Ugo Fiore

Orcid: 0000-0003-0509-5662

According to our database1, Ugo Fiore authored at least 80 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Estimating electricity consumption at city-level through advanced machine learning methods.
Connect. Sci., 2024

2023
TokenFuse: A Versatile NFT Marketplace.
Proceedings of the Computational Science and Its Applications - ICCSA 2023 Workshops, 2023

2022
Predictive and adaptive Drift Analysis on Decomposed Healthcare Claims using ART based Topological Clustering.
Inf. Process. Manag., 2022

Electricity production and consumption modeling through fuzzy logic.
Int. J. Intell. Syst., 2022

Improved Classification of Blockchain Transactions Using Feature Engineering and Ensemble Learning.
Future Internet, 2022

Deep Learning Forecasting for Supporting Terminal Operators in Port Business Development.
Future Internet, 2022

2021
An efficient chaotic salp swarm optimization approach based on ensemble algorithm for class imbalance problems.
Soft Comput., 2021

COVIDNet: Implementing Parallel Architecture on Sound and Image for High Efficacy.
Future Internet, 2021

Transformative computing in security, big data analysis, and cloud computing applications.
Concurr. Comput. Pract. Exp., 2021

QoS-aware big service composition using distributed co-evolutionary algorithm.
Concurr. Comput. Pract. Exp., 2021

2020
Monitoring System of a Heat Pump Installation for Heating a Rural House Using Low-grade Heat from a Surface Watercourse.
J. Sens. Actuator Networks, 2020

Human capital evaluation in knowledge-based organizations based on big data analytics.
Future Gener. Comput. Syst., 2020

Minority oversampling based on the attraction-repulsion Weber problem.
Concurr. Comput. Pract. Exp., 2020

A MapReduce-based modified Grey Wolf optimizer for QoS-aware big service composition.
Concurr. Comput. Pract. Exp., 2020

2019
Do Digital and Communication Technologies Improve Smart Ports? A Fuzzy DEA Approach.
IEEE Trans. Ind. Informatics, 2019

Optimal fitness aware cloud service composition using modified invasive weed optimization.
Swarm Evol. Comput., 2019

SELCLOUD: a hybrid multi-criteria decision-making model for selection of cloud services.
Soft Comput., 2019

An Interdisciplinary Review of Smart Vehicular Traffic and Its Applications and Challenges.
J. Sens. Actuator Networks, 2019

Planning and operational energy optimization solutions for smart buildings.
Inf. Sci., 2019

Performance and energy optimisation in CPUs through fuzzy knowledge representation.
Inf. Sci., 2019

Using generative adversarial networks for improving classification effectiveness in credit card fraud detection.
Inf. Sci., 2019

A study on forecasting electricity production and consumption in smart cities and factories.
Int. J. Inf. Manag., 2019

2018
QoS-aware Big service composition using MapReduce based evolutionary algorithm with guided mutation.
Future Gener. Comput. Syst., 2018

Optimal Partitioning of LLC in CAT-enabled CPUs to Prevent Side-Channel Attacks.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018

2017
Exploiting Battery-Drain Vulnerabilities in Mobile Smart Devices.
IEEE Trans. Sustain. Comput., 2017

Evaluating the efficiency of cloud services using modified data envelopment analysis and modified super-efficiency data envelopment analysis.
Soft Comput., 2017

A Multiobjective Wavelength Routing Approach Combining Network and Traffic Engineering With Energy Awareness.
IEEE Syst. J., 2017

Traffic matrix estimation with software-defined NFV: Challenges and opportunities.
J. Comput. Sci., 2017

Special issue on recent advances in soft set decision making: Theories and applications.
Appl. Soft Comput., 2017

2016
GRASP-based resource re-optimization for effective big data access in federated clouds.
Future Gener. Comput. Syst., 2016

2015
Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures.
J. Supercomput., 2015

Modeling energy-efficient secure communications in multi-mode wireless mobile devices.
J. Comput. Syst. Sci., 2015

Embedding an Identity-Based Short Signature as a Digital Watermark.
Future Internet, 2015

2014
A secure file sharing service for distributed computing environments.
J. Supercomput., 2014

A dynamic trust model exploiting the time slice in WSNs.
Soft Comput., 2014

A botnet-based command and control approach relying on swarm intelligence.
J. Netw. Comput. Appl., 2014

A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems.
Int. J. Parallel Program., 2014

A distributed approach to network anomaly detection based on independent component analysis.
Concurr. Comput. Pract. Exp., 2014

Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Multimedia-based battery drain attacks for Android devices.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
Towards an energy-aware Internet: modeling a cross-layer optimization approach.
Telecommun. Syst., 2013

Modeling energy consumption in next-generation wireless access-over-WDM networks with hybrid power sources.
Math. Comput. Model., 2013

An intelligent security architecture for distributed firewalling environments.
J. Ambient Intell. Humaniz. Comput., 2013

Network anomaly detection with the restricted Boltzmann machine.
Neurocomputing, 2013

On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines.
Appl. Soft Comput., 2013

Evaluating energy savings in WoL-enabled networks of PCs.
Proceedings of the 22nd IEEE International Symposium on Industrial Electronics, 2013

An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Trustworthy Opportunistic Access to the Internet of Services.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

Analyzing the Internet Stability in Presence of Disasters.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Selfish routing and wavelength assignment strategies with advance reservation in inter-domain optical networks.
Comput. Commun., 2012

An energy-aware dynamic RWA framework for next-generation wavelength-routed networks.
Comput. Networks, 2012

An asynchronous covert channel using spam.
Comput. Math. Appl., 2012

Device Tracking in Private Networks via NAPT Log Analysis.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

2011
Automatic security assessment for next generation wireless mobile networks.
Mob. Inf. Syst., 2011

Analyzing Local Strategies for Energy-Efficient Networking.
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011

E-mail-Based Covert Channels for Asynchronous Message Steganography.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Energy-Aware RWA for WDM Networks with Dual Power Sources.
Proceedings of IEEE International Conference on Communications, 2011

Saving Energy in Data Center Infrastructures.
Proceedings of the First International Conference on Data Compression, 2011

Evaluating Network-Based DoS Attacks under the Energy Consumption Perspective: New Security Issues in the Coming Green ICT Area.
Proceedings of the 2011 International Conference on Broadband, 2011

2010
Constrained minimum lightpath affinity routing in multi-layer optical transport networks.
J. High Speed Networks, 2010

Selective Redundancy Removal: A Framework for Data Hiding.
Future Internet, 2010

Network anomaly detection through nonlinear analysis.
Comput. Secur., 2010

A GRASP-based network re-optimization strategy for improving RWA in multi-constrained optical transport infrastructures.
Comput. Commun., 2010

Insights into peer to peer traffic through nonlinear analysis.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

Energy-Oriented Models for WDM Networks.
Proceedings of the Broadband Communications, Networks, and Systems, 2010

2009
Providing true end-to-end security in converged voice over IP infrastructures.
Comput. Secur., 2009

A nonlinear, recurrence-based approach to traffic classification.
Comput. Networks, 2009

SimulNet: a wavelength-routed optical network simulation framework.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

2008
A Minimum Cut Interference-based Integrated RWA Algorithm for Multi-constrained Optical Transport Networks.
J. Netw. Syst. Manag., 2008

Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies.
Comput. Secur., 2008

2007
Enhanced Security Strategies for MPLS Signaling.
J. Networks, 2007

SPARK: A smart parametric online RWA algorithm.
J. Commun. Networks, 2007

Automated detection and containment of worms and viruses into heterogeneous networks: a simple network immune system.
Int. J. Wirel. Mob. Comput., 2007

2006
A Low Cost and Effective Link Protection Approach for Enhanced Survivability in Optical Transport Networks.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

Audit-Based Access Control in Nomadic Wireless Environments.
Proceedings of the Computational Science and Its Applications, 2006

2005
Introducing Public E-Mail Gateways: An Effective Hardening Strategy Against Spam.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Securing the MPLS Control Plane.
Proceedings of the High Performance Computing and Communications, 2005

2003
Introducing MPLS in Mobile Data Networks: An High Performance Framework for QoS-Powered IP Mobility.
Proceedings of the Mobile Agents for Telecommunication Applications, 2003


  Loading...