Luca Caviglione
According to our database1,
Luca Caviglione
authored at least 58 papers
between 2005 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
Homepages:
On csauthors.net:
Bibliography
2019
Model Predictive Control for Energy-Efficient, Quality-Aware, and Secure Virtual Machine Placement.
IEEE Trans. Automation Science and Engineering, 2019
When Time Matters: Predictive Mission Planning in Cyber-Physical Scenarios.
IEEE Access, 2019
2018
Emerging and Unconventional: New Attacks and Innovative Detection Techniques.
Security and Communication Networks, 2018
The New Threats of Information Hiding: The Road Ahead.
IT Professional, 2018
IEEE 802.15.4 Air-Ground UAV Communications in Smart Farming Scenarios.
IEEE Communications Letters, 2018
Exploiting IP telephony with silence suppression for hidden data transfers.
Computers & Security, 2018
Covert Channels in IoT Deployments Through Data Hiding Techniques.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018
2017
Covert Channels in Personal Cloud Storage Services: The Case of Dropbox.
IEEE Trans. Industrial Informatics, 2017
Using SPDY to improve Web 2.0 over satellite links.
Int. J. Satellite Communications Networking, 2017
Recent Advancements in Digital Forensics.
IEEE Security & Privacy, 2017
The Future of Digital Forensics: Challenges and the Road Ahead.
IEEE Security & Privacy, 2017
Detecting local covert channels using process activity correlation on Android smartphones.
Comput. Syst. Sci. Eng., 2017
Measuring the Energy Consumption of Cyber Security.
IEEE Communications Magazine, 2017
A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence.
IEEE Trans. Information Forensics and Security, 2016
Predictive Control for Energy-Aware Consolidation in Cloud Datacenters.
IEEE Trans. Contr. Sys. Techn., 2016
Optimal control of time instants for task replanning in robotic networks.
Proceedings of the 2016 American Control Conference, 2016
Model predictive control for the placement of virtual machines in cloud computing applications.
Proceedings of the 2016 American Control Conference, 2016
2015
A survey on energy-aware security mechanisms.
Pervasive and Mobile Computing, 2015
A deep analysis on future web technologies and protocols over broadband GEO satellite networks.
Int. J. Satellite Communications Networking, 2015
Information Hiding as a Challenge for Malware Detection.
IEEE Security & Privacy, 2015
A first look at traffic patterns of Siri.
Trans. Emerging Telecommunications Technologies, 2015
Steganography in Modern Smartphones and Mitigation Techniques.
IEEE Communications Surveys and Tutorials, 2015
Understanding Information Hiding in iOS.
IEEE Computer, 2015
Analysis of Human Awareness of Security and Privacy Threats in Smart Environments.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
2014
Characterizing SPDY over High Latency Satellite Channels.
ICST Trans. Mobile Communications Applications, 2014
A taxonomy-based model of security and privacy in online social networks.
IJCSE, 2014
A Task Allocation Middleware for Wireless Sensor Networks in a Multi-Agent Environment.
Proceedings of the SENSORNETS 2014 - Proceedings of the 3rd International Conference on Sensor Networks, Lisbon, Portugal, 7, 2014
Performance Evaluation of HTTP and SPDY Over a DVB-RCS Satellite Link with Different BoD Schemes.
Proceedings of the Personal Satellite Services. Next-Generation Satellite Networking and Communication Systems, 2014
Satellites, UAVs, Vehicles and Sensors for an Integrated Delay Tolerant Ad Hoc Network.
Proceedings of the Personal Satellite Services. Next-Generation Satellite Networking and Communication Systems, 2014
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats.
Proceedings of the ISSE 2014, 2014
A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
A predictive control approach for energy-aware consolidation of virtual machines in cloud computing.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014
2013
Extending HTTP models to Web 2.0 applications: the case of online social networks.
IJCSE, 2013
Performance Evaluation of SPDY over High Latency Satellite Channels.
Proceedings of the Personal Satellite Services - 5th International ICST Conference, 2013
2012
The energy impact of security mechanisms in modern mobile devices.
Network Security, 2012
2011
An Optimized Content Replication and Distribution Framework for Vehicular Networks.
J. Intellig. Transport. Systems, 2011
Design, optimization and performance evaluation of a content distribution overlay for streaming.
Computer Communications, 2011
Extending HTTP Models to Web 2.0 Applications: The Case of Social Networks.
Proceedings of the IEEE 4th International Conference on Utility and Cloud Computing, 2011
A task allocation middleware targeting an RFID-enhanced environment.
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011
A framework for the delivery of contents in RFID-driven smart environments.
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011
Architecture of a communication middleware for VANET applications.
Proceedings of the 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2011
What is Green Security?
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
2010
A simple neural framework for bandwidth reservation of VoIP communications in cost-effective devices.
IEEE Trans. Consumer Electronics, 2010
2009
Using P2P overlays to provide QoS in service-oriented wireless networks.
IEEE Wireless Commun., 2009
Enabling cooperation of consumer devices through peer-to-peer overlays.
IEEE Trans. Consumer Electronics, 2009
Optimization of a peer-to-peer system for efficient content replication.
European Journal of Operational Research, 2009
2008
Traffic volume analysis of a nation-wide eMule community.
Computer Communications, 2008
Optimization of an eMule-like modifier strategy.
Computer Communications, 2008
2007
Fusion of digital television, broadband Internet and mobile communications - Part II: Future service scenarios.
Int. J. Satellite Communications Networking, 2007
Design of a peer-to-peer system for optimized content replication.
Computer Communications, 2007
2006
Introducing emergent technologies in tactical and disaster recovery networks.
Int. J. Communication Systems, 2006
Traffic analysis of an internet online game accessed via a wireless LAN.
IEEE Communications Letters, 2006
Using Kademlia for the Configuration of B3G Radio Access Nodes.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006
Supporting Vertical Handover by Using a Pastry Peer-to-Peer Overlay Network.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006
2005
Peer-to-peer middleware for bandwidth allocation in sensor networks.
IEEE Communications Letters, 2005
Using SIP as P2P Technology.
African J. of Inf. & Commun. Technology, 2005
A packet snif.ng and synchronization technique to boost P2P satellite networks.
Proceedings of the Second International Workshop on Hot Topics in Peer-to-Peer Systems, 2005