Leonardo Aniello

Orcid: 0000-0003-2886-8445

According to our database1, Leonardo Aniello authored at least 45 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Software supply chain: review of attacks, risk assessment strategies and security controls.
CoRR, 2023

A Methodology for Cybersecurity Risk Assessment in Supply Chains.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

2022
A lightweight approach to the concurrent use and integration of SysML and formal methods in systems design.
Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings, 2022

Evaluating Blockchain Systems: A Comprehensive Study of Security and Dependability Attributes.
Proceedings of the 4th Workshop on Distributed Ledger Technology co-located with the Italian Conference on Cybersecurity 2022 (ITASEC 2022), 2022

2021
ASSURE: A Hardware-Based Security Protocol for Resource-Constrained IoT Systems.
J. Hardw. Syst. Secur., 2021

MalFamAware: automatic family identification and malware classification through online clustering.
Int. J. Inf. Sec., 2021

Anti-BlUFf: towards counterfeit mitigation in IC supply chains using blockchain and PUF.
Int. J. Inf. Sec., 2021

Verifying System-Level Security of a Smart Ballot Box.
Proceedings of the Rigorous State-Based Methods - 8th International Conference, 2021

2020
Cloud2Edge Elastic AI Framework for Prototyping and Deployment of AI Inference Engines in Autonomous Vehicles.
Sensors, 2020

A Methodology to Select Topology Generators for Ad Hoc Mesh Network Simulations.
J. Commun., 2020

AndroDFA: Android Malware Classification Based on Resource Consumption.
Inf., 2020

2019
PASCAL: An architecture for proactive auto-scaling of distributed services.
Future Gener. Comput. Syst., 2019

Towards a Supply Chain Management System for Counterfeit Mitigation using Blockchain and PUF.
CoRR, 2019

A Methodology to Select Topology Generators for WANET Simulations (Extended Version).
CoRR, 2019

Survey of machine learning techniques for malware analysis.
Comput. Secur., 2019

2018
Elastic Symbiotic Scaling of Operators and Resources in Stream Processing Systems.
IEEE Trans. Parallel Distributed Syst., 2018

PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain.
Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to, 2018

2017
Survey on the Usage of Machine Learning Techniques for Malware Analysis.
CoRR, 2017

The goods, the bads and the uglies: Supporting decisions in malware detection through visual analytics.
Proceedings of the 14th IEEE Symposium on Visualization for Cyber Security, 2017

Android malware family classification based on resource consumption over time.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

Blockchain-Based Database to Ensure Data Integrity in Cloud Computing Environments.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017

Malware family identification with BIRCH clustering.
Proceedings of the International Carnahan Conference on Security Technology, 2017

A Prototype Evaluation of a Tamper-Resistant High Performance Blockchain-Based Transaction Log for a Distributed Database.
Proceedings of the 13th European Dependable Computing Conference, 2017

Malware Triage Based on Static Features and Public APT Reports.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

<i>Share a pie?</i>: Privacy-Preserving Knowledge Base Export through Count-min Sketches.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

2016
Timely processing of big data in collaborative large-scale distributed systems.
PhD thesis, 2016

A Blockchain-Based Solution for Enabling Log-Based Resolution of Disputes in Multi-party Transactions.
Proceedings of 5th International Conference in Software Engineering for Defence Applications, 2016

Automatic Invariant Selection for Online Anomaly Detection.
Proceedings of the Computer Safety, Reliability, and Security, 2016

Towards the Usage of Invariant-Based App Behavioral Fingerprinting for the Detection of Obfuscated Versions of Known Malware.
Proceedings of the 10th International Conference on Next Generation Mobile Applications, 2016

An Architecture for Semi-Automatic Collaborative Malware Analysis for CIs.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

2015
High frequency batch-oriented computations over large sliding time windows.
Future Gener. Comput. Syst., 2015

NIRVANA: A Non-intrusive Black-Box Monitoring Framework for Rack-Level Fault Detection.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

2014
An event-based platform for collaborative threats detection and monitoring.
Inf. Syst., 2014

Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities.
CoRR, 2014

An Architecture for Automatic Scaling of Replicated Services.
Proceedings of the Networked Systems - Second International Conference, 2014

Cloud-based data stream processing.
Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, 2014

The overlay scan attack: inferring topologies of distributed pub/sub systems through broker saturation.
Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, 2014

2013
Assessing data availability of Cassandra in the presence of non-accurate membership.
Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing, 2013

Input data organization for batch processing in time window based computations.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Adaptive online scheduling in storm.
Proceedings of the 7th ACM International Conference on Distributed Event-Based Systems, 2013

2012
Collaborative Inter-domain Stealthy Port Scan Detection Using Esper Complex Event Processing.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

Distributed Attack Detection Using Agilis.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

Cyber Attacks on Financial Critical Infrastructures.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

2011
A Collaborative Event Processing System for Protection of Critical Infrastructures from Cyber Attacks.
Proceedings of the Computer Safety, Reliability, and Security, 2011

Inter-domain stealthy port scan detection through complex event processing.
Proceedings of the 13th European Workshop on Dependable Computing, 2011


  Loading...