Giuseppe Cattaneo

According to our database1, Giuseppe Cattaneo authored at least 76 papers between 1988 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
An experimental estimate of the impact produced on PNU by new generation video codecs.
Int. J. Embed. Syst., 2020

On the Reliability of the PNU for Source Camera Identification Tasks.
CoRR, 2020

FASTA/Q Data Compressors for MapReduce-Hadoop Genomics: Space and Time Savings Made Easy - Version 1.
CoRR, 2020

An Extensible, Scalable Spark Platform for Alignment-free Genomic Analysis - Version 2.
CoRR, 2020

2019
MapReduce in Computational Biology Via Hadoop and Spark.
Proceedings of the Encyclopedia of Bioinformatics and Computational Biology - Volume 1, 2019

A Novel Methodology to Acquire Live Big Data Evidence from the Cloud.
IEEE Trans. Big Data, 2019

Achieving efficient source camera identification on Hadoop.
Multim. Tools Appl., 2019

Analyzing big datasets of genomic sequences: fast and scalable collection of k-mer statistics.
BMC Bioinform., 2019

TRUST: TRust Unguarded Service Terminals.
Proceedings of the Pervasive Systems, Algorithms and Networks, 2019

Experimental Analysis of the Pixel Non Uniformity (PNU) in SEM for Digital Forensics Purposes.
Proceedings of the Pervasive Systems, Algorithms and Networks, 2019

2018
Improving the experimental analysis of tampered image detection algorithms for biometric systems.
Pattern Recognit. Lett., 2018

On the optimal tuning and placement of FEC codecs within multicasting trees for resilient publish/subscribe services in edge-IoT architectures.
Future Gener. Comput. Syst., 2018

Informational and linguistic analysis of large genomic sequence collections via efficient Hadoop cluster algorithms.
Bioinform., 2018

Effects of H.265 encoding on PNU and source camera identification.
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018

2017
An effective extension of the applicability of alignment-free biological sequence comparison algorithms with Hadoop.
J. Supercomput., 2017

FASTdoop: a versatile and efficient library for the input of FASTA and FASTQ files for MapReduce Hadoop bioinformatics applications.
Bioinform., 2017

H-264/RTSP Multicast Stream Integrity.
Proceedings of the Image Analysis and Processing - ICIAP 2017, 2017

Distributed Anti-Plagiarism Checker for Biomedical Images Based on Sensor Noise.
Proceedings of the New Trends in Image Analysis and Processing - ICIAP 2017, 2017

An Efficient Implementation of the Algorithm by Lukáš et al. on Hadoop.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

2016
Ensuring non-repudiation in human conversations over VoIP communications.
Int. J. Commun. Networks Distributed Syst., 2016

MapReduce in Computational Biology - A Synopsis.
Proceedings of the Advances in Artificial Life, Evolutionary Computation, and Systems Chemistry, 2016

Using PNU-Based Techniques to Detect Alien Frames in Videos.
Proceedings of the Advanced Concepts for Intelligent Vision Systems, 2016

2015
A New Flexible Protocol for Docking Studies.
Proceedings of the Advances in Artificial Life, Evolutionary Computation and Systems Chemistry, 2015

Novel Algorithm for Efficient Distribution of Molecular Docking Calculations.
Proceedings of the Advances in Artificial Life, Evolutionary Computation and Systems Chemistry, 2015

Reliable Voice-Based Transactions over VoIP Communications.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Alignment-Free Sequence Comparison over Hadoop for Computational Biology.
Proceedings of the 44th International Conference on Parallel Processing Workshops, 2015

A PNU-Based Technique to Detect Forged Regions in Digital Images.
Proceedings of the Advanced Concepts for Intelligent Vision Systems, 2015

2014
A Possible Pitfall in the Experimental Analysis of Tampering Detection Algorithms.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Experimental Evaluation of an Algorithm for the Detection of Tampered JPEG Images.
Proceedings of the Information and Communication Technology, 2014

A Scalable Approach to Source Camera Identification over Hadoop.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
Security Issues and Attacks on the GSM Standard: a Review.
J. Univers. Comput. Sci., 2013

Experimentations with source camera identification and Online Social Networks.
J. Ambient Intell. Humaniz. Comput., 2013

Automated Production of Predetermined Digital Evidence.
IEEE Access, 2013

A Review of Security Attacks on the GSM Standard.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Forensically-Sound Methods to Collect Live Network Evidence.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
Engineering a secure mobile messaging framework.
Comput. Secur., 2012

Virtual lab: A concrete experience in building multi-purpose virtualized labs for Computer Science Education.
Proceedings of the 20th International Conference on Software, 2012

Experiments on Improving Sensor Pattern Noise Extraction for Source Camera Identification.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

The Forensic Analysis of a False Digital Alibi.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

How to Forge a Digital Alibi on Mac OS X.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
A Forensic Analysis of Images on Online Social Networks.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

On the Construction of a False Digital Alibi on the Android OS.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

SECR3T: Secure End-to-End Communication over 3G Telecommunication Networks.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Automatic, Selective and Secure Deletion of Digital Evidence.
Proceedings of the 2011 International Conference on Broadband, 2011

A Novel Anti-forensics Technique for the Android OS.
Proceedings of the 2011 International Conference on Broadband, 2011

Automated Construction of a False Digital Alibi.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
Maintaining dynamic minimum spanning trees: An experimental study.
Discret. Appl. Math., 2010

Proxy Smart Card Systems.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

An Extensible Framework for Efficient Secure SMS.
Proceedings of the CISIS 2010, 2010

Source Camera Identification in Real Practice: A Preliminary Experimentation.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
A Multi-scheme and Multi-channel Framework for Micropayment Systems.
Proceedings of the E-Commerce and Web Technologies, 10th International Conference, 2009

DISCERN: A collaborative visualization system for learning cryptographic protocols.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

2008
Visualization of cryptographic protocols with GRACE.
J. Vis. Lang. Comput., 2008

2007
iToken: aWireless smart card reader which provides handhelds with desk top equivalent security.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

2006
SPEECH: Secure Personal End-to-End Communication with Handheld.
Proceedings of the ISSE 2006, 2006

2004
A Web Services Based Architecture for Digital Time Stamping.
J. Web Eng., 2004

JIVE: Java Interactive Software Visualization Environment.
Proceedings of the 2004 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2004), 2004

Providing Privacy for Web Services by Anonymous Group Identification.
Proceedings of the IEEE International Conference on Web Services (ICWS'04), 2004

2003
Using Web Services Technology for Inter-enterprise Integration of Digital Time Stamping.
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003

A Lightweight Security Model for WBEM.
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003

2002
CATAI: Concurrent Algorithms and Data Types Animation over the Internet.
J. Vis. Lang. Comput., 2002

2001
The Design and Implementation of a Transparent Cryptographic File System for UNIX.
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, 2001

JSEB (Java Scalable sErvices Builder): Scalable Systems for Clusters of Workstations.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

2000
Teach++: A Cooperative Distance Learning and Teaching Environment.
Proceedings of the Applied Computing 2000, 2000

1999
Algorithm Engineering.
ACM Comput. Surv., 1999

1998
Symmetric adaptive customer modeling in an electronic store.
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998

Concurrent Algorithms and Data Types Animation over the Internet.
Proceedings of the Fundamentals - Foundations of Computer Science, 1998

Symmetric Adaptive Customer Modeling for Electronic Commerce in a Distributed Environment.
Proceedings of the Trends in Distributed Systems for Electronic Commerce, 1998

1997
An Empirical Study of Dynamic Graph Algorithms.
ACM J. Exp. Algorithmics, 1997

Experimental Analysis of Dynamic Minimum Spanning Tree Algorithms (Extended Abstract).
Proceedings of the Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, 1997

1996
An Empirical Study of Dynamic Graph Algorithms (Extended Abstract).
Proceedings of the Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, 1996

1992
Another C Threads Library.
ACM SIGPLAN Notices, 1992

Incremental, High Level Implementation of Prolog in an Open System Framework.
Proceedings of the SEKE'92, 1992

1989
Les Sleepers: une technique d'implémentation de haut niveau pour contrôler le processus de démonstration.
Proceedings of the SPLT'89, 1989

1988
A common-LISP implementation of an extended Prolog system.
ACM SIGPLAN Notices, 1988


  Loading...