Alberto Coen-Porisini

Orcid: 0000-0002-3788-8926

According to our database1, Alberto Coen-Porisini authored at least 66 papers between 1991 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Towards rapid modeling and prototyping of indoor and outdoor monitoring applications.
Sustain. Comput. Informatics Syst., January, 2024

IoT-driven blockchain to manage the healthcare supply chain and protect medical records.
Future Gener. Comput. Syst., 2024

NERO: NEural algorithmic reasoning for zeRO-day attack detection in the IoT: A hybrid approach.
Comput. Secur., 2024

ASAP: Automatic Synthesis of Attack Prototypes, an online-learning, end-to-end approach.
Comput. Networks, 2024

2023
Deep Reinforcement Learning for intrusion detection in Internet of Things: Best practices, lessons learnt, and open challenges.
Comput. Networks, November, 2023

2022
Analysis on functionalities and security features of Internet of Things related protocols.
Wirel. Networks, 2022

Securing the access control policies to the Internet of Things resources through permissioned blockchain.
Concurr. Comput. Pract. Exp., 2022

Insights into security and privacy towards fog computing evolution.
Comput. Secur., 2022

Security&privacy issues and challenges in NoSQL databases.
Comput. Networks, 2022

2021
Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middleware.
Int. J. Inf. Sec., 2021

2020
Sticky Policies: A Survey.
IEEE Trans. Knowl. Data Eng., 2020

Smart certification: protecting the originality of the product in the eyewear sector.
Internet Technol. Lett., 2020

5G In the internet of things era: An overview on security and privacy challenges.
Comput. Networks, 2020

Increasing the pervasiveness of the IoT: fog computing coupled with pub&sub and security.
Proceedings of the 2020 IEEE International Conference on Smart Internet of Things, 2020

Testing and Evaluating a Security-Aware Pub and Sub Protocol in a Fog-Driven IoT Environment.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 2020

2019
How to evaluate an Internet of Things system: Models, case studies, and real developments.
Softw. Pract. Exp., 2019

Smart transport and logistics: A Node-RED implementation.
Internet Technol. Lett., 2019

Beyond the smart things: Towards the definition and the performance assessment of a secure architecture for the Internet of Nano-Things.
Comput. Networks, 2019

2018
S<sub>2</sub> DCC: secure selective dropping congestion control in hybrid wireless multimedia sensor networks.
Wirel. Networks, 2018

Securing the smart home: A real case study.
Internet Technol. Lett., 2018

A risk assessment methodology for the Internet of Things.
Comput. Commun., 2018

REATO: REActing TO Denial of Service attacks in the Internet of Things.
Comput. Networks, 2018

2017
Performance Comparison of Reputation Assessment Techniques Based on Self-Organizing Maps in Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2017

Security towards the edge: Sticky policy enforcement for networked smart objects.
Inf. Syst., 2017

Dynamic Policies in Internet of Things: Enforcement and Synchronization.
IEEE Internet Things J., 2017

A secure ICN-IoT architecture.
Proceedings of the 2017 IEEE International Conference on Communications Workshops, 2017

2016
A security-and quality-aware system architecture for Internet of Things.
Inf. Syst. Frontiers, 2016

A secure and quality-aware prototypical architecture for the Internet of Things.
Inf. Syst., 2016

AUPS: An Open Source AUthenticated Publish/Subscribe system for the Internet of Things.
Inf. Syst., 2016

Security policy enforcement for networked smart objects.
Comput. Networks, 2016

Internet of Things: Security in the Keys.
Proceedings of the 12th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2016

2015
Security, privacy and trust in Internet of Things: The road ahead.
Comput. Networks, 2015

Networked Smart Objects: Moving Data Processing Closer to the Source.
Proceedings of the Internet of Things. IoT Infrastructures, 2015

GoNe: Dealing with node behavior.
Proceedings of the IEEE 5th International Conference on Consumer Electronics - Berlin, 2015

Secure OM2M Service Platform.
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015

2014
A NFP Model for Internet of Things applications.
Proceedings of the IEEE 10th International Conference on Wireless and Mobile Computing, 2014

2013
DARE: evaluating Data Accuracy using node REputation.
Comput. Networks, 2013

SETA: A secure sharing of tasks in clustered wireless sensor networks.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

2012
DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks.
J. Syst. Softw., 2012

Improving data quality using a cross layer protocol in wireless sensor networks.
Comput. Networks, 2012

Towards the Definition of a Framework for Service Development in the Agrofood Domain - A Conceptual Model.
Proceedings of the WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies, Porto, Portugal, 18, 2012

Cross Layer Data Assessment in Wireless Sensor Networks.
Proceedings of the SENSORNETS 2012, 2012

2010
SeDAP: Secure Data Aggregation Protocol in Privacy Aware Wireless Sensor Networks.
Proceedings of the Sensor Systems and Software - Second International ICST Conference, 2010

Dealing with anonymity in wireless sensor networks.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

A Meta-model Supporting the Decomposition of Problem Descriptions.
Proceedings of the Fifth International Conference on Software Engineering Advances, 2010

2009
Towards a Meta-model for Problem Frames: Conceptual Issues and Tool Building Support.
Proceedings of the Fourth International Conference on Software Engineering Advances, 2009

2008
Introducing privacy in a hospital information system.
Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, 2008

2007
A Methodological Framework for SysML: a Problem Frames-based Approach.
Proceedings of the 14th Asia-Pacific Software Engineering Conference (APSEC 2007), 2007

2004
Designing and Enacting Simulations Using Distributed Components.
Proceedings of the Computer and Information Sciences, 2004

2003
A formal approach for designing CORBA-based applications.
ACM Trans. Softw. Eng. Methodol., 2003

2001
Using symbolic execution for verifying safety-critical systems.
Proceedings of the 8th European Software Engineering Conference held jointly with 9th ACM SIGSOFT International Symposium on Foundations of Software Engineering 2001, 2001

2000
A framework architecture for supervision and control systems.
ACM Comput. Surv., 2000

Using TRIO for designing a CORBA-based application.
Concurr. Pract. Exp., 2000

1999
From Formal Models to Formally Based Methods: An Industrial Experience.
ACM Trans. Softw. Eng. Methodol., 1999

1998
A Finite-Domain Semantics for Testing Temporal Logic Specifications.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 1998

1997
Specification of Realtime Systems Using ASTRAL.
IEEE Trans. Software Eng., 1997

1995
A Formal Framework for ASTRAL Inter-level Proof Obligations.
Proceedings of the 5th European Software Engineering Conference, 1995

1994
A Formal Framework for ASTRAL Intralevel Proof Obligations.
IEEE Trans. Software Eng., 1994

1993
Array Representation in Symbolic Execution.
Comput. Lang., 1993

Overview and Progress Report of the ESSE Project: Supporting Object-Oriented Database Schema Analysis and Evolution.
Proceedings of the TOOLS 1993: 10th International Conference on Technology of Object-Oriented Languages and Systems, 1993

The Composability of ASTRAL Realtime Specifications.
Proceedings of the 1993 International Symposium on Software Testing and Analysis, 1993

A Formal Framework for ASTRAL Intra-Level Proof Obligations.
Proceedings of the Software Engineering, 1993

1992
The ESSE Project: An Overview.
Proceedings of the Second Far-East Workshop on Future Database Systems 1992, 1992

1991
Software Specialization Via Symbolic Execution.
IEEE Trans. Software Eng., 1991

Updating the Schema of an Object-Oriented Database (Extended Abstract).
IEEE Data Eng. Bull., 1991

SESADA: An Environment Supporting Software Specialization.
Proceedings of the ESEC '91, 1991


  Loading...