Massimo Ficco

Orcid: 0000-0003-4199-8199

According to our database1, Massimo Ficco authored at least 116 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Federated learning for IoT devices: Enhancing TinyML with on-board training.
Inf. Fusion, April, 2024

When explainability turns into a threat - using xAI to fool a fake news detection method.
Comput. Secur., February, 2024

Testing the Resilience of MEC-Based IoT Applications Against Resource Exhaustion Attacks.
IEEE Trans. Dependable Secur. Comput., 2024

A systematic approach for threat and vulnerability analysis of unmanned aerial vehicles.
Internet Things, 2024

A User-Centered Privacy Policy Management System for Automatic Consent on Cookie Banners.
Comput., 2024

TinyIDS - An IoT Intrusion Detection System by Tiny Machine Learning.
Proceedings of the Computational Science and Its Applications - ICCSA 2024 Workshops, 2024

Monitoring Power Usage Effectiveness to Detect Cooling Systems Attacks and Failures in Cloud Data Centers.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024

XSS-Unearth: A Tool for Forensics Analysis of XSS Attacks.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Privacy-preserving malware detection in Android-based IoT devices through federated Markov chains.
Future Gener. Comput. Syst., November, 2023

Nature-Inspired Decision Support System for Securing Clusters of Wireless Sensor Networks in Advanced IoT Environments.
Wirel. Pers. Commun., 2023

Survivability Analysis of IoT Systems Under Resource Exhausting Attacks.
IEEE Trans. Inf. Forensics Secur., 2023

Mitigating User Exposure to Dark Patterns in Cookie Banners Through Automated Consent.
Proceedings of the Computational Science and Its Applications - ICCSA 2023 Workshops, 2023

An Association Rules-Based Approach for Anomaly Detection on CAN-bus.
Proceedings of the Computational Science and Its Applications - ICCSA 2023 Workshops, 2023

Privacy risk analysis and metrics in capturing and storing network traffic.
Proceedings of the 24th International Conference on Control Systems and Computer Science, 2023

Semi-Automatic PenTest Methodology based on Threat-Model: The IoT Brick Case Study.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023

2022
Malware Analysis by Combining Multiple Detectors and Observation Windows.
IEEE Trans. Computers, 2022

Federated and Generative Data Sharing for Data-Driven Security: Challenges and Approach.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

MAVLink Protocol for Unmanned Aerial Vehicle: Vulnerabilities Analysis.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

2021
Blockchain-based authentication and authorization for smart city applications.
Inf. Process. Manag., 2021

Association rule-based malware classification using common subsequences of API calls.
Appl. Soft Comput., 2021

Threat Modeling of Edge-Based IoT Applications.
Proceedings of the Quality of Information and Communications Technology, 2021

Intelligent Agents for Diffused Cyber-Physical Museums.
Proceedings of the Intelligent Distributed Computing XIV, 2021

Intelligent Cloud Agents in Multi-participant Conversations for Cyber-Physical Exploitation of Cultural Heritage.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Distributed Group Key Management for Event Notification Confidentiality Among Sensors.
IEEE Trans. Dependable Secur. Comput., 2020

Malware detection in mobile environments based on Autoencoders and API-images.
J. Parallel Distributed Comput., 2020

Comparing API Call Sequence Algorithms for Malware Detection.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

2019
Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios.
J. Syst. Archit., 2019

Could emerging fraudulent energy consumption attacks make the cloud infrastructure costs unsustainable?
Inf. Sci., 2019

Internet-of-Things and fog-computing as enablers of new security and privacy threats.
Internet Things, 2019

Detecting IoT Malware by Markov Chain Behavioral Models.
Proceedings of the IEEE International Conference on Cloud Engineering, 2019

2018
A scalable distributed machine learning approach for attack detection in edge computing environments.
J. Parallel Distributed Comput., 2018

Event-based sensor data exchange and fusion in the Internet of Things environments.
J. Parallel Distributed Comput., 2018

Building a network embedded FEC protocol by using game theory.
Inf. Sci., 2018

Loss-Tolerant Event Communications Within Industrial Internet of Things by Leveraging on Game Theoretic Intelligence.
IEEE Internet Things J., 2018

Internet of things reference architectures, security and interoperability: A survey.
Internet Things, 2018

Migrating mission-critical applications in federated cloud: a case study.
Int. J. High Perform. Comput. Netw., 2018

Aging-related performance anomalies in the apache storm stream processing system.
Future Gener. Comput. Syst., 2018

A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation.
Future Gener. Comput. Syst., 2018

Hybrid Simulation and Test of Vessel Traffic Systems on the Cloud.
IEEE Access, 2018

2017
Introducing Fraudulent Energy Consumption in Cloud Infrastructures: A New Generation of Denial-of-Service Attacks.
IEEE Syst. J., 2017

Simulation platform for cyber-security and vulnerability analysis of critical infrastructures.
J. Comput. Sci., 2017

Optimized task allocation on private cloud for hybrid simulation of large-scale critical systems.
Future Gener. Comput. Syst., 2017

Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design.
Future Gener. Comput. Syst., 2017

Improving the gossiping effectiveness with distributed strategic learning (Invited paper).
Future Gener. Comput. Syst., 2017

Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems.
IEEE Commun. Mag., 2017

Malware Detection for Secure Microgrids: CoSSMic Case Study.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

2016
Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory.
IEEE Trans. Computers, 2016

Using multi-objective metaheuristics for the optimal selection of positioning systems.
Soft Comput., 2016

Recent Developments on Security and Reliability in Large-Scale Data Processing with MapReduce.
Int. J. Data Warehous. Min., 2016

Editorial: security and reliability of critical systems.
J. Ambient Intell. Humaniz. Comput., 2016

Intrusion detection in federated clouds.
Int. J. Comput. Sci. Eng., 2016

An HLA-based framework for simulation of large-scale critical systems.
Concurr. Comput. Pract. Exp., 2016

Live Migration in Emerging Cloud Paradigms.
IEEE Cloud Comput., 2016

A cloud-based architecture for emergency management and first responders localization in smart city environments.
Comput. Electr. Eng., 2016

CIPRNet Training Lecture: Hybrid Simulation of Distributed Large-Scale Critical Infrastructures.
Proceedings of the Image Processing and Communications Challenges 8, 2016

Distributed strategic learning for effective gossiping in wireless networks.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

CoSSMic Smart Grid Migration in Federated Clouds.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

2015
Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures.
J. Supercomput., 2015

Stealthy Denial of Service Strategy in Cloud Computing.
IEEE Trans. Cloud Comput., 2015

A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing.
Knowl. Based Syst., 2015

A semantic driven approach for requirements consistency verification.
Int. J. High Perform. Comput. Netw., 2015

Modeling security requirements for cloud-based system development.
Concurr. Comput. Pract. Exp., 2015

An uncertainty-managing batch relevance-based approach to network anomaly detection.
Appl. Soft Comput., 2015

A Game-Theoretic Approach to Network Embedded FEC over Large-Scale Networks.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

Supporting First Responders Localization during Crisis Management.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

A Semantic Driven Approach for Consistency Verification Between Requirements and FMEA.
Proceedings of the Intelligent Distributed Computing IX - Proceedings of the 9th International Symposium on Intelligent Distributed Computing, 2015

2nd Workshop on Cyber Security and Resilience of Large-Scale Systems.
Proceedings of the Intelligent Distributed Computing IX - Proceedings of the 9th International Symposium on Intelligent Distributed Computing, 2015

Sampling UAV Most Informative Diagnostic Signals.
Proceedings of the 10th International Conference on P2P, 2015

2014
Calibrating Indoor Positioning Systemswith Low Efforts.
IEEE Trans. Mob. Comput., 2014

Developing Secure Cloud Applications.
Scalable Comput. Pract. Exp., 2014

Hybrid indoor and outdoor location services for new generation mobile terminals.
Pers. Ubiquitous Comput., 2014

Calibration-less indoor location systems based on wireless sensors.
J. Ambient Intell. Humaniz. Comput., 2014

Semantic Support for Log Analysis of Safety-Critical Embedded Systems.
CoRR, 2014

Agent-Based Intrusion Detection for Federated Clouds.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

Hybrid Simulation of Distributed Large-Scale Critical Infrastructures.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

Adaptive Stealth Energy-Related DoS Attacks against Cloud Data Centers.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A Semantic Driven Approach for Requirements Verification.
Proceedings of the Intelligent Distributed Computing VIII, 2014

Supporting Development of Certified Aeronautical Components by Applying Text Analysis Techniques.
Proceedings of the Eighth International Conference on Complex, 2014

On Reliability and Security in Knowledge Grids.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
Security event correlation approach for cloud computing.
Int. J. High Perform. Comput. Netw., 2013

An Advanced Intrusion Detection Framework for Cloud Computing.
Comput. Syst. Sci. Eng., 2013

Interconnecting Federated Clouds by Using Publish-Subscribe Service.
Clust. Comput., 2013

Hybrid Localization for Ubiquitous Services.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

Developing Secure Cloud Applications: A Case Study.
Proceedings of the 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2013

Interconnection of Federated Clouds.
Proceedings of the Intelligent Distributed Computing VII, 2013

Intrusion Detection in Cloud Computing.
Proceedings of the Eighth International Conference on P2P, 2013

2012
Intrusion Tolerance of Stealth DoS Attacks to Web Services.
Proceedings of the Information Security and Privacy Research, 2012

mOSAIC-Based Intrusion Detection Framework for Cloud Computing.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2012, 2012

Simulation and Support of Critical Activities by Mobile Agents in Pervasive and Ubiquitous Scenarios.
Proceedings of the 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, 2012

Intrusion Tolerance as a Service - A SLA-based Solution.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

SLA-Oriented Security Provisioning for Cloud Computing.
Proceedings of the Cloud Computing and Services Science - Second International Conference, 2012

Intrusion Tolerance in Cloud Applications: The mOSAIC Approach.
Proceedings of the Sixth International Conference on Complex, 2012

An intrusion detection framework for supporting SLA assessment in Cloud Computing.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

2011
A simulation model for localization of pervasive objects using heterogeneous wireless networks.
Simul. Model. Pract. Theory, 2011

Deployment of RSS-Based Indoor Positioning Systems.
Int. J. Wirel. Inf. Networks, 2011

Bug Localization in Test-Driven Development.
Adv. Softw. Eng., 2011

An event correlation approach for fault diagnosis in SCADA infrastructures.
Proceedings of the 13th European Workshop on Dependable Computing, 2011

Intrusion Tolerant Approach for Denial of Service Attacks to Web Services.
Proceedings of the First International Conference on Data Compression, 2011

A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing.
Proceedings of the First International Conference on Data Compression, 2011

2010
Achieving Security by Intrusion-Tolerance Based on Event Correlation.
Netw. Protoc. Algorithms, 2010

Supporting ubiquitous location information in interworking 3G and wireless networks.
Commun. ACM, 2010

A Correlation Approach to Intrusion Detection.
Proceedings of the Mobile Lightweight Wireless Systems, 2010

2009
A hybrid positioning system for technology-independent location-aware computing.
Softw. Pract. Exp., 2009

Calibrating RSS-Based Indoor Positioning Systems.
Proceedings of the 5th IEEE International Conference on Wireless and Mobile Computing, 2009

A Weight-Based Symptom Correlation Approach to SQL Injection Attacks.
Proceedings of the Fourth Latin-American Symposium on Dependable Computing, 2009

2007
A bluetooth infrastructure for automatic services access in ubiquitous and nomadic computing environments.
Proceedings of the Fifth ACM International Workshop on Mobility Management & Wireless Access, 2007

2006
An architecture for providing Java applications with indoor and outdoor hybrid location sensing.
Proceedings of the Fourth IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems and the Second International Workshop on Collaborative Computing, 2006

2005
A Strategy for Application-Transparent Integration of Nomadic Computing Domains.
Proceedings of the Third IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2005

Indoor and Outdoor Location Based Services for Portable Wireless Devices.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

2004
Implementing Positioning Services over an Ubiquitous Infrastructure.
Proceedings of the 2nd IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2004

Supporting Location-Aware Distributed Applications on Mobile Devices.
Proceedings of the Applied Parallel Computing, 2004

Indoor Positioning for Location-Aware Applications on Java-Based Mobile Devices.
Proceedings of the On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, 2004

2002
Service Differentiation of Communication-bound Processes in a Real-Time Operating System.
Proceedings of the 7th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2002), 2002

2001
A Service Differentiation Scheme for the End-System.
Proceedings of the Interactive Distributed Multimedia Systems, 2001

2000
Bringing service differentiation to the end system.
Proceedings of the IEEE International Conference on Networks 2000: Networking Trends and Challenges in the New Millennium, 2000


  Loading...