Aniello Castiglione
Orcid: 0000-0003-0571-1074Affiliations:
- University of Naples Parthenope, Italy
- University of Salerno, Department of Computer Science (former)
According to our database1,
Aniello Castiglione
authored at least 226 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
-
on di.unisa.it
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Efficient and precise visual location estimation by effective priority matching-based pose verification in edge-cloud collaborative IoT.
Future Gener. Comput. Syst., 2024
Optimising production efficiency: Managing flexibility in Industry 4.0 systems via simulation.
Comput. Ind. Eng., 2024
2023
A framework for achieving a circular economy using the blockchain technology in a sustainable waste management system.
Comput. Ind. Eng., June, 2023
A Deep Learning-based Fast Fake News Detection Model for Cyber-Physical Social Services.
Pattern Recognit. Lett., April, 2023
J. Signal Process. Syst., March, 2023
The NITRDrone Dataset to Address the Challenges for Road Extraction from Aerial Images.
J. Signal Process. Syst., March, 2023
PCNN<sub>CEC</sub>: Efficient and Privacy-Preserving Convolutional Neural Network Inference Based on Cloud-Edge-Client Collaboration.
IEEE Trans. Netw. Sci. Eng., 2023
Proceedings of the IEEE International Conference on Consumer Electronics, 2023
Proceedings of the IEEE International Conference on Consumer Electronics, 2023
Proceedings of the 24th International Conference on Control Systems and Computer Science, 2023
On the (in)Security and Weaknesses of Commonly Used Applications on Large-Scale Distributed Systems.
Proceedings of the 24th International Conference on Control Systems and Computer Science, 2023
2022
IEEE Trans. Intell. Transp. Syst., 2022
Guest Editorial: Biometrics in Industry 4.0: Open Challenges and Future Perspectives.
IEEE Trans. Ind. Informatics, 2022
Impact of Deep Learning Approaches on Facial Expression Recognition in Healthcare Industries.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Dependable Secur. Comput., 2022
Trustworthiness Evaluation-Based Routing Protocol for Incompletely Predictable Vehicular Ad Hoc Networks.
IEEE Trans. Big Data, 2022
Pattern Recognit., 2022
2021
ACM Trans. Internet Techn., 2021
COVID-19: Automatic Detection of the Novel Coronavirus Disease From CT Images Using an Optimized Convolutional Neural Network.
IEEE Trans. Ind. Informatics, 2021
Trustworthy Method for Person Identification in IIoT Environments by Means of Facial Dynamics.
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Ind. Informatics, 2021
Introduction to the special issue on "Biometrics in Smart Cities: Techniques and Applications (BI_SCI)".
Pattern Recognit. Lett., 2021
Pattern Recognit. Lett., 2021
IEEE Internet Things J., 2021
A human-centered artificial intelligence approach for privacy protection of elderly App users in smart cities.
Neurocomputing, 2021
K maximum probability attack paths generation algorithm for target nodes in networked systems.
Int. J. Inf. Sec., 2021
Future Gener. Comput. Syst., 2021
Comput. Stand. Interfaces, 2021
Vessel to shore data movement through the Internet of Floating Things: A microservice platform at the edge.
Concurr. Comput. Pract. Exp., 2021
Fostering secure cross-layer collaborative communications by means of covert channels in MEC environments.
Comput. Commun., 2021
Message from the IEEE SmartData 2021 General Chairs: iThings-GreenCom-CPSCom-SmartData-Cybermatics 2021.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021
2020
SDN based communications privacy-preserving architecture for VANETs using fog computing.
Veh. Commun., 2020
Inter-Beam Interference Cancellation and Physical Layer Security Constraints by 3D Polarized Beamforming in Power Domain NOMA Systems.
IEEE Trans. Sustain. Comput., 2020
Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing.
IEEE Trans. Emerg. Top. Comput., 2020
Distributed Group Key Management for Event Notification Confidentiality Among Sensors.
IEEE Trans. Dependable Secur. Comput., 2020
J. Parallel Distributed Comput., 2020
Cognitive IoT system with intelligence techniques in sustainable computing environment.
Comput. Commun., 2020
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
Proceedings of the 6th IEEE International Conference on Dependability in Sensor, 2020
Proceedings of the IEEE Intl Conf on Dependable, 2020
Proceedings of the AVI '20: International Conference on Advanced Visual Interfaces, Island of Ischia, Italy, September 28, 2020
2019
Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things.
IEEE Trans. Dependable Secur. Comput., 2019
IEEE Trans. Big Data, 2019
Pattern Recognit. Lett., 2019
Pattern Recognit. Lett., 2019
CSP-E<sup>2</sup>: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems.
Inf. Sci., 2019
Data fusion technique in SPIDER Peer-to-Peer networks in smart cities for security enhancements.
Inf. Sci., 2019
On Data Sovereignty in Cloud-Based Computation Offloading for Smart Cities Applications.
IEEE Internet Things J., 2019
Future Gener. Comput. Syst., 2019
Biometric data on the edge for secure, smart and user tailored access to cloud services.
Future Gener. Comput. Syst., 2019
Concurr. Comput. Pract. Exp., 2019
Forward to the special issue of the 9th International Symposium on Cyberspace Safety and Security (CSS 2017).
Concurr. Comput. Pract. Exp., 2019
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019
Eye-Movement and Touch Dynamics: A Proposed Approach for Activity Recognition of a Web User.
Proceedings of the 15th International Conference on Signal-Image Technology & Internet-Based Systems, 2019
Proceedings of the Parallel Processing and Applied Mathematics, 2019
Optimization of Score-Level Biometric Data Fusion by Constraint Construction Training.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019
Dependable Person Recognition by Means of Local Descriptors of Dynamic Facial Features.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019
2018
Integrity for an Event Notification Within the Industrial Internet of Things by Using Group Signatures.
IEEE Trans. Ind. Informatics, 2018
IEEE Trans. Dependable Secur. Comput., 2018
J. Parallel Distributed Comput., 2018
J. Parallel Distributed Comput., 2018
Distributed strategic learning and game theoretic formulation of network embedded coding.
J. Comput. Sci., 2018
Inf. Sci., 2018
Loss-Tolerant Event Communications Within Industrial Internet of Things by Leveraging on Game Theoretic Intelligence.
IEEE Internet Things J., 2018
Future Gener. Comput. Syst., 2018
Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes.
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation.
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Information theoretic-based detection and removal of slander and/or false-praise attacks for robust trust management with Dempster-Shafer combination of linguistic fuzzy terms.
Concurr. Comput. Pract. Exp., 2018
Comput. Secur., 2018
Comput. Secur., 2018
Cloud-Based Biometrics (Biometrics as a Service) for Smart Cities, Nations, and Beyond.
IEEE Cloud Comput., 2018
IEEE Access Special Section Editorial: Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies.
IEEE Access, 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the 2018 International Workshop on Biometrics and Forensics, 2018
2017
IEEE Trans. Sustain. Comput., 2017
ACM Trans. Embed. Comput. Syst., 2017
A Multiobjective Wavelength Routing Approach Combining Network and Traffic Engineering With Energy Awareness.
IEEE Syst. J., 2017
Inf. Sci., 2017
Inf. Sci., 2017
Int. J. Found. Comput. Sci., 2017
Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design.
Future Gener. Comput. Syst., 2017
Improving the gossiping effectiveness with distributed strategic learning (Invited paper).
Future Gener. Comput. Syst., 2017
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants.
Future Gener. Comput. Syst., 2017
A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy.
Concurr. Comput. Pract. Exp., 2017
Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner.
Comput. Secur., 2017
Security and privacy for cloud-based data management in the health network service chain: a microservice approach.
IEEE Commun. Mag., 2017
Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective.
IEEE Cloud Comput., 2017
IEEE Cloud Comput., 2017
IEEE Cloud Comput., 2017
IEEE Cloud Comput., 2017
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Proceedings of the 21st International Conference on Control Systems and Computer Science, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory.
IEEE Trans. Computers, 2016
Human continuous activity recognition based on energy-efficient schemes considering cloud security technology.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment.
Int. J. Data Warehous. Min., 2016
GRASP-based resource re-optimization for effective big data access in federated clouds.
Future Gener. Comput. Syst., 2016
Concurr. Comput. Pract. Exp., 2016
IEEE Cloud Comput., 2016
IEEE Cloud Comput., 2016
IEEE Cloud Comput., 2016
IEEE Cloud Comput., 2016
IEEE Cloud Comput., 2016
A cloud-based architecture for emergency management and first responders localization in smart city environments.
Comput. Electr. Eng., 2016
Greedy Probability-Based Routing Protocol for Incompletely Predictable Vehicular Ad-hoc Network.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Distributed Strategic Learning for Building Network Embedded Coding to Achieve Reliable Event Notification.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016
A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
A triadic closure and homophily-based recommendation system for online social networks.
World Wide Web, 2015
Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures.
J. Supercomput., 2015
Pervasive Mob. Comput., 2015
A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing.
Knowl. Based Syst., 2015
Energy efficiency of elastic frequency grids in multilayer IP/MPLS-over-flexgrid networks.
J. Netw. Comput. Appl., 2015
Modeling energy-efficient secure communications in multi-mode wireless mobile devices.
J. Comput. Syst. Sci., 2015
Cloud-based adaptive compression and secure management services for 3D healthcare data.
Future Gener. Comput. Syst., 2015
Concurr. Comput. Pract. Exp., 2015
Proceedings of the Computational Intelligence and Intelligent Systems, 2015
Proceedings of the Computational Intelligence and Intelligent Systems, 2015
Proceedings of the Computational Intelligence and Intelligent Systems, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
2014
J. Supercomput., 2014
IEEE Trans. Dependable Secur. Comput., 2014
Soft Comput., 2014
Pers. Ubiquitous Comput., 2014
J. Netw. Comput. Appl., 2014
J. Ambient Intell. Humaniz. Comput., 2014
J. Ambient Intell. Humaniz. Comput., 2014
A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems.
Int. J. Parallel Program., 2014
Future Gener. Comput. Syst., 2014
A distributed approach to network anomaly detection based on independent component analysis.
Concurr. Comput. Pract. Exp., 2014
Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
The Role of Trust and Co-partnership in the Societal Digital Security Culture Approach.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
2013
Modeling energy consumption in next-generation wireless access-over-WDM networks with hybrid power sources.
Math. Comput. Model., 2013
J. Ambient Intell. Humaniz. Comput., 2013
J. Ambient Intell. Humaniz. Comput., 2013
J. Ambient Intell. Humaniz. Comput., 2013
Neurocomputing, 2013
Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks.
Comput. Sci. Inf. Syst., 2013
Clust. Comput., 2013
On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines.
Appl. Soft Comput., 2013
Proceedings of the 22nd IEEE International Symposium on Industrial Electronics, 2013
An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
Proceedings of the Security Engineering and Intelligence Informatics, 2013
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
Virtual lab: A concrete experience in building multi-purpose virtualized labs for Computer Science Education.
Proceedings of the 20th International Conference on Software, 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
2011
Mob. Inf. Syst., 2011
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Steganography and Secure Communication on Online Social Networks and Online Photo Sharing.
Proceedings of the 2011 International Conference on Broadband, 2011
Proceedings of the 2011 International Conference on Broadband, 2011
Proceedings of the 2011 International Conference on Broadband, 2011
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011
2010
Proceedings of the E-Commerce and Web Technologies, 11th International Conference, 2010
Proceedings of the CISIS 2010, 2010
An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
2009
Proceedings of the E-Commerce and Web Technologies, 10th International Conference, 2009
Proceedings of the E-Commerce and Web Technologies, 10th International Conference, 2009
2007
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata.
J. Syst. Softw., 2007
2006
Proceedings of the ISSE 2006, 2006