Luca Caviglione
Orcid: 0000-0001-6466-3354Affiliations:
- National Research Council, Italy
According to our database1,
Luca Caviglione
authored at least 127 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2006
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
5
10
15
20
4
4
9
9
4
3
5
6
2
6
3
1
1
2
1
3
2
2
2
2
7
5
6
8
5
2
1
1
2
1
6
1
5
2
3
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
You Can't Do That on Protocols Anymore: Analysis of Covert Channels in IETF Standards.
IEEE Netw., September, 2024
Learning autoencoder ensembles for detecting malware hidden communications in IoT ecosystems.
J. Intell. Inf. Syst., August, 2024
CoRR, 2024
Proceedings of the 32nd International Conference on Modeling, 2024
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024
Dawn of LLM4Cyber: Current Solutions, Challenges, and New Perspectives in Harnessing LLMs for Cybersecurity.
Proceedings of the Ital-IA Intelligenza Artificiale, 2024
Erasing the Shadow: Sanitization of Images with Malicious Payloads Using Deep Autoencoders.
Proceedings of the Foundations of Intelligent Systems - 27th International Symposium, 2024
A Few to Unveil Them All: Leveraging Mixture of Experts on Minimal Data for Detecting Covert Channels in Containerized Cloud Infrastructures.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
No Country for Leaking Containers: Detecting Exfiltration of Secrets Through AI and Syscalls.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
SoftwareX, December, 2023
A federated approach for detecting data hidden in icons of mobile applications delivered via web and multiple stores.
Soc. Netw. Anal. Min., December, 2023
IEEE Commun. Mag., October, 2023
ORISHA: Improving Threat Detection through Orchestrated Information Sharing (Discussion Paper).
Proceedings of the 31st Symposium of Advanced Database Systems, 2023
Proceedings of the 2023 International Conference on Research in Adaptive and Convergent Systems, 2023
Information Leakages of Docker Containers: Characterization and Mitigation Strategies.
Proceedings of the 9th IEEE International Conference on Network Softwarization, 2023
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023
Using AI to face covert attacks in IoT and softwarized scenarios: challenges and opportunities.
Proceedings of the Italia Intelligenza Artificiale, 2023
2022
IEEE Trans. Netw. Serv. Manag., 2022
IPv6CC: IPv6 covert channels for testing networks against stegomalware and data exfiltration.
SoftwareX, 2022
Detection of Steganographic Threats Targeting Digital Images in Heterogeneous Ecosystems Through Machine Learning.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
it Inf. Technol., 2022
Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection.
Entropy, 2022
Federated Learning for the Efficient Detection of Steganographic Threats Hidden in Image Icons.
Proceedings of the Pervasive Knowledge and Collective Intelligence on Web and Social Media, 2022
Proceedings of the Italian Conference on Cybersecurity (ITASEC 2022), 2022
Ensembling Sparse Autoencoders for Network Covert Channel Detection in IoT Ecosystems.
Proceedings of the Foundations of Intelligent Systems - 26th International Symposium, 2022
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
Detection of Malicious Images in Production-Quality Scenarios with the SIMARGL Toolkit.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
IEEE Trans. Ind. Informatics, 2021
Correction to: Deep reinforcement learning for multi-objective placement of virtual machines in cloud datacenters.
Soft Comput., 2021
Deep reinforcement learning for multi-objective placement of virtual machines in cloud datacenters.
Soft Comput., 2021
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
J. Internet Serv. Inf. Secur., 2021
Kernel-level tracing for detecting stegomalware and covert channels in Linux environments.
Comput. Networks, 2021
IEEE Access, 2021
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021
Proceedings of the Italian Conference on Cybersecurity, 2021
Proceedings of the Italian Conference on Cybersecurity, 2021
pcapStego: A Tool for Generating Traffic Traces for Experimenting with Network Covert Channels.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Scientometrics, 2020
Information Security Methodology, Replication Studies and Information Security Education.
J. Univers. Comput. Sci., 2020
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020
Future Gener. Comput. Syst., 2020
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020
Are you (Google) Home? Detecting Users' Presence through Traffic Analysis of Smart Speakers.
Proceedings of the Fourth Italian Conference on Cyber Security, 2020
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
Model Predictive Control for Energy-Efficient, Quality-Aware, and Secure Virtual Machine Placement.
IEEE Trans Autom. Sci. Eng., 2019
IEEE Access, 2019
Proceedings of the Third Central European Cybersecurity Conference, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Secur. Commun. Networks, 2018
Int. J. Distributed Sens. Networks, 2018
IEEE Commun. Lett., 2018
Comput. Secur., 2018
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018
2017
IEEE Trans. Ind. Informatics, 2017
Int. J. Satell. Commun. Netw., 2017
IEEE Secur. Priv., 2017
Detecting local covert channels using process activity correlation on Android smartphones.
Comput. Syst. Sci. Eng., 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence.
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Control. Syst. Technol., 2016
Proceedings of the 2016 American Control Conference, 2016
Model predictive control for the placement of virtual machines in cloud computing applications.
Proceedings of the 2016 American Control Conference, 2016
2015
A deep analysis on future web technologies and protocols over broadband GEO satellite networks.
Int. J. Satell. Commun. Netw., 2015
IEEE Commun. Surv. Tutorials, 2015
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
2014
EAI Endorsed Trans. Mob. Commun. Appl., 2014
Int. J. Comput. Sci. Eng., 2014
A Task Allocation Middleware for Wireless Sensor Networks in a Multi-Agent Environment.
Proceedings of the SENSORNETS 2014 - Proceedings of the 3rd International Conference on Sensor Networks, Lisbon, Portugal, 7, 2014
Performance Evaluation of HTTP and SPDY Over a DVB-RCS Satellite Link with Different BoD Schemes.
Proceedings of the Personal Satellite Services. Next-Generation Satellite Networking and Communication Systems, 2014
Satellites, UAVs, Vehicles and Sensors for an Integrated Delay Tolerant Ad Hoc Network.
Proceedings of the Personal Satellite Services. Next-Generation Satellite Networking and Communication Systems, 2014
Proceedings of the ISSE 2014, 2014
A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
A predictive control approach for energy-aware consolidation of virtual machines in cloud computing.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014
2013
Int. J. Comput. Sci. Eng., 2013
Proceedings of the Personal Satellite Services - 5th International ICST Conference, 2013
2012
Netw. Secur., 2012
2011
J. Intell. Transp. Syst., 2011
Design, optimization and performance evaluation of a content distribution overlay for streaming.
Comput. Commun., 2011
Proceedings of the IEEE 4th International Conference on Utility and Cloud Computing, 2011
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011
Proceedings of the 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
2010
A simple neural framework for bandwidth reservation of VoIP communications in cost-effective devices.
IEEE Trans. Consumer Electron., 2010
2009
IEEE Wirel. Commun., 2009
IEEE Trans. Consumer Electron., 2009
Eur. J. Oper. Res., 2009
2008
2007
Fusion of digital television, broadband Internet and mobile communications - Part II: Future service scenarios.
Int. J. Satell. Commun. Netw., 2007
Comput. Commun., 2007
2006
Int. J. Commun. Syst., 2006
IEEE Commun. Lett., 2006
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006
2005
IEEE Commun. Lett., 2005
Proceedings of the 2nd IEEE International Symposium on Wireless Communication Systems, 2005
P2P in satellite networks: a tutorial on related problems and some possible solutions.
Proceedings of the 2nd IEEE International Symposium on Wireless Communication Systems, 2005
Proceedings of the Second International Workshop on Hot Topics in Peer-to-Peer Systems, 2005