Massimiliano Albanese
Orcid: 0000-0002-2675-5810Affiliations:
- George Mason University, Fairfax VA, USA
According to our database1,
Massimiliano Albanese
authored at least 101 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Future Gener. Comput. Syst., 2024
Clust. Comput., 2024
Improving the Efficiency of Intrusion Detection Systems by Optimizing Rule Deployment Across Multiple IDSs.
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
CVE2CWE: Automated Mapping of Software Vulnerabilities to Weaknesses Based on CVE Descriptions.
Proceedings of the 21st International Conference on Security and Cryptography, 2024
2023
Secur. Priv., 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
2022
Mason Vulnerability Scoring Framework: A Customizable Framework for Scoring Common Vulnerabilities and Weaknesses.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
2020
Future Gener. Comput. Syst., 2020
FingerPIN: An Authentication Mechanism Integrating Fingerprints and Personal Identification Numbers.
Proceedings of the Computer Vision and Image Processing - 5th International Conference, 2020
SCIBORG: Secure Configurations for the IoT Based on optimization and Reasoning on Graphs.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
2019
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019
2018
DeBot: A novel network-based mechanism to detect exfiltration by architectural stealthy botnets.
Secur. Priv., 2018
IEEE Secur. Priv., 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field.
Proceedings of the From Database to Cyber Security, 2018
2017
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017
Proceedings of the 2017 Workshop on Moving Target Defense, 2017
2016
Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks.
IEEE Trans. Inf. Forensics Secur., 2016
Proceedings of the 2016 IEEE Symposium on Service-Oriented System Engineering, 2016
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
A quantitative risk assessment framework for adaptive Intrusion Detection in the cloud.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016
2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the Data Management in Pervasive Systems, 2015
2014
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-04612-9, 2014
Proceedings of the Cyber Defense and Situational Awareness, 2014
Proceedings of the Network Science and Cybersecurity, 2014
Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance.
Proceedings of the Cybersecurity Systems for Human Cognition Augmentation, 2014
IEEE Trans. Knowl. Data Eng., 2014
Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions.
Proceedings of the SECRYPT 2014, 2014
Next-generation technologies for preventing accidental death of children trapped in parked vehicles.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014
Keeping Intruders at Bay: A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014
Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks.
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the Secure Cloud Computing, 2014
2013
Fast Activity Detection: Indexing for Temporal Stochastic Automaton-Based Activity Models.
IEEE Trans. Knowl. Data Eng., 2013
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
Proceedings of the Security and Trust Management - 9th International Workshop, 2013
Proceedings of the SECRYPT 2013, 2013
A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices.
Proceedings of the Integration of Reusable Systems [extended versions of the best papers which were presented at IEEE International Conference on Information Reuse and Integration and IEEE International Workshop on Formal Methods Integration, 2013
A moving target defense approach for protecting resource-constrained distributed devices.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013
Proceedings of the Algorithms and Architectures for Parallel Processing, 2013
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012
2011
A Novel Strategy for Recommending Multimedia Objects and its Application in the Cultural Heritage Domain.
Int. J. Multim. Data Eng. Manag., 2011
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011
Proceedings of the MILCOM 2011, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011
Proceedings of the Logic Programming, Knowledge Representation, and Nonmonotonic Reasoning, 2011
2010
IEEE Trans. Pattern Anal. Mach. Intell., 2010
Multim. Tools Appl., 2010
Proceedings of the 2010 ACM Conference on Recommender Systems, 2010
Proceedings of the 9th ACM International Conference on Image and Video Retrieval, 2010
Proceedings of the 2010 International Workshop on Content-Based Multimedia Indexing, 2010
2008
A Constrained Probabilistic Petri Net Framework for Human Activity Detection in Video.
IEEE Trans. Multim., 2008
2007
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2007
Proceedings of the IJCAI 2007, 2007
2006
PhD thesis, 2006
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006
Proceedings of the 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 2006
2005
Proceedings of the Advances in Multimedia Information Systems, 11th International Workshop, 2005
Towards a Multimedia Ontology System: an Approach Using TAO_XML.
Proceedings of the 11th International Conference on Distributed Multimedia Systems, 2005
2004
Multim. Tools Appl., 2004
Proceedings of the 13th international conference on World Wide Web, 2004
Proceedings of the Sixth ACM CIKM International Workshop on Web Information and Data Management (WIDM 2004), 2004
Proceedings of the First International Workshop on Computer Vision meets Databases, 2004
2003
Dissolve Detection in a Video Sequence Based on Active Vision.
Proceedings of the MIS 2003, 9th International Workshop on Multimedia Information Systems, 2003
2002
Image Similarity Based on Animate Vision: Information Path Matching.
Proceedings of the MIS 2002, International Workshop on Multimedia Information Systems, October 10, 2002