Simon Pietro Romano

Orcid: 0000-0002-5876-0382

Affiliations:
  • University of Naples Federico II, Italy


According to our database1, Simon Pietro Romano authored at least 121 papers between 1998 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A cyber-resilient open architecture for drone control.
Comput. Secur., 2025

2024
Sniping at web applications to discover input-handling vulnerabilities.
J. Comput. Virol. Hacking Tech., November, 2024

"Dirclustering": a semantic clustering approach to optimize website structure discovery during penetration testing.
J. Comput. Virol. Hacking Tech., November, 2024

Playing With a Multi Armed Bandit to Optimize Resource Allocation in Satellite-Enabled 5G Networks.
IEEE Trans. Netw. Serv. Manag., February, 2024

An NLP-based approach to assessing a company's maturity level in the digital era.
Expert Syst. Appl., 2024

WebAssembly and Security: a review.
CoRR, 2024

Whispy: Adapting STT Whisper Models to Real-Time Environments.
CoRR, 2024

2023
Including insider threats into risk management through Bayesian threat graph networks.
Comput. Secur., October, 2023

A Software-Defined Approach for Mitigating Insider and External Threats via Moving Target Defense.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2023

Sharing Responsibilities through Distributed Key Generation in the Chirotonia e-Voting Framework.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023

Container-based Virtualization for Ethical Hacking with HOUDINI.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023

2022
Dockerized Android: a container-based platform to build mobile Android scenarios for Cyber Ranges.
CoRR, 2022

ExploitWP2Docker: a Platform for Automating the Generation of Vulnerable WordPress Environments for Cyber Ranges.
CoRR, 2022

An automated approach to Web Offensive Security.
Comput. Commun., 2022

Satellite multi-beam multicast support for an efficient community-based CDN.
Comput. Networks, 2022

AI for Zero-Touch Management of Satellite Networks in B5G and 6G Infrastructures.
Proceedings of the Short Paper Proceedings of the First International Workshop on Artificial Intelligence in Beyond 5G and 6G Wireless Networks (AI6G 2022) co-located with IEEE World Congress on Computational Intelligence (WCCI2022), 2022

ThePhish: an Automated Open-Source Phishing Email Analysis Platform.
Proceedings of the Italian Conference on Cybersecurity (ITASEC 2022), 2022

2021
Protocol for Controlling Multiple Streams for Telepresence (CLUE).
RFC, January, 2021

An XML Schema for the Controlling Multiple Streams for Telepresence (CLUE) Data Model.
RFC, January, 2021

Cooperative Intersection Crossing Over 5G.
IEEE/ACM Trans. Netw., 2021

A distributed security tomography framework to assess the exposure of ICT infrastructures to network threats.
J. Inf. Secur. Appl., 2021

Leveraging AI to optimize website structure discovery during Penetration Testing.
CoRR, 2021

Exploiting the MIL-STD-1553 avionic data bus with an active cyber device.
Comput. Secur., 2021

Discovering reflected cross-site scripting vulnerabilities using a multiobjective reinforcement learning environment.
Comput. Secur., 2021

OT Cyber Security Frameworks Comparison Tool (CSFCTool).
Proceedings of the Italian Conference on Cybersecurity, 2021

On-demand Deployment and Orchestration of Cyber Ranges in the Cloud.
Proceedings of the Italian Conference on Cybersecurity, 2021

Chirotonia: A Scalable and Secure e-Voting Framework based on Blockchains and Linkable Ring Signatures.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

2020
Hacking Goals: A Goal-Centric Attack Classification Framework.
Proceedings of the Testing Software and Systems, 2020

Combining exposure indicators and predictive analytics for threats detection in real industrial IoT sensor networks.
Proceedings of the 2020 IEEE International Workshop on Metrology for Industry 4.0 & IoT, 2020

IntentKeeper: Intent-oriented Data Usage Control for Federated Data Analytics.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

Enabling an efficient satellite-terrestrial hybrid transport service through a QUIC-based proxy function.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Capturing flags in a dynamically deployed microservices-based heterogeneous environment.
Proceedings of the Principles, Systems and Applications of IP Telecommunications, 2020

When Less is More: Core-Restricted Container Provisioning for Serverless Computing.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

A QUIC-based proxy architecture for an efficient hybrid backhaul transport.
Proceedings of the 23rd Conference on Innovation in Clouds, 2020

2019
Container NATs and Session-Oriented Standards: Friends or Foe?
IEEE Internet Comput., 2019

LIoTS: League of IoT Sovereignties. A Scalable approach for a Transparent Privacy-safe Federation of Secured IoT Platforms.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

Fuzzing Janus for Fun and Profit.
Proceedings of the 2019 Principles, Systems and Applications of IP Telecommunications, 2019

An attempt at introducing Multipath in QUIC.
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019

Automated Discovery of CoAP-enabled IoT devices.
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019

The SHINE testbed for secure in-network caching in hybrid satellite-terrestrial networks.
Proceedings of the European Conference on Networks and Communications, 2019

Implementation of Virtualised Network Functions (VNFs) for Broadband Satellite Networks.
Proceedings of the European Conference on Networks and Communications, 2019

2018
Service Delivery Models for Converged Satellite-Terrestrial 5G Network Deployment: A Satellite-Assisted CDN Use-Case.
IEEE Netw., 2018

SHINE: Secure Hybrid In Network caching Environment.
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018

Measuring Janus temperature in ICE-land.
Proceedings of the 2018 Principles, Systems and Applications of IP Telecommunications, 2018

On the use of network coding as a virtual network function in satellite-terrestrial CDNs.
Proceedings of the IEEE INFOCOM 2018, 2018

Thalos: Secure File Storage in Untrusted Clouds.
Proceedings of the Future Network Systems and Security - 4th International Conference, 2018

Secure Hybrid In-Network Caching in a Hybrid Satellite-Terrestrial Environment: The SHINE Project.
Proceedings of the 2018 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2018

2017
Kerberos: A real-time fraud detection system for IMS-enabled VoIP networks.
J. Netw. Comput. Appl., 2017

Real Time Communications in the Web: Current Achievements and Future Perspectives.
IEEE Commun. Stand. Mag., 2017

Leveraging SDN to Improve the Performance of Multicast-Enabled IPTV Distribution Systems.
IEEE Commun. Stand. Mag., 2017

How Far Are We from WebRTC-1.0? An Update on Standards and a Look at What's Next.
IEEE Commun. Mag., 2017

The Docker Security Playground: A hands-on approach to the study of network security.
Proceedings of the 2017 Principles, Systems and Applications of IP Telecommunications, 2017

Bringing privacy to the Janus WebRTC server: The PERC way.
Proceedings of the 2017 Principles, Systems and Applications of IP Telecommunications, 2017

2016
GOSPF: An energy efficient implementation of the OSPF routing protocol.
J. Netw. Comput. Appl., 2016

Jattack: a WebRTC load testing tool.
Proceedings of the 2016 Principles, Systems and Applications of IP Telecommunications, 2016

2015
A cooperation-based approach to energy optimization in wireless ad hoc networks.
EAI Endorsed Trans. Mob. Commun. Appl., 2015

UMPIRE: a universal moderator for the participation in IETF remote events.
IEEE Commun. Mag., 2015

Performance analysis of the Janus WebRTC gateway.
Proceedings of the 1st Workshop on All-Web Real-Time Systems, 2015

The Virtual Puppet Master: Adaptive Streaming on Top of an SDN-Enabled Virtual Infrastructure.
Proceedings of the Euro-Par 2015: Parallel Processing Workshops, 2015

2014
Effects of Cooperation on Wireless Ad Hoc Network Performance.
Proceedings of the Wireless Internet - 8th International Conference, 2014

Setting up CLUE telepresence sessions via the WebRTC data channel.
Proceedings of the Conference on Principles, 2014

Janus: a general purpose WebRTC gateway.
Proceedings of the Conference on Principles, 2014

Introducing ufo.js: A browser-oriented p2p network.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

2013
Media Control Channel Framework (CFW) Call Flow Examples.
RFC, November, 2013

A Distributed Control Law for Load Balancing in Content Delivery Networks.
IEEE/ACM Trans. Netw., 2013

An anomaly-based approach to the analysis of the social behavior of VoIP users.
Comput. Networks, 2013

On the seamless interaction between webRTC browsers and SIP-based conferencing systems.
IEEE Commun. Mag., 2013

2012
Centralized Conferencing Manipulation Protocol (CCMP) Call Flow Examples.
RFC, March, 2012

Centralized Conferencing Manipulation Protocol.
RFC, March, 2012

A SAN-Based Modeling Approach to Performance Evaluation of an IMS-Compliant Conferencing Framework.
Trans. Petri Nets Other Model. Concurr., 2012

Standard multimedia conferencing in the wild: the Meetecho architecture.
Multim. Tools Appl., 2012

Energy- and Delay-Efficient Routing in Mobile Ad Hoc Networks.
Mob. Networks Appl., 2012

Real-Time Communications in the Web: Issues, Achievements, and Ongoing Standardization Efforts.
IEEE Internet Comput., 2012

Optimised balancing algorithm for content delivery networks.
IET Commun., 2012

Can cooperation improve energy efficiency in ad hoc wireless networks?
Comput. Commun., 2012

2011
Meetecho Mobile: Accessing an IETF-compliant conferencing framework from cellular devices.
IEEE Commun. Mag., 2011

On the Use of Cooperation as an Energy-Saving Incentive in Ad Hoc Wireless Networks.
Proceedings of the Green Communications and Networking - First International Conference, 2011

Protecting Critical Infrastructures from Stealth Attacks: A Closed-Loop Approach Involving Detection and Remediation - (Short Paper).
Proceedings of the Critical Information Infrastructure Security, 2011

2010
Automated qualitative assessment of multi-modal distortions in digital images based on GLZ.
Ann. des Télécommunications, 2010

An extended ns-2 for validation of load balancing algorithms in Content Delivery Networks.
Proceedings of the 3rd International Conference on Simulation Tools and Techniques, 2010

NTRULO: A Tunneling Architecture for Multimedia Conferencing over IP.
Proceedings of the Smart Spaces and Next Generation Wired/Wireless Networking, 2010

CCMP: a novel standard protocol for conference management in the XCON framework.
Proceedings of the Principles, 2010

Online non-intrusive diagnosis of one-way RTP faults in VoIP networks using cooperation.
Proceedings of the Principles, 2010

Recording and Playout of Multimedia Conferencing Sessions: A Standard Approach.
Proceedings of the Future Multimedia Networking, Third International Workshop, 2010

Performance assessment of a distributed intrusion detection system in a real network scenario.
Proceedings of the CRiSIS 2010, 2010

2009
Meetecho: A Standard Multimedia Conferencing Architecture.
Proceedings of the Future Multimedia Networking, Second International Workshop, 2009

2008
REFACING: An autonomic approach to network security based on multidimensional trustworthiness.
Comput. Networks, 2008

Separation of Responsibilities between Application Servers and Media Servers in NGNs: A Practical Approach.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2008

A Semi-Autonomic Framework for Intrusion Tolerance in Heterogeneous Networks.
Proceedings of the Self-Organizing Systems, Third International Workshop, 2008

Improving the Scalability of an IMS-Compliant Conferencing Framework Part II: Involving Mixing and Floor Control.
Proceedings of the Principles, 2008

A Reputation-Based Metric for Secure Routing in Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
A distributed IMS enabled conferencing architecture on top of a standard centralized conferencing framework [IP Multimedia Systems (IMS) Infrastructure and Services].
IEEE Commun. Mag., 2007

A Semantic Approach to Policy-based Management - Linking Policies to Ontologies.
Proceedings of the WINSYS 2007, 2007

An Architecture for Experimenting with Traffic Engineering and QoS Routing Algorithms.
Proceedings of the 3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2007

A splitting infrastructure for load balancing and security in an MPLS network.
Proceedings of the 3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2007

Design and Implementation of an Open Source IMS Enabled Conferencing Architecture.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2007

Improving the scalability of an IMS-compliant conferencing framework through presence and event notification.
Proceedings of the Principles, 2007

2006
Resource allocation in multi-domain networks based on service level specifications.
J. Commun. Networks, 2006

A link weight assignment algorithm for traffic-engineered networks.
Comput. Networks, 2006

Behavioral network engineering: making intrusion detection become autonomic.
Ann. des Télécommunications, 2006

Pinball Caching: Improving Performance of a Framework for Dynamic Web-Content Adaptation and Deliver.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

2005
Time-aware admission control on top of time-unaware network infrastructures.
Comput. Commun., 2005

Evaluating Pattern Recognition Techniques in Intrusion Detection Systems.
Proceedings of the Pattern Recognition in Information Systems, 2005

Real Time Detection of Novel Attacks by Means of Data Mining Techniques.
Proceedings of the ICEIS 2005, 2005

2004
Assessing the scalability of component-based frameworks: the CADENUS case study.
SIGMETRICS Perform. Evaluation Rev., 2004

Managing service level agreements in Premium IP networks: a business-oriented approach.
Comput. Networks, 2004

Using Metadata in SLA Negotiation over Premium IP Networks.
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004

2003
Introducing QoS awareness in distributed programming: QTcl.
Softw. Pract. Exp., 2003

Cadenus: creation and deployment of end-user services in premium IP networks.
IEEE Commun. Mag., 2003


2002
Designing service negotiation entities for the electronic market-place.
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002

On the introduction of quality of service awareness in legacy ditributed applications.
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002

A Framework for Policy-Based Management of QoS Aware IP Networks.
Proceedings of the NETWORKING 2002, 2002

An active network approach to virtual private networks.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

An active security protocol against DoS attacks.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

Service Level Indication - A Proposal for QoS Monitoring in SLA-based Multidomain Networks.
Proceedings of the Converged Networking: Data and Real-time Communications over IP, 2002

2001
Dynamic SLA-Based Management of Virtual Private Networks.
Proceedings of the Evolutionary Trends of the Internet, 2001

2000
A Scheme for Time-Dependent Resource Reservation in QoS-Enabled IP Networks.
Proceedings of the NETWORKING 2000, 2000

Bringing service differentiation to the end system.
Proceedings of the IEEE International Conference on Networks 2000: Networking Trends and Challenges in the New Millennium, 2000

1999
An Engineering Approach to QoS Provisioning over the Internet.
Proceedings of the Multimedia Applications, Services and Techniques, 1999

1998
Integrated QoS Architectue for IP Switching.
Proceedings of the Multimedia Applications, Services and Techniques, 1998


  Loading...