Intrusion Detection System Based on Behavioral Network Engineering.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

High-Speed Intrusion Detection in Support of Critical Infrastructure Protection.
Proceedings of the Critical Information Infrastructures Security, 2006

2005
Evaluating Pattern Recognition Techniques in Intrusion Detection Systems.
Proceedings of the Pattern Recognition in Information Systems, 2005

Real Time Detection of Novel Attacks by Means of Data Mining Techniques.
Proceedings of the ICEIS 2005, 2005


  Loading...