Luca Caviglione

According to our database1, Luca Caviglione authored at least 58 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 





Model Predictive Control for Energy-Efficient, Quality-Aware, and Secure Virtual Machine Placement.
IEEE Trans. Automation Science and Engineering, 2019

When Time Matters: Predictive Mission Planning in Cyber-Physical Scenarios.
IEEE Access, 2019

Emerging and Unconventional: New Attacks and Innovative Detection Techniques.
Security and Communication Networks, 2018

The New Threats of Information Hiding: The Road Ahead.
IT Professional, 2018

IEEE 802.15.4 Air-Ground UAV Communications in Smart Farming Scenarios.
IEEE Communications Letters, 2018

Exploiting IP telephony with silence suppression for hidden data transfers.
Computers & Security, 2018

Covert Channels in IoT Deployments Through Data Hiding Techniques.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

Covert Channels in Personal Cloud Storage Services: The Case of Dropbox.
IEEE Trans. Industrial Informatics, 2017

Using SPDY to improve Web 2.0 over satellite links.
Int. J. Satellite Communications Networking, 2017

Recent Advancements in Digital Forensics.
IEEE Security & Privacy, 2017

The Future of Digital Forensics: Challenges and the Road Ahead.
IEEE Security & Privacy, 2017

Detecting local covert channels using process activity correlation on Android smartphones.
Comput. Syst. Sci. Eng., 2017

Measuring the Energy Consumption of Cyber Security.
IEEE Communications Magazine, 2017

A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence.
IEEE Trans. Information Forensics and Security, 2016

Predictive Control for Energy-Aware Consolidation in Cloud Datacenters.
IEEE Trans. Contr. Sys. Techn., 2016

Optimal control of time instants for task replanning in robotic networks.
Proceedings of the 2016 American Control Conference, 2016

Model predictive control for the placement of virtual machines in cloud computing applications.
Proceedings of the 2016 American Control Conference, 2016

A survey on energy-aware security mechanisms.
Pervasive and Mobile Computing, 2015

A deep analysis on future web technologies and protocols over broadband GEO satellite networks.
Int. J. Satellite Communications Networking, 2015

Information Hiding as a Challenge for Malware Detection.
IEEE Security & Privacy, 2015

A first look at traffic patterns of Siri.
Trans. Emerging Telecommunications Technologies, 2015

Steganography in Modern Smartphones and Mitigation Techniques.
IEEE Communications Surveys and Tutorials, 2015

Understanding Information Hiding in iOS.
IEEE Computer, 2015

Analysis of Human Awareness of Security and Privacy Threats in Smart Environments.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Characterizing SPDY over High Latency Satellite Channels.
ICST Trans. Mobile Communications Applications, 2014

A taxonomy-based model of security and privacy in online social networks.
IJCSE, 2014

A Task Allocation Middleware for Wireless Sensor Networks in a Multi-Agent Environment.
Proceedings of the SENSORNETS 2014 - Proceedings of the 3rd International Conference on Sensor Networks, Lisbon, Portugal, 7, 2014

Performance Evaluation of HTTP and SPDY Over a DVB-RCS Satellite Link with Different BoD Schemes.
Proceedings of the Personal Satellite Services. Next-Generation Satellite Networking and Communication Systems, 2014

Satellites, UAVs, Vehicles and Sensors for an Integrated Delay Tolerant Ad Hoc Network.
Proceedings of the Personal Satellite Services. Next-Generation Satellite Networking and Communication Systems, 2014

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats.
Proceedings of the ISSE 2014, 2014

A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A predictive control approach for energy-aware consolidation of virtual machines in cloud computing.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

Extending HTTP models to Web 2.0 applications: the case of online social networks.
IJCSE, 2013

Performance Evaluation of SPDY over High Latency Satellite Channels.
Proceedings of the Personal Satellite Services - 5th International ICST Conference, 2013

The energy impact of security mechanisms in modern mobile devices.
Network Security, 2012

An Optimized Content Replication and Distribution Framework for Vehicular Networks.
J. Intellig. Transport. Systems, 2011

Design, optimization and performance evaluation of a content distribution overlay for streaming.
Computer Communications, 2011

Extending HTTP Models to Web 2.0 Applications: The Case of Social Networks.
Proceedings of the IEEE 4th International Conference on Utility and Cloud Computing, 2011

A task allocation middleware targeting an RFID-enhanced environment.
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011

A framework for the delivery of contents in RFID-driven smart environments.
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011

Architecture of a communication middleware for VANET applications.
Proceedings of the 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2011

What is Green Security?
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

A simple neural framework for bandwidth reservation of VoIP communications in cost-effective devices.
IEEE Trans. Consumer Electronics, 2010

Using P2P overlays to provide QoS in service-oriented wireless networks.
IEEE Wireless Commun., 2009

Enabling cooperation of consumer devices through peer-to-peer overlays.
IEEE Trans. Consumer Electronics, 2009

Optimization of a peer-to-peer system for efficient content replication.
European Journal of Operational Research, 2009

Traffic volume analysis of a nation-wide eMule community.
Computer Communications, 2008

Optimization of an eMule-like modifier strategy.
Computer Communications, 2008

Fusion of digital television, broadband Internet and mobile communications - Part II: Future service scenarios.
Int. J. Satellite Communications Networking, 2007

Design of a peer-to-peer system for optimized content replication.
Computer Communications, 2007

Introducing emergent technologies in tactical and disaster recovery networks.
Int. J. Communication Systems, 2006

Traffic analysis of an internet online game accessed via a wireless LAN.
IEEE Communications Letters, 2006

Using Kademlia for the Configuration of B3G Radio Access Nodes.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

Supporting Vertical Handover by Using a Pastry Peer-to-Peer Overlay Network.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

Peer-to-peer middleware for bandwidth allocation in sensor networks.
IEEE Communications Letters, 2005

Using SIP as P2P Technology.
African J. of Inf. & Commun. Technology, 2005

A packet and synchronization technique to boost P2P satellite networks.
Proceedings of the Second International Workshop on Hot Topics in Peer-to-Peer Systems, 2005