Luca Veltri

Orcid: 0000-0003-2245-4823

According to our database1, Luca Veltri authored at least 71 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Explainable Anomaly Detection of Synthetic Medical IoT Traffic Using Machine Learning.
SN Comput. Sci., June, 2024

2023
Anomaly Detection of Medical IoT Traffic Using Machine Learning.
Proceedings of the 12th International Conference on Data Science, 2023

2022
Enabling Location Based Services with Privacy and Integrity Protection in Untrusted Environments through Blockchain and Secure Computation.
Proceedings of the 4th IEEE International Conference on Trust, 2022

Interworking between LoRaWAN and non-LoRa IoT Systems.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

2021
A Scalable and Secure Publish/Subscribe-Based Framework for Industrial IoT.
IEEE Trans. Ind. Informatics, 2021

Blockchain Security and Privacy for the Internet of Things.
Sensors, 2021

2020
ZWT: A new cross-platform graphical interface framework for Java applications.
SoftwareX, 2020

Estimation of Correlated Gaussian Samples in Impulsive Noise.
IEEE Commun. Lett., 2020

IoT Attack Detection with Deep Learning Analysis.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

2019
NEMO: A flexible and highly scalable network EMulatOr.
SoftwareX, 2019

A Next-Generation Core Network Architecture for Mobile Networks.
Future Internet, 2019

A Sidecar Object for the Optimized Communication Between Edge and Cloud in Internet of Things Applications.
Future Internet, 2019

Broker Bridging Mechanism for Providing Anonymity in MQTT.
Proceedings of the 10th International Conference on Networks of the Future, 2019

Estimation of a Gaussian Source with Memory in Bursty Impulsive Noise.
Proceedings of the 2019 IEEE International Symposium on Power Line Communications and its Applications (ISPLC), 2019

2018
A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord.
Secur. Commun. Networks, 2018

THORIN: an Efficient Module for Federated Access and Threat Mitigation in Big Stream Cloud Architectures.
IEEE Cloud Comput., 2018

IoTChain: A blockchain security architecture for the Internet of Things.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

NEMO: A Flexible Java-based Network Emulator.
Proceedings of the 26th International Conference on Software, 2018

A Token-based Protocol for Securing MQTT Communications.
Proceedings of the 26th International Conference on Software, 2018

2017
Implementation of virtual network function chaining through segment routing in a linux-based NFV infrastructure.
Proceedings of the 2017 IEEE Conference on Network Softwarization, 2017

An anonymization protocol for the Internet of Things.
Proceedings of the 2017 International Symposium on Wireless Communication Systems, 2017

2016
3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications.
Comput. Commun., 2016

PMSR - Poor Man's Segment Routing, a minimalistic approach to Segment Routing and a Traffic Engineering use case.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

A P2P virtual core-network architecture for next-generation mobility networks.
Proceedings of the 2016 IEEE Conference on Standards for Communications and Networking, 2016

2015
Lightweight Session Initiation for the Internet of Things.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Traffic Engineering with Segment Routing: SDN-Based Architectural Design and Open Source Implementation.
Proceedings of the Fourth European Workshop on Software Defined Networks, 2015

2014
A Scalable and Self-Configuring Architecture for Service Discovery in the Internet of Things.
IEEE Internet Things J., 2014

Trust-based routing for Kademlia in a sybil scenario.
Proceedings of the 22nd International Conference on Software, 2014

mjCoAP: An Open-Source Lightweight Java CoAP Library for Internet of Things Applications.
Proceedings of the Interoperability and Open-Source Solutions for the Internet of Things, 2014

Lightweight multicast forwarding for service discovery in low-power IoT networks.
Proceedings of the 22nd International Conference on Software, 2014

A statistical blind technique for recognition of internet traffic with dependence enforcement.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

Performance evaluation of a SIP-based constrained peer-to-peer overlay.
Proceedings of the International Conference on High Performance Computing & Simulation, 2014

2013
A session initiation protocol for the Internet of Things.
Scalable Comput. Pract. Exp., 2013

Information centric networking over SDN and OpenFlow: Architectural aspects and experiments on the OFELIA testbed.
Comput. Networks, 2013

Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview.
Algorithms, 2013

A novel batch-based group key management protocol applied to the Internet of Things.
Ad Hoc Networks, 2013

Batch-based group key management with shared key derivation in the Internet of Things.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

CoSIP: A Constrained Session Initiation Protocol for the Internet of Things.
Proceedings of the Advances in Service-Oriented and Cloud Computing, 2013

2012
Supporting information-centric functionality in software defined networks.
Proceedings of IEEE International Conference on Communications, 2012

An OpenFlow-based testbed for information centric networking.
Proceedings of the 2012 Future Network & Mobile Summit, Berlin, Germany, July 4-6, 2012, 2012

2009
Reputation management algorithms for DHT-based peer-to-peer environment.
Comput. Commun., 2009

Peer-to-Peer beyond file sharing: Where are P2P systems going?
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

A Multicast-Based Bootstrap Mechanism for Self-Organizing P2P Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
SIP-based mobility management in next generation networks.
IEEE Wirel. Commun., 2008

A resilient architecture for DHT-based distributed collaborative environments.
Proceedings of the SERENE 2008, 2008

Byzantine agreement for reputation management in DHT-based peer-to-peer networks.
Proceedings of the 2008 International Conference on Telecommunications, 2008

2007
Architecture and testbed implementation of vertical handovers based on SIP session border controllers.
Wirel. Pers. Commun., 2007

Reputation Management Techniques in DHT-Based Peer-to-Peer Networks.
Proceedings of the International Conference on Internet and Web Applications and Services (ICIW 2007), 2007

Kademlia for data storage and retrieval in enterprise networks.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

2006
UniWireless: a distributed open access network.
Proceedings of the 4th international workshop on Wireless mobile applications and services on WLAN hotspots, 2006

SIP roaming solution amongst different WLAN-based service providers.
Proceedings of the 3rd Annual International ICST Conference on Mobile and Ubiquitous Systems: Computing, 2006

Byzantine Generals Problem in the Light of P2P Computing.
Proceedings of the 3rd Annual International ICST Conference on Mobile and Ubiquitous Systems: Computing, 2006

Wireless LAN-3G Integration: Unified Mechanisms for Secure Authentication based on SIP.
Proceedings of IEEE International Conference on Communications, 2006

Seamless vertical handover of VoIP calls based on SIP Session Border Controllers.
Proceedings of IEEE International Conference on Communications, 2006

2005
Using SIP as P2P Technology.
Afr. J. Inf. Commun. Technol., 2005

2004
Dynamic resource configuration in DiffServ networks: control plane mechanisms and performance evaluation of a traffic control API.
Comput. Networks, 2004

DHCP-Based Authentication for Mobile Users/Terminals in a Wireless Access Network.
Proceedings of the Telecommunications and Networking, 2004

2003
SIP Originated Dynamic Resource Configuration in DiffServ Networks: SIP / COPS / Traffic Control Mechanisms.
Proceedings of the Quality of Service in Multiservice IP Networks, 2003

Access control in IPv6-based roaming scenarios.
Proceedings of IEEE International Conference on Communications, 2003

Solutions for mobility support in DHCP-based environments.
Proceedings of IEEE International Conference on Communications, 2003

2002
SIP security issues: the SIP authentication procedure and its processing load.
IEEE Netw., 2002

QoS control by means of COPS to support SIP-based applications.
IEEE Netw., 2002

SIP-H323: A Solution for Interworking Saving Existing Architecture.
Proceedings of the NETWORKING 2002, 2002

Roaming Scenarios Based on SIP.
Proceedings of the Management of Multimedia on the Internet, 2002

Mobility amongst heterogeneous networks with AAA support.
Proceedings of the IEEE International Conference on Communications, 2002

2001
Delay calculus for differentiated services networks.
Proceedings of the IEEE International Conference on Communications, 2001

Maximum throughput in multicast input queued packet switches.
Proceedings of the IEEE International Conference on Communications, 2001

Non-blocking generalized three-stage switching networks.
Proceedings of the IEEE International Conference on Communications, 2001

2000
Worst-case analysis for deterministic allocation in a differentiated services network.
Proceedings of the Global Telecommunications Conference, 2000. GLOBECOM 2000, San Francisco, CA, USA, 27 November, 2000

1999
Supporting RSVP in a differentiated service domain: an architectural framework and a scalability analysis.
Proceedings of the 1999 IEEE International Conference on Communications: Global Convergence Through Communications, 1999

1998
Blocking probability of three-stage multicast switches.
Proceedings of the 1998 IEEE International Conference on Communications, 1998


  Loading...