Tommaso Zoppi

Orcid: 0000-0001-9820-6047

According to our database1, Tommaso Zoppi authored at least 45 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ROSpace: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical System.
CoRR, 2024

2023
Safe Maintenance of Railways using COTS Mobile Devices: The Remote Worker Dashboard.
ACM Trans. Cyber Phys. Syst., October, 2023

Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection.
Comput. Secur., April, 2023

On the Efficacy of Metrics to Describe Adversarial Attacks.
CoRR, 2023

Tolerate Failures of the Visual Camera With Robust Image Classifiers.
IEEE Access, 2023

Detection of Adversarial Attacks by Observing Deep Features with Structured Data Algorithms.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

Anomaly Detectors for Self-Aware Edge and IoT Devices.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

Intrusion detection without attack knowledge: generating out-of-distribution tabular data.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

Ensembling Uncertainty Measures to Improve Safety of Black-Box Classifiers.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

2022
On the Properness of Incorporating Binary Classification Machine Learning Algorithms Into Safety-Critical Systems.
IEEE Trans. Emerg. Top. Comput., 2022

Towards Enhancing Traffic Sign Recognition through Sliding Windows.
Sensors, 2022

Prepare for Trouble and Make it Double. Supervised and Unsupervised Stacking for AnomalyBased Intrusion Detection.
CoRR, 2022

Towards a General Model for Intrusion Detection: An Exploratory Study.
Proceedings of the Machine Learning and Principles and Practice of Knowledge Discovery in Databases, 2022

2021
MADneSs: A Multi-Layer Anomaly Detection Framework for Complex Dynamic Systems.
IEEE Trans. Dependable Secur. Comput., 2021

Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape.
Trans. Data Sci., 2021

Meta-Learning to Improve Unsupervised Intrusion Detection in Cyber-Physical Systems.
ACM Trans. Cyber Phys. Syst., 2021

Prepare for trouble and make it double! Supervised - Unsupervised stacking for anomaly-based intrusion detection.
J. Netw. Comput. Appl., 2021

Development and validation of a safe communication protocol compliant to railway standards.
J. Braz. Comput. Soc., 2021

Unsupervised Algorithms to Detect Zero-Day Attacks: Strategy and Application.
IEEE Access, 2021

Detect Adversarial Attacks Against Deep Neural Networks With GPU Monitoring.
IEEE Access, 2021

Understanding the properness of incorporating machine learning algorithms in safety-critical systems.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Quantitative comparison of supervised algorithms and feature sets for traffic sign recognition.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Detecting Intrusions by Voting Diverse Machine Learners: Is It Really Worth?
Proceedings of the 26th IEEE Pacific Rim International Symposium on Dependable Computing, 2021

Feature Rankers to Predict Classification Performance of Unsupervised Intrusion Detectors.
Proceedings of the 10th Latin-American Symposium on Dependable Computing, 2021

Spoofing Detectability as a Property of Biometric Characteristics.
Proceedings of the Italian Conference on Cybersecurity, 2021

2020
On the educated selection of unsupervised algorithms via attacks and anomaly classes.
J. Inf. Secur. Appl., 2020

Into the Unknown: Unsupervised Machine Learning Algorithms for Anomaly-Based Intrusion Detection.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020

2019
Threat Analysis in Systems-of-Systems: An Emergence-Oriented Approach.
ACM Trans. Cyber Phys. Syst., 2019

An Initial Investigation on Sliding Windows for Anomaly-Based Intrusion Detection.
Proceedings of the 2019 IEEE World Congress on Services, 2019

Quantitative comparison of unsupervised anomaly detection algorithms for intrusion detection.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Practical Experience Report: Implementation, Verification and Validation of a Safe and Secure Communication Protocol for the Railway Domain.
Proceedings of the 9th Latin-American Symposium on Dependable Computing, 2019

Evaluation of Anomaly Detection Algorithms Made Easy with RELOAD.
Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering, 2019

2018
Labelling relevant events to support the crisis management operator.
J. Softw. Evol. Process., 2018

On Algorithms Selection for Unsupervised Anomaly Detection.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

2017
A Tool for Evolutionary Threat Analysis of Smart Grids.
Proceedings of the Smart Grid Inspired Future Technologies, 2017

A Modeling Framework to Support Resilient Evolution Planning of Smart Grids.
Proceedings of the Smart Grid Inspired Future Technologies, 2017

Exploring anomaly detection in systems of systems.
Proceedings of the Symposium on Applied Computing, 2017

Towards Security Requirements: Iconicity as a Feature of an Informal Modeling Language.
Proceedings of the Joint Proceedings of REFSQ-2017 Workshops, 2017

2016
On the impact of emergent properties on SoS security.
Proceedings of the 11th System of Systems Engineering Conference, 2016

Challenging Anomaly Detection in Complex Dynamic Systems.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

Context-Awareness to Improve Anomaly Detection in Dynamic Service Oriented Architectures.
Proceedings of the Computer Safety, Reliability, and Security, 2016

Presenting the Proper Data to the Crisis Management Operator: A Relevance Labelling Strategy.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

2015
A Multi-layer Anomaly Detector for Dynamic Service-Based Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2015

2014
A Testbed for Evaluating Anomaly Detection Monitors through Fault Injection.
Proceedings of the 17th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2014

2006
Ontological Modelling for Archaeological Data.
Proceedings of the 37th CIPA International Workshop dedicated on e-Documentation and Standardisation in Cultural Heritage, incorporating the 7th International Symposium on Virtual Reality, Archaeology and Intelligent Cultural Heritage, the 4th Eurographics Workshop on Graphics and Cultural Heritage, and the 1st EuroMed Conference on IT in Cultural Heritage, CIPA/VAST/GCH/EuroMed 2006, Nicosia, Cyprus, October 30, 2006


  Loading...