Aniello Castiglione

Orcid: 0000-0003-0571-1074

Affiliations:
  • University of Naples Parthenope, Italy
  • University of Salerno, Department of Computer Science (former)


According to our database1, Aniello Castiglione authored at least 227 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Backdoor Two-Stream Video Models on Federated Learning.
ACM Trans. Multim. Comput. Commun. Appl., November, 2024

Efficient and precise visual location estimation by effective priority matching-based pose verification in edge-cloud collaborative IoT.
Future Gener. Comput. Syst., 2024

Optimising production efficiency: Managing flexibility in Industry 4.0 systems via simulation.
Comput. Ind. Eng., 2024

2023
A framework for achieving a circular economy using the blockchain technology in a sustainable waste management system.
Comput. Ind. Eng., June, 2023

A Deep Learning-based Fast Fake News Detection Model for Cyber-Physical Social Services.
Pattern Recognit. Lett., April, 2023

DA-Net: Dual Attention Network for Flood Forecasting.
J. Signal Process. Syst., March, 2023

The NITRDrone Dataset to Address the Challenges for Road Extraction from Aerial Images.
J. Signal Process. Syst., March, 2023

PCNN<sub>CEC</sub>: Efficient and Privacy-Preserving Convolutional Neural Network Inference Based on Cloud-Edge-Client Collaboration.
IEEE Trans. Netw. Sci. Eng., 2023

Low Resource Vs High Resource solutions for Federated learning sentiment analysis.
Proceedings of the IEEE International Conference on Consumer Electronics, 2023

Achieving a Lawfully-Secure Audio Recording Framework using Consumer Electronics.
Proceedings of the IEEE International Conference on Consumer Electronics, 2023

Fractal encoding uses and variations in contemporary biometrics applications.
Proceedings of the 24th International Conference on Control Systems and Computer Science, 2023

On the (in)Security and Weaknesses of Commonly Used Applications on Large-Scale Distributed Systems.
Proceedings of the 24th International Conference on Control Systems and Computer Science, 2023

2022
An End-to-End Curriculum Learning Approach for Autonomous Driving Scenarios.
IEEE Trans. Intell. Transp. Syst., 2022

Guest Editorial: Biometrics in Industry 4.0: Open Challenges and Future Perspectives.
IEEE Trans. Ind. Informatics, 2022

Impact of Deep Learning Approaches on Facial Expression Recognition in Healthcare Industries.
IEEE Trans. Ind. Informatics, 2022

Policy-Based Broadcast Access Authorization for Flexible Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2022

Trustworthiness Evaluation-Based Routing Protocol for Incompletely Predictable Vehicular Ad Hoc Networks.
IEEE Trans. Big Data, 2022

Head pose estimation: An extensive survey on recent techniques and applications.
Pattern Recognit., 2022

Dependable workflow management system for smart farms.
Connect. Sci., 2022

2021
Waiting for Tactile: Robotic and Virtual Experiences in the Fog.
ACM Trans. Internet Techn., 2021

COVID-19: Automatic Detection of the Novel Coronavirus Disease From CT Images Using an Optimized Convolutional Neural Network.
IEEE Trans. Ind. Informatics, 2021

Trustworthy Method for Person Identification in IIoT Environments by Means of Facial Dynamics.
IEEE Trans. Ind. Informatics, 2021

Cognitive Analysis in Social Networks for Viral Marketing.
IEEE Trans. Ind. Informatics, 2021

Introduction to the special issue on "Biometrics in Smart Cities: Techniques and Applications (BI_SCI)".
Pattern Recognit. Lett., 2021

User recognition based on periocular biometrics and touch dynamics.
Pattern Recognit. Lett., 2021

Deep learning for emotion driven user experiences.
Pattern Recognit. Lett., 2021

The Role of Internet of Things to Control the Outbreak of COVID-19 Pandemic.
IEEE Internet Things J., 2021

A human-centered artificial intelligence approach for privacy protection of elderly App users in smart cities.
Neurocomputing, 2021

K maximum probability attack paths generation algorithm for target nodes in networked systems.
Int. J. Inf. Sec., 2021

OBPP: An ontology-based framework for privacy-preserving in IoT-based smart city.
Future Gener. Comput. Syst., 2021

On the Characterization and Risk Assessment of AI-Powered Mobile Cloud Applications.
Comput. Stand. Interfaces, 2021

Vessel to shore data movement through the Internet of Floating Things: A microservice platform at the edge.
Concurr. Comput. Pract. Exp., 2021

Fostering secure cross-layer collaborative communications by means of covert channels in MEC environments.
Comput. Commun., 2021

Message from the IEEE SmartData 2021 General Chairs: iThings-GreenCom-CPSCom-SmartData-Cybermatics 2021.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021

2020
SDN based communications privacy-preserving architecture for VANETs using fog computing.
Veh. Commun., 2020

Inter-Beam Interference Cancellation and Physical Layer Security Constraints by 3D Polarized Beamforming in Power Domain NOMA Systems.
IEEE Trans. Sustain. Comput., 2020

Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing.
IEEE Trans. Emerg. Top. Comput., 2020

Distributed Group Key Management for Event Notification Confidentiality Among Sensors.
IEEE Trans. Dependable Secur. Comput., 2020

A semantic-based methodology for digital forensics analysis.
J. Parallel Distributed Comput., 2020

Cognitive IoT system with intelligence techniques in sustainable computing environment.
Comput. Commun., 2020

Observability in Kubernetes Cluster: Automatic Anomalies Detection using Prometheus.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

Implementing a solution for monitoring SLA violations in Cloud.
Proceedings of the 6th IEEE International Conference on Dependability in Sensor, 2020

Social Robot Interactions for Social Engineering: Opportunities and Open Issues.
Proceedings of the IEEE Intl Conf on Dependable, 2020

DELEX: a DEep Learning Emotive eXperience: Investigating empathic HCI.
Proceedings of the AVI '20: International Conference on Advanced Visual Interfaces, Island of Ischia, Italy, September 28, 2020

2019
Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things.
IEEE Trans. Dependable Secur. Comput., 2019

A Novel Methodology to Acquire Live Big Data Evidence from the Cloud.
IEEE Trans. Big Data, 2019

CNN-based anti-spoofing two-tier multi-factor authentication system.
Pattern Recognit. Lett., 2019

PhysioUnicaDB: a dataset of EEG and ECG simultaneously acquired.
Pattern Recognit. Lett., 2019

New publicly verifiable computation for batch matrix multiplication.
Inf. Sci., 2019

CSP-E<sup>2</sup>: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems.
Inf. Sci., 2019

Data fusion technique in SPIDER Peer-to-Peer networks in smart cities for security enhancements.
Inf. Sci., 2019

Fine-grained information flow control using attributes.
Inf. Sci., 2019

On Data Sovereignty in Cloud-Based Computation Offloading for Smart Cities Applications.
IEEE Internet Things J., 2019

Distributed temporal link prediction algorithm based on label propagation.
Future Gener. Comput. Syst., 2019

Biometric data on the edge for secure, smart and user tailored access to cloud services.
Future Gener. Comput. Syst., 2019

Foreword to the special issue on security, privacy, and social networks.
Concurr. Comput. Pract. Exp., 2019

Forward to the special issue of the 9th International Symposium on Cyberspace Safety and Security (CSS 2017).
Concurr. Comput. Pract. Exp., 2019

On the rewards of self-adaptive IoT honeypots.
Ann. des Télécommunications, 2019

Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity.
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019

Eye-Movement and Touch Dynamics: A Proposed Approach for Activity Recognition of a Web User.
Proceedings of the 15th International Conference on Signal-Image Technology & Internet-Based Systems, 2019

Security and Storage Issues in Internet of Floating Things Edge-Cloud Data Movement.
Proceedings of the Parallel Processing and Applied Mathematics, 2019

Optimization of Score-Level Biometric Data Fusion by Constraint Construction Training.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Towards the Design of a Covert Channel by Using Web Tracking Technologies.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

Dependable Person Recognition by Means of Local Descriptors of Dynamic Facial Features.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

A Novel Blockchain Scheme Combining Prime Numbers and Iris for Encrypting Coding.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

Analysis of Community In Social Networks Based on Game Theory.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

2018
Integrity for an Event Notification Within the Industrial Internet of Things by Using Group Signatures.
IEEE Trans. Ind. Informatics, 2018

Using Screen Brightness to Improve Security in Mobile Social Network Access.
IEEE Trans. Dependable Secur. Comput., 2018

Multimedia summarization using social media content.
Multim. Tools Appl., 2018

Advanced services for efficient management of smart farms.
J. Parallel Distributed Comput., 2018

Event-based sensor data exchange and fusion in the Internet of Things environments.
J. Parallel Distributed Comput., 2018

Distributed strategic learning and game theoretic formulation of network embedded coding.
J. Comput. Sci., 2018

Special issue on security in cloud computing.
J. Netw. Comput. Appl., 2018

Computational Intelligence and its Applications in New Computing Models.
Inf. Sci., 2018

Loss-Tolerant Event Communications Within Industrial Internet of Things by Leveraging on Game Theoretic Intelligence.
IEEE Internet Things J., 2018

Recent advances in security and privacy in Social Big Data.
Future Gener. Comput. Syst., 2018

Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes.
Future Gener. Comput. Syst., 2018

Power domain NOMA to support group communication in public safety networks.
Future Gener. Comput. Syst., 2018

Controlling and filtering users data in Intelligent Transportation System.
Future Gener. Comput. Syst., 2018

A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation.
Future Gener. Comput. Syst., 2018

CHIS: A big data infrastructure to manage digital cultural items.
Future Gener. Comput. Syst., 2018

Multimedia story creation on social networks.
Future Gener. Comput. Syst., 2018

Information theoretic-based detection and removal of slander and/or false-praise attacks for robust trust management with Dempster-Shafer combination of linguistic fuzzy terms.
Concurr. Comput. Pract. Exp., 2018

On the protection of consumer genomic data in the Internet of Living Things.
Comput. Secur., 2018

Editorial: Security and privacy protection vs sustainable development.
Comput. Secur., 2018

Recognizing human behaviours in online social networks.
Comput. Secur., 2018

Human-Driven Edge Computing and Communication: Part 2.
IEEE Commun. Mag., 2018

Cloud-Based Biometrics (Biometrics as a Service) for Smart Cities, Nations, and Beyond.
IEEE Cloud Comput., 2018

IEEE Access Special Section Editorial: Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies.
IEEE Access, 2018

Creating and Managing Realism in the Next-Generation Cyber Range.
Proceedings of the Network and System Security - 12th International Conference, 2018

Walking on the Cloud: Gait Recognition, a Wearable Solution.
Proceedings of the Network and System Security - 12th International Conference, 2018

Have you permission to answer this phone?
Proceedings of the 2018 International Workshop on Biometrics and Forensics, 2018

2017
Exploiting Battery-Drain Vulnerabilities in Mobile Smart Devices.
IEEE Trans. Sustain. Comput., 2017

On-Board Format-Independent Security of Functional Magnetic Resonance Images.
ACM Trans. Embed. Comput. Syst., 2017

A Multiobjective Wavelength Routing Approach Combining Network and Traffic Engineering With Energy Awareness.
IEEE Syst. J., 2017

Layered multicast for reliable event notification over large-scale networks.
Inf. Sci., 2017

Supporting dynamic updates in storage clouds with the Akl-Taylor scheme.
Inf. Sci., 2017

Securing Information Exchange in VANETs by Using Pairing-Based Cryptography.
Int. J. Found. Comput. Sci., 2017

Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design.
Future Gener. Comput. Syst., 2017

Improving the gossiping effectiveness with distributed strategic learning (Invited paper).
Future Gener. Comput. Syst., 2017

A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants.
Future Gener. Comput. Syst., 2017

A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy.
Concurr. Comput. Pract. Exp., 2017

Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner.
Comput. Secur., 2017

Security and privacy for cloud-based data management in the health network service chain: a microservice approach.
IEEE Commun. Mag., 2017

Human-Driven Edge Computing and Communication: Part 1.
IEEE Commun. Mag., 2017

Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective.
IEEE Cloud Comput., 2017

Evidence and Forensics in the Cloud: Challenges and Future Research Directions.
IEEE Cloud Comput., 2017

Context Aware Ubiquitous Biometrics in Edge of Military Things.
IEEE Cloud Comput., 2017

Biometrics in the Cloud: Challenges and Research Opportunities.
IEEE Cloud Comput., 2017

OFL: A Language for Cloud Orchestration.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Flaw Recovery in Cloud Based Bio-inspired Peer-to-Peer Systems for Smart Cities.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Detection of Lurkers in Online Social Networks.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Selection-Based Scheduling Algorithms under Service Level Agreement Constraints.
Proceedings of the 21st International Conference on Control Systems and Computer Science, 2017

2016
Cryptographic Hierarchical Access Control for Dynamic Structures.
IEEE Trans. Inf. Forensics Secur., 2016

Hierarchical and Shared Access Control.
IEEE Trans. Inf. Forensics Secur., 2016

Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory.
IEEE Trans. Computers, 2016

Human continuous activity recognition based on energy-efficient schemes considering cloud security technology.
Secur. Commun. Networks, 2016

A secure payment system for multimedia on demand on mobile VANET clouds.
Secur. Commun. Networks, 2016

A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment.
Int. J. Data Warehous. Min., 2016

GRASP-based resource re-optimization for effective big data access in federated clouds.
Future Gener. Comput. Syst., 2016

An HLA-based framework for simulation of large-scale critical systems.
Concurr. Comput. Pract. Exp., 2016

Cloud Manufacturing: Security, Privacy, and Forensic Concerns.
IEEE Cloud Comput., 2016

Challenges in Delivering Software in the Cloud as Microservices.
IEEE Cloud Comput., 2016

Encryption-Based Solution for Data Sovereignty in Federated Clouds.
IEEE Cloud Comput., 2016

Enhanced Network Support for Federated Cloud Infrastructures.
IEEE Cloud Comput., 2016

Healthcare-Related Data in the Cloud: Challenges and Opportunities.
IEEE Cloud Comput., 2016

A cloud-based architecture for emergency management and first responders localization in smart city environments.
Comput. Electr. Eng., 2016

Greedy Probability-Based Routing Protocol for Incompletely Predictable Vehicular Ad-hoc Network.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

Optimal Data Replica Placement in Large-Scale Federated Architectures.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

Privacy-Aware Routing for Sharing Sensitive Information across Wide-Area Networks.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

Distributed strategic learning for effective gossiping in wireless networks.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Distributed Strategic Learning for Building Network Embedded Coding to Achieve Reliable Event Notification.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

Interoperable Access Control by Means of a Semantic Approach.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

Putting the User in Control of the Intelligent Transportation System.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
A triadic closure and homophily-based recommendation system for online social networks.
World Wide Web, 2015

Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures.
J. Supercomput., 2015

Modeling performances of concurrent big data applications.
Softw. Pract. Exp., 2015

Secure and reliable data communication in developing regions and rural areas.
Pervasive Mob. Comput., 2015

A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing.
Knowl. Based Syst., 2015

Energy efficiency of elastic frequency grids in multilayer IP/MPLS-over-flexgrid networks.
J. Netw. Comput. Appl., 2015

Modeling energy-efficient secure communications in multi-mode wireless mobile devices.
J. Comput. Syst. Sci., 2015

Cloud-based adaptive compression and secure management services for 3D healthcare data.
Future Gener. Comput. Syst., 2015

Modeling security requirements for cloud-based system development.
Concurr. Comput. Pract. Exp., 2015

A Kuramoto Model Based Approach to Extract and Assess Influence Relations.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

Analysis of Network Management and Monitoring Using Cloud Computing.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

A Game-Theoretic Approach to Network Embedded FEC over Large-Scale Networks.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

The untrusted handover security of the S-PMIPv6 on LTE-A.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Supporting First Responders Localization during Crisis Management.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

A honeypot system with honeyword-driven fake interactive sessions.
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015

Dealing with Reliable Event-Based Communications by Means of Layered Multicast.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Cyber Threats to Industrial Control Systems.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

Heterogeneous Network Handover Using 3GPP ANDSF.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

On the Protection of fMRI Images in Multi-domain Environments.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

Format-Independent Protection of DNA Microarray Images.
Proceedings of the 10th International Conference on P2P, 2015

Reversible Copyright Protection for DNA Microarray Images.
Proceedings of the 10th International Conference on P2P, 2015

2014
A secure file sharing service for distributed computing environments.
J. Supercomput., 2014

A Denial of Service Attack to UMTS Networks Using SIM-Less Devices.
IEEE Trans. Dependable Secur. Comput., 2014

Soft computing for security services in smart and ubiquitous environments.
Soft Comput., 2014

Hybrid indoor and outdoor location services for new generation mobile terminals.
Pers. Ubiquitous Comput., 2014

A botnet-based command and control approach relying on swarm intelligence.
J. Netw. Comput. Appl., 2014

Prosperity of IT security technologies in homeland defense.
J. Ambient Intell. Humaniz. Comput., 2014

Secure and distributed video surveillance via portable devices.
J. Ambient Intell. Humaniz. Comput., 2014

A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems.
Int. J. Parallel Program., 2014

Editorial.
Int. J. Commun. Networks Distributed Syst., 2014

Exploiting mean field analysis to model performances of big data architectures.
Future Gener. Comput. Syst., 2014

A distributed approach to network anomaly detection based on independent component analysis.
Concurr. Comput. Pract. Exp., 2014

Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Industrial Control System Cyber Threats Indicators in Smart Grid Technology.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Protection of Microscopy Images through Digital Watermarking Techniques.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

The Role of Trust and Co-partnership in the Societal Digital Security Culture Approach.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

Friendship Recommendations in Online Social Networks.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

Adaptive Stealth Energy-Related DoS Attacks against Cloud Data Centers.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Multimedia-based battery drain attacks for Android devices.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
Modeling energy consumption in next-generation wireless access-over-WDM networks with hybrid power sources.
Math. Comput. Model., 2013

An intelligent security architecture for distributed firewalling environments.
J. Ambient Intell. Humaniz. Comput., 2013

Special issue on cloud, wireless and e-commerce security.
J. Ambient Intell. Humaniz. Comput., 2013

Experimentations with source camera identification and Online Social Networks.
J. Ambient Intell. Humaniz. Comput., 2013

Network anomaly detection with the restricted Boltzmann machine.
Neurocomputing, 2013

Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks.
Comput. Sci. Inf. Syst., 2013

Interconnecting Federated Clouds by Using Publish-Subscribe Service.
Clust. Comput., 2013

On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines.
Appl. Soft Comput., 2013

Automated Production of Predetermined Digital Evidence.
IEEE Access, 2013

On asynchronous enforcement of security policies in "Nomadic" storage facilities.
Proceedings of the 22nd IEEE International Symposium on Industrial Electronics, 2013

An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Text Compression and Encryption through Smart Devices for Mobile Communication.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

On Secure Data Management in Health-Care Environment.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Trustworthy Opportunistic Access to the Internet of Services.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Forensically-Sound Methods to Collect Live Network Evidence.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

Analyzing the Internet Stability in Presence of Disasters.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Condensation-based routing in mobile ad-hoc networks.
Mob. Inf. Syst., 2012

Engineering a secure mobile messaging framework.
Comput. Secur., 2012

An asynchronous covert channel using spam.
Comput. Math. Appl., 2012

Virtual lab: A concrete experience in building multi-purpose virtualized labs for Computer Science Education.
Proceedings of the 20th International Conference on Software, 2012

The Digital Profiling Techniques Applied to the Analysis of a GPS Navigation Device.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Device Tracking in Private Networks via NAPT Log Analysis.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

The Forensic Analysis of a False Digital Alibi.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

How to Forge a Digital Alibi on Mac OS X.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

A Secure Distributed Video Surveillance System Based on Portable Devices.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
Automatic security assessment for next generation wireless mobile networks.
Mob. Inf. Syst., 2011

Hiding Information into OOXML Documents: New Steganographic Perspectives.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

The AVQ Algorithm: Watermarking and Compression Performances.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Characterizing and Classifying Card-Sharing Traffic through Wavelet Analysis.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

A Forensic Analysis of Images on Online Social Networks.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

On the Construction of a False Digital Alibi on the Android OS.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

E-mail-Based Covert Channels for Asynchronous Message Steganography.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

SECR3T: Secure End-to-End Communication over 3G Telecommunication Networks.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Steganography and Secure Communication on Online Social Networks and Online Photo Sharing.
Proceedings of the 2011 International Conference on Broadband, 2011

Automatic, Selective and Secure Deletion of Digital Evidence.
Proceedings of the 2011 International Conference on Broadband, 2011

A Novel Anti-forensics Technique for the Android OS.
Proceedings of the 2011 International Conference on Broadband, 2011

Automated Construction of a False Digital Alibi.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

New Steganographic Techniques for the OOXML File Format.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
Security and privacy issues in the Portable Document Format.
J. Syst. Softw., 2010

Towards a Lawfully Secure and Privacy Preserving Video Surveillance System.
Proceedings of the E-Commerce and Web Technologies, 11th International Conference, 2010

An Extensible Framework for Efficient Secure SMS.
Proceedings of the CISIS 2010, 2010

An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

Source Camera Identification in Real Practice: A Preliminary Experimentation.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
Do You Trust Your Phone?
Proceedings of the E-Commerce and Web Technologies, 10th International Conference, 2009

A Multi-scheme and Multi-channel Framework for Micropayment Systems.
Proceedings of the E-Commerce and Web Technologies, 10th International Conference, 2009

2007
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata.
J. Syst. Softw., 2007

2006
SPEECH: Secure Personal End-to-End Communication with Handheld.
Proceedings of the ISSE 2006, 2006


  Loading...