Massimo Ficco
Orcid: 0000-0003-4199-8199
According to our database1,
Massimo Ficco
authored at least 116 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
On csauthors.net:
Bibliography
2024
Inf. Fusion, April, 2024
When explainability turns into a threat - using xAI to fool a fake news detection method.
Comput. Secur., February, 2024
Testing the Resilience of MEC-Based IoT Applications Against Resource Exhaustion Attacks.
IEEE Trans. Dependable Secur. Comput., 2024
A systematic approach for threat and vulnerability analysis of unmanned aerial vehicles.
Internet Things, 2024
A User-Centered Privacy Policy Management System for Automatic Consent on Cookie Banners.
Comput., 2024
Proceedings of the Computational Science and Its Applications - ICCSA 2024 Workshops, 2024
Monitoring Power Usage Effectiveness to Detect Cooling Systems Attacks and Failures in Cloud Data Centers.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024
Proceedings of the Advanced Information Networking and Applications, 2024
2023
Privacy-preserving malware detection in Android-based IoT devices through federated Markov chains.
Future Gener. Comput. Syst., November, 2023
Nature-Inspired Decision Support System for Securing Clusters of Wireless Sensor Networks in Advanced IoT Environments.
Wirel. Pers. Commun., 2023
IEEE Trans. Inf. Forensics Secur., 2023
Mitigating User Exposure to Dark Patterns in Cookie Banners Through Automated Consent.
Proceedings of the Computational Science and Its Applications - ICCSA 2023 Workshops, 2023
Proceedings of the Computational Science and Its Applications - ICCSA 2023 Workshops, 2023
Proceedings of the 24th International Conference on Control Systems and Computer Science, 2023
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023
2022
IEEE Trans. Computers, 2022
Federated and Generative Data Sharing for Data-Driven Security: Challenges and Approach.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022
Proceedings of the IEEE Intl. Conf. on Dependable, 2022
2021
Inf. Process. Manag., 2021
Association rule-based malware classification using common subsequences of API calls.
Appl. Soft Comput., 2021
Proceedings of the Quality of Information and Communications Technology, 2021
Proceedings of the Intelligent Distributed Computing XIV, 2021
Intelligent Cloud Agents in Multi-participant Conversations for Cyber-Physical Exploitation of Cultural Heritage.
Proceedings of the Advanced Information Networking and Applications, 2021
2020
Distributed Group Key Management for Event Notification Confidentiality Among Sensors.
IEEE Trans. Dependable Secur. Comput., 2020
J. Parallel Distributed Comput., 2020
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020
2019
Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios.
J. Syst. Archit., 2019
Could emerging fraudulent energy consumption attacks make the cloud infrastructure costs unsustainable?
Inf. Sci., 2019
Internet-of-Things and fog-computing as enablers of new security and privacy threats.
Internet Things, 2019
Proceedings of the IEEE International Conference on Cloud Engineering, 2019
2018
A scalable distributed machine learning approach for attack detection in edge computing environments.
J. Parallel Distributed Comput., 2018
J. Parallel Distributed Comput., 2018
Loss-Tolerant Event Communications Within Industrial Internet of Things by Leveraging on Game Theoretic Intelligence.
IEEE Internet Things J., 2018
Internet Things, 2018
Int. J. High Perform. Comput. Netw., 2018
Future Gener. Comput. Syst., 2018
A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation.
Future Gener. Comput. Syst., 2018
2017
Introducing Fraudulent Energy Consumption in Cloud Infrastructures: A New Generation of Denial-of-Service Attacks.
IEEE Syst. J., 2017
Simulation platform for cyber-security and vulnerability analysis of critical infrastructures.
J. Comput. Sci., 2017
Optimized task allocation on private cloud for hybrid simulation of large-scale critical systems.
Future Gener. Comput. Syst., 2017
Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design.
Future Gener. Comput. Syst., 2017
Improving the gossiping effectiveness with distributed strategic learning (Invited paper).
Future Gener. Comput. Syst., 2017
IEEE Commun. Mag., 2017
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017
2016
Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory.
IEEE Trans. Computers, 2016
Using multi-objective metaheuristics for the optimal selection of positioning systems.
Soft Comput., 2016
Recent Developments on Security and Reliability in Large-Scale Data Processing with MapReduce.
Int. J. Data Warehous. Min., 2016
J. Ambient Intell. Humaniz. Comput., 2016
Concurr. Comput. Pract. Exp., 2016
A cloud-based architecture for emergency management and first responders localization in smart city environments.
Comput. Electr. Eng., 2016
CIPRNet Training Lecture: Hybrid Simulation of Distributed Large-Scale Critical Infrastructures.
Proceedings of the Image Processing and Communications Challenges 8, 2016
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016
2015
Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures.
J. Supercomput., 2015
IEEE Trans. Cloud Comput., 2015
A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing.
Knowl. Based Syst., 2015
Int. J. High Perform. Comput. Netw., 2015
Concurr. Comput. Pract. Exp., 2015
Appl. Soft Comput., 2015
Proceedings of the Computational Intelligence and Intelligent Systems, 2015
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
A Semantic Driven Approach for Consistency Verification Between Requirements and FMEA.
Proceedings of the Intelligent Distributed Computing IX - Proceedings of the 9th International Symposium on Intelligent Distributed Computing, 2015
Proceedings of the Intelligent Distributed Computing IX - Proceedings of the 9th International Symposium on Intelligent Distributed Computing, 2015
Proceedings of the 10th International Conference on P2P, 2015
2014
IEEE Trans. Mob. Comput., 2014
Pers. Ubiquitous Comput., 2014
J. Ambient Intell. Humaniz. Comput., 2014
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Proceedings of the Intelligent Distributed Computing VIII, 2014
Supporting Development of Certified Aeronautical Components by Applying Text Analysis Techniques.
Proceedings of the Eighth International Conference on Complex, 2014
Proceedings of the 2014 Ninth International Conference on P2P, 2014
2013
Int. J. High Perform. Comput. Netw., 2013
An Advanced Intrusion Detection Framework for Cloud Computing.
Comput. Syst. Sci. Eng., 2013
Clust. Comput., 2013
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
Proceedings of the 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2013
Proceedings of the Intelligent Distributed Computing VII, 2013
Proceedings of the Eighth International Conference on P2P, 2013
2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2012, 2012
Simulation and Support of Critical Activities by Mobile Agents in Pervasive and Ubiquitous Scenarios.
Proceedings of the 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, 2012
Intrusion Tolerance as a Service - A SLA-based Solution.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012
Proceedings of the Cloud Computing and Services Science - Second International Conference, 2012
Proceedings of the Sixth International Conference on Complex, 2012
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012
2011
A simulation model for localization of pervasive objects using heterogeneous wireless networks.
Simul. Model. Pract. Theory, 2011
Int. J. Wirel. Inf. Networks, 2011
Proceedings of the 13th European Workshop on Dependable Computing, 2011
Proceedings of the First International Conference on Data Compression, 2011
A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing.
Proceedings of the First International Conference on Data Compression, 2011
2010
Netw. Protoc. Algorithms, 2010
Commun. ACM, 2010
Proceedings of the Mobile Lightweight Wireless Systems, 2010
2009
Softw. Pract. Exp., 2009
Proceedings of the 5th IEEE International Conference on Wireless and Mobile Computing, 2009
Proceedings of the Fourth Latin-American Symposium on Dependable Computing, 2009
2007
A bluetooth infrastructure for automatic services access in ubiquitous and nomadic computing environments.
Proceedings of the Fifth ACM International Workshop on Mobility Management & Wireless Access, 2007
2006
An architecture for providing Java applications with indoor and outdoor hybrid location sensing.
Proceedings of the Fourth IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems and the Second International Workshop on Collaborative Computing, 2006
2005
Proceedings of the Third IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2005
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005
2004
Proceedings of the 2nd IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2004
Proceedings of the Applied Parallel Computing, 2004
Proceedings of the On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, 2004
2002
Service Differentiation of Communication-bound Processes in a Real-Time Operating System.
Proceedings of the 7th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2002), 2002
2001
Proceedings of the Interactive Distributed Multimedia Systems, 2001
2000
Proceedings of the IEEE International Conference on Networks 2000: Networking Trends and Challenges in the New Millennium, 2000