Arcangelo Castiglione
Orcid: 0000-0002-7991-2410
According to our database1,
Arcangelo Castiglione
authored at least 74 papers
between 2012 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption.
Comput. Stand. Interfaces, 2025
2024
Guest Editorial: IoT-based secure health monitoring and tracking through estimated computing.
IET Cyper-Phys. Syst.: Theory & Appl., June, 2024
DSTGCS: an intelligent dynamic spatial-temporal graph convolutional system for traffic flow prediction in ITS.
Soft Comput., May, 2024
2023
CTDM: cryptocurrency abnormal transaction detection method with spatio-temporal and global representation.
Soft Comput., August, 2023
IoT-based health monitoring system to handle pandemic diseases using estimated computing.
Neural Comput. Appl., July, 2023
A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control.
Future Gener. Comput. Syst., May, 2023
Proceedings of the Computational Science and Its Applications - ICCSA 2023 Workshops, 2023
2022
ACM Trans. Internet Techn., 2022
Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey.
Soft Comput., 2022
IEEE Internet Things J., 2022
Comput. Stand. Interfaces, 2022
Fabric-GC: A Blockchain-based Gantt chart system for cross-organizational project management.
Comput. Sci. Inf. Syst., 2022
Comput. Ind. Eng., 2022
2021
Soft Comput., 2021
A clique-based discrete bat algorithm for influence maximization in identifying top-k influential nodes of social networks.
Soft Comput., 2021
A novel Byzantine fault tolerance consensus for Green IoT with intelligence based on reinforcement.
J. Inf. Secur. Appl., 2021
A Cluster-Based Multidimensional Approach for Detecting Attacks on Connected Vehicles.
IEEE Internet Things J., 2021
Effective classification of android malware families through dynamic features and neural networks.
Connect. Sci., 2021
Concurr. Comput. Pract. Exp., 2021
On the undetectability of payloads generated through automatic tools: A human-oriented approach.
Concurr. Comput. Pract. Exp., 2021
A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment.
Comput. Commun., 2021
Appl. Soft Comput., 2021
Machine Learning Technique for Fake News Detection Using Text-Based Word Vector Representation.
Proceedings of the Computational Data and Social Networks - 10th International Conference, 2021
Proceedings of the Joint Proceedings of the BIR 2021 Workshops and Doctoral Consortium co-located with 20th International Conference on Perspectives in Business Informatics Research (BIR 2021), 2021
2020
Sensors, 2020
Pattern Recognit. Lett., 2020
Securing visual search queries in ubiquitous scenarios empowered by smart personal devices.
Inf. Sci., 2020
Introduction to the special section on blockchain techniques for the internet of vehicles security (VSI-bciov).
Comput. Electr. Eng., 2020
Appl. Intell., 2020
Proceedings of the Testing Software and Systems, 2020
Proceedings of the 26th International DMS Conference on Visualization and Visual Languages, 2020
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020
Proceedings of the Advanced Information Networking and Applications, 2020
Proceedings of the Advanced Information Networking and Applications, 2020
2019
Inf. Sci., 2019
Future Gener. Comput. Syst., 2019
Proceedings of the 4th International Conference on System Reliability and Safety, 2019
2018
Quantum technique for access control in cloud computing II: Encryption and key distribution.
J. Netw. Comput. Appl., 2018
Comput. Secur., 2018
IEEE Cloud Comput., 2018
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018
2017
ACM Trans. Embed. Comput. Syst., 2017
Inf. Sci., 2017
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants.
Future Gener. Comput. Syst., 2017
Future Gener. Comput. Syst., 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes.
IEEE Trans. Dependable Secur. Comput., 2016
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Pervasive Mob. Comput., 2015
Modeling energy-efficient secure communications in multi-mode wireless mobile devices.
J. Comput. Syst. Sci., 2015
Cloud-based adaptive compression and secure management services for 3D healthcare data.
Future Gener. Comput. Syst., 2015
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
2014
J. Ambient Intell. Humaniz. Comput., 2014
Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Proceedings of the IEEE International Conference on Fuzzy Systems, 2014
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
2013
An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
A Secure Low Complexity Approach for Compression and Transmission of 3-D Medical Images.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012