Luca Caviglione

According to our database1, Luca Caviglione
  • authored at least 56 papers between 2005 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
The New Threats of Information Hiding: the Road Ahead.
CoRR, 2018

2017
Covert Channels in Personal Cloud Storage Services: The Case of Dropbox.
IEEE Trans. Industrial Informatics, 2017

Using SPDY to improve Web 2.0 over satellite links.
Int. J. Satellite Communications Networking, 2017

Recent Advancements in Digital Forensics.
IEEE Security & Privacy, 2017

The Future of Digital Forensics: Challenges and the Road Ahead.
IEEE Security & Privacy, 2017

Measuring the Energy Consumption of Cyber Security.
IEEE Communications Magazine, 2017

A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence.
IEEE Trans. Information Forensics and Security, 2016

Predictive Control for Energy-Aware Consolidation in Cloud Datacenters.
IEEE Trans. Contr. Sys. Techn., 2016

Optimal control of time instants for task replanning in robotic networks.
Proceedings of the 2016 American Control Conference, 2016

Model predictive control for the placement of virtual machines in cloud computing applications.
Proceedings of the 2016 American Control Conference, 2016

2015
A survey on energy-aware security mechanisms.
Pervasive and Mobile Computing, 2015

A deep analysis on future web technologies and protocols over broadband GEO satellite networks.
Int. J. Satellite Communications Networking, 2015

Information Hiding as a Challenge for Malware Detection.
IEEE Security & Privacy, 2015

A first look at traffic patterns of Siri.
Trans. Emerging Telecommunications Technologies, 2015

Information Hiding as a Challenge for Malware Detection.
CoRR, 2015

Analysis of Human Awareness of Security and Privacy Threats in Smart Environments.
CoRR, 2015

Steganography in Modern Smartphones and Mitigation Techniques.
IEEE Communications Surveys and Tutorials, 2015

Understanding Information Hiding in iOS.
IEEE Computer, 2015

Analysis of Human Awareness of Security and Privacy Threats in Smart Environments.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
Characterizing SPDY over High Latency Satellite Channels.
ICST Trans. Mobile Communications Applications, 2014

A taxonomy-based model of security and privacy in online social networks.
IJCSE, 2014

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats.
CoRR, 2014

Steganography in Modern Smartphones and Mitigation Techniques.
CoRR, 2014

How to covertly leak data from iOS?
CoRR, 2014

A Task Allocation Middleware for Wireless Sensor Networks in a Multi-Agent Environment.
Proceedings of the SENSORNETS 2014 - Proceedings of the 3rd International Conference on Sensor Networks, Lisbon, Portugal, 7, 2014

Performance Evaluation of HTTP and SPDY Over a DVB-RCS Satellite Link with Different BoD Schemes.
Proceedings of the Personal Satellite Services. Next-Generation Satellite Networking and Communication Systems, 2014

Satellites, UAVs, Vehicles and Sensors for an Integrated Delay Tolerant Ad Hoc Network.
Proceedings of the Personal Satellite Services. Next-Generation Satellite Networking and Communication Systems, 2014

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats.
Proceedings of the ISSE 2014, 2014

A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A predictive control approach for energy-aware consolidation of virtual machines in cloud computing.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

2013
Extending HTTP models to Web 2.0 applications: the case of online social networks.
IJCSE, 2013

Performance Evaluation of SPDY over High Latency Satellite Channels.
Proceedings of the Personal Satellite Services - 5th International ICST Conference, 2013

2012
The energy impact of security mechanisms in modern mobile devices.
Network Security, 2012

2011
An Optimized Content Replication and Distribution Framework for Vehicular Networks.
J. Intellig. Transport. Systems, 2011

Design, optimization and performance evaluation of a content distribution overlay for streaming.
Computer Communications, 2011

Extending HTTP Models to Web 2.0 Applications: The Case of Social Networks.
Proceedings of the IEEE 4th International Conference on Utility and Cloud Computing, 2011

A task allocation middleware targeting an RFID-enhanced environment.
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011

A framework for the delivery of contents in RFID-driven smart environments.
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011

Architecture of a communication middleware for VANET applications.
Proceedings of the 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2011

What is Green Security?
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
A simple neural framework for bandwidth reservation of VoIP communications in cost-effective devices.
IEEE Trans. Consumer Electronics, 2010

2009
Using P2P overlays to provide QoS in service-oriented wireless networks.
IEEE Wireless Commun., 2009

Enabling cooperation of consumer devices through peer-to-peer overlays.
IEEE Trans. Consumer Electronics, 2009

Optimization of a peer-to-peer system for efficient content replication.
European Journal of Operational Research, 2009

2008
Traffic volume analysis of a nation-wide eMule community.
Computer Communications, 2008

Optimization of an eMule-like modifier strategy.
Computer Communications, 2008

2007
Fusion of digital television, broadband Internet and mobile communications - Part II: Future service scenarios.
Int. J. Satellite Communications Networking, 2007

Design of a peer-to-peer system for optimized content replication.
Computer Communications, 2007

2006
Introducing emergent technologies in tactical and disaster recovery networks.
Int. J. Communication Systems, 2006

Traffic analysis of an internet online game accessed via a wireless LAN.
IEEE Communications Letters, 2006

Using Kademlia for the Configuration of B3G Radio Access Nodes.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

Supporting Vertical Handover by Using a Pastry Peer-to-Peer Overlay Network.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

2005
Peer-to-peer middleware for bandwidth allocation in sensor networks.
IEEE Communications Letters, 2005

Using SIP as P2P Technology.
African J. of Inf. & Commun. Technology, 2005

A packet snif.ng and synchronization technique to boost P2P satellite networks.
Proceedings of the Second International Workshop on Hot Topics in Peer-to-Peer Systems, 2005


  Loading...