Michele Mastroianni

Orcid: 0000-0001-6415-1180

According to our database1, Michele Mastroianni authored at least 42 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Evaluation of the Effectiveness of National Promotion Strategies for the Improvement of Privacy and Security.
Comput., April, 2024

GDPR compliance through standard security controls: An automated approach.
J. High Speed Networks, 2024

A User-Centered Privacy Policy Management System for Automatic Consent on Cookie Banners.
Comput., 2024

A Tool to Support Automation of Risk Assessment.
Proceedings of the Computational Science and Its Applications - ICCSA 2024 Workshops, 2024

Monitoring Power Usage Effectiveness to Detect Cooling Systems Attacks and Failures in Cloud Data Centers.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024

Fuzzy-based Severity Evaluation in Privacy Problems: an Application to Healthcare.
Proceedings of the 19th European Dependable Computing Conference, 2024

Evaluating The Effects Of Nudging And Deterrence On Users' Behavior For Privacy-By-Design.
Proceedings of the 38th ECMS International Conference on Modelling and Simulation, 2024

XSS-Unearth: A Tool for Forensics Analysis of XSS Attacks.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
A cyber warfare perspective on risks related to health IoT devices and contact tracing.
Neural Comput. Appl., July, 2023

Towards a cloud model choice evaluation: comparison between cost/features and ontology-based analysis.
Int. J. Grid Util. Comput., 2023

Prevention of Cyber-Attacks and Privacy Breaches in Healthcare Sector.
Proceedings of the Computational Science and Its Applications - ICCSA 2023 Workshops, 2023

Evaluating the Effectiveness of Privacy and Security Promotion Strategies.
Proceedings of the Computational Science and Its Applications - ICCSA 2023 Workshops, 2023

Cost- And Performance-Based Evaluation Of Cloud-Based Disaster Recovery.
Proceedings of the 37th ECMS International Conference on Modelling and Simulation, 2023

Privacy risk analysis and metrics in capturing and storing network traffic.
Proceedings of the 24th International Conference on Control Systems and Computer Science, 2023

2022
Analysis of the Battery Level in Complex Wireless Sensor Networks Using a Two Time Scales Second Order Fluid Model.
Proceedings of the Practical Applications of Stochastic Modelling, 2022

Evaluating the Impact of Data Anonymization in a Machine Learning Application.
Proceedings of the Computational Science and Its Applications - ICCSA 2022 Workshops, 2022

Energy-aware Optimization of Data Centers and Cybersecurity Issues.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

Towards privacy-aware software design in small and medium enterprises.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

2021
Performance evaluation for the design of a hybrid cloud based distance synchronous and asynchronous learning architecture.
Simul. Model. Pract. Theory, 2021

Designing a GDPR compliant blockchain-based IoV distributed information tracking system.
Inf. Process. Manag., 2021

Privacy Regulations, Smart Roads, Blockchain, and Liability Insurance: Putting Technologies to Work.
IEEE Secur. Priv., 2021

Machine Learning-aided Automatic Calibration of Smart Thermal Cameras for Health Monitoring Applications.
Proceedings of the 6th International Conference on Internet of Things, 2021

Applying Machine Learning to Weather and Pollution Data Analysis for a Better Management of Local Areas: The Case of Napoli, Italy.
Proceedings of the 6th International Conference on Internet of Things, 2021

Exploring a Federated Learning Approach to Enhance Authorship Attribution of Misleading Information from Heterogeneous Sources.
Proceedings of the International Joint Conference on Neural Networks, 2021

A Conceptual Model for the General Data Protection Regulation.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021

Risk Analysis of a GDPR-Compliant Deletion Technique for Consortium Blockchains Based on Pseudonymization.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021

A New Structured Model for ICT Competencies Assessment Through Data Warehousing Software.
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2021

Hybrid Simulation of Energy Management in IoT Edge Computing Surveillance Systems.
Proceedings of the Performance Engineering and Stochastic Modeling, 2021

2020
Performance evaluation of a fog WSN infrastructure for emergency management.
Simul. Model. Pract. Theory, 2020

Toward a Fuzzy-based Approach for Computational Load Offloading of IoT Devices.
J. Univers. Comput. Sci., 2020

Modelling performances of an autonomic router running under attack.
Int. J. Embed. Syst., 2020

Privacy Regulations Challenges on Data-centric and IoT Systems: A Case Study for Smart Vehicles.
Proceedings of the 5th International Conference on Internet of Things, 2020

A WSN Energy-aware Approach for Air Pollution Monitoring in Waste Treatment Facility Site: A Case Study for Landfill Monitoring Odour.
Proceedings of the 5th International Conference on Internet of Things, 2020

A Simulation Study On A WSN For Emergency Management.
Proceedings of the 34th International ECMS Conference on Modelling and Simulation, 2020

Towards the Use of Generative Adversarial Neural Networks to Attack Online Resources.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

2019
Quantitative Modeling of the Behaviour of an Autonomic Router.
Proceedings of the 12th EAI International Conference on Performance Evaluation Methodologies and Tools, 2019

On Performance Evaluation of Security Monitoring in Multitenant Cloud Applications.
Proceedings of the Tenth International Workshop on the Practical Application of Stochastic Modelling, 2019

Performance Modeling And Analysis Of An Autonomic Router.
Proceedings of the 33rd International ECMS Conference on Modelling and Simulation, 2019

Semantic Techniques for Validation of GDPR Compliance of Business Processes.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019

An Approach to Help in Cloud Model Choice for Academia Services' Supplying.
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2019

2018
Using Federated Cloud Platform to Implement Academia Services for Research and Administration.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

2005
Accessibility of Public e-Procurement Websites: Methodology and Empirical Evidence.
Proceedings of the 5th European Conference on e-Government University of Antwerp, 2005


  Loading...