Luciano Argento

Orcid: 0000-0001-8869-5035

According to our database1, Luciano Argento authored at least 13 papers between 2014 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
TrueDetective 4.0: A Big Data Architecture for Real Time Anomaly Detection.
Proceedings of the Foundations of Intelligent Systems - 26th International Symposium, 2022

2020
A Simulation-based and Data-driven Framework for Enabling the Analysis and Design of Business Processes based on Blockchain and Smart Contracts Solutions.
Proceedings of the 3rd Distributed Ledger Technology Workshop Co-located with ITASEC 2020, 2020

2019
An Infrastructure for Service Accountability based on Digital Identity and Blockchain 3.0.
Proceedings of the IEEE INFOCOM 2019, 2019

2018
Exploiting Content Spatial Distribution to Improve Detection of Intrusions.
ACM Trans. Internet Techn., 2018

A hierarchical hybrid framework for modelling anomalous behaviours.
Simul. Model. Pract. Theory, 2018

A Cloud-based platform for the emulation of complex cybersecurity scenarios.
Future Gener. Comput. Syst., 2018

Detection, Prevention and Simulation Approaches to Address Anomalies in Cyber Security.
Proceedings of the 26th Italian Symposium on Advanced Database Systems, 2018

Effectiveness of Content Spatial Distribution Analysis in Securing IoT Environments.
Proceedings of the 6th IEEE International Conference on Future Internet of Things and Cloud, 2018

Towards Adaptive Access Control.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

2017
Using virtual environments for the assessment of cybersecurity issues in IoT scenarios.
Simul. Model. Pract. Theory, 2017

2015
Exploiting N-Gram Location for Intrusion Detection.
Proceedings of the 27th IEEE International Conference on Tools with Artificial Intelligence, 2015

A multi-protocol framework for the development of collaborative virtual environments.
Proceedings of the 19th IEEE International Conference on Computer Supported Cooperative Work in Design, 2015

2014
PCkAD: an unsupervised intrusion detection technique exploiting within payload n-gram location distribution.
CoRR, 2014


  Loading...