Leonardo Aniello
Orcid: 0000-0003-2886-8445
According to our database1,
Leonardo Aniello
authored at least 49 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the Rigorous State-Based Methods - 10th International Conference, 2024
MANET-Rank: A Framework for Defence Protocols against Packet Dropping Attacks in MANETs.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024
Proceedings of the Sixth Distributed Ledger Technology Workshop (DLT 2024), 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Software supply chain: review of attacks, risk assessment strategies and security controls.
CoRR, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
2022
A lightweight approach to the concurrent use and integration of SysML and formal methods in systems design.
Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings, 2022
Evaluating Blockchain Systems: A Comprehensive Study of Security and Dependability Attributes.
Proceedings of the 4th Workshop on Distributed Ledger Technology co-located with the Italian Conference on Cybersecurity 2022 (ITASEC 2022), 2022
2021
J. Hardw. Syst. Secur., 2021
MalFamAware: automatic family identification and malware classification through online clustering.
Int. J. Inf. Sec., 2021
Anti-BlUFf: towards counterfeit mitigation in IC supply chains using blockchain and PUF.
Int. J. Inf. Sec., 2021
Proceedings of the Rigorous State-Based Methods - 8th International Conference, 2021
2020
Cloud2Edge Elastic AI Framework for Prototyping and Deployment of AI Inference Engines in Autonomous Vehicles.
Sensors, 2020
J. Commun., 2020
2019
Future Gener. Comput. Syst., 2019
Towards a Supply Chain Management System for Counterfeit Mitigation using Blockchain and PUF.
CoRR, 2019
A Methodology to Select Topology Generators for WANET Simulations (Extended Version).
CoRR, 2019
2018
IEEE Trans. Parallel Distributed Syst., 2018
Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to, 2018
2017
The goods, the bads and the uglies: Supporting decisions in malware detection through visual analytics.
Proceedings of the 14th IEEE Symposium on Visualization for Cyber Security, 2017
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017
Proceedings of the International Carnahan Conference on Security Technology, 2017
A Prototype Evaluation of a Tamper-Resistant High Performance Blockchain-Based Transaction Log for a Distributed Database.
Proceedings of the 13th European Dependable Computing Conference, 2017
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017
<i>Share a pie?</i>: Privacy-Preserving Knowledge Base Export through Count-min Sketches.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
2016
PhD thesis, 2016
A Blockchain-Based Solution for Enabling Log-Based Resolution of Disputes in Multi-party Transactions.
Proceedings of 5th International Conference in Software Engineering for Defence Applications, 2016
Proceedings of the Computer Safety, Reliability, and Security, 2016
Towards the Usage of Invariant-Based App Behavioral Fingerprinting for the Detection of Obfuscated Versions of Known Malware.
Proceedings of the 10th International Conference on Next Generation Mobile Applications, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016
2015
Future Gener. Comput. Syst., 2015
NIRVANA: A Non-intrusive Black-Box Monitoring Framework for Rack-Level Fault Detection.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015
2014
Inf. Syst., 2014
Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities.
CoRR, 2014
Proceedings of the Networked Systems - Second International Conference, 2014
Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, 2014
The overlay scan attack: inferring topologies of distributed pub/sub systems through broker saturation.
Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, 2014
2013
Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing, 2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Proceedings of the 7th ACM International Conference on Distributed Event-Based Systems, 2013
2012
Collaborative Inter-domain Stealthy Port Scan Detection Using Esper Complex Event Processing.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012
Proceedings of the Collaborative Financial Infrastructure Protection, 2012
Proceedings of the Collaborative Financial Infrastructure Protection, 2012
2011
A Collaborative Event Processing System for Protection of Critical Infrastructures from Cyber Attacks.
Proceedings of the Computer Safety, Reliability, and Security, 2011
Proceedings of the 13th European Workshop on Dependable Computing, 2011