Fabrizio Baiardi

Orcid: 0000-0001-9797-2380

Affiliations:
  • University of Pisa, Italy


According to our database1, Fabrizio Baiardi authored at least 93 papers between 1983 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Kex-Filtering: A Proactive Approach to Filtering.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

Multilevel Database Decomposition Framework.
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024

Satisfying Least Privilege Through Database Decomposition.
Proceedings of the 20th International Conference on the Design of Reliable Communication Networks, 2024

2023
SentiTrust: A New Trust Model for Decentralized Online Social Media.
IEEE Access, 2023

Impact of Decentralization on Electronic Voting Systems: A Systematic Literature Survey.
IEEE Access, 2023

Merging FMEA and Digital Twins to Improve Trustfulness.
Proceedings of the 7th International Conference on System Reliability and Safety, 2023

2022
Discovering How to Attack a System.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

2020
Blockchain-based access control management for Decentralized Online Social Networks.
J. Parallel Distributed Comput., 2020

Blockchain Smart Contract for Scalable Data Sharing in IoT: A Case Study of Smart Agriculture.
Proceedings of the IEEE Global Conference on Artificial Intelligence and Internet of Things, 2020

Context-Aware and Dynamic Role-Based Access Control Using Blockchain.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
Sequential pattern mining for ICT risk assessment and management.
J. Log. Algebraic Methods Program., 2019

Applying Resilience to Hybrid Threats.
IEEE Secur. Priv., 2019

Protecting Personal Data Using Smart Contracts.
Proceedings of the Internet and Distributed Computing Systems, 2019

2017
Sequential Pattern Mining for ICT Risk Assessment and Prevention.
Proceedings of the Software Engineering and Formal Methods, 2017

Using S-Rules to Fire Dynamic Countermeasures.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

2016
Application Vulnerabilities in Risk Assessment and Management.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

A risk mitigation approach for autonomous cloud intrusion response system.
Computing, 2016

An Extension of Haruspex to Cover Vulnerabilities in Application Environments.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

Assessing and Managing Risk by Simulating Attack Chains.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

2015
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks.
IEEE Trans. Dependable Secur. Comput., 2015

Selecting Countermeasures for ICT Systems Before They are Attacked.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

Iterative selection of countermeasures for intelligent threat agents.
Int. J. Netw. Manag., 2015

Assessing and managing the information and communication risk of power generation.
Comput. Electr. Eng., 2015

CyVar: Extending Var-At-Risk to ICT.
Proceedings of the Risk Assessment and Risk-Driven Testing - Third International Workshop, 2015

Iterative Selection of Cost-Effective Countermeasures for Intelligent Threat Agents.
Proceedings of the 23rd Euromicro International Conference on Parallel, 2015

2014
Automating the assessment of ICT risk.
J. Inf. Secur. Appl., 2014

A Scenario Method to Automatically Assess ICT Risk.
Proceedings of the 22nd Euromicro International Conference on Parallel, 2014

Assessing and Managing ICT Risk with Partial Information.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

Security Stress: Evaluating ICT Robustness Through a Monte Carlo Method.
Proceedings of the Critical Information Infrastructures Security, 2014

2013
QSec: Supporting Security Decisions on an IT Infrastructure.
Proceedings of the Critical Information Infrastructures Security, 2013

HA-CIDS: A Hierarchical and Autonomous IDS for Cloud Systems.
Proceedings of the Fifth International Conference on Computational Intelligence, 2013

GVScan: Scanning Networks for Global Vulnerabilities.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
CIDD: A Cloud Intrusion Detection Dataset for Cloud Computing and Masquerade Attacks.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

CIDS: A Framework for Intrusion Detection in Cloud Systems.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

2011
Attestation of integrity of overlay networks.
J. Syst. Archit., 2011

A simulation-driven approach for assessing risks of complex systems.
Proceedings of the 13th European Workshop on Dependable Computing, 2011

An Obfuscation-Based Approach against Injection Attacks.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Semantic Attestation of Node Integrity in Overlays.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010, 2010

Securing a Community Cloud.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

2009
Hierarchical, model-based risk management of critical infrastructures.
Reliab. Eng. Syst. Saf., 2009

Measuring Semantic Integrity for Remote Attestation.
Proceedings of the Trusted Computing, 2009

PsycoTrace: Virtual and Transparent Monitoring of a Process Self.
Proceedings of the 17th Euromicro International Conference on Parallel, 2009

Modeling and Managing Risk in Billing Infrastructures.
Proceedings of the Critical Infrastructure Protection III, 2009

Securing Health Information Infrastructures through Overlays.
Proceedings of the Second International Conference on Health Informatics, 2009

2008
Risk management of an information infrastructure: a framework based upon security dependencies.
Int. J. Syst. Syst. Eng., 2008

Transparent Process Monitoring in a Virtual Environment.
Proceedings of the 3rd International Workshop on Views On Designing Complex Architectures, 2008

Virtual interacting network community: exploiting multi-core architectures to increase security.
Proceedings of the 5th Conference on Computing Frontiers, 2008

Secure Sharing of an ICT Infrastructure through Vinci.
Proceedings of the Resilient Networks and Services, 2008

Semantics-Driven Introspection in a Virtual Environment.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Security and Integrity of a Distributed File Storage in a Virtual Environment.
Proceedings of the Fourth International IEEE Security in Storage Workshop, 2007

Managing Critical Infrastructures through Virtual Network Communities.
Proceedings of the Critical Information Infrastructures Security, 2007

Building Trustworthy Intrusion Detection through VM Introspection.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Policy Driven Virtual Machine Monitor for Protected Grids.
Proceedings of the 15th IEEE International Symposium on High Performance Distributed Computing, 2006

Assessing the Risk of an Information Infrastructure Through Security Dependencies.
Proceedings of the Critical Information Infrastructures Security, 2006

2005
SEAS, a secure e-voting protocol: Design and implementation.
Comput. Secur., 2005

Solving Irregular Problems through Parallel Irregular Trees.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2005

A Theoretical Model for the Average Impact of Attacks on Billing Infrastructures.
Proceedings of the Computer Network Security, 2005

2004
Parallel Hierarchical Radiosity: The PIT Approach.
Proceedings of the Applied Parallel Computing, 2004

Improving Grid Services Security with Fine Grain Policies.
Proceedings of the On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, 2004

2003
MPI on a Virtual Shared Memory.
Proceedings of the Parallel Computing: Software Technology, 2003

SEAS: A Secure E-Voting Applet System.
Proceedings of the Software Security, 2003

2002
PIT: A Library for the Parallelization of Irregular Problems.
Proceedings of the Applied Parallel Computing Advanced Scientific Computing, 2002

2001
Integrating load balancing and locality in the parallelization of irregular problems.
Future Gener. Comput. Syst., 2001

Collecting Remote Data in Irregular Problems with Hierarchical Representation of the Domain.
Proceedings of the Recent Advances in Parallel Virtual Machine and Message Passing Interface, 2001

DVSA and SHOB: Support to Shared Data Structures on Distributed Memory Architectures.
Proceedings of the Ninth Euromicro Workshop on Parallel and Distributed Processing, 2001

Two Layers Distributed Shared Memory.
Proceedings of the High-Performance Computing and Networking, 9th International Conference, 2001

2000
Adaptive Multigrid Methods in MPI.
Proceedings of the Recent Advances in Parallel Virtual Machine and Message Passing Interface, 2000

Evaluation of a virtual shared memory machine by the compilation of data parallel loops.
Proceedings of the Eight Euromicro Workshop on Parallel and Distributed Processing, 2000

Parallelization of Irregular Problems Based on Hierarchical Domain Representation.
Proceedings of the High-Performance Computing and Networking, 8th International Conference, 2000

A Hierarchical Approach to Irregular Problems (Research Note).
Proceedings of the Euro-Par 2000, Parallel Processing, 6th International Euro-Par Conference, Munich, Germany, August 29, 2000

1998
Load Balancing and Locality in Hierarchical N-Body Algorithms on Distributed Memory Architectures.
Proceedings of the High-Performance Computing and Networking, 1998

Q-Learning and Redundancy Reduction in Classifier Systems with Internal State.
Proceedings of the Machine Learning: ECML-98, 1998

1997
Massively parallel execution of logic programs: A static approach.
J. Syst. Archit., 1997

1996
Locality in Load Balancing Policies for Massively Parallel Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1996

1995
A Static Analysis to Order Instructions of a Concurrent Program.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1995

Q-Learning and Parallelism in Evolutionary Rule Based Systems.
Proceedings of the Artificial Neural Nets and Genetic Algorithms, 1995

PANIC: A Parallel Evolutionary Rule Based System.
Proceedings of the Fourth Annual Conference on Evolutionary Programming, 1995

1994
Q-Learning in Evolutionary Rule Based Systems.
Proceedings of the Parallel Problem Solving from Nature, 1994

1993
P<sup>3</sup>M: A Virtual Machine Approach to Massively Parallel Computing.
Proceedings of the 1993 International Conference on Parallel Processing, 1993

Nested Hybrid Genetic Algorithms for System Configuration and Program Mapping in Massively Parallel Systems.
Proceedings of the 5th International Conference on Genetic Algorithms, 1993

1992
A Data Driven Static Model for the Execution of Logic Programs on Dist. Memory Systems.
Proceedings of the Workshop on Concurrent and Parallel Implementations (sessions A and B), 1992

1991
An Architectural Model for OR-Parallelism on Distributed Memory Systems.
Proceedings of the Programming Language Implementation and Logic Programming, 1991

A tool for the static optimization of concurrent programs.
Proceedings of the Fifteenth Annual International Computer Software and Applications Conference, 1991

Pisa parallel processing project on general-purpose highly-parallel computers.
Proceedings of the Fifteenth Annual International Computer Software and Applications Conference, 1991

1989
Strategies for a Massively Parallel Implementation of Simulated Annealing.
Proceedings of the PARLE '89: Parallel Architectures and Languages Europe, 1989

Parallel Implementation of a Multi-Layer Perceptron.
Proceedings of the Neurocomputing - Algorithms, Architectures and Applications, Proceedings of the NATO Advanced Research Workshop on Neurocomputing Algorithms, Architectures and Applications, Les Arcs, France, February 27, 1989

1987
Distributed Implementation of Nested Communicating Sequential Processes: Communication and Termination.
J. Parallel Distributed Comput., 1987

1986
Development of a Debugger for a Concurrent Language.
IEEE Trans. Software Eng., 1986

An Approach to Fault-Tolerance in Massive Parallelism Systems.
Proceedings of the Fifth Symposium on Reliability in Distributed Software and Database Systems, 1986

Parallelism Issues in Multi-Style Computers.
Proceedings of the Future Parallel Computers, 1986

1984
Structure Process for a Cooperative Approach to Fault-Tolerant Distributed Software.
Proceedings of the Fourth Symposium on Reliability in Distributed Software and Database Systems, 1984

Static checking of interprocess communication in ECSP.
Proceedings of the 1984 SIGPLAN Symposium on Compiler Construction, 1984

1983
Development of a debugger for a concurrent language.
Proceedings of the symposium on High-level debugging, 1983


  Loading...