Massimiliano Albanese

Orcid: 0000-0002-2675-5810

Affiliations:
  • George Mason University, Fairfax VA, USA


According to our database1, Massimiliano Albanese authored at least 101 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Resilience and performance quantification of dynamic reconfiguration.
Future Gener. Comput. Syst., 2024

Design and modeling of moving target defense in workflow-based applications.
Clust. Comput., 2024

Improving the Efficiency of Intrusion Detection Systems by Optimizing Rule Deployment Across Multiple IDSs.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

Classifying Human-Generated and AI-Generated Election Claims in Social Media.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

DISC: A Dataset for Information Security Classification.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

CVE2CWE: Automated Mapping of Software Vulnerabilities to Weaknesses Based on CVE Descriptions.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

2023
A framework for designing vulnerability metrics.
Comput. Secur., September, 2023

Biometric multi-factor authentication: On the usability of the FingerPIN scheme.
Secur. Priv., 2023

An attack volume metric.
Secur. Priv., 2023

Towards Usable Scoring of Common Weaknesses.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

2022
Mason Vulnerability Scoring Framework: A Customizable Framework for Scoring Common Vulnerabilities and Weaknesses.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

A Formal Model for Credential Hopping Attacks.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Performance Modeling of Moving Target Defenses with Reconfiguration Limits.
IEEE Trans. Dependable Secur. Comput., 2021

Vulnerability Metrics for Graph-based Configuration Security.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

2020
Security and trust in cloud application life-cycle management.
Future Gener. Comput. Syst., 2020

FingerPIN: An Authentication Mechanism Integrating Fingerprints and Personal Identification Numbers.
Proceedings of the Computer Vision and Image Processing - 5th International Conference, 2020

SCIBORG: Secure Configurations for the IoT Based on optimization and Reasoning on Graphs.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Online and Scalable Adaptive Cyber Defense.
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019

Adaptive Cyber Defenses for Botnet Detection and Mitigation.
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019

Moving Target Defense Quantification.
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019

2018
DeBot: A novel network-based mechanism to detect exfiltration by architectural stealthy botnets.
Secur. Priv., 2018

Defending from Stealthy Botnets Using Moving Target Defenses.
IEEE Secur. Priv., 2018

On Defensive Cyber Deception: A Case Study Using SDN.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Measuring the Effectiveness of Network Deception.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

A Quantitative Framework to Model Advanced Persistent Threats.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

MTD 2018: 5th ACM Workshop on Moving Target Defense (MTD).
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field.
Proceedings of the From Database to Cyber Security, 2018

2017
An Integrated Framework for Cyber Situation Awareness.
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017

Computer-Aided Human Centric Cyber Situation Awareness.
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017

A Framework for Moving Target Defense Quantification.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017

Performance Modeling of Moving Target Defenses.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017

2016
Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks.
IEEE Trans. Inf. Forensics Secur., 2016

Dependable and Resilient Cloud Computing.
Proceedings of the 2016 IEEE Symposium on Service-Oriented System Engineering, 2016

A moving target defense approach to mitigate DDoS attacks against proxy-based architectures.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

A quantitative risk assessment framework for adaptive Intrusion Detection in the cloud.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Moving Target Defense against DDoS Attacks: An Empirical Game-Theoretic Analysis.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

A Moving Target Defense Approach to Disrupting Stealthy Botnets.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

Deceiving Attackers by Creating a Virtual Attack Surface.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016

2015
Disrupting stealthy botnets through strategic placement of detectors.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

A deception based approach for defeating OS and service fingerprinting.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Security and Privacy Issues in Social Networks.
Proceedings of the Data Management in Pervasive Systems, 2015

2014
Network Hardening - An Automated Approach to Improving Network Security
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-04612-9, 2014

Formation of Awareness.
Proceedings of the Cyber Defense and Situational Awareness, 2014

Recognizing Unexplained Behavior in Network Traffic.
Proceedings of the Network Science and Cybersecurity, 2014

Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance.
Proceedings of the Cybersecurity Systems for Human Cognition Augmentation, 2014

Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data.
IEEE Trans. Knowl. Data Eng., 2014

A probabilistic framework for jammer identification in MANETs.
Ad Hoc Networks, 2014

Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions.
Proceedings of the SECRYPT 2014, 2014

Next-generation technologies for preventing accidental death of children trapped in parked vehicles.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Keeping Intruders at Bay: A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks.
Proceedings of the Computer Security - ESORICS 2014, 2014

Manipulating the attacker's view of a system's attack surface.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Securing Mission-Centric Operations in the Cloud.
Proceedings of the Secure Cloud Computing, 2014

2013
A Multimedia Recommender System.
ACM Trans. Internet Techn., 2013

Fast Activity Detection: Indexing for Temporal Stochastic Automaton-Based Activity Models.
IEEE Trans. Knowl. Data Eng., 2013

Security-Aware Scheduling of Mission Tasks under Temporal Constraints.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

A Logic Framework for Flexible and Security-Aware Service Composition.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

A Probabilistic Framework for Distributed Localization of Attackers in MANETs.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013

An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities.
Proceedings of the SECRYPT 2013, 2013

A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices.
Proceedings of the Integration of Reusable Systems [extended versions of the best papers which were presented at IEEE International Conference on Information Reuse and Integration and IEEE International Workshop on Formal Methods Integration, 2013

A moving target defense approach for protecting resource-constrained distributed devices.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013

An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013

Measuring Trust in Big Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2013

Reliable mission deployment in vulnerable distributed systems.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

A moving target defense mechanism for MANETs based on identity virtualization.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
A Probabilistic Framework for Localization of Attackers in MANETs.
Proceedings of the Computer Security - ESORICS 2012, 2012

Time-efficient and cost-effective network hardening using attack graphs.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

2011
A Novel Strategy for Recommending Multimedia Objects and its Application in the Cultural Heritage Domain.
Int. J. Multim. Data Eng. Manag., 2011

A Multimedia Semantic Recommender System for Cultural Heritage Applications.
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011

Cauldron mission-centric cyber situational awareness with defense in depth.
Proceedings of the MILCOM 2011, 2011

Finding "Unexplained" Activities in Video.
Proceedings of the IJCAI 2011, 2011

Scalable Analysis of Attack Scenarios.
Proceedings of the Computer Security - ESORICS 2011, 2011

Scalable Detection of Cyber Attacks.
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011

PLINI: A Probabilistic Logic Program Framework for Inconsistent News Information.
Proceedings of the Logic Programming, Knowledge Representation, and Nonmonotonic Reasoning, 2011

2010
Semantic Video Content Analysis.
Proceedings of the Video Search and Mining, 2010

PADS: A Probabilistic Activity Detection Framework for Video Data.
IEEE Trans. Pattern Anal. Mach. Intell., 2010

A multimedia recommender integrating object features and user behavior.
Multim. Tools Appl., 2010

Modeling recommendation as a social choice problem.
Proceedings of the 2010 ACM Conference on Recommender Systems, 2010

A ranking method for multimedia recommenders.
Proceedings of the 9th ACM International Conference on Image and Video Retrieval, 2010

Capturing user behavior in multimedia recommenders.
Proceedings of the 2010 International Workshop on Content-Based Multimedia Indexing, 2010

2008
Video Summarization.
Proceedings of the Encyclopedia of Multimedia, 2nd Ed., 2008

A Constrained Probabilistic Petri Net Framework for Human Activity Detection in Video.
IEEE Trans. Multim., 2008

2007
Story creation from heterogeneous data sources.
Multim. Tools Appl., 2007

CARA: A Cultural-Reasoning Architecture.
IEEE Intell. Syst., 2007

MAGIC: A Multi-Activity Graph Index for Activity Detection.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2007

Detecting Stochastically Scheduled Activities in Video.
Proceedings of the IJCAI 2007, 2007

2006
Video Summarization.
Proceedings of the Encyclopedia of Multimedia, 2006

Extracting and summarizing information from large data repositories.
PhD thesis, 2006

The priority curve algorithm for video summarization.
Inf. Syst., 2006

Experience of Animate Similarity Concepts in Multimedia Database.
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006

A Model for User Profiling in an ASP Environment.
Proceedings of the 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 2006

2005
Information Retrieval from the Web: An Interactive Paradigm.
Proceedings of the Advances in Multimedia Information Systems, 11th International Workshop, 2005

Towards a Multimedia Ontology System: an Approach Using TAO_XML.
Proceedings of the 11th International Conference on Distributed Multimedia Systems, 2005

2004
A Formal Model for Video Shot Segmentation and its Application via Animate Vision.
Multim. Tools Appl., 2004

A web personalization system based on web usage mining techniques.
Proceedings of the 13th international conference on World Wide Web, 2004

Web personalization based on static information and dynamic user behavior.
Proceedings of the Sixth ACM CIKM International Workshop on Web Information and Data Management (WIDM 2004), 2004

A Multimedia Data Base Browsing System.
Proceedings of the First International Workshop on Computer Vision meets Databases, 2004

2003
Dissolve Detection in a Video Sequence Based on Active Vision.
Proceedings of the MIS 2003, 9th International Workshop on Multimedia Information Systems, 2003

2002
Image Similarity Based on Animate Vision: Information Path Matching.
Proceedings of the MIS 2002, International Workshop on Multimedia Information Systems, October 10, 2002


  Loading...