Serena Nicolazzo

Orcid: 0000-0003-2719-9526

According to our database1, Serena Nicolazzo authored at least 47 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A novel IoT trust model leveraging fully distributed behavioral fingerprinting and secure delegation.
Pervasive Mob. Comput., 2024

A deep reinforcement learning approach for security-aware service acquisition in IoT.
J. Inf. Secur. Appl., 2024

SeCTIS: A Framework to Secure CTI Sharing.
CoRR, 2024

Service Level Agreements and Security SLA: A Comprehensive Survey.
CoRR, 2024

KDk: A Defense Mechanism Against Label Inference Attacks in Vertical Federated Learning.
CoRR, 2024

OSTIS: A novel Organization-Specific Threat Intelligence System.
Comput. Secur., 2024

Privacy-preserving in Blockchain-based Federated Learning systems.
Comput. Commun., 2024

Relation Extraction Techniques in Cyber Threat Intelligence.
Proceedings of the Natural Language Processing and Information Systems, 2024

2023
How COVID-19 affects user interaction with online streaming service providers on twitter.
Soc. Netw. Anal. Min., December, 2023

The role of social media on the evolution of companies: A Twitter analysis of Streaming Service Providers.
Online Soc. Networks Media, July, 2023

The importance of the language for the evolution of online communities: An analysis based on Twitter and Reddit.
Expert Syst. Appl., July, 2023

NLP-Based Techniques for Cyber Threat Intelligence.
CoRR, 2023

2022
A two-tier Blockchain framework to increase protection and autonomy of smart objects in the IoT.
Comput. Commun., 2022

2021
H2O: Secure Interactions in IoT via Behavioral Fingerprinting.
Future Internet, 2021

Anonymous Access Monitoring of Indoor Areas.
IEEE Access, 2021

Increasing protection and autonomy in the IoT through a two-tier blockchain framework (Discussion Paper).
Proceedings of the 29th Italian Symposium on Advanced Database Systems, 2021

2020
A Privacy-Preserving Localization Service for Assisted Living Facilities.
IEEE Trans. Serv. Comput., 2020

A privacy-preserving approach to prevent feature disclosure in an IoT scenario.
Future Gener. Comput. Syst., 2020

2019
The Challenge of Privacy in the Cloud.
Proceedings of the Encyclopedia of Bioinformatics and Computational Biology - Volume 1, 2019

A System for Privacy-Preserving Access Accountability in Critical Environments.
IEEE Pervasive Comput., 2019

2018
Is the Sharing Economy About Sharing at All? A Linguistic Analysis of Airbnb Reviews.
Proceedings of the Twelfth International Conference on Web and Social Media, 2018

Not Only Databases: Social Data and Cybersecurity Perspective.
Proceedings of the A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years., 2018

2017
Discovering Good Links Between Objects in the Internet of Things.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

A Model for Handling Multiple Social Networks, its Implementation.
Proceedings of the 25th Italian Symposium on Advanced Database Systems, 2017

A System for Privacy-Preserving Analysis of Vehicle Movements.
Proceedings of the Cloud Infrastructures, Services, and IoT Systems for Smart Cities, 2017

eIDAS Public Digital Identity Systems: Beyond Online Authentication to Support Urban Security.
Proceedings of the Cloud Infrastructures, Services, and IoT Systems for Smart Cities, 2017

Tweetchain: An Alternative to Blockchain for Crowd-Based Applications.
Proceedings of the Web Engineering - 17th International Conference, 2017

Contrasting False Identities in Social Networks by Trust Chains and Biometric Reinforcement.
Proceedings of the 2017 International Conference on Cyberworlds, 2017

Overcoming Limits of Blockchain for IoT Applications.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
A model to support design and development of multiple-social-network applications.
Inf. Sci., 2016

Interest Assortativity in Twitter.
Proceedings of the 12th International Conference on Web Information Systems and Technologies, 2016

Completeness, Correctness and Freshness of Cloud-Managed Data Streams.
Proceedings of the 24th Italian Symposium on Advanced Database Systems, 2016

A Middleware to Allow Fine-Grained Access Control of Twitter Applications.
Proceedings of the Mobile, Secure, and Programmable Networking, 2016

Range query integrity in the cloud: the case of video surveillance.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

A New Approach for Electronic Signature.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Range Query Integrity in Cloud Data Streams with Efficient Insertion.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

A Threat to Friendship Privacy in Facebook.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016

2015
Comparing Twitter and Facebook user behavior: Privacy and other aspects.
Comput. Hum. Behav., 2015

Accountability-Preserving Anonymous Delivery of Cloud Services.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

A lightweight electronic signature scheme using Twitter.
Proceedings of the 23rd Italian Symposium on Advanced Database Systems, 2015

A Model Implementing Certified Reputation and Its Application to TripAdvisor.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Fortifying TripAdvisor against reputation-system attacks.
Proceedings of the 2014 World Congress on Internet Security, 2014

Generating K-Anonymous Logs of People Tracing Systems in Surveilled Environments.
Proceedings of the 22nd Italian Symposium on Advanced Database Systems, 2014

A Model to Support Multi-Social-Network Applications.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Conferences, 2014

Driving Global Team Formation in Social Networks to Obtain Diversity.
Proceedings of the Web Engineering, 14th International Conference, 2014

A Privacy-Preserving Solution for Tracking People in Critical Environments.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2013
Measuring Betweenness Centrality in Social Internetworking Scenarios.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2013 Workshops, 2013


  Loading...