Maurizio Naldi

Orcid: 0000-0002-0903-398X

Affiliations:
  • LUMSA University, Rome, Italy
  • University of Rome Tor Vergata, Department of Civil and Computer Engineering, Rome, Italy (former)


According to our database1, Maurizio Naldi authored at least 146 papers between 1995 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Detecting Moral Features in TV Series with a Transformer Architecture through Dictionary-Based Word Embedding.
Inf., March, 2024

2023
Deep learning-based lexical character identification in TV series.
Digit. Scholarsh. Humanit., November, 2023

Alexa, Is My Data Safe? The (Ir)relevance of Privacy in Smart Speakers Reviews.
Int. J. Hum. Comput. Interact., April, 2023

Optimal Pricing in a Rented 5G Infrastructure Scenario with Sticky Customers.
Future Internet, February, 2023

A Testset-Based Method to Analyse the Negation-Detection Performance of Lexicon-Based Sentiment Analysis Tools.
Comput., January, 2023

Privacy in smart speakers: A systematic literature review.
Secur. Priv., 2023

Optimal Hiding Strategy for Transshipments under Trade Embargoes.
Inf., 2023

2022
Optimizing Cybersecurity Investments over Time.
Algorithms, 2022

2021
Planning a Mass Vaccination Campaign with Balanced Staff Engagement.
Proceedings of the Information Technology for Management: Business and Social Issues, 2021

Mass Vaccine Administration under Uncertain Supply Scenarios.
Proceedings of the 16th Conference on Computer Science and Intelligence Systems, 2021

2020
A 2020 perspective on "How to derive causal insights for digital commerce in China? A research commentary on computational social science methods".
Electron. Commer. Res. Appl., 2020

How should we understand the digital economy in Asia? Critical assessment and research agenda.
Electron. Commer. Res. Appl., 2020

Research directions for sharing economy issues.
Electron. Commer. Res. Appl., 2020

The Expected Utility Insurance Premium Principle with Fourth-Order Statistics: Does It Make a Difference?
Algorithms, 2020

Calibration of an agent-based model for opinion formation through a retweet social network.
Proceedings of the Workshop on 21st Workshop "From Objects to Agents", 2020

Cournot Equilibrium in an Owner-Renter Model for 5G Networks under Flat-Rate Pricing.
Proceedings of the 43rd International Conference on Telecommunications and Signal Processing, 2020

CoProtect: Collaborative Management of Cryptographic Keys for Data Security in Cloud Systems.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Privacy Through Data Recolouring.
Proceedings of the Privacy Technologies and Policy - 8th Annual Privacy Forum, 2020

2019
Economic Analysis of a Multi-Sided Platform for Sensor-Based Services in the Internet of Things.
Sensors, 2019

Interactions and Sentiment in Personal Finance Forums: An Exploratory Analysis.
Inf., 2019

Service Level Agreement Violations in Cloud Storage: Insurance and Compensation Sustainability.
Future Internet, 2019

Competition in data-based service provision: Nash equilibrium characterization.
Future Gener. Comput. Syst., 2019

How to derive causal insights for digital commerce in China? A research commentary on computational social science methods.
Electron. Commer. Res. Appl., 2019

Distinctiveness Centrality in Social Networks.
CoRR, 2019

A Conceptual Framework for Assessing Anonymization-Utility Trade-Offs Based on Principal Component Analysis.
CoRR, 2019

A review of sentiment computation methods with R packages.
CoRR, 2019

Agent-Based Models for Opinion Formation: A Bibliographic Survey.
IEEE Access, 2019

An Agent-Based Model on Scale-Free Networks for Personal Finance Decisions.
Proceedings of the 20th Workshop "From Objects to Agents", 2019

Whose Fault is It? Correctly Attributing Outages in Cloud Services.
Proceedings of the 2019 Federated Conference on Computer Science and Information Systems, 2019

2018
Negligence and sanctions in information security investments in a cloud environment.
Electron. Mark., 2018

Build or Merge: Locational Decisions in Mobile Access Networks.
Proceedings of the 20th UKSim-AMSS International Conference on Computer Modelling and Simulation, 2018

Bagging Estimation of Availability in Public Cloud Storage.
Proceedings of the 20th UKSim-AMSS International Conference on Computer Modelling and Simulation, 2018

Non-Parametric Bootstrap Detection of Availability Service Level Objective Violations in Cloud Storage.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2018

Collaborative Language Learning Through Computer-Assisted Translation on a Wiki-Based Platform: Operations and Management.
Proceedings of the Methodologies and Intelligent Systems for Technology Enhanced Learning, 2018

Hiding Alice in Wonderland: A Case for the Use of Signal Processing Techniques in Differential Privacy.
Proceedings of the Privacy Technologies and Policy - 6th Annual Privacy Forum, 2018

2017
Wireless Sensor Network-Based Service Provisioning by a Brokering Platform.
Sensors, 2017

Game Theoretical Analysis of Service Provision for the Internet of Things Based on Sensor Virtualization.
IEEE J. Sel. Areas Commun., 2017

Project Makespan Estimation: Computational Load of Interval and Point Estimates.
CoRR, 2017

Calibration of the Gordon-Loeb Models for the Probability of Security Breaches.
Proceedings of the UKSim-AMSS 19th International Conference on Computer Modelling & Simulation, 2017

Evaluation of customer's losses and value-at-risk under cloud outages.
Proceedings of the 40th International Conference on Telecommunications and Signal Processing, 2017

Insurance Pricing and Refund Sustainability for Cloud Outages.
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2017

Individual Competence Evolution Under Equality Bias.
Proceedings of the 2017 European Modelling Symposium (EMS), 2017

Wireless sensor network-based service provision: A three-sided market model.
Proceedings of the 13th International Conference on Network and Service Management, 2017

Economic analysis of a centralized brokering platform for wireless sensor data.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Mr X vs. Mr Y: The Emergence of Externalities in Differential Privacy.
Proceedings of the Privacy Technologies and Policy - 5th Annual Privacy Forum, 2017

2016
Maximum-Profit Two-Sided Pricing in Service Platforms Based on Wireless Sensor Networks.
IEEE Wirel. Commun. Lett., 2016

Maximin Fairness in Project Budget Allocation.
Electron. Notes Discret. Math., 2016

Economic decision criteria for the migration to cloud storage.
Eur. J. Inf. Syst., 2016

Protecting suppliers' private information: the case of stock levels and the impact of correlated items.
CoRR, 2016

Concentration in the mobile operating systems market.
CoRR, 2016

Accuracy of third-party cloud availability estimation through ICMP.
Proceedings of the 39th International Conference on Telecommunications and Signal Processing, 2016

Optimal pricing strategy for a wireless sensor data broker under a Zipf-distributed sensing rate offer.
Proceedings of the 27th IEEE Annual International Symposium on Personal, 2016

Accuracy of Second Language Skills Self-assessment Through a Web-Based Survey Tool.
Proceedings of the Methodologies and Intelligent Systems for Technology Enhanced Learning, 2016

Pricing of Wireless Sensor Data on a centralized bundling platform.
Proceedings of the 23rd International Conference on Telecommunications, 2016

A Simulation study of Fairness-Profit Trade-off in Project Selection based on HHI and Knapsack Models.
Proceedings of the 2016 European Modelling Symposium, 2016

Maximin Fairness-profit Tradeoff in Project Budget Allocation.
Proceedings of the International Conference on ENTERprise Information Systems/International Conference on Project MANagement/International Conference on Health and Social Care Information Systems and Technologies, 2016

2015
Differential Privacy: An Estimation Theory-Based Method for Choosing Epsilon.
CoRR, 2015

Option contracts for a privacy-aware market.
CoRR, 2015

Approximation of the truncated Zeta distribution and Zipf's law.
CoRR, 2015

A Probability Model for the Size of Investment Projects.
Proceedings of the 2015 IEEE European Modelling Symposium, 2015

Option pricing in a privacy-aware market.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Repairable Systems With Dependent Components: Stochastic Process Techniques and Models.
IEEE Trans. Reliab., 2014

Influence of Search Neutrality on the Economics of Advertisement-Financed Content.
ACM Trans. Internet Techn., 2014

Differential privacy for counting queries: can Bayes estimation help uncover the true value?
CoRR, 2014

A note on "The Need for End-to-End Evaluation of Cloud Availability".
CoRR, 2014

Interval Estimation of the Herfindahl-Hirschman Index under Incomplete Market Information.
Proceedings of the UKSim-AMSS 16th International Conference on Computer Modelling and Simulation, 2014

Forecast Uncertainty in Procurement Decisions for Cloud Storage.
Proceedings of the UKSim-AMSS 16th International Conference on Computer Modelling and Simulation, 2014

Balancing Leasing and Insurance Costs to Achieve Total Risk Coverage in Cloud Storage Multi-homing.
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2014

2013
Towards risk-aware communications networking.
Reliab. Eng. Syst. Saf., 2013

A traffic-based evolutionary algorithm for network clustering.
Appl. Soft Comput., 2013

Cloud storage pricing: a comparison of current practices.
Proceedings of the 2013 international workshop on Hot topics in cloud services, 2013

Solution Space Size in Credit Risk Simulation.
Proceedings of the 15th International Conference on Computer Modelling and Simulation, 2013

Liability for Data Breaches: A Proposal for a Revenue-Based Sanctioning Approach.
Proceedings of the Network and System Security - 7th International Conference, 2013

Information Security Investments: When Being Idle Equals Negligence.
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2013

A comparison of sanctioning approaches for security breaches.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013

The availability of cloud-based services: Is it living up to its promise?
Proceedings of the 9th International Conference on the Design of Reliable Communication Networks, 2013

When free riding is the best choice: The case of network charges for content providers.
Proceedings of the 9th International Conference on Network and Service Management, 2013

2012
Pricing of insurance policies against cloud storage price rises.
SIGMETRICS Perform. Evaluation Rev., 2012

A rank-and-compare algorithm to detect abnormally low bids in procurement auctions.
Electron. Commer. Res. Appl., 2012

Sponsored search auctions: an overview of research with emphasis on game theoretic aspects.
Electron. Commer. Res., 2012

Analysis of cloud storage prices
CoRR, 2012

Personal data disclosure and data breaches: the customer's viewpoint
CoRR, 2012

Simulation of Correlated Financial Defaults through Smoothed Cross-Entropy.
Proceedings of the 14th International Conference on Computer Modelling and Simulation, 2012

Damage Sharing May Not Be Enough: An Analysis of an Ex-ante Regulation Policy for Data Breaches.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation.
Proceedings of the Information Security and Privacy Research, 2012

Impact on retail prices of non-neutral wholesale prices for content providers.
Proceedings of the 8th Euro-NF Conference on Next Generation Internet NGI 2012, 2012

Traffic vs topology in network clustering: Does it matter?
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

A Phase Model of the Service Delivery Process for Bundle Services.
Proceedings of the Sixth UKSim/AMSS European Symposium on Computer Modeling and Simulation, 2012

How Much Can Content Providers Afford to Pay for Network Charges?
Proceedings of the Sixth UKSim/AMSS European Symposium on Computer Modeling and Simulation, 2012

2011
Multi-timescale Economics-Driven Traffic Management in MPLS Networks.
Proceedings of the Network Performance Engineering, 2011

Editorial.
Telecommun. Syst., 2011

Options and overbooking strategy in the management of wireless spectrum.
Telecommun. Syst., 2011

Pricing of spectrum reservation under overbooking.
Electron. Commer. Res. Appl., 2011

Virtualization of spectrum for mobile operators: the pricing issue.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2011

Long-range Evaluation of Risk in the Migration to Cloud Storage.
Proceedings of the 13th IEEE Conference on Commerce and Enterprise Computing, 2011

A Model for the Dynamics of Bidders in the Simulation of Keyword Auctions.
Proceedings of the 13th UKSim-AMSS International Conference on Computer Modelling and Simulation, Cambridge University, Emmanuel College, Cambridge, UK, 30 March, 2011

A Simulator of a Mobile Ad-Hoc Network in a Hostile Environment.
Proceedings of the SIMULTECH 2011 - Proceedings of 1st International Conference on Simulation and Modeling Methodologies, Technologies and Applications, Noordwijkerhout, The Netherlands, 29, 2011

Storage Buy-or-Lease decisions in cloud computing under price uncertainty.
Proceedings of the 7th Conference on Next Generation Internet, 2011

An evolutionary algorithm for network clustering through traffic matrices.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Compensation Policies and Risk in Service Level Agreements: A Value-at-Risk Approach under the ON-OFF Service Model.
Proceedings of the Economics of Converged, Internet-Based Networks, 2011

Violation of Service Availability Targets in Service Level Agreements.
Proceedings of the Federated Conference on Computer Science and Information Systems, 2011

Network protection through insurance: Premium computation for the ON-OFF service model.
Proceedings of the 8th International Workshop on the Design of Reliable Communication Networks, 2011

The Competitor Busting Strategy in Keyword Auctions: Who's Worst Hit?
Proceedings of the Ninth Annual Communication Networks and Services Research Conference, 2011

2010
Evolutionary Optimization of Service Times in Interactive Voice Response Systems.
IEEE Trans. Evol. Comput., 2010

The value of location in keyword auctions.
Electron. Commer. Res. Appl., 2010

Optimal sequence of free traffic offers in mixed fee-consumption pricing packages.
Decis. Support Syst., 2010

Spectrum Trading: An Abstracted Bibliography
CoRR, 2010

Blind maximum likelihood estimation of traffic matrices under long-range dependent traffic.
Comput. Networks, 2010

A real options model for the transferability value of telecommunications licenses.
Ann. des Télécommunications, 2010

Spectrum reservation options for Mobile Virtual Network Operators.
Proceedings of the Next Generation Internet (NGI), 2010

Traffic-based network clustering.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

Pricing of reservations for time-limited spectrum leases under overbooking.
Proceedings of the 9th Conference on Telecommunications Internet and Media Techno Economics, 2010

Penalized Second Price: A New Pricing Algorithm for Advertising in Search Engines.
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010

2009
Evolutionary design of oriented-tree networks using Cayley-type encodings.
Inf. Sci., 2009

A dandelion-encoded evolutionary algorithm for the delay-constrained capacitated minimum spanning tree problem.
Comput. Commun., 2009

Option-based Dynamic Management of Wireless Spectrum.
Proceedings of the Next Generation Internet Networks, 2009

Understanding and Preventing Tacit Collusion among Telecommunication Operators.
Proceedings of the Network Control and Optimization, Third Euro-NF Conference, 2009

Price war with migrating customers.
Proceedings of the 17th Annual Meeting of the IEEE/ACM International Symposium on Modelling, 2009

Economics-Driven Short-Term Traffic Management in MPLS-Based Self-adaptive Networks.
Proceedings of the Self-Organizing Systems, 4th IFIP TC 6 International Workshop, 2009

2008
Performance of the Vickrey auction for digital goods under various bid distributions.
Perform. Evaluation, 2008

A Normal Copula Model for the Economic Risk Analysis of Correlated Failures in Communications Networks.
J. Univers. Comput. Sci., 2008

Detection of anomalous bids in procurement auctions.
Decis. Support Syst., 2008

Tests of Correlation Among Wavelet-Based Estimates for Long Memory Processes.
Commun. Stat. Simul. Comput., 2008

A Simple Model for the Effectiveness of Delaying Strategies for Telecommunications Churn Reduction.
Proceedings of the 10th EUROS/UKSim International Conference on Computer Modelling and Simulation, 2008

Solving the Delay-Constrained Capacitated Minimum Spanning Tree Problem Using a Dandelion-Encoded Evolutionary Algorithm.
Proceedings of the Simulated Evolution and Learning, 7th International Conference, 2008

Optimization of Automated Call Center Service Times Using Evolutionary Techniques.
Proceedings of the 8th International Conference on Hybrid Intelligent Systems (HIS 2008), 2008

Competition for Migrating Customers: A Game-Theoretic Analysis in a Regulated Regime.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Blind Maximum-Likelihood Estimation of Traffic Matrices in Long Range Dependent Traffic.
Proceedings of the Traffic Management and Traffic Engineering for the Future Internet, 2008

2006
Communication Networks Rank-size distribution of teletraffic and customers over a wide area network.
Eur. Trans. Telecommun., 2006

2005
Cross-entropy-based adaptive optimization of simulation parameters for Markovian-driven service systems.
Simul. Model. Pract. Theory, 2005

Connectivity of Waxman topology models.
Comput. Commun., 2005

2003
Stochastic simulation techniques as related to innovation in communications-navigation-surveillance and air traffic management (CNS/ATM).
Simul. Model. Pract. Theory, 2003

2002
Computational costs of fast stochastic simulation techniques for Markovian fluid models in multiservice networks.
Simul. Pract. Theory, 2002

A mixture model for the connection holding times in the Video-on-Demand service.
Perform. Evaluation, 2002

Size and shape characteristics of SDH rings.
Int. J. Commun. Syst., 2002

Polynomial biasing importance sampling for markov fluid models.
Eur. Trans. Telecommun., 2002

Internet access traffic sharing in a multi-operator environment.
Comput. Networks, 2002

2001
Fuzzy Logic-Based Diagnosis of Traffic Anomalies in Voice Networks.
J. Netw. Syst. Manag., 2001

Data transfer statistics in internet dial - up sessions.
Eur. Trans. Telecommun., 2001

1999
Estimation of Point-to-Point Traffic in Circuit-Switched Networks.
Eur. Trans. Telecommun., 1999

Measurement-based modelling of Internet dial-up access connections.
Comput. Networks, 1999

1998
A comparison of the GEVT and RESTART techniques for the simulation of rare events in ATM networks.
Simul. Pract. Theory, 1998

Standardization of Traffic Measurements and Models for Broadband Networks: Open Issues.
Comput. Networks, 1998

1997
A short-range, high-resolution millimeter-wave surface movement radar.
Ann. des Télécommunications, 1997

1996
Fast simulation techniques for ATM networks.
Proceedings of the EUROSIM'96, 1996

1995
Simulation of Aircraft Images for Airport Surface Traffic Control.
Proceedings of the Image Analysis and Processing, 8th International Conference, 1995


  Loading...