Luca Caviglione

Orcid: 0000-0001-6466-3354

Affiliations:
  • National Research Council, Italy


According to our database1, Luca Caviglione authored at least 115 papers between 2005 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
DockerChannel: A framework for evaluating information leakages of Docker containers.
SoftwareX, December, 2023

A federated approach for detecting data hidden in icons of mobile applications delivered via web and multiple stores.
Soc. Netw. Anal. Min., December, 2023

A Long-Term Perspective of the Internet Susceptibility to Covert Channels.
IEEE Commun. Mag., October, 2023

Avoiding Research Tribal Wars Using Taxonomies.
Computer, 2023

ORISHA: Improving Threat Detection through Orchestrated Information Sharing (Discussion Paper).
Proceedings of the 31st Symposium of Advanced Database Systems, 2023

SecCo: Automated Services to Secure Containers in the DevOps Paradigm.
Proceedings of the 2023 International Conference on Research in Adaptive and Convergent Systems, 2023

Information Leakages of Docker Containers: Characterization and Mitigation Strategies.
Proceedings of the 9th IEEE International Conference on Network Softwarization, 2023

Scamming the Scammers: Using ChatGPT to Reply Mails for Wasting Time and Resources.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023

Using AI to face covert attacks in IoT and softwarized scenarios: challenges and opportunities.
Proceedings of the Italia Intelligenza Artificiale, 2023

2022
Code Layering for the Detection of Network Covert Channels in Agentless Systems.
IEEE Trans. Netw. Serv. Manag., 2022

IPv6CC: IPv6 covert channels for testing networks against stegomalware and data exfiltration.
SoftwareX, 2022

Guest editorial: Information security methodology and replication studies.
it Inf. Technol., 2022

Security and Privacy Issues of Home Globalization.
IEEE Secur. Priv., 2022

Never Mind the Malware, Here's the Stegomalware.
IEEE Secur. Priv., 2022

Emerging topics in defending networked systems.
Future Gener. Comput. Syst., 2022

Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection.
Entropy, 2022

Analysis of Reversible Network Covert Channels.
IEEE Access, 2022

Federated Learning for the Efficient Detection of Steganographic Threats Hidden in Image Icons.
Proceedings of the Pervasive Knowledge and Collective Intelligence on Web and Social Media, 2022

Detection of Network Covert Channels in IoT Ecosystems Using Machine Learning.
Proceedings of the Italian Conference on Cybersecurity (ITASEC 2022), 2022

Ensembling Sparse Autoencoders for Network Covert Channel Detection in IoT Ecosystems.
Proceedings of the Foundations of Intelligent Systems - 26th International Symposium, 2022

Steganography Hiding Patterns: A Brief Review.
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022

Revealing MageCart-like Threats in Favicons via Artificial Intelligence.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Detection of Malicious Images in Production-Quality Scenarios with the SIMARGL Toolkit.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021

Multiobjective Placement for Secure and Dependable Smart Industrial Environments.
IEEE Trans. Ind. Informatics, 2021

Correction to: Deep reinforcement learning for multi-objective placement of virtual machines in cloud datacenters.
Soft Comput., 2021

Deep reinforcement learning for multi-objective placement of virtual machines in cloud datacenters.
Soft Comput., 2021

Covert Channels in Transport Layer Security: Performance and Security Assessment.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Guest Editorial: Multidisciplinary Solutions to Modern Cybersecurity Challenges.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Deep Adversarial Learning on Google Home devices.
J. Internet Serv. Inf. Secur., 2021

Kernel-level tracing for detecting stegomalware and covert channels in Linux environments.
Comput. Networks, 2021

Cyber reconnaissance techniques.
Commun. ACM, 2021

Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection.
IEEE Access, 2021

Code Augmentation for Detecting Covert Channels Targeting the IPv6 Flow Label.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

Detecting Covert Channels Through Code Augmentation.
Proceedings of the Italian Conference on Cybersecurity, 2021

Sanitization of Images Containing Stegomalware via Machine Learning Approaches.
Proceedings of the Italian Conference on Cybersecurity, 2021

pcapStego: A Tool for Generating Traffic Traces for Experimenting with Network Covert Channels.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

A Revised Taxonomy of Steganography Embedding Patterns.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Crème de la Crème: Lessons from Papers in Security Publications.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

bccstego: A Framework for Investigating Network Covert Channels.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Risks and Opportunities for Information Hiding in DICOM Standard.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Not all areas are equal: analysis of citations in information security research.
Scientometrics, 2020

Information Security Methodology, Replication Studies and Information Security Education.
J. Univers. Comput. Sci., 2020

Fine-hearing Google Home: why silence will not protect your privacy.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

VoIP network covert channels to enhance privacy and information sharing.
Future Gener. Comput. Syst., 2020

Programmable Data Gathering for Detecting Stegomalware.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

Are you (Google) Home? Detecting Users' Presence through Traffic Analysis of Smart Speakers.
Proceedings of the Fourth Italian Conference on Cyber Security, 2020

Covert Channels in Transport Layer Security.
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020

Design and performance evaluation of reversible network covert channels.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Stegomalware detection through structural analysis of media files.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Model Predictive Control for Energy-Efficient, Quality-Aware, and Secure Virtual Machine Placement.
IEEE Trans Autom. Sci. Eng., 2019

Recent Advancements in Digital Forensics, Part 2.
IEEE Secur. Priv., 2019

When Time Matters: Predictive Mission Planning in Cyber-Physical Scenarios.
IEEE Access, 2019

IPv6 Covert Channels in the Wild.
Proceedings of the Third Central European Cybersecurity Conference, 2019

Towards Reversible Storage Network Covert Channels.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Emerging and Unconventional: New Attacks and Innovative Detection Techniques.
Secur. Commun. Networks, 2018

The New Threats of Information Hiding: The Road Ahead.
IT Prof., 2018

Security mechanisms and data access protocols in innovative wireless networks.
Int. J. Distributed Sens. Networks, 2018

IEEE 802.15.4 Air-Ground UAV Communications in Smart Farming Scenarios.
IEEE Commun. Lett., 2018

Exploiting IP telephony with silence suppression for hidden data transfers.
Comput. Secur., 2018

Covert Channels in IoT Deployments Through Data Hiding Techniques.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

2017
Covert Channels in Personal Cloud Storage Services: The Case of Dropbox.
IEEE Trans. Ind. Informatics, 2017

Using SPDY to improve Web 2.0 over satellite links.
Int. J. Satell. Commun. Netw., 2017

Recent Advancements in Digital Forensics.
IEEE Secur. Priv., 2017

The Future of Digital Forensics: Challenges and the Road Ahead.
IEEE Secur. Priv., 2017

Detecting local covert channels using process activity correlation on Android smartphones.
Comput. Syst. Sci. Eng., 2017

Measuring the Energy Consumption of Cyber Security.
IEEE Commun. Mag., 2017

A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence.
IEEE Trans. Inf. Forensics Secur., 2016

Predictive Control for Energy-Aware Consolidation in Cloud Datacenters.
IEEE Trans. Control. Syst. Technol., 2016

Optimal control of time instants for task replanning in robotic networks.
Proceedings of the 2016 American Control Conference, 2016

Model predictive control for the placement of virtual machines in cloud computing applications.
Proceedings of the 2016 American Control Conference, 2016

2015
A survey on energy-aware security mechanisms.
Pervasive Mob. Comput., 2015

A deep analysis on future web technologies and protocols over broadband GEO satellite networks.
Int. J. Satell. Commun. Netw., 2015

Information Hiding as a Challenge for Malware Detection.
IEEE Secur. Priv., 2015

A first look at traffic patterns of Siri.
Trans. Emerg. Telecommun. Technol., 2015

Steganography in Modern Smartphones and Mitigation Techniques.
IEEE Commun. Surv. Tutorials, 2015

Understanding Information Hiding in iOS.
Computer, 2015

Analysis of Human Awareness of Security and Privacy Threats in Smart Environments.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
Characterizing SPDY over High Latency Satellite Channels.
EAI Endorsed Trans. Mob. Commun. Appl., 2014

A taxonomy-based model of security and privacy in online social networks.
Int. J. Comput. Sci. Eng., 2014

How to covertly leak data from iOS?
CoRR, 2014

A Task Allocation Middleware for Wireless Sensor Networks in a Multi-Agent Environment.
Proceedings of the SENSORNETS 2014 - Proceedings of the 3rd International Conference on Sensor Networks, Lisbon, Portugal, 7, 2014

Performance Evaluation of HTTP and SPDY Over a DVB-RCS Satellite Link with Different BoD Schemes.
Proceedings of the Personal Satellite Services. Next-Generation Satellite Networking and Communication Systems, 2014

Satellites, UAVs, Vehicles and Sensors for an Integrated Delay Tolerant Ad Hoc Network.
Proceedings of the Personal Satellite Services. Next-Generation Satellite Networking and Communication Systems, 2014

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats.
Proceedings of the ISSE 2014, 2014

A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A predictive control approach for energy-aware consolidation of virtual machines in cloud computing.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

2013
Extending HTTP models to Web 2.0 applications: the case of online social networks.
Int. J. Comput. Sci. Eng., 2013

Performance Evaluation of SPDY over High Latency Satellite Channels.
Proceedings of the Personal Satellite Services - 5th International ICST Conference, 2013

2012
The energy impact of security mechanisms in modern mobile devices.
Netw. Secur., 2012

2011
An Optimized Content Replication and Distribution Framework for Vehicular Networks.
J. Intell. Transp. Syst., 2011

Design, optimization and performance evaluation of a content distribution overlay for streaming.
Comput. Commun., 2011

Extending HTTP Models to Web 2.0 Applications: The Case of Social Networks.
Proceedings of the IEEE 4th International Conference on Utility and Cloud Computing, 2011

A task allocation middleware targeting an RFID-enhanced environment.
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011

A framework for the delivery of contents in RFID-driven smart environments.
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011

Architecture of a communication middleware for VANET applications.
Proceedings of the 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2011

What is Green Security?
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
A simple neural framework for bandwidth reservation of VoIP communications in cost-effective devices.
IEEE Trans. Consumer Electron., 2010

2009
Using P2P overlays to provide QoS in service-oriented wireless networks.
IEEE Wirel. Commun., 2009

Enabling cooperation of consumer devices through peer-to-peer overlays.
IEEE Trans. Consumer Electron., 2009

Optimization of a peer-to-peer system for efficient content replication.
Eur. J. Oper. Res., 2009

2008
Traffic volume analysis of a nation-wide eMule community.
Comput. Commun., 2008

Optimization of an eMule-like modifier strategy.
Comput. Commun., 2008

2007
Fusion of digital television, broadband Internet and mobile communications - Part II: Future service scenarios.
Int. J. Satell. Commun. Netw., 2007

Design of a peer-to-peer system for optimized content replication.
Comput. Commun., 2007

2006
Introducing emergent technologies in tactical and disaster recovery networks.
Int. J. Commun. Syst., 2006

Traffic analysis of an internet online game accessed via a wireless LAN.
IEEE Commun. Lett., 2006

Using Kademlia for the Configuration of B3G Radio Access Nodes.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

Supporting Vertical Handover by Using a Pastry Peer-to-Peer Overlay Network.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

2005
Peer-to-peer middleware for bandwidth allocation in sensor networks.
IEEE Commun. Lett., 2005

Using SIP as P2P Technology.
Afr. J. Inf. Commun. Technol., 2005

The "SaterLay": an Overlay System for Satellite Based Communities.
Proceedings of the 2nd IEEE International Symposium on Wireless Communication Systems, 2005

P2P in satellite networks: a tutorial on related problems and some possible solutions.
Proceedings of the 2nd IEEE International Symposium on Wireless Communication Systems, 2005

A packet snif.ng and synchronization technique to boost P2P satellite networks.
Proceedings of the Second International Workshop on Hot Topics in Peer-to-Peer Systems, 2005


  Loading...