Marco Prandini

Orcid: 0000-0002-3962-5513

Affiliations:
  • University of Bologna, Italy


According to our database1, Marco Prandini authored at least 64 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Ranflood: A mitigation tool based on the principles of data flooding against ransomware.
SoftwareX, February, 2024

Wi-Fi Sensing for Human Identification Through ESP32 Devices: An Experimental Study.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

On the Trade-Off Between Privacy and Information Quality in Location Based Services.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Time sensitive networking security: issues of precision time protocol and its implementation.
Cybersecur., December, 2023

P-IOTA: A Cloud-Based Geographically Distributed Threat Alert System That Leverages P4 and IOTA.
Sensors, March, 2023

When Operation Technology Meets Information Technology: Challenges and Opportunities.
Future Internet, March, 2023

GRAPH4: A Security Monitoring Architecture Based on Data Plane Anomaly Detection Metrics Calculated over Attack Graphs.
Future Internet, 2023

A high throughput Intrusion Detection System (IDS) to enhance the security of data transmission among research centers.
CoRR, 2023

Data Flooding against Ransomware: Concepts and Implementations.
Comput. Secur., 2023

A Systematic Literature Review of Offensive and Defensive Security Solutions With Software Defined Network.
IEEE Access, 2023

Real-time Pipeline Reconfiguration of P4 Programmable Switches to Efficiently Detect and Mitigate DDoS Attacks.
Proceedings of the 26th Conference on Innovation in Clouds, Internet and Networks, 2023

A Structured Approach to Insider Threat Monitoring for Offensive Security Teams.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

Towards the Creation of Interdisciplinary Consumer-Oriented Security Metrics.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
P4DM: Measure the Link Delay with P4.
Sensors, 2022

Microservice security: a systematic literature review.
PeerJ Comput. Sci., 2022

Metrics for Cyber-Physical Security: a call to action.
Proceedings of the International Symposium on Networks, Computers and Communications, 2022

2021
P-SCOR: Integration of Constraint Programming Orchestration and Programmable Data Plane.
IEEE Trans. Netw. Serv. Manag., 2021

A Security Monitoring Architecture based on Data Plane Programmability.
Proceedings of the Joint European Conference on Networks and Communications & 6G Summit, 2021

2020
Password Similarity Using Probabilistic Data Structures.
J. Cybersecur. Priv., December, 2020

Sustainable Infrastructure Monitoring for Security-Oriented Purposes.
Proceedings of the GoodTechs '20: 6th EAI International Conference on Smart Objects and Technologies for Social Good, 2020

TechNETium: Atomic Predicates and Model Driven Development to Verify Security Network Policies.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

2019
Gamifying cultural experiences across the urban environment.
Multim. Tools Appl., 2019

Federated Platooning: Insider Threats and Mitigations.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
Integrating Personalized and Accessible Itineraries in MaaS Ecosystems Through Microservices.
Mob. Networks Appl., 2018

Cloud-of-Things meets Mobility-as-a-Service: An insider threat perspective.
Comput. Secur., 2018

Security network policy enforcement through a SDN framework.
Proceedings of the 28th International Telecommunication Networks and Applications Conference, 2018

A Policy Checker Approach for Secure Industrial SDN.
Proceedings of the 2nd Cyber Security in Networking Conference, 2018

2017
Smart mobility for all: A global federated market for mobility-as-a-service operators.
Proceedings of the 20th IEEE International Conference on Intelligent Transportation Systems, 2017

I want to ride my bicycle: A microservice-based use case for a MaaS architecture.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Insider Threats in Emerging Mobility-as-a-Service Scenarios.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Discovering the City: Crowdsourcing and Personalized Urban Paths Across Cultural Heritage.
Proceedings of the Smart Objects and Technologies for Social Good, 2017

2016
A Service-Oriented Approach to Crowdsensing for Accessible Smart Mobility Scenarios.
Mob. Inf. Syst., 2016

SecIVo: a quantitative security evaluation framework for internet voting schemes.
Ann. des Télécommunications, 2016

Data security issues in MaaS-enabling platforms.
Proceedings of the 2nd IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2016

CrowdSensing for smart mobility through a service-oriented architecture.
Proceedings of the IEEE International Smart Cities Conference, 2016

Public Transportation, IoT, Trust and Urban Habits.
Proceedings of the Internet Science - Third International Conference, 2016

A Microservice Architecture Use Case for Persons with Disabilities.
Proceedings of the Smart Objects and Technologies for Social Good, 2016

A Microservice-Based Architecture for the Development of Accessible, Crowdsensing-Based Mobility Platforms.
Proceedings of the 2016 International Conference on Collaboration Technologies and Systems, 2016

2015
Privacy-Preserving Design of Data Processing Systems in the Public Transport Context.
Pac. Asia J. Assoc. Inf. Syst., 2015

2012
Return-Oriented Programming.
IEEE Secur. Priv., 2012

Raising Risk Awareness on the Adoption of Web 2.0 Technologies in Decision Making Processes.
Future Internet, 2012

A Browser-Based Distributed System for the Detection of HTTPS Stripping Attacks against Web Pages.
Proceedings of the Information Security and Privacy Research, 2012

Internet voting: fatally torn between conflicting goals?
Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, 2012

2011
Security considerations about the adoption of web 2.0 technologies in sensitive e-government processes.
Proceedings of the ICEGOV 2011, 2011

Taking the Best of Both Worlds: A Comparison and Integration of the U.S. and EU Approaches to E-Voting Systems Evaluation.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2010
Always the Same, Never the Same.
IEEE Secur. Priv., 2010

Splitting the HTTPS Stream to Attack Secure Web Connections.
IEEE Secur. Priv., 2010

Towards a practical and effective security testing methodology.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Risk Analysis and Deployment Security Issues in a Multi-agent System.
Proceedings of the ICAART 2010 - Proceedings of the International Conference on Agents and Artificial Intelligence, Volume 2, 2010

An Integrated Application of Security Testing Methodologies to e-voting Systems.
Proceedings of the Electronic Participation, Second IFIP WG 8.5 International Conference, 2010

2009
A Messaging-Based System for Remote Server Administration.
Proceedings of the Third International Conference on Network and System Security, 2009

Comment Spam Injection Made Easy.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Redesigning remote system administration paradigms for enhanced security and flexibility.
Comput. Stand. Interfaces, 2008

Adaptive Filtering of Comment Spam in Multi-user Forums and Blogs.
Proceedings of the Security in Information Systems, 2008

2007
RoboAdmin: A Different Approach to Remote System Administration.
Proceedings of the Security in Information Systems, 2007

Confining the Insider Threat in Mass Virtual Hosting Systems.
Proceedings of the Security in Information Systems, 2007

2006
Securing a Linux-based multi-user web server.
Proceedings of the Third IASTED International Conference on Communication, 2006

2004
A flexible approach to configuration of linux-based firewalls.
Proceedings of the IASTED International Conference on Communications, Internet, and Information Technology, November 22, 2004

Efficient authentication and verification of certificate status within public-key infrastructures.
Proceedings of the IASTED International Conference on Communications, Internet, and Information Technology, November 22, 2004

2003
An Application of Efficient Certificate Status Handling Methods to High Traffic Authentication Services.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

2002
A flexible scheme for on-line public-key certificate status updating and verification.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

2000
A Novel Approach to On-Line Status Authentication of Public-Key Certificates.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1999
A General Methodology for Robotic Haptic Recognition of 3-D Objects.
Proceedings of the 1st International Conference on Enterprise Information Systems, 1999

Efficient Certificate Status Handling Within PKIs: An Application to Public Administration Services.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999


  Loading...