Arcangelo Castiglione

Orcid: 0000-0002-7991-2410

According to our database1, Arcangelo Castiglione authored at least 74 papers between 2012 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption.
Comput. Stand. Interfaces, 2025

2024
Guest Editorial: IoT-based secure health monitoring and tracking through estimated computing.
IET Cyper-Phys. Syst.: Theory & Appl., June, 2024

DSTGCS: an intelligent dynamic spatial-temporal graph convolutional system for traffic flow prediction in ITS.
Soft Comput., May, 2024

2023
CTDM: cryptocurrency abnormal transaction detection method with spatio-temporal and global representation.
Soft Comput., August, 2023

IoT-based health monitoring system to handle pandemic diseases using estimated computing.
Neural Comput. Appl., July, 2023

A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control.
Future Gener. Comput. Syst., May, 2023

Improving Drone Security in Smart Cities via Lightweight Cryptography.
Proceedings of the Computational Science and Its Applications - ICCSA 2023 Workshops, 2023

2022
Privacy-preserving Secure Media Streaming for Multi-user Smart Environments.
ACM Trans. Internet Techn., 2022

Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey.
Soft Comput., 2022

DNS tunnels detection via DNS-images.
Inf. Process. Manag., 2022

Robust End Hopping for Secure Satellite Communication in Moving Target Defense.
IEEE Internet Things J., 2022

MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning.
Comput. Stand. Interfaces, 2022

Fabric-GC: A Blockchain-based Gantt chart system for cross-organizational project management.
Comput. Sci. Inf. Syst., 2022

Modeling and analysis of port supply chain system based on Fabric blockchain.
Comput. Ind. Eng., 2022

2021
A two-stage intrusion detection approach for software-defined IoT networks.
Soft Comput., 2021

A clique-based discrete bat algorithm for influence maximization in identifying top-k influential nodes of social networks.
Soft Comput., 2021

A novel Byzantine fault tolerance consensus for Green IoT with intelligence based on reinforcement.
J. Inf. Secur. Appl., 2021

A Cluster-Based Multidimensional Approach for Detecting Attacks on Connected Vehicles.
IEEE Internet Things J., 2021

Effective classification of android malware families through dynamic features and neural networks.
Connect. Sci., 2021

A machine learning-based memory forensics methodology for TOR browser artifacts.
Concurr. Comput. Pract. Exp., 2021

On the undetectability of payloads generated through automatic tools: A human-oriented approach.
Concurr. Comput. Pract. Exp., 2021

A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment.
Comput. Commun., 2021

High-precision linearized interpretation for fully connected neural network.
Appl. Soft Comput., 2021

Machine Learning Technique for Fake News Detection Using Text-Based Word Vector Representation.
Proceedings of the Computational Data and Social Networks - 10th International Conference, 2021

Covid-19 Data Sharing and Organization through Blockchain and Decentralized Models.
Proceedings of the Joint Proceedings of the BIR 2021 Workshops and Doctoral Consortium co-located with 20th International Conference on Perspectives in Business Informatics Research (BIR 2021), 2021

2020
An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree.
Sensors, 2020

Securing the internet of vehicles through lightweight block ciphers.
Pattern Recognit. Lett., 2020

Securing visual search queries in ubiquitous scenarios empowered by smart personal devices.
Inf. Sci., 2020

Compression-based steganography.
Concurr. Comput. Pract. Exp., 2020

Introduction to the special section on blockchain techniques for the internet of vehicles security (VSI-bciov).
Comput. Electr. Eng., 2020

An intrusion detection approach based on improved deep belief network.
Appl. Intell., 2020

Vulsploit: A Module for Semi-automatic Exploitation of Vulnerabilities.
Proceedings of the Testing Software and Systems, 2020

On the impact of lightweight ciphers in automotive networks (S).
Proceedings of the 26th International DMS Conference on Visualization and Visual Languages, 2020

A Novel Approach for Fake News Detection in Vehicular Ad-Hoc Network (VANET).
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

Network Forensics of WhatsApp: A Practical Approach Based on Side-Channel Analysis.
Proceedings of the Advanced Information Networking and Applications, 2020

On the File Recovery in Systems Infected by Ransomware.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
Secure weighted possibilistic c-means algorithm on cloud for clustering big data.
Inf. Sci., 2019

One-pass lossless data hiding and compression of remote sensing data.
Future Gener. Comput. Syst., 2019

Lightweight Ciphers in Automotive Networks: A Preliminary Approach.
Proceedings of the 4th International Conference on System Reliability and Safety, 2019

2018
Quantum technique for access control in cloud computing II: Encryption and key distribution.
J. Netw. Comput. Appl., 2018

Building a network embedded FEC protocol by using game theory.
Inf. Sci., 2018

On the protection of consumer genomic data in the Internet of Living Things.
Comput. Secur., 2018

Biometrics-as-a-Service: Cloud-Based Technology, Systems, and Applications.
IEEE Cloud Comput., 2018

Data hiding using compressed archives.
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018

2017
On-Board Format-Independent Security of Functional Magnetic Resonance Images.
ACM Trans. Embed. Comput. Syst., 2017

Supporting dynamic updates in storage clouds with the Akl-Taylor scheme.
Inf. Sci., 2017

A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants.
Future Gener. Comput. Syst., 2017

Secure group communication schemes for dynamic heterogeneous distributed computing.
Future Gener. Comput. Syst., 2017

2016
Cryptographic Hierarchical Access Control for Dynamic Structures.
IEEE Trans. Inf. Forensics Secur., 2016

Hierarchical and Shared Access Control.
IEEE Trans. Inf. Forensics Secur., 2016

Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes.
IEEE Trans. Dependable Secur. Comput., 2016

On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Secure and reliable data communication in developing regions and rural areas.
Pervasive Mob. Comput., 2015

Modeling energy-efficient secure communications in multi-mode wireless mobile devices.
J. Comput. Syst. Sci., 2015

Cloud-based adaptive compression and secure management services for 3D healthcare data.
Future Gener. Comput. Syst., 2015

Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

On the Protection of fMRI Images in Multi-domain Environments.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

Format-Independent Protection of DNA Microarray Images.
Proceedings of the 10th International Conference on P2P, 2015

Reversible Copyright Protection for DNA Microarray Images.
Proceedings of the 10th International Conference on P2P, 2015

2014
Secure and distributed video surveillance via portable devices.
J. Ambient Intell. Humaniz. Comput., 2014

Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes.
IACR Cryptol. ePrint Arch., 2014

Parallel Low-Complexity Lossless Coding of Three-Dimensional Medical Images.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Hierarchical and Shared Key Assignment.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Protection of Microscopy Images through Digital Watermarking Techniques.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

A Collaborative Decision-Support System for Secure Analysis of Cranial Disorders.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

An Efficient Protocol for Reliable Data Communication on Dataless Devices.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A fuzzy logic based reputation system for E-markets.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2014

An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Text Compression and Encryption through Smart Devices for Mobile Communication.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

On Secure Data Management in Health-Care Environment.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A Secure Low Complexity Approach for Compression and Transmission of 3-D Medical Images.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
A Secure Distributed Video Surveillance System Based on Portable Devices.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012


  Loading...