Leonardo Mostarda

Orcid: 0000-0001-8852-8317

According to our database1, Leonardo Mostarda authored at least 111 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Analytical model for performability evaluation of Practical Byzantine Fault-Tolerant systems.
Expert Syst. Appl., March, 2024

Efficient Inner-Product Argument from Compressed Σ-Protocols and Applications.
Proceedings of the Advanced Information Networking and Applications, 2024

Sensitivity Analysis of Performability Model to Evaluate PBFT Systems.
Proceedings of the Advanced Information Networking and Applications, 2024

Interoperability Between EVM-Based Blockchains.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
SPECTRE: a deep learning network for posture recognition in manufacturing.
J. Intell. Manuf., December, 2023

Availability evaluation of IoT systems with Byzantine fault-tolerance for mission-critical applications.
Internet Things, October, 2023

Optimal vs rotation heuristics in the role of cluster-head for routing in IoT constrained devices.
Internet Things, July, 2023

Android-IoT Malware Classification and Detection Approach Using Deep URL Features Analysis.
J. Database Manag., 2023

Blockchain Application for Fish Origin Certification.
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023

Range Proofs with Constant Size and Trustless Setup.
Proceedings of the Advanced Information Networking and Applications, 2023

Zero-Knowledge Multi-transfer Based on Range Proofs and Homomorphic Encryption.
Proceedings of the Advanced Information Networking and Applications, 2023

Performance Analysis of a BESU Permissioned Blockchain.
Proceedings of the Advanced Information Networking and Applications, 2023

Availability Model for Byzantine Fault-Tolerant Systems.
Proceedings of the Advanced Information Networking and Applications, 2023

Blockchain and IoT Integration for Air Pollution Control.
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2023

2022
Off-chain trading for micro grid systems.
Frontiers Blockchain, July, 2022

Cyber-Threat Detection System Using a Hybrid Approach of Transfer Learning and Multi-Model Image Representation.
Sensors, 2022

Novel Concave Hull-Based Heuristic Algorithm For TSP.
Oper. Res. Forum, 2022

NARUN: noise adaptive routing for utility networks.
Int. J. Web Grid Serv., 2022

A MCDM-based framework for blockchain consensus protocol selection.
Expert Syst. Appl., 2022

Light Communication for Controlling Industrial Robots.
CoRR, 2022

NARUN-PC: Caching Strategy for Noise Adaptive Routing in Utility Networks.
Proceedings of the Advanced Information Networking and Applications, 2022

Reasoning About Inter-procedural Security Requirements in IoT Applications.
Proceedings of the Advanced Information Networking and Applications, 2022

ZeroMT: Multi-transfer Protocol for Enabling Privacy in Off-Chain Payments.
Proceedings of the Advanced Information Networking and Applications, 2022

Robot Based Computing System: An Educational Experience.
Proceedings of the Advanced Information Networking and Applications, 2022

Blockchain and IoT Integration for Pollutant Emission Control.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
Fast File Transfers from IoT Devices by Using Multiple Interfaces.
Sensors, 2021

Clone detection in 5G-enabled social IoT system using graph semantics and deep learning model.
Int. J. Mach. Learn. Cybern., 2021

Voronoi Tesselation-based load-balanced multi-objective priority-based heuristic optimisation for multi-cell region coverage with UAVs.
Int. J. Web Grid Serv., 2021

An intelligent decision support system for software plagiarism detection in academia.
Int. J. Intell. Syst., 2021

Quantum Consensus: an overview.
CoRR, 2021

Steering Angle Prediction Techniques for Autonomous Ground Vehicles: A Review.
IEEE Access, 2021

Heuristic Drone Pathfinding Over Optimized Charging Station Grid.
IEEE Access, 2021

IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments.
IEEE Access, 2021

A system to improve the physical ergonomics in Human-Robot Collaboration.
Proceedings of the 3rd International Conference on Industry 4.0 and Smart Manufacturing (ISM 2022), Virtual Event / Upper Austria University of Applied Sciences - Hagenberg Campus, 2021

Optimum Path Finding Framework for Drone Assisted Boat Rescue Missions.
Proceedings of the Advanced Information Networking and Applications, 2021

UAVs Route Planning in Sea Emergencies.
Proceedings of the Advanced Information Networking and Applications, 2021

Off-Chain Execution of IoT Smart Contracts.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Cognition in UAV-Aided 5G and Beyond Communications: A Survey.
IEEE Trans. Cogn. Commun. Netw., 2020

Energy consumption balancing in multi-interface networks.
J. Ambient Intell. Humaniz. Comput., 2020

Ethereum smart contracts: Analysis and statistics of their source code and opcodes.
Internet Things, 2020

Applying REECHD to non-uniformly distributed heterogeneous devices.
Int. J. Grid Util. Comput., 2020

Applications of Artificial Intelligence and Machine learning in smart cities.
Comput. Commun., 2020

UAVs assessment in software-defined IoT networks: An overview.
Comput. Commun., 2020

UAVs joint optimization problems and machine learning to improve the 5G and Beyond communication.
Comput. Networks, 2020

Seamless secure anonymous authentication for cloud-based mobile edge computing.
Comput. Electr. Eng., 2020

Survival Study on Blockchain Based 6G-Enabled Mobile Edge Computation for IoT Automation.
IEEE Access, 2020

Enhancing the Access Privacy of IDaaS System Using SAML Protocol in Fog Computing.
IEEE Access, 2020

Proficient QoS-Based Target Coverage Problem in Wireless Sensor Networks.
IEEE Access, 2020

Capturing-the-Invisible (CTI): Behavior-Based Attacks Recognition in IoT-Oriented Industrial Control Systems.
IEEE Access, 2020

An Efficient Framework for Text Document Security and Privacy.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Optimal Cluster Head Rotation for Heterogeneous WSNs.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

Multi-objective Priority Based Heuristic Optimization for Region Coverage with UAVs.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
A4WSN: an architecture-driven modelling platform for analysing and developing WSNs.
Softw. Syst. Model., 2019

A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems.
Sensors, 2019

On the performance, availability and energy consumption modelling of clustered IoT systems.
Computing, 2019

Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach.
IEEE Access, 2019

CER-CH: Combining Election and Routing Amongst Cluster Heads in Heterogeneous WSNs.
IEEE Access, 2019

Intelligent Data Delivery Approach for Smart Cities Using Road Side Units.
IEEE Access, 2019

Artificial Muscle Intelligence System With Deep Learning for Post-Stroke Assistance and Rehabilitation.
IEEE Access, 2019

Quantifying Uncertainty in Internet of Medical Things and Big-Data Services Using Intelligence and Deep Learning.
IEEE Access, 2019

Enhanced Deployment Strategy for the 5G Drone-BS Using Artificial Intelligence.
IEEE Access, 2019

Network Experience Scheduling and Routing Approach for Big Data Transmission in the Internet of Things.
IEEE Access, 2019

Energy Aware Resource Allocation in Multi-Hop Multimedia Routing via the Smart Edge Device.
IEEE Access, 2019

Analysis of Ethereum Smart Contracts and Opcodes.
Proceedings of the Advanced Information Networking and Applications, 2019

Distributing Energy Consumption in Multi-interface Series-Parallel Networks.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019

2018
Analysis and verification of ECA rules in intelligent environments.
J. Ambient Intell. Smart Environ., 2018

Does the assumption of exponential arrival distributions in wireless sensor networks hold?
Int. J. Sens. Networks, 2018

Multi-path Routing for Mission Critical Applications in Software-Defined Networks.
Proceedings of the Industrial Networks and Intelligent Systems, 2018

Rotating Energy Efficient Clustering for Heterogeneous Devices (REECHD).
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

PICO-MP: De-centralised Macro-Programming for Wireless Sensor and Actuator Networks.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Symbolic verification of event-condition-action rules in intelligent environments.
J. Reliab. Intell. Environ., 2017

Modeling temporal aspects of sensor data for MongoDB NoSQL database.
J. Big Data, 2017

vIRONy: A Tool for Analysis and Verification of ECA Rules in Intelligent Environments.
Proceedings of the 2017 International Conference on Intelligent Environments, 2017

2016
A Flexible and Scalable Architecture for Real-Time ANT+ Sensor Data Acquisition and NoSQL Storage.
Int. J. Distributed Sens. Networks, 2016

A Formal Model for Event-Condition-Action Rules in Intelligent Environments.
Proceedings of the Intelligent Environments 2016, 2016

Towards a Uniform Ontology-Driven Approach for Modeling, Checking and Executing WSANs.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

A Comparison of HEED Based Clustering Algorithms - Introducing ER-HEED.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

Algorithms for Services with Multiple Levels of Quality.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

2015
Analytical Modelling and Performability Analysis for Cloud Computing Using Queuing System.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Symbolic Model-checking for Resource-Bounded ATL.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Packet Arrival Analysis in Wireless Sensor Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

A Constrained ECA Language Supporting Formal Verification of WSNs.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

RUHEED-Rotated Unequal Clustering Algorithm for Wireless Sensor Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

2014
Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions.
KSII Trans. Internet Inf. Syst., 2014

Performability Modelling and Analysis of Clustered Wireless Sensor Networks with Limited Storage Capacities.
Proceedings of the Internet and Distributed Computing Systems, 2014

An Ontology Driven Software Framework for the Healthcare Applications Based on ANT+ Protocol.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

2013
Implementing Adaptation and Reconfiguration Strategies in Heterogeneous WSN.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

Modelling Attacker with Deciding Security Properties by Induction and Deduction.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Path Loss Effect on Energy Consumption in a WSN.
Proceedings of the 14th International Conference on Computer Modelling and Simulation, 2012

Effects of IDSs on the WSNs Lifetime: Evidence of the Need of New Approaches.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A model-driven engineering framework for architecting and analysing Wireless Sensor Networks.
Proceedings of the Third International Workshop on Software Engineering for Sensor Network Applications, 2012

UHEED - An Unequal Clustering Algorithm for Wireless Sensor Networks.
Proceedings of the SENSORNETS 2012, 2012

2011
A policy-based publish/subscribe middleware for sense-and-react applications.
J. Syst. Softw., 2011

2010
Context-based authentication and transport of cultural assets.
Pers. Ubiquitous Comput., 2010

An Architectural Framework for Analyzing Tradeoffs between Software Security and Performance.
Proceedings of the Architecting Critical Systems, First International Symposium, 2010

Distributed Fault Tolerant Controllers.
Proceedings of the Distributed Applications and Interoperable Systems, 2010

Distributed Orchestration of Pervasive Services.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Policies for Self Tuning Home Networks.
Proceedings of the POLICY 2009, 2009

2008
Synthesis of decentralized and concurrent adaptors for correctly assembling distributed component-based systems.
J. Syst. Softw., 2008

Distributed Intrusion Detection Systems for Enhancing Security in Mobile Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2008

DALICA: Agent-Based Ambient Intelligence for Cultural-Heritage Scenarios.
IEEE Intell. Syst., 2008

Place and Time Authentication of Cultural Assets.
Proceedings of the Trust Management II, 2008

ESCAPE: A Component-Based Policy Framework for Sense and React Applications.
Proceedings of the Component-Based Software Engineering, 11th International Symposium, 2008

2007
Agents and Security in a Cultural Assets Transport Scenario.
Proceedings of the WOA 2007: Dagli Oggetti agli Agenti. 8th AI*IA/TABOO Joint Workshop "From Objects to Agents": Agents and Industry: Technological Applications of Software Agents, 2007

DALICA: Intelligent Agents for User Profile Deduction.
Proceedings of the Nineteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2007), 2007

DESERT: a decentralized monitoring tool generator.
Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), 2007

A Geo Time Authentication System.
Proceedings of the Trust Management, 2007

2006
A Distributed Monitoring System for Enhancing Security and Dependability at Architectural Level.
Proceedings of the Architecting Dependable Systems IV [the book is a result of DSN 2006 workshops, 2006

Distributed IDSs for enhancing Security in Mobile Wireless Sensor Networks.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Synthesis of correct and distributed adaptors for component-based systems: an automatic approach.
Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), 2005

A Distributed Intrusion Detection Approach for Secure Software Architecture.
Proceedings of the Software Architecture, 2nd European Workshop, 2005


  Loading...