Francesco Palmieri

Orcid: 0000-0003-1760-5527

Affiliations:
  • University of Salerno, Fisciano, Italy
  • Second University of Naples, Department of Industrial and Information Engineering (former)


According to our database1, Francesco Palmieri authored at least 261 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Federated learning for IoT devices: Enhancing TinyML with on-board training.
Inf. Fusion, April, 2024

When explainability turns into a threat - using xAI to fool a fake news detection method.
Comput. Secur., February, 2024

Bounds and Protocols for Graph-Based Distributed Secret Sharing.
IEEE Trans. Dependable Secur. Comput., 2024

Testing the Resilience of MEC-Based IoT Applications Against Resource Exhaustion Attacks.
IEEE Trans. Dependable Secur. Comput., 2024

Estimating electricity consumption at city-level through advanced machine learning methods.
Connect. Sci., 2024

A User-Centered Privacy Policy Management System for Automatic Consent on Cookie Banners.
Comput., 2024

Monitoring Power Usage Effectiveness to Detect Cooling Systems Attacks and Failures in Cloud Data Centers.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024

XSS-Unearth: A Tool for Forensics Analysis of XSS Attacks.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Privacy-preserving malware detection in Android-based IoT devices through federated Markov chains.
Future Gener. Comput. Syst., November, 2023

Enhancing COVID-19 tracking apps with human activity recognition using a deep convolutional neural network and HAR-images.
Neural Comput. Appl., July, 2023

A co-evolutionary genetic algorithm for robust and balanced controller placement in software-defined networks.
J. Netw. Comput. Appl., March, 2023

Transmission of Digital Data in the 5G Era: Compression and Privacy.
Inf., February, 2023

MLPKV: A Local Differential Multi-Layer Private Key-Value Data Collection Scheme for Edge Computing Environments.
IEEE Trans. Inf. Forensics Secur., 2023

Survivability Analysis of IoT Systems Under Resource Exhausting Attacks.
IEEE Trans. Inf. Forensics Secur., 2023

Improved Protocols for Distributed Secret Sharing.
IEEE Trans. Dependable Secur. Comput., 2023

Identifying patterns in multiple biomarkers to diagnose diabetic foot using an explainable genetic programming-based approach.
Future Gener. Comput. Syst., 2023

Raise Awareness of the Environmental Impacts of Retail Food Products: A User-Centered Scenario-Based Approach.
Proceedings of the 15th International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2023), 2023

Prevention of Cyber-Attacks and Privacy Breaches in Healthcare Sector.
Proceedings of the Computational Science and Its Applications - ICCSA 2023 Workshops, 2023

Mitigating User Exposure to Dark Patterns in Cookie Banners Through Automated Consent.
Proceedings of the Computational Science and Its Applications - ICCSA 2023 Workshops, 2023

Improving Drone Security in Smart Cities via Lightweight Cryptography.
Proceedings of the Computational Science and Its Applications - ICCSA 2023 Workshops, 2023

Recurrence Plots-Based Network Attack Classification Using CNN-Autoencoders.
Proceedings of the Computational Science and Its Applications - ICCSA 2023 Workshops, 2023

Privacy risk analysis and metrics in capturing and storing network traffic.
Proceedings of the 24th International Conference on Control Systems and Computer Science, 2023

2022
Privacy-preserving Secure Media Streaming for Multi-user Smart Environments.
ACM Trans. Internet Techn., 2022

Maximum Network Lifetime Problem with Time Slots and coverage constraints: heuristic approaches.
J. Supercomput., 2022

A genetic programming-based approach for classifying pancreatic adenocarcinoma: the SICED experience.
Soft Comput., 2022

Artificial neural networks for resources optimization in energetic environment.
Soft Comput., 2022

DNS tunnels detection via DNS-images.
Inf. Process. Manag., 2022

Electricity production and consumption modeling through fuzzy logic.
Int. J. Intell. Syst., 2022

Gotta CAPTCHA 'Em All: A Survey of 20 Years of the Human-or-computer Dilemma.
ACM Comput. Surv., 2022

A federated approach to Android malware classification through Perm-Maps.
Clust. Comput., 2022

A Galerkin Approach for Fractional Delay Differential Equations Using Hybrid Chelyshkov Basis Functions.
Proceedings of the Computational Science and Its Applications - ICCSA 2022, 2022

Energy-aware Optimization of Data Centers and Cybersecurity Issues.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

Efficient and Secure Transmission of Digital Data in the 5G Era.
Proceedings of the Extended Reality - First International Conference, 2022

2021
A Distributed Flow Correlation Attack to Anonymizing Overlay Networks Based on Wavelet Multi-Resolution Analysis.
IEEE Trans. Dependable Secur. Comput., 2021

Network traffic classification using deep convolutional recurrent autoencoder neural networks for spatial-temporal features extraction.
J. Netw. Comput. Appl., 2021

GGA: A modified genetic algorithm with gradient-based local search for solving constrained optimization problems.
Inf. Sci., 2021

A Cluster-Based Multidimensional Approach for Detecting Attacks on Connected Vehicles.
IEEE Internet Things J., 2021

A stacked autoencoder-based convolutional and recurrent deep neural network for detecting cyberattacks in interconnected power control systems.
Int. J. Intell. Syst., 2021

Gotta CAPTCHA 'Em All: A Survey of Twenty years of the Human-or-Computer Dilemma.
CoRR, 2021

Effective classification of android malware families through dynamic features and neural networks.
Connect. Sci., 2021

A machine learning-based memory forensics methodology for TOR browser artifacts.
Concurr. Comput. Pract. Exp., 2021

Human oriented solutions for intelligent analysis, multimedia and communication systems.
Concurr. Comput. Pract. Exp., 2021

On the undetectability of payloads generated through automatic tools: A human-oriented approach.
Concurr. Comput. Pract. Exp., 2021

Optimal control of system governed by nonlinear volterra integral and fractional derivative equations.
Comput. Appl. Math., 2021

PERMS: An efficient rescue route planning system in disasters.
Appl. Soft Comput., 2021

Association rule-based malware classification using common subsequences of API calls.
Appl. Soft Comput., 2021

Effectiveness of Video-Classification in Android Malware Detection Through API-Streams and CNN-LSTM Autoencoders.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021

Vehicle-to-Everything (V2X) Communication Scenarios for Vehicular Ad-hoc Networking (VANET): An Overview.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021

Comparison Between Protein-Protein Interaction Networks CD4<sup>+</sup>T and CD8<sup>+</sup>T and a Numerical Approach for Fractional HIV Infection of CD4<sup>+</sup>T Cells.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021

A Methodological Perspective on Lawful Internet Surveillance.
Proceedings of the FRAME@HPDC 2021: Proceedings of the 1st Workshop on Flexible Resource and Application Management on the Edge, 2021

2020
Low-Resource Footprint, Data-Driven Malware Detection on Android.
IEEE Trans. Sustain. Comput., 2020

A Fraud-Resilient Blockchain-Based Solution for Invoice Financing.
IEEE Trans. Engineering Management, 2020

Distributed Group Key Management for Event Notification Confidentiality Among Sensors.
IEEE Trans. Dependable Secur. Comput., 2020

CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices.
ACM Trans. Cyber Phys. Syst., 2020

Temporal convolutional neural (TCN) network for an effective weather forecasting using time-series data from the local weather station.
Soft Comput., 2020

A machine learning evolutionary algorithm-based formula to assess tumor markers and predict lung cancer in cytologically negative pleural effusions.
Soft Comput., 2020

A genetic approach for the maximum network lifetime problem with additional operating time slot constraints.
Soft Comput., 2020

Special Issue on Intelligent Systems in Sensor Networks and Internet of Things.
Sensors, 2020

Securing the internet of vehicles through lightweight block ciphers.
Pattern Recognit. Lett., 2020

Malware detection in mobile environments based on Autoencoders and API-images.
J. Parallel Distributed Comput., 2020

Special issue on advanced techniques for security and privacy of internet-of-things with machine learning.
J. Netw. Comput. Appl., 2020

Securing visual search queries in ubiquitous scenarios empowered by smart personal devices.
Inf. Sci., 2020

Transformative computing approaches for advanced management solutions and cognitive processing.
Inf. Process. Manag., 2020

DLCD-CCE: A Local Community Detection Algorithm for Complex IoT Networks.
IEEE Internet Things J., 2020

Discovering genomic patterns in SARS-CoV-2 variants.
Int. J. Intell. Syst., 2020

Knowledge elicitation based on genetic programming for non destructive testing of critical aerospace systems.
Future Gener. Comput. Syst., 2020

Securing PIN-based authentication in smartwatches with just two gestures.
Concurr. Comput. Pract. Exp., 2020

Compression-based steganography.
Concurr. Comput. Pract. Exp., 2020

A Reliability and latency-aware routing framework for 5G transport infrastructures.
Comput. Networks, 2020

Security, Privacy and Trust for Smart Mobile- Internet of Things (M-IoT): A Survey.
IEEE Access, 2020

Vulsploit: A Module for Semi-automatic Exploitation of Vulnerabilities.
Proceedings of the Testing Software and Systems, 2020

On the impact of lightweight ciphers in automotive networks (S).
Proceedings of the 26th International DMS Conference on Visualization and Visual Languages, 2020

Network Forensics of WhatsApp: A Practical Approach Based on Side-Channel Analysis.
Proceedings of the Advanced Information Networking and Applications, 2020

On the File Recovery in Systems Infected by Ransomware.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
Guest Editorial: Soft Computing Applications for Novel and Upcoming Distributed and Parallel Systems From Cloud Computing and Beyond.
IEEE Trans. Ind. Informatics, 2019

A Deep Learning Approach for Maximum Activity Links in D2D Communications.
Sensors, 2019

Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios.
J. Syst. Archit., 2019

MIH-SPFP: MIH-based secure cross-layer handover protocol for Fast Proxy Mobile IPv6-IoT networks.
J. Netw. Comput. Appl., 2019

Network anomaly detection based on logistic regression of nonlinear chaotic invariants.
J. Netw. Comput. Appl., 2019

Special issue on advances in security and privacy in IoT.
J. Netw. Comput. Appl., 2019

New energy-optimization challenges in the next-generation Internet ecosystem.
Inf. Sci., 2019

Using generative adversarial networks for improving classification effectiveness in credit card fraud detection.
Inf. Sci., 2019

A data-driven approximate dynamic programming approach based on association rule learning: Spacecraft autonomy as a case study.
Inf. Sci., 2019

Detecting unfair recommendations in trust-based pervasive environments.
Inf. Sci., 2019

Special Issue on Security and Privacy in Machine Learning.
Inf. Sci., 2019

A study on forecasting electricity production and consumption in smart cities and factories.
Int. J. Inf. Manag., 2019

Distributed temporal link prediction algorithm based on label propagation.
Future Gener. Comput. Syst., 2019

One-pass lossless data hiding and compression of remote sensing data.
Future Gener. Comput. Syst., 2019

Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey.
CoRR, 2019

Lightweight Ciphers in Automotive Networks: A Preliminary Approach.
Proceedings of the 4th International Conference on System Reliability and Safety, 2019

A Scheduling Framework for Latency Optimization on 5G Mobile Edge Computing Infrastructures.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

2018
Integrity for an Event Notification Within the Industrial Internet of Things by Using Group Signatures.
IEEE Trans. Ind. Informatics, 2018

Using Screen Brightness to Improve Security in Mobile Social Network Access.
IEEE Trans. Dependable Secur. Comput., 2018

Security and Privacy for Smart, Connected, and Mobile IoT Devices and Platforms.
Secur. Commun. Networks, 2018

A scalable distributed machine learning approach for attack detection in edge computing environments.
J. Parallel Distributed Comput., 2018

Event-based sensor data exchange and fusion in the Internet of Things environments.
J. Parallel Distributed Comput., 2018

Distributed strategic learning and game theoretic formulation of network embedded coding.
J. Comput. Sci., 2018

Stackelberg games for modeling defense scenarios against cloud security threats.
J. Netw. Comput. Appl., 2018

Building a network embedded FEC protocol by using game theory.
Inf. Sci., 2018

Loss-Tolerant Event Communications Within Industrial Internet of Things by Leveraging on Game Theoretic Intelligence.
IEEE Internet Things J., 2018

Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes.
Future Gener. Comput. Syst., 2018

A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation.
Future Gener. Comput. Syst., 2018

On the optimal tuning and placement of FEC codecs within multicasting trees for resilient publish/subscribe services in edge-IoT architectures.
Future Gener. Comput. Syst., 2018

CHIS: A big data infrastructure to manage digital cultural items.
Future Gener. Comput. Syst., 2018

Information theoretic-based detection and removal of slander and/or false-praise attacks for robust trust management with Dempster-Shafer combination of linguistic fuzzy terms.
Concurr. Comput. Pract. Exp., 2018

On the protection of consumer genomic data in the Internet of Living Things.
Comput. Secur., 2018

Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT.
Comput. Secur., 2018

Saving energy in aggressive intrusion detection through dynamic latency sensitivity recognition.
Comput. Secur., 2018

Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM.
IEEE Commun. Mag., 2018

Cloud Message Queueing and Notification: Challenges and Opportunities.
IEEE Cloud Comput., 2018

Data hiding using compressed archives.
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018

Secure Lossy Image Compression via Adaptive Vector Quantization.
Proceedings of the Augmented Reality, Virtual Reality, and Computer Graphics, 2018

2017
Exploiting Battery-Drain Vulnerabilities in Mobile Smart Devices.
IEEE Trans. Sustain. Comput., 2017

On-Board Format-Independent Security of Functional Magnetic Resonance Images.
ACM Trans. Embed. Comput. Syst., 2017

Developing a trust model for pervasive computing based on Apriori association rules learning and Bayesian classification.
Soft Comput., 2017

A Multiobjective Wavelength Routing Approach Combining Network and Traffic Engineering With Energy Awareness.
IEEE Syst. J., 2017

Introducing Fraudulent Energy Consumption in Cloud Infrastructures: A New Generation of Denial-of-Service Attacks.
IEEE Syst. J., 2017

Non-deterministic security driven meta scheduler for distributed cloud organizations.
Simul. Model. Pract. Theory, 2017

A wave propagation-based adaptive probabilistic broadcast containment strategy for reactive MANET routing protocols.
Pervasive Mob. Comput., 2017

Ambient Intelligence in the Internet of Things.
Mob. Inf. Syst., 2017

Traffic matrix estimation with software-defined NFV: Challenges and opportunities.
J. Comput. Sci., 2017

Bayesian resource discovery in infrastructure-less networks.
Inf. Sci., 2017

Layered multicast for reliable event notification over large-scale networks.
Inf. Sci., 2017

Supporting dynamic updates in storage clouds with the Akl-Taylor scheme.
Inf. Sci., 2017

Securing Information Exchange in VANETs by Using Pairing-Based Cryptography.
Int. J. Found. Comput. Sci., 2017

Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design.
Future Gener. Comput. Syst., 2017

Improving the gossiping effectiveness with distributed strategic learning (Invited paper).
Future Gener. Comput. Syst., 2017

A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants.
Future Gener. Comput. Syst., 2017

Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems.
IEEE Commun. Mag., 2017

Automated extraction of fragments of Bayesian networks from textual sources.
Appl. Soft Comput., 2017

Dynamic Latency Sensitivity Recognition: An Application to Energy Saving.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

2016
Performance Modeling of Big Data-Oriented Architectures.
Proceedings of the Resource Management for Big Data Platforms, 2016

Cryptographic Hierarchical Access Control for Dynamic Structures.
IEEE Trans. Inf. Forensics Secur., 2016

Hierarchical and Shared Access Control.
IEEE Trans. Inf. Forensics Secur., 2016

A Novel NTT-Based Authentication Scheme for 10-GHz Quantum Key Distribution Systems.
IEEE Trans. Ind. Electron., 2016

Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory.
IEEE Trans. Computers, 2016

A secure payment system for multimedia on demand on mobile VANET clouds.
Secur. Commun. Networks, 2016

A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment.
Int. J. Data Warehous. Min., 2016

GRASP-based resource re-optimization for effective big data access in federated clouds.
Future Gener. Comput. Syst., 2016

An HLA-based framework for simulation of large-scale critical systems.
Concurr. Comput. Pract. Exp., 2016

A hybrid load-balancing and energy-aware RWA algorithm for telecommunication networks.
Comput. Commun., 2016

Enhanced Network Support for Federated Cloud Infrastructures.
IEEE Cloud Comput., 2016

A cloud-based architecture for emergency management and first responders localization in smart city environments.
Comput. Electr. Eng., 2016

Optimal Data Replica Placement in Large-Scale Federated Architectures.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

Privacy-Aware Routing for Sharing Sensitive Information across Wide-Area Networks.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

Distributed strategic learning for effective gossiping in wireless networks.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Distributed Strategic Learning for Building Network Embedded Coding to Achieve Reliable Event Notification.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

Interoperable Access Control by Means of a Semantic Approach.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
A triadic closure and homophily-based recommendation system for online social networks.
World Wide Web, 2015

Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures.
J. Supercomput., 2015

Modeling performances of concurrent big data applications.
Softw. Pract. Exp., 2015

Secure and reliable data communication in developing regions and rural areas.
Pervasive Mob. Comput., 2015

Innovative Mobile Internet Services and Applications.
Mob. Inf. Syst., 2015

A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing.
Knowl. Based Syst., 2015

Energy efficiency of elastic frequency grids in multilayer IP/MPLS-over-flexgrid networks.
J. Netw. Comput. Appl., 2015

Modeling energy-efficient secure communications in multi-mode wireless mobile devices.
J. Comput. Syst. Sci., 2015

Cloud-based adaptive compression and secure management services for 3D healthcare data.
Future Gener. Comput. Syst., 2015

An energy-aware engineered control plane for wavelength-routed networks.
Trans. Emerg. Telecommun. Technol., 2015

Modeling security requirements for cloud-based system development.
Concurr. Comput. Pract. Exp., 2015

An uncertainty-managing batch relevance-based approach to network anomaly detection.
Appl. Soft Comput., 2015

A Game-Theoretic Approach to Network Embedded FEC over Large-Scale Networks.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

The untrusted handover security of the S-PMIPv6 on LTE-A.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Supporting First Responders Localization during Crisis Management.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

A honeypot system with honeyword-driven fake interactive sessions.
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015

Dealing with Reliable Event-Based Communications by Means of Layered Multicast.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

Heterogeneous Network Handover Using 3GPP ANDSF.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

On the Protection of fMRI Images in Multi-domain Environments.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

Format-Independent Protection of DNA Microarray Images.
Proceedings of the 10th International Conference on P2P, 2015

An Artificial Intelligence-Based Trust Model for Pervasive Computing.
Proceedings of the 10th International Conference on P2P, 2015

2014
A secure file sharing service for distributed computing environments.
J. Supercomput., 2014

A Denial of Service Attack to UMTS Networks Using SIM-Less Devices.
IEEE Trans. Dependable Secur. Comput., 2014

Hybrid indoor and outdoor location services for new generation mobile terminals.
Pers. Ubiquitous Comput., 2014

A botnet-based command and control approach relying on swarm intelligence.
J. Netw. Comput. Appl., 2014

A perspective of the journal's life in the last three years.
J. High Speed Networks, 2014

Secure and distributed video surveillance via portable devices.
J. Ambient Intell. Humaniz. Comput., 2014

A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems.
Int. J. Parallel Program., 2014

Advances in Security and Privacy in Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Exploiting mean field analysis to model performances of big data architectures.
Future Gener. Comput. Syst., 2014

A distributed approach to network anomaly detection based on independent component analysis.
Concurr. Comput. Pract. Exp., 2014

Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Adaptive Stealth Energy-Related DoS Attacks against Cloud Data Centers.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Multimedia-based battery drain attacks for Android devices.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

On Reliability and Security in Knowledge Grids.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
Towards an energy-aware Internet: modeling a cross-layer optimization approach.
Telecommun. Syst., 2013

Eco-sustainable routing in optical networks.
Photonic Netw. Commun., 2013

Modeling energy consumption in next-generation wireless access-over-WDM networks with hybrid power sources.
Math. Comput. Model., 2013

An intelligent security architecture for distributed firewalling environments.
J. Ambient Intell. Humaniz. Comput., 2013

Network anomaly detection with the restricted Boltzmann machine.
Neurocomputing, 2013

A distributed scheduling framework based on selfish autonomous agents for federated cloud environments.
Future Gener. Comput. Syst., 2013

Scalable service discovery in ubiquitous and pervasive computing architectures: A percolation-driven approach.
Future Gener. Comput. Syst., 2013

Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks.
Comput. Sci. Inf. Syst., 2013

Interconnecting Federated Clouds by Using Publish-Subscribe Service.
Clust. Comput., 2013

On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines.
Appl. Soft Comput., 2013

Evaluating energy savings in WoL-enabled networks of PCs.
Proceedings of the 22nd IEEE International Symposium on Industrial Electronics, 2013

An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Text Compression and Encryption through Smart Devices for Mobile Communication.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

On Secure Data Management in Health-Care Environment.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Towards Service Orchestration Between Smart Grids and Telecom Networks.
Proceedings of the Energy Efficiency in Large Scale Distributed Systems, 2013

FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

Analyzing the Internet Stability in Presence of Disasters.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Condensation-based routing in mobile ad-hoc networks.
Mob. Inf. Syst., 2012

Percolation-based routing in the Internet.
J. Syst. Softw., 2012

Selfish routing and wavelength assignment strategies with advance reservation in inter-domain optical networks.
Comput. Commun., 2012

An energy-aware dynamic RWA framework for next-generation wavelength-routed networks.
Comput. Networks, 2012

An asynchronous covert channel using spam.
Comput. Math. Appl., 2012

Device Tracking in Private Networks via NAPT Log Analysis.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A Secure Distributed Video Surveillance System Based on Portable Devices.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
Automatic security assessment for next generation wireless mobile networks.
Mob. Inf. Syst., 2011

Hiding Information into OOXML Documents: New Steganographic Perspectives.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

Analyzing Local Strategies for Energy-Efficient Networking.
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011

Characterizing and Classifying Card-Sharing Traffic through Wavelet Analysis.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

E-mail-Based Covert Channels for Asynchronous Message Steganography.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Energy-Aware RWA for WDM Networks with Dual Power Sources.
Proceedings of IEEE International Conference on Communications, 2011

Saving Energy in Data Center Infrastructures.
Proceedings of the First International Conference on Data Compression, 2011

Evaluating Network-Based DoS Attacks under the Energy Consumption Perspective: New Security Issues in the Coming Green ICT Area.
Proceedings of the 2011 International Conference on Broadband, 2011

New Steganographic Techniques for the OOXML File Format.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
Enhanced Network Support for Scalable Computing Clouds.
Proceedings of the Cloud Computing, Principles, Systems and Applications, 2010

Constrained minimum lightpath affinity routing in multi-layer optical transport networks.
J. High Speed Networks, 2010

Towards a federated Metropolitan Area Grid environment: The SCoPE network-aware infrastructure.
Future Gener. Comput. Syst., 2010

Network anomaly detection through nonlinear analysis.
Comput. Secur., 2010

A GRASP-based network re-optimization strategy for improving RWA in multi-constrained optical transport infrastructures.
Comput. Commun., 2010

A Fault Avoidance Strategy Improving the Reliability of the EGI Production Grid Infrastructure.
Proceedings of the Principles of Distributed Systems - 14th International Conference, 2010

Insights into peer to peer traffic through nonlinear analysis.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

A Wide Area Network Optimization Service for Effective Access to Heterogeneous DataGrid Infrastructures.
Proceedings of the Data Management in Grid and Peer-to-Peer Systmes, 2010

Towards a Lawfully Secure and Privacy Preserving Video Surveillance System.
Proceedings of the E-Commerce and Web Technologies, 11th International Conference, 2010

An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

Energy-Oriented Models for WDM Networks.
Proceedings of the Broadband Communications, Networks, and Systems, 2010

2009
A Converged Charging Framework for Mobile Voice and Data Applications.
J. Networks, 2009

Network-aware scheduling for real-time execution support in data-intensive optical Grids.
Future Gener. Comput. Syst., 2009

Providing true end-to-end security in converged voice over IP infrastructures.
Comput. Secur., 2009

A nonlinear, recurrence-based approach to traffic classification.
Comput. Networks, 2009

SimulNet: a wavelength-routed optical network simulation framework.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

Managing Network-Aware Grid Services on Metropolitan Scale: The SCoPE Experience.
Proceedings of the IP Operations and Management, 9th IEEE International Workshop, 2009

Percolation-Based Replica Discovery in Peer-to-Peer Grid Infrastructures.
Proceedings of the Networks for Grid Applications, 2009

2008
A Minimum Cut Interference-based Integrated RWA Algorithm for Multi-constrained Optical Transport Networks.
J. Netw. Syst. Manag., 2008

Inter-domain Routing Stability Dynamics During Infrastructure Stress Events: The Internet Worm Menace.
Int. J. Netw. Secur., 2008

Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies.
Comput. Secur., 2008

Network-Aware Replica Optimization in the SCoPE Grid Infrastructure.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008

2007
Enhanced Security Strategies for MPLS Signaling.
J. Networks, 2007

Introducing Virtual Private Overlay Network Services in Large Scale Grid Infrastructures.
J. Comput., 2007

SPARK: A smart parametric online RWA algorithm.
J. Commun. Networks, 2007

Automated detection and containment of worms and viruses into heterogeneous networks: a simple network immune system.
Int. J. Wirel. Mob. Comput., 2007

2006
GMPLS-based service differentiation for scalable QoS support in all-optical Grid applications.
Future Gener. Comput. Syst., 2006

A Low Cost and Effective Link Protection Approach for Enhanced Survivability in Optical Transport Networks.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

Large Scale Voice over IP Experiences on High Performance Intranets.
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006

Audit-Based Access Control in Nomadic Wireless Environments.
Proceedings of the Computational Science and Its Applications, 2006

Dynamic Layer-2 VPN Services for Improving Security in the Grid Environment.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

2005
An MPLS-based architecture for scalable QoS and traffic engineering in converged multiservice mobile IP networks.
Comput. Networks, 2005

Evaluating Evolutionary IP-Based Transport Services on a Dark Fiber Large-Scale Network Testbed.
Proceedings of the Networking, 2005

Introducing Public E-Mail Gateways: An Effective Hardening Strategy Against Spam.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Securing the MPLS Control Plane.
Proceedings of the High Performance Computing and Communications, 2005

2004
An High Performance Traffic Engineering Model for All-Optical Networks - Evolutionary GMPLS Control Plane Services in All-Optical Cross-Connects.
Proceedings of the ICETE 2004, 2004

A Scalable PKI for Secure Routing in the Internet.
Proceedings of the Computational Science and Its Applications, 2004

MPLS DiffServ-Enabled Traffic Engineering: A Scalable QoS Model for Optical-Speed Media Streaming Networks.
Proceedings of the High Speed Networks and Multimedia Communications, 2004

2003
Introducing MPLS in Mobile Data Networks: An High Performance Framework for QoS-Powered IP Mobility.
Proceedings of the Mobile Agents for Telecommunication Applications, 2003

VPN scalability over high performance backbones Evaluating MPLS VPN against traditional approaches.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003


  Loading...