Antonio Pecchia
Orcid: 0000-0003-2869-8423
According to our database1,
Antonio Pecchia
authored at least 69 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
9
2
1
5
1
5
2
2
2
2
1
1
2
2
3
2
3
3
4
3
1
2
1
6
3
3
4
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Softw. Qual. J., March, 2024
Exploring the effect of training-time randomness on the performance of deep neural networks for intrusion detection.
Soft Comput., February, 2024
DEFEDGE: Threat-Driven Security Testing and Proactive Defense Identification for Edge-Cloud Systems.
Proceedings of the Advanced Information Networking and Applications, 2024
Towards realistic problem-space adversarial attacks against machine learning in network intrusion detection.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
CPS-GUARD: Intrusion detection for cyber-physical systems and IoT devices using outlier-aware deep autoencoders.
Comput. Secur., June, 2023
Machine Learning on Public Intrusion Datasets: Academic Hype or Concrete Advances in NIDS?
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023
Traditional vs Federated Learning with Deep Autoencoders: a Study in IoT Intrusion Detection.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023
A Case Study with CICIDS2017 on the Robustness of Machine Learning against Adversarial Attacks in Intrusion Detection.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
IEEE Trans. Serv. Comput., 2022
Transferability of machine learning models learned from public intrusion detection datasets: the CICIDS2017 case study.
Softw. Qual. J., 2022
Micro2vec: Anomaly detection in microservices systems by mining numeric representations of computer logs.
J. Netw. Comput. Appl., 2022
No more DoS? An empirical study on defense techniques for web server Denial of Service mitigation.
J. Netw. Comput. Appl., 2022
Expert Syst. Appl., 2022
Proceedings of the Quality of Information and Communications Technology, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Demystifying the role of public intrusion datasets: A replication study of DoS network traffic data.
Comput. Secur., 2021
A Critique on the Use of Machine Learning on Public Datasets for Intrusion Detection.
Proceedings of the Quality of Information and Communications Technology, 2021
On the Quality of Network Flow Records for IDS Evaluation: A Collaborative Filtering Approach.
Proceedings of the Testing Software and Systems, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021
2020
IEEE Trans. Serv. Comput., 2020
Security Log Analysis in Critical Industrial Systems Exploiting Game Theoretic Feature Selection and Evidence Combination.
IEEE Trans. Ind. Informatics, 2020
Discovering process models for the analysis of application failures under uncertainty of event logs.
Knowl. Based Syst., 2020
Contextual filtering and prioritization of computer application logs for security situational awareness.
Future Gener. Comput. Syst., 2020
Empir. Softw. Eng., 2020
Proceedings of the Quality of Information and Communications Technology, 2020
Proceedings of the Testing Software and Systems, 2020
A case study on the representativeness of public DoS network traffic data for cybersecurity research.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
Future Gener. Comput. Syst., 2019
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019
Proceedings of the 15th European Dependable Computing Conference, 2019
RT-CASEs: Container-Based Virtualization for Temporally Separated Mixed-Criticality Task Sets.
Proceedings of the 31st Euromicro Conference on Real-Time Systems, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
2018
IEEE Trans. Evol. Comput., 2018
Guest Editors' Introduction: Special Issue on Data-Driven Dependability and Security.
IEEE Trans. Dependable Secur. Comput., 2018
Proceedings of the 2018 IEEE International Symposium on Software Reliability Engineering Workshops, 2018
Contextual Anomaly Detection for a Critical Industrial System Based on Logs and Metrics.
Proceedings of the 14th European Dependable Computing Conference, 2018
Proceedings of the 14th European Dependable Computing Conference, 2018
2017
Softw. Test. Verification Reliab., 2017
J. Parallel Distributed Comput., 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
2016
IEEE Trans. Reliab., 2016
Future Gener. Comput. Syst., 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016
2015
Industry Practices and Event Logging: Assessment of a Critical Software Development Process.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
2014
Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities.
CoRR, 2014
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014
Assessing Direct Monitoring Techniques to Analyze Failures of Critical Industrial Systems.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering, 2014
Event Logging in an Industrial Development Process: Practices and Reengineering Challenges.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014
NAPOLI FUTURA: Novel Approaches for Protecting Critical Infrastructures from Cyber Attacks.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014
Proceedings of the Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimarães, Portugal, June 30, 2014
What Logs Should You Look at When an Application Fails? Insights from an Industrial Case Study.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
2013
IEEE Trans. Software Eng., 2013
Proceedings of the SAFECOMP 2013, 2013
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
2012
Proceedings of the Computer Safety, Reliability, and Security, 2012
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering Workshops, 2012
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering, 2012
2011
Identifying Compromised Users in Shared Computing Infrastructures: A Data-Driven Bayesian Network Approach.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), 2011
Proceedings of the Computer Safety, Reliability, and Security, 2011
Proceedings of the 5th Latin-American Symposium on Dependable Computing, 2011
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
2010
Int. J. Syst. Serv. Oriented Eng., 2010
Assessing and improving the effectiveness of logs for the analysis of software faults.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010
2008
An experiment in memory leak analysis with a mission-critical middleware for air traffic control.
Proceedings of the IEEE International Conference on Software Reliability Engineering Workshops, 2008