Roberto Setola

Orcid: 0000-0002-8792-2520

Affiliations:
  • Università Campus Bio-Medico, Rome, Italy


According to our database1, Roberto Setola authored at least 146 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Recovery Model for Faulty Networked System.
IEEE Syst. J., March, 2024

Risk assessment of critical infrastructures: A methodology based on criticality of infrastructure elements.
Reliab. Eng. Syst. Saf., March, 2024

A Geometrical Approach to Enhance Security Against Cyber Attacks in Digital Substations.
IEEE Access, 2024

2023
Systemic cyber risk.
Int. J. Crit. Infrastructure Prot., December, 2023

Evaluating the effects of uncertainty in interval pairwise comparison matrices.
Int. J. Approx. Reason., December, 2023

A hybrid behavior- and Bayesian network-based framework for cyber-physical anomaly detection.
Comput. Electr. Eng., December, 2023

Waveform Similarity Analysis Using Graph Mining for the Optimization of Sensor Positioning in Wearable Seismocardiography.
IEEE Trans. Biomed. Eng., October, 2023

New threats and research problems for critical infrastructure.
Int. J. Crit. Infrastructure Prot., September, 2023

Best Effort Workload Disparity Minimization in Multi-Agent Systems With Capacity Constraints.
IEEE Trans. Autom. Control., August, 2023

Editorial on Protection vs Resilience by Prof. Roberto Setola.
Int. J. Crit. Infrastructure Prot., July, 2023

Distributed Markov Chain Redesign for Multiagent Decision-Making Problems.
IEEE Trans. Autom. Control., February, 2023

Robustness to rank reversal in pairwise comparison matrices based on uncertainty bounds.
Eur. J. Oper. Res., 2023

DRIVERS: A platform for dynamic risk assessment of emergent cyber threats for industrial control systems.
Proceedings of the 31st Mediterranean Conference on Control and Automatio, 2023

Default Credentials Vulnerability: The Case Study of Exposed IP Cams.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Evaluating Machine Learning Approaches for Cyber and Physical Anomalies in SCADA Systems.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
A hardware-in-the-loop water distribution testbed (WDT) dataset for cyber-physical security testing.
Dataset, November, 2022

Precordial Vibrations: A Review of Wearable Systems, Signal Processing Techniques, and Main Applications.
Sensors, 2022

Cyber Security Strategies for the Protection of Electrical Substations.
Proceedings of the Italian Conference on Cybersecurity (ITASEC 2022), 2022

Configuration vulnerability in SNORT for Windows Operating Systems.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

Identifying Residential Areas Based on Open Source Data: A Multi-Criteria Holistic Indicator to Optimize Resource Allocation During a Pandemic.
Proceedings of the Critical Information Infrastructures Security, 2022

2021
Intelligence-Aware Batch Processing for TMA with Bearings-Only Measurements.
Sensors, 2021

A multi-criteria model for the security assessment of large-infrastructure construction sites.
Int. J. Crit. Infrastructure Prot., 2021

A Hardware-in-the-Loop Water Distribution Testbed Dataset for Cyber-Physical Security Testing.
IEEE Access, 2021

A clustering-based approach for quality level verification of sanitation procedures in workplaces.
Proceedings of the IEEE International Workshop on Metrology for Industry 4.0 & IoT, 2021

On-Board Diagnostic of the Motor Vehicle through Smartphone.
Proceedings of the IEEE International Workshop on Metrology for Automotive, 2021

Machine Learning for Threat Recognition in Critical Cyber-Physical Systems.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

Optimal Man-In-The-Middle Stealth Attack.
Proceedings of the Critical Information Infrastructures Security, 2021

2020
Hybrid Indoor Positioning System for First Responders.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Distributed C-Means Clustering Via Broadcast-Only Token Passing.
IEEE Trans. Control. Netw. Syst., 2020

Cyber threats for operational technologies.
Int. J. Syst. Syst. Eng., 2020

Multi-criteria node criticality assessment framework for critical infrastructure networks.
Int. J. Crit. Infrastructure Prot., 2020

Use of Drone to Improve Healthcare Efficiency and Sustainability.
Proceedings of the 43rd International Convention on Information, 2020

A Privacy-Oriented Solution for the Improvement of Workers Safety.
Proceedings of the 43rd International Convention on Information, 2020

2019
Network Structural Vulnerability: A Multiobjective Attacker Perspective.
IEEE Trans. Syst. Man Cybern. Syst., 2019

Sparse analytic hierarchy process: an experimental analysis.
Soft Comput., 2019

A Stackelberg Game-Theoretical Approach to Maritime Counter-Piracy.
IEEE Syst. J., 2019

Covert Channels-Based Stealth Attacks in Industry 4.0.
IEEE Syst. J., 2019

Gossip algorithm for multi-agent systems via random walk.
Syst. Control. Lett., 2019

Method for remote rapid response to transportation security threats on high speed rail systems.
Int. J. Crit. Infrastructures, 2019

Network Defensive Strategy Definition Based on Node Criticality.
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019

A Wearable Platform to Identify Workers Unsafety Situations.
Proceedings of the 2nd Workshop on Metrology for Industry 4.0 and IoT MetroInd4.0&IoT 2019, 2019

Assessing Node Criticality in Dynamical Distributed Systems.
Proceedings of the 17th European Control Conference, 2019

Aggregating Centrality Rankings: A Novel Approach to Detect Critical Infrastructure Vulnerabilities.
Proceedings of the Critical Information Infrastructures Security, 2019

White Paper on Industry Experiences in Critical Information Infrastructure Security: A Special Session at CRITIS 2019.
Proceedings of the Critical Information Infrastructures Security, 2019

IIoT in the Hospital Scenario: Hospital 4.0, Blockchain and Robust Data Management.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

2018
Distributed Cycle Detection and Removal.
IEEE Trans. Control. Netw. Syst., 2018

Performance and robustness of discrete and finite time average consensus algorithms.
Int. J. Syst. Sci., 2018

Finding critical nodes in infrastructure networks.
Int. J. Crit. Infrastructure Prot., 2018

Distributed Utility Estimation With Heterogeneous Relative Information.
IEEE Control. Syst. Lett., 2018

Experimental analysis of the influencing factors on the response of a tool for epidural space detection.
Proceedings of the 2018 IEEE International Symposium on Medical Measurements and Applications, 2018

A Suite of Distributed Methodologies to Solve the Sparse Analytic Hierarchy Process Problem.
Proceedings of the 16th European Control Conference, 2018

A Touchless system for image visualization during surgery: preliminary experience in clinical settings.
Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2018

Discovering Vulnerabilities in Heterogeneous Interconnected Systems.
Proceedings of the Critical Information Infrastructures Security, 2018

2017
Distributed Finite-Time Average-Consensus With Limited Computational and Storage Capability.
IEEE Trans. Control. Netw. Syst., 2017

Fault Diagnosis and Network Anomaly Detection in Water Infrastructures.
IEEE Des. Test, 2017

Monitoring system reaction in cyber-physical testbed under cyber-attacks.
Comput. Electr. Eng., 2017

Sparse and distributed Analytic Hierarchy Process.
Autom., 2017

Improving the Automatic Identification of Malicious Android Apps in Unofficial Stores through Logo Analysis.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Ex vivo animal-model assessment of a non-invasive system for loss of resistance detection during epidural blockade.
Proceedings of the 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2017

Faulty or Malicious Anchor Detection Criteria for Distance-Based Localization.
Proceedings of the Critical Information Infrastructures Security, 2017

Cybersecurity of Wearable Devices: An Experimental Analysis and a Vulnerability Assessment Method.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Game Theoretical Approach for Dynamic Active Patrolling in a Counter-Piracy Framework.
Proceedings of the Recent Advances in Computational Intelligence in Defense and Security, 2016

Distributed finite-time calculation of node eccentricities, graph radius and graph diameter.
Syst. Control. Lett., 2016

Localization of networks with presence and distance constraints based on 1-hop and 2-hop mass-spring optimization.
ICT Express, 2016

Critical node detection based on attacker preferences.
Proceedings of the 24th Mediterranean Conference on Control and Automation, 2016

A cost-effective, non-invasive system for pressure monitoring during epidural needle insertion: Design, development and bench tests.
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016

Railway Station Surveillance System Design: A Real Application of an Optimal Coverage Approach.
Proceedings of the Critical Information Infrastructures Security, 2016

Distributed asynchronous Cholesky decomposition.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

Distributed C-means data clustering algorithm.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

2015
Infrastructure Interdependencies: Modeling and Analysis.
Proceedings of the Intelligent Monitoring, 2015

Sensor Networks Localization: Extending Trilateration via Shadow Edges.
IEEE Trans. Autom. Control., 2015

Distributed Data Clustering via Opinion Dynamics.
Int. J. Distributed Sens. Networks, 2015

Augmenting rescuer safety using wireless sensor networks.
Proceedings of the 2015 International Conference on Indoor Positioning and Indoor Navigation, 2015

Fall-detection solution for mobile platforms using accelerometer and gyroscope data.
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015

Strategies to Improve Critical Infrastructures Robustness Against the IEMI Threat: A Review of Relevant Standards and Guidelines on the Topic.
Proceedings of the Critical Information Infrastructures Security, 2015

Identifying Critical Infrastructure Clusters via Spectral Analysis.
Proceedings of the Critical Information Infrastructures Security, 2015

The Professional Figure of the Security Liaison Officer in the Council Directive 2008/114/EC.
Proceedings of the Critical Information Infrastructures Security, 2015

Noisy localization over unit disk graphs: The shadow edge approach.
Proceedings of the American Control Conference, 2015

2014
Fuzzy Importance Measures for Ranking Key Interdependent Sectors Under Uncertainty.
IEEE Trans. Reliab., 2014

Discrete-time linear systems with fuzzy dynamics.
J. Intell. Fuzzy Syst., 2014

An amendment to "Distributed synchronization under uncertainty: A fuzzy approach".
Fuzzy Sets Syst., 2014

Distance-constrained data clustering by combined k-means algorithms and opinion dynamics filters.
Proceedings of the 22nd Mediterranean Conference on Control and Automation, 2014

Indoor positioning system using walking pattern classification.
Proceedings of the 22nd Mediterranean Conference on Control and Automation, 2014

Hybrid sensor networks localization dealing with range-capable and range-free nodes.
Proceedings of the 2014 International Conference on Indoor Positioning and Indoor Navigation, 2014

Dependencies analysis in emergency scenarios.
Proceedings of the International Carnahan Conference on Security Technology, 2014

Critical Infrastructure Online Fault Detection: Application in Water Supply Systems.
Proceedings of the Critical Information Infrastructures Security, 2014

Improving Situational Awareness for First Responders.
Proceedings of the Critical Information Infrastructures Security, 2014

2013
Distributed Cooperative Localization.
J. Inf. Technol. Res., 2013

Distributed consensus under ambiguous information.
Int. J. Syst. Syst. Eng., 2013

Distributed opinion dynamics with heterogeneous reputation.
Int. J. Syst. Syst. Eng., 2013

Vulnerability modeling and analysis for critical infrastructure protection applications.
Int. J. Crit. Infrastructure Prot., 2013

Distributed k-means algorithm.
CoRR, 2013

On field gesture-based human-robot interface for emergency responders.
Proceedings of the IEEE International Symposium on Safety, Security, and Rescue Robotics, 2013

Exploiting routing information in Wireless Sensor Networks localization.
Proceedings of the 2nd IEEE Network Science Workshop, 2013

Assessing protein resilience via a complex network approach.
Proceedings of the 2nd IEEE Network Science Workshop, 2013

An enhanced indoor positioning system for first responders.
Proceedings of the International Conference on Indoor Positioning and Indoor Navigation, 2013

Network localization by Shadow Edges.
Proceedings of the 12th European Control Conference, 2013

Optimization Models in a Smart Tool for the Railway Infrastructure Protection.
Proceedings of the Critical Information Infrastructures Security, 2013

Analysis of Severe Space Weather on Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2013

2012
Overview of Critical Information Infrastructure Protection.
Proceedings of the Critical Infrastructure Protection, 2012

A New Approach to the Internally Positive Representation of Linear MIMO Systems.
IEEE Trans. Autom. Control., 2012

Distributed synchronization under uncertainty: A fuzzy approach.
Fuzzy Sets Syst., 2012

Assessing bone loss in micro-gravity: A fuzzy approach.
Comput. Methods Programs Biomed., 2012

A REference implementation of interoperable indoor location & communication systems for First REsponders: The REFIRE project.
Proceedings of the IEEE International Symposium on Safety, Security, and Rescue Robotics, 2012

Consensus of agents with fuzzy state.
Proceedings of the 6th International Conference on Soft Computing and Intelligent Systems (SCIS), 2012

System Dynamics for Railway Infrastructure Protection.
Proceedings of the Critical Information Infrastructures Security, 2012

Discrete-time LTI fuzzy systems: Stability and representation.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

2011
Fuzzy dynamic input-output inoperability model.
Int. J. Crit. Infrastructure Prot., 2011

On the Stability of Linear Discrete-Time Fuzzy Systems
CoRR, 2011

Fuzzy Consensus and Synchronization: Theory and Application to Critical Infrastructure Protection Problems
CoRR, 2011

Discrete event simulation of a proton therapy facility: A case study.
Comput. Methods Programs Biomed., 2011

Fuzzy Input-Output Inoperability Model - (Short Paper).
Proceedings of the Critical Information Infrastructure Security, 2011

How to Perform Verification and Validation of Critical Infrastructure Modeling Tools.
Proceedings of the Critical Information Infrastructure Security, 2011

Online Distributed Interdependency Estimation for critical infrastructures.
Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, 2011

An adaptive localization system for first responders.
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, 2011

2010
How to measure the degree of interdependencies among critical infrastructures.
Int. J. Syst. Syst. Eng., 2010

Methodologies for pharmacokinetic post-contrastographic dynamic contrast enhancement.
Int. J. Model. Identif. Control., 2010

Agent-based input-output interdependency model.
Int. J. Crit. Infrastructure Prot., 2010

Protecting the Food Supply Chain from Terrorist Attack.
Proceedings of the Critical Infrastructure Protection IV, 2010

A Two-Stage Approach to Simulate Interdependent Critical Infrastructures.
Proceedings of the Complexity in Engineering, 2010


2009
Modelling critical infrastructure via a mixed holistic reductionistic approach.
Int. J. Crit. Infrastructures, 2009

Critical infrastructure dependency assessment using the input-output inoperability model.
Int. J. Crit. Infrastructure Prot., 2009

A Holistic-Reductionistic Approach for Modeling Interdependencies.
Proceedings of the Critical Infrastructure Protection III, 2009

2008
R&D activities in Europe on critical information infrastructure protection.
Int. J. Syst. Syst. Eng., 2008

Failures propagation in critical interdependent infrastructures.
Int. J. Model. Identif. Control., 2008

Simultaneous localisation and mapping of a mobile robot via interlaced extended Kalman filter.
Int. J. Model. Identif. Control., 2008

Modelling interdependent infrastructures using interacting dynamical models.
Int. J. Crit. Infrastructures, 2008

Simulation of heterogeneous and interdependent critical infrastructures.
Int. J. Crit. Infrastructures, 2008

An Integrated Approach For Simulating Interdependencies.
Proceedings of the Critical Infrastructure Protection II, 2008

2007
Availability of healthcare services in a network-based scenario.
Int. J. Netw. Virtual Organisations, 2007

Analysis of Interdependencies Between Italy's Economic Sectors.
Proceedings of the Critical Infrastructure Protection, 2007

A Methodology to Estimate Input-Output Inoperability Model Parameters.
Proceedings of the Critical Information Infrastructures Security, 2007

2006
Coordinated control of mobile antennas for ad hoc networks.
Int. J. Model. Identif. Control., 2006

Multirobot Localisation Using Interlaced Extended Kalman Filter.
Proceedings of the 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2006

Coordinated Control of Mobile Antennas for Ad-Hoc Networks in Cluttered Environments.
Proceedings of the Intelligent Autonomous Systems 9, 2006

Video-Rhino-Hygrometer (RH).
Proceedings of the 28th International Conference of the IEEE Engineering in Medicine and Biology Society, 2006

High-Speed Intrusion Detection in Support of Critical Infrastructure Protection.
Proceedings of the Critical Information Infrastructures Security, 2006

An Overview of R&D Activities in Europe on Critical Information Infrastructure Protection (CIIP).
Proceedings of the Critical Information Infrastructures Security, 2006

2005
Interlaced extended Kalman filter for real time navigation.
Proceedings of the 2005 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2005

A self-configuring MANET for coverage area adaptation through kinematic control of a platoon of mobile robots.
Proceedings of the 2005 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2005

2004
Identifying and Evaluating Critical Infrastructures - A Goal-driven Dependability Analysis Framework.
Proceedings of the International Conference on Communications in Computing, 2004

2002
Handling the knowledge acquired during the requirements engineering process: a case study.
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002

1999
An interlaced extended Kalman filter.
IEEE Trans. Autom. Control., 1999

A sliding manifold approach for vibration reduction of flexible systems.
Autom., 1999

Interlaced extended Kalman filter as deterministic nonlinear observer.
Proceedings of the 5th European Control Conference, 1999


  Loading...