Marco Prandini
Orcid: 0000-0002-3962-5513Affiliations:
- University of Bologna, Italy
According to our database1,
Marco Prandini
authored at least 70 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Increasing the Security of Network Data Transmission with a Configurable Hardware Firewall Based on Field Programmable Gate Arrays.
Future Internet, September, 2024
Unleashing Dynamic Pipeline Reconfiguration of P4 Switches for Efficient Network Monitoring.
IEEE Trans. Netw. Serv. Manag., June, 2024
Ranflood: A mitigation tool based on the principles of data flooding against ransomware.
SoftwareX, February, 2024
Leveraging Data Plane Programmability to enhance service orchestration at the edge: A focus on industrial security.
Comput. Networks, 2024
Proceedings of the 10th IEEE International Conference on Network Softwarization, 2024
Proceedings of the Service-Oriented Computing - 22nd International Conference, 2024
Detection of Ladder Logic Bombs in PLC Control Programs: an Architecture based on Formal Verification.
Proceedings of the 7th IEEE International Conference on Industrial Cyber-Physical Systems, 2024
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024
2023
Time sensitive networking security: issues of precision time protocol and its implementation.
Cybersecur., December, 2023
P-IOTA: A Cloud-Based Geographically Distributed Threat Alert System That Leverages P4 and IOTA.
Sensors, March, 2023
When Operation Technology Meets Information Technology: Challenges and Opportunities.
Future Internet, March, 2023
GRAPH4: A Security Monitoring Architecture Based on Data Plane Anomaly Detection Metrics Calculated over Attack Graphs.
Future Internet, 2023
A high throughput Intrusion Detection System (IDS) to enhance the security of data transmission among research centers.
CoRR, 2023
A Systematic Literature Review of Offensive and Defensive Security Solutions With Software Defined Network.
IEEE Access, 2023
Real-time Pipeline Reconfiguration of P4 Programmable Switches to Efficiently Detect and Mitigate DDoS Attacks.
Proceedings of the 26th Conference on Innovation in Clouds, Internet and Networks, 2023
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023
2022
Proceedings of the International Symposium on Networks, Computers and Communications, 2022
2021
P-SCOR: Integration of Constraint Programming Orchestration and Programmable Data Plane.
IEEE Trans. Netw. Serv. Manag., 2021
Proceedings of the Joint European Conference on Networks and Communications & 6G Summit, 2021
2020
J. Cybersecur. Priv., December, 2020
Proceedings of the GoodTechs '20: 6th EAI International Conference on Smart Objects and Technologies for Social Good, 2020
TechNETium: Atomic Predicates and Model Driven Development to Verify Security Network Policies.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020
2019
Multim. Tools Appl., 2019
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
2018
Integrating Personalized and Accessible Itineraries in MaaS Ecosystems Through Microservices.
Mob. Networks Appl., 2018
Comput. Secur., 2018
Proceedings of the 28th International Telecommunication Networks and Applications Conference, 2018
Proceedings of the 2nd Cyber Security in Networking Conference, 2018
2017
Smart mobility for all: A global federated market for mobility-as-a-service operators.
Proceedings of the 20th IEEE International Conference on Intelligent Transportation Systems, 2017
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Discovering the City: Crowdsourcing and Personalized Urban Paths Across Cultural Heritage.
Proceedings of the Smart Objects and Technologies for Social Good, 2017
2016
Mob. Inf. Syst., 2016
Ann. des Télécommunications, 2016
Proceedings of the 2nd IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2016
Proceedings of the IEEE International Smart Cities Conference, 2016
Proceedings of the Internet Science - Third International Conference, 2016
Proceedings of the Smart Objects and Technologies for Social Good, 2016
A Microservice-Based Architecture for the Development of Accessible, Crowdsensing-Based Mobility Platforms.
Proceedings of the 2016 International Conference on Collaboration Technologies and Systems, 2016
2015
Privacy-Preserving Design of Data Processing Systems in the Public Transport Context.
Pac. Asia J. Assoc. Inf. Syst., 2015
2012
Raising Risk Awareness on the Adoption of Web 2.0 Technologies in Decision Making Processes.
Future Internet, 2012
A Browser-Based Distributed System for the Detection of HTTPS Stripping Attacks against Web Pages.
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, 2012
2011
Security considerations about the adoption of web 2.0 technologies in sensitive e-government processes.
Proceedings of the ICEGOV 2011, 2011
Taking the Best of Both Worlds: A Comparison and Integration of the U.S. and EU Approaches to E-Voting Systems Evaluation.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011
2010
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010
Risk Analysis and Deployment Security Issues in a Multi-agent System.
Proceedings of the ICAART 2010 - Proceedings of the International Conference on Agents and Artificial Intelligence, Volume 2, 2010
Proceedings of the Electronic Participation, Second IFIP WG 8.5 International Conference, 2010
2009
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
2008
Redesigning remote system administration paradigms for enhanced security and flexibility.
Comput. Stand. Interfaces, 2008
Adaptive Filtering of Comment Spam in Multi-user Forums and Blogs.
Proceedings of the Security in Information Systems, 2008
2007
RoboAdmin: A Different Approach to Remote System Administration.
Proceedings of the Security in Information Systems, 2007
Confining the Insider Threat in Mass Virtual Hosting Systems.
Proceedings of the Security in Information Systems, 2007
2006
Securing a Linux-based multi-user web server.
Proceedings of the Third IASTED International Conference on Communication, 2006
2004
A flexible approach to configuration of linux-based firewalls.
Proceedings of the IASTED International Conference on Communications, Internet, and Information Technology, November 22, 2004
Efficient authentication and verification of certificate status within public-key infrastructures.
Proceedings of the IASTED International Conference on Communications, Internet, and Information Technology, November 22, 2004
2003
An Application of Efficient Certificate Status Handling Methods to High Traffic Authentication Services.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
2002
A flexible scheme for on-line public-key certificate status updating and verification.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002
2000
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
1999
A General Methodology for Robotic Haptic Recognition of 3-D Objects.
Proceedings of the 1st International Conference on Enterprise Information Systems, 1999
Efficient Certificate Status Handling Within PKIs: An Application to Public Administration Services.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999