Michele Colajanni

Orcid: 0000-0002-9499-1559

Affiliations:
  • University of Modena and Reggio Emilia, Italy


According to our database1, Michele Colajanni authored at least 170 papers between 1992 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Assessing generalizability of Deep Reinforcement Learning algorithms for Automated Vulnerability Assessment and Penetration Testing.
Array, 2024

Flexible zero trust architecture for the cybersecurity of industrial IoT infrastructures.
Ad Hoc Networks, 2024

Autoencoder-Based Solution for Intrusion Detection in Industrial Control System.
Proceedings of the Intelligent Computing, 2024

2023
FRAMH: A Federated Learning Risk-Based Authorization Middleware for Healthcare.
IEEE Trans. Comput. Soc. Syst., August, 2023

A multidisciplinary detection system for cyber attacks on Powertrain Cyber Physical Systems.
Future Gener. Comput. Syst., July, 2023

DOLOS: A Novel Architecture for Moving Target Defense.
IEEE Trans. Inf. Forensics Secur., 2023

ARGANIDS: a novel Network Intrusion Detection System based on adversarially Regularized Graph Autoencoder.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

Penetrating the Silence: Data Exfiltration in Maritime and Underwater Scenarios.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023

Practical Evaluation of Graph Neural Networks in Network Intrusion Detection.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023

A Framework for Automating Security Assessments with Deductive Reasoning.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023

2022
Scalable, Confidential and Survivable Software Updates.
IEEE Trans. Parallel Distributed Syst., 2022

Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems.
DTRAP, 2022

Classification of Web Phishing Kits for early detection by platform providers.
CoRR, 2022

Exploring the consequences of cyber attacks on Powertrain Cyber Physical Systems.
CoRR, 2022

Evaluating Tangle Distributed Ledger for Access Control Policy Distribution in Multi-region Cloud Environments.
Proceedings of the Quality of Information and Communications Technology, 2022

A Zero Trust approach for the cybersecurity of Industrial Control Systems.
Proceedings of the 21st IEEE International Symposium on Network Computing and Applications, 2022

Robustness Evaluation of Network Intrusion Detection Systems based on Sequential Machine Learning.
Proceedings of the 21st IEEE International Symposium on Network Computing and Applications, 2022

A Fully Decentralized Architecture for Access Control Verification in Serverless Environments.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

2021
Glyph: Efficient ML-Based Detection of Heap Spraying Attacks.
IEEE Trans. Inf. Forensics Secur., 2021

Verifiable and auditable authorizations for smart industries and industrial Internet-of-Things.
J. Inf. Secur. Appl., 2021

Survivable zero trust for cloud computing environments.
Comput. Secur., 2021

Flexible and Survivable Single Sign-On.
Proceedings of the Cyberspace Safety and Security - 13th International Symposium, 2021

2020
Deep Reinforcement Adversarial Learning Against Botnet Evasion Attacks.
IEEE Trans. Netw. Serv. Manag., 2020

A Data-driven Characterization of Modern Android Spyware.
ACM Trans. Manag. Inf. Syst., 2020

Hardening Random Forest Cyber Detectors Against Adversarial Attacks.
IEEE Trans. Emerg. Top. Comput. Intell., 2020

Detection and Threat Prioritization of Pivoting Attacks in Large Networks.
IEEE Trans. Emerg. Top. Comput., 2020

A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises.
Mob. Networks Appl., 2020

2019
Fog-based Secure Communications for Low-power IoT Devices.
ACM Trans. Internet Techn., 2019

Efficient License Management Based on Smart Contracts Between Software Vendors and Service Providers.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019

Evaluating the effectiveness of Adversarial Attacks against Botnet Detectors.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019

Authorization Transparency for Accountable Access to IoT Services.
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019

Digital Forensics in Vessel Transportation Systems.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

Addressing Adversarial Attacks Against Security Systems Based on Machine Learning.
Proceedings of the 11th International Conference on Cyber Conflict, 2019

2018
A symmetric cryptographic scheme for data integrity verification in cloud databases.
Inf. Sci., 2018

Evading Botnet Detectors Based on Flows and Random Forest with Adversarial Samples.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

On the effectiveness of machine and deep learning for cyber security.
Proceedings of the 10th International Conference on Cyber Conflict, 2018

2017
Identifying malicious hosts involved in periodic communications.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Scalable architecture for online prioritisation of cyber threats.
Proceedings of the 9th International Conference on Cyber Conflict, 2017

Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Exploratory security analytics for anomaly detection.
Comput. Secur., 2016

Analysis of high volumes of network traffic for Advanced Persistent Threat detection.
Comput. Networks, 2016

Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms.
Proceedings of the 2nd IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2016

Guaranteeing Correctness of Bulk Operations in Outsourced Databases.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Countering Advanced Persistent Threats through security intelligence and big data analytics.
Proceedings of the 8th International Conference on Cyber Conflict, 2016

Implementation of Verified Set Operation Protocols Based on Bilinear Accumulators.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Adaptive, scalable and reliable monitoring of big data on clouds.
J. Parallel Distributed Comput., 2015

A collaborative framework for intrusion detection in mobile networks.
Inf. Sci., 2015

Supporting sense-making and decision-making through time evolution analysis of open sources.
Proceedings of the 7th International Conference on Cyber Conflict: Architectures in Cyberspace, 2015

Enforcing Correct Behavior without Trust in Cloud Key-Value Databases.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases.
IEEE Trans. Parallel Distributed Syst., 2014

Scalable Architecture for Multi-User Encrypted SQL Operations on Cloud Database Services.
IEEE Trans. Cloud Comput., 2014

Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cloud Databases.
IEEE Trans. Cloud Comput., 2014

Detecting correlation between server resources for system management.
J. Comput. Syst. Sci., 2014

Efficient detection of unauthorized data modification in cloud databases.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

Security and privacy of location-based services for in-vehicle device systems.
Proceedings of the International Conference on High Performance Computing & Simulation, 2014

2013
Algorithms for Web service selection with static and dynamic requirements.
Serv. Oriented Comput. Appl., 2013

Data clustering based on correlation analysis applied to highly variable domains.
Comput. Networks, 2013

Real-time adaptive algorithm for resource monitoring.
Proceedings of the 9th International Conference on Network and Service Management, 2013

Access Control Enforcement on Query-Aware Encrypted Cloud Databases.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
Selective resource characterization for evaluation of system dynamics.
SIGMETRICS Perform. Evaluation Rev., 2012

Dual time-scale distributed capacity allocation and load redirect algorithms for cloud systems.
J. Parallel Distributed Comput., 2012

A Novel Intermediary Framework for Dynamic Edge Service Composition.
J. Comput. Sci. Technol., 2012

A Scalable Architecture for Real-Time Monitoring of Large Information Systems.
Proceedings of the Second Symposium on Network Cloud Computing and Applications, 2012

Supporting Data Center Management through Clustering of System Data Streams.
Proceedings of the Advanced Infocomm Technology - 5th IEEE International Conference, 2012

Supporting Security and Consistency for Cloud Database.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

Collaborative Attack Detection Using Distributed Hash Tables.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

Cyber Attacks on Financial Critical Infrastructures.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

2011
Defeating NIDS evasion in Mobile IPv6 networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Multistep Attack Detection and Alert Correlation in Intrusion Detection Systems.
Proceedings of the Information Security and Assurance - International Conference, 2011

The Problem of NIDS Evasion in Mobile Networks.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Assessing the overhead and scalability of system monitors for large data centers.
Proceedings of the First International Workshop on Cloud Computing Platforms, 2011

Identification of correlated network intrusion alerts.
Proceedings of the Third International Workshop on Cyberspace Safety and Security, 2011

Dynamic Request Management Algorithms for Web-Based Services in Cloud Computing.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Detecting Behavioral Variations in System Resources of Large Data Centers.
Proceedings of the 11th IEEE International Conference on Computer and Information Technology, 2011

A Software Architecture for the Analysis of Large Sets of Data Streams in Cloud Infrastructures.
Proceedings of the 11th IEEE International Conference on Computer and Information Technology, 2011

2010
MIMOSA: context-aware adaptation for ubiquitous web access.
Pers. Ubiquitous Comput., 2010

Resource Management Strategies for the Mobile Web.
Mob. Networks Appl., 2010

A Two-level distributed architecture for the support of content adaptation and delivery services.
Clust. Comput., 2010

Characteristics and evolution of content popularity and user relations in social networks.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Real-time models supporting resource management decisions in highly variable systems.
Proceedings of the 29th International Performance Computing and Communications Conference, 2010

Selective and Early Threat Detection in Large Networked Systems.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Adaptive Algorithms for Efficient Content Management in Social Network Services.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Performance Evolution of Mobile Web-Based Services.
IEEE Internet Comput., 2009

Short-term prediction models for server management in Internet-based contexts.
Decis. Support Syst., 2009

Runtime state change detector of computer system resources under non stationary conditions.
Proceedings of the 17th Annual Meeting of the IEEE/ACM International Symposium on Modelling, 2009

Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale.
Proceedings of the Information Security, 12th International Conference, 2009

Self-Adaptive Techniques for the Load Trend Evaluation of Internal System Resources.
Proceedings of the Fifth International Conference on Autonomic and Autonomous Systems, 2009

Defending financial infrastructures through early warning systems: the intelligence cloud approach.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Hot Set Identification for Social Network Applications.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

Dynamic Load Management of Virtual Machines in Cloud Architectures.
Proceedings of the Cloud Computing - First International Conference, 2009

2008
Models and framework for supporting runtime decisions in Web-based systems.
ACM Trans. Web, 2008

Resource Management Strategies for Mobile Web-Based Services.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

Collaborative architecture for malware detection and analysis.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Autonomic Request Management Algorithms for Geographically Distributed Internet-Based Systems.
Proceedings of the Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008

Adaptive traffic filtering for efficient and secure IP-mobility.
Proceedings of the Q2SWinet'08, 2008

Runtime Prediction Models for Internet-based Systems.
Proceedings of the 16th International Symposium on Modeling, 2008

2007
A Distributed Infrastructure Supporting Personalized Services for the Mobile Web.
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007

Dynamic load balancing for network intrusion detection systems based on distributed architectures.
Proceedings of the Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), 12, 2007

Trend-based Load Balancer for a Multi-tier Distributed System.
Proceedings of the 15th International Symposium on Modeling, 2007

Enhancing interoperability and stateful analysis of cooperative network intrusion detection systems.
Proceedings of the 2007 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2007

2006
A Distributed Architecture for Gracefully Degradable Web-Based Services.
Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications, 2006

Distribution of Adaptation Services for Ubiquitous Web AccesDriven by User Profiles.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

Distributed Architectures for High Performance and Privacy-Aware Content Generation and Delivery.
Proceedings of the Second International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, 2006

Web System Reliability and Performance.
Proceedings of the Web Engineering, 2006

2005
Hybrid cooperative schemes for scalable and stable performance of Web content delivery.
Comput. Networks, 2005

Do we need more web performance research?
Proceedings of the 14th international conference on World Wide Web, 2005

HoneySpam: Honeypots Fighting Spam at the Source.
Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop, 2005

A Two-Level Distributed Architecture for Efficient Web Content Adaptation and Delivery.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2005), 31 January, 2005

Performance Comparison of Distributed Architectures for Content Adaptation and Delivery of Web Resources.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

A Scalable Framework for the Support of Advanced Edge Services.
Proceedings of the High Performance Computing and Communications, 2005

Design and Testing of Scalable Web-Based Systems with Performance Constraints.
Proceedings of the FIRB-Perf Workshop on Techniques, 2005

2004
Fine grain performance evaluation of e-commerce sites.
SIGMETRICS Perform. Evaluation Rev., 2004

A Cluster-Based Web System Providing Differentiated and Guaranteed Services.
Clust. Comput., 2004

Emerging Internet-Based Services: New Frontiers for Performance Models and Applications.
Proceedings of the 1st International Conference on Quantitative Evaluation of Systems (QEST 2004), 2004

Peer-to-peer workload characterization: techniques and open issues.
Proceedings of the International Workshop on Hot Topics in Peer-to-Peer Systems, 2004

Topic 18: Peer-to-Peer and Web Computing.
Proceedings of the Euro-Par 2004 Parallel Processing, 2004

2003
Request Redirection Algorithms for Distributed Web Systems.
IEEE Trans. Parallel Distributed Syst., 2003

Cooperative TransCaching: A System of Distributed Proxy Servers for Web Content Adaptation.
Proceedings of the Twelfth International World Wide Web Conference - Posters, 2003

Scalability of content-aware switches for cluster-based Web information systems.
Proceedings of the Twelfth International World Wide Web Conference, 2003

Cooperative Architectures and Algorithms for Discovery and Transcoding of Multi-Version Content.
Proceedings of the Web Content Caching and Distribution, 8th International Workshop, 2003

Distributed Cooperation Schemes for Document Lookup in Multiple Cache Servers.
Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 2003

Kernel-based Web switches providing content-aware routing.
Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 2003

Scalability of Cooperative Algorithms for Distributed Architectures of Proxy Servers.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003

2002
A Performance Study of Robust Load Sharing Strategies for Distributed Heterogeneous Web Server Systems.
IEEE Trans. Knowl. Data Eng., 2002

Performance study of dispatching algorithms in multi-tier web architectures.
SIGMETRICS Perform. Evaluation Rev., 2002

Performance analysis of adaptive wormhole routing in a two-dimensional torus.
Parallel Comput., 2002

The state of the art in locally distributed Web-server systems.
ACM Comput. Surv., 2002

Content-Aware Dispatching Algorithms for Cluster-Based Web Servers.
Clust. Comput., 2002

Benchmarking Models and Tools for Distributed Web-Server Systems.
Proceedings of the Performance Evaluation of Complex Systems: Techniques and Tools, 2002

A Scalable Architecture for Cooperative Web Caching.
Proceedings of the Web Engineering and Peer-to-Peer Computing, 2002

Global Caching Mechanisms in Clusters of Web Servers.
Proceedings of the 10th International Workshop on Modeling, 2002

2001
Web switch support for differentiated services.
SIGMETRICS Perform. Evaluation Rev., 2001

Mechanisms for quality of service in Web clusters.
Comput. Networks, 2001

A client-aware dispatching algorithm for web clusters providing multiple services.
Proceedings of the Tenth International World Wide Web Conference, 2001

Two-Tier Cooperation: A Scalable Protocol for Web Cache Sharing.
Proceedings of the IEEE International Symposium on Network Computing and Applications (NCA 2001), 2001

A Performance Study of Distributed Architectures for the Quality of Web Services.
Proceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS-34), 2001

2000
PSBLAS: a library for parallel linear algebra computation on sparse matrices.
ACM Trans. Math. Softw., 2000

A hierarchical approach for bounding the completion time distribution of stochastic task graphs.
Perform. Evaluation, 2000

Geographic Load Balancing for Scalable Distributed Web Systems.
Proceedings of the MASCOTS 2000, Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 29 August, 2000

Scalable Web Clusters with Static and Dynamic Contents.
Proceedings of the 2000 IEEE International Conference on Cluster Computing (CLUSTER 2000), November 28th, 2000

1999
DNS Dispatching Algorithms with State Estimators for Scalable Web-Server Clusters.
World Wide Web, 1999

Dynamic Load Balancing on Web-Server Systems.
IEEE Internet Comput., 1999

An Analytical Comparison of Cooperation Protocols for Web Proxy Servers.
Proceedings of the MASCOTS 1999, 1999

An Object-Oriented Environment for Sparse Parallel Computation on Adaptive Grids.
Proceedings of the 13th International Parallel Processing Symposium / 10th Symposium on Parallel and Distributed Processing (IPPS / SPDP '99), 1999

Redirection Algorithms for Load Sharing in Distributed Web-server Systems.
Proceedings of the 19th International Conference on Distributed Computing Systems, Austin, TX, USA, May 31, 1999

Performance Analysis of Wormhole Switching with Adaptive Routing in a Two-Dimensional Torus.
Proceedings of the Euro-Par '99 Parallel Processing, 5th International Euro-Par Conference, Toulouse, France, August 31, 1999

1998
Analysis of Task Assignment Policies in Scalable Distributed Web-Server Systems.
IEEE Trans. Parallel Distributed Syst., 1998

Performance evaluation of message passing strategies and routing policies in multicomputers.
Simul. Pract. Theory, 1998

Performance Analysis of Circuit-Switching Interconnection Networks with Deterministic and Adaptive Routing.
Perform. Evaluation, 1998

Performance evaluation of deterministic wormhole routing in k-ary n-cubes.
Parallel Comput., 1998

Threshold-Based Reconfiguration Strategies for Gracefully Degradable Parallel Computations.
J. Parallel Distributed Comput., 1998

Supporting Self-Adaptivity for SPMD Message-Passing Applications.
Proceedings of the Languages, 1998

Dynamic Load Balancing in Geographically Distributed Heterogeneous Web Servers.
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998

Efficient State Estimators for Load Control Policies in Scalable Web Server Clusters.
Proceedings of the COMPSAC '98, 1998

1997
Adaptive TTL Schemes for Load Balancing of Distributed Web Servers.
SIGMETRICS Perform. Evaluation Rev., 1997

Non-Uniform and Dynamic Domain Decompositions for Hypercomputing.
Parallel Comput., 1997

Dynamic data decomposition in a message-passing environment.
J. Syst. Archit., 1997

DAME: an environment for preserving the efficiency of data-parallel computations on distributed systems.
IEEE Concurrency, 1997

Check-load Interval Analysis for Balancing Distributed SPMD Applications.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1997

An Accurate Model for the Performance Analysis of Deterministic Wormhole Routing.
Proceedings of the 11th International Parallel Processing Symposium (IPPS '97), 1997

Scheduling Algorithms for Distributed Web Servers.
Proceedings of the 17th International Conference on Distributed Computing Systems, 1997

Dynamic load balancing of distributed SPMD computations with explicit message-passing.
Proceedings of the 6th Heterogeneous Computing Workshop, 1997

1996
A Proposal for Parallel Sparse BLAS.
Proceedings of the Applied Parallel Computing, 1996

1995
A Programming Environment for Heterogeneous Network Computing with Transparent Workload Redistribution.
Proceedings of the Parallel Computing: State-of-the-Art and Perspectives, 1995

Communication Switching Techniques and Link-Conflict Resolution Strategies: A Comparison Analysis.
Proceedings of the EUROSIM'96, 1995

1994
Subcube Matrix Decomposition: A Unifying View for LU Factorization on Multicomputers.
Parallel Comput., 1994

The Row/Column Pivoting Strategy on Multicomputers.
Parallel Comput., 1994

Stochastic Bounds on Execution Times of Parallel Computations.
Proceedings of the MASCOTS '94, Proceedings of the Second International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems, January 31, 1994

1993
Unifying and Optimizing Parallel Linear Algebra Algorithms.
IEEE Trans. Parallel Distributed Syst., 1993

1992
A Simulation Tool for the Design of Satellite Data-Flow Handling Systems: Workload Characterization.
Proceedings of the Eurosim 1992, Simulation Congress, Proceedings of the 1992 EUROSIM Conference, Capri, Italy, September 28, 1992


  Loading...