Leonardo Aniello

According to our database1, Leonardo Aniello
  • authored at least 23 papers between 2011 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Survey on the Usage of Machine Learning Techniques for Malware Analysis.
CoRR, 2017

Android Malware Family Classification Based on Resource Consumption over Time.
CoRR, 2017

The goods, the bads and the uglies: Supporting decisions in malware detection through visual analytics.
Proceedings of the 2017 IEEE Symposium on Visualization for Cyber Security, 2017

Blockchain-Based Database to Ensure Data Integrity in Cloud Computing Environments.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017

A Prototype Evaluation of a Tamper-Resistant High Performance Blockchain-Based Transaction Log for a Distributed Database.
Proceedings of the 13th European Dependable Computing Conference, 2017

Malware Triage Based on Static Features and Public APT Reports.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

Share a pie?: Privacy-Preserving Knowledge Base Export through Count-min Sketches.
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017

2016
Automatic Invariant Selection for Online Anomaly Detection.
Proceedings of the Computer Safety, Reliability, and Security, 2016

Towards the Usage of Invariant-Based App Behavioral Fingerprinting for the Detection of Obfuscated Versions of Known Malware.
Proceedings of the 10th International Conference on Next Generation Mobile Applications, 2016

An Architecture for Semi-Automatic Collaborative Malware Analysis for CIs.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

2015
High frequency batch-oriented computations over large sliding time windows.
Future Generation Comp. Syst., 2015

NIRVANA: A Non-intrusive Black-Box Monitoring Framework for Rack-Level Fault Detection.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

2014
An event-based platform for collaborative threats detection and monitoring.
Inf. Syst., 2014

Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities.
CoRR, 2014

An Architecture for Automatic Scaling of Replicated Services.
Proceedings of the Networked Systems - Second International Conference, 2014

Cloud-based data stream processing.
Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, 2014

The overlay scan attack: inferring topologies of distributed pub/sub systems through broker saturation.
Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, 2014

2013
Input data organization for batch processing in time window based computations.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Adaptive online scheduling in storm.
Proceedings of the 7th ACM International Conference on Distributed Event-Based Systems, 2013

2012
Collaborative Inter-domain Stealthy Port Scan Detection Using Esper Complex Event Processing.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

Distributed Attack Detection Using Agilis.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

Cyber Attacks on Financial Critical Infrastructures.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

2011
A Collaborative Event Processing System for Protection of Critical Infrastructures from Cyber Attacks.
Proceedings of the Computer Safety, Reliability, and Security, 2011


  Loading...