Giuseppe Cascavilla

Orcid: 0000-0002-0724-3772

According to our database1, Giuseppe Cascavilla authored at least 21 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Internet-of-things architectures for secure cyber-physical spaces: The VISOR experience report.
J. Softw. Evol. Process., July, 2023

Real-world K-Anonymity applications: The KGen approach and its evaluation in fraudulent transactions.
Inf. Syst., May, 2023

Counter-terrorism in cyber-physical spaces: Best practices and technologies from the state of the art.
Inf. Softw. Technol., 2023

When the Few Outweigh the Many: Illicit Content Recognition with Few-Shot Learning.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

BigData Fusion for Trajectory Prediction of Multi-Sensor Surveillance Information Systems.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Real-world K-Anonymity Applications: the \textsc{KGen} approach and its evaluation in Fraudulent Transactions.
CoRR, 2022

Unsupervised Labor Intelligence Systems: A Detection Approach and Its Evaluation - A Case Study in the Netherlands.
Proceedings of the Service-Oriented Computing - 16th Symposium and Summer School, 2022

Illicit Darkweb Classification via Natural-language Processing: Classifying Illicit Content of Webpages based on Textual Information.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

SENSEI: Scraper for ENhanced AnalySis to Evaluate Illicit Trends.
Proceedings of the Service-Oriented Computing - ICSOC 2022 Workshops - ASOCA, AI-PA, FMCIoT, WESOACS 2022, Sevilla, Spain, November 29, 2022

"When the Code becomes a Crime Scene" Towards Dark Web Threat Intelligence with Software Quality Metrics.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2022

Securing Cyber-Physical Spaces with Hybrid Analytics: Vision and Reference Architecture.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

Explaining IoT Attacks: An Effective and Efficient Semi-Supervised Learning Framework.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Cybercrime threat intelligence: A systematic multi-vocal literature review.
Comput. Secur., 2021

2020
Services Computing for Cyber-Threat Intelligence: The ANITA Approach.
Proceedings of the Advances in Service-Oriented and Cloud Computing, 2020

Counterterrorism for Cyber-Physical Spaces: A Computer Vision Approach.
Proceedings of the AVI '20: International Conference on Advanced Visual Interfaces, Island of Ischia, Italy, September 28, 2020

2018
OSSINT - Open Source Social Network Intelligence: An efficient and effective way to uncover "private" information in OSN profiles.
Online Soc. Networks Media, 2018

The insider on the outside: a novel system for the detection of information leakers in social networks.
Eur. J. Inf. Syst., 2018

2017
Identifying Emotions in Social Media: Comparison of Word-Emotion Lexicons.
Proceedings of the 5th International Conference on Future Internet of Things and Cloud Workshops, 2017

On the Influence of Emotional Valence Shifts on the Spread of Information in Social Networks.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2015
Revealing Censored Information Through Comments and Commenters in Online Social Networks.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks.
Proceedings of the Risks and Security of Internet and Systems, 2014


  Loading...