Search filters

List of works by Luca Caviglione

A Graph-Based Approach to Model Privacy and Security Issues of Online Social Networks

A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing

A control theoretic approach for energy-efficient management of Online Social Network services

A deep analysis on future web technologies and protocols over broadband GEO satellite networks

scholarly article by Luca Caviglione et al published 7 July 2015 in International Journal of Satellite Communications and Networking

A first look at traffic patterns of Siri

A framework for the delivery of contents in RFID-driven smart environments

A packet snif.ng and synchronization technique to boost P2P satellite networks

A predictive control approach for energy-aware consolidation of virtual machines in cloud computing

scholarly article published December 2014

A simple neural framework for bandwidth reservation of VoIP communications in cost-effective devices

A survey on energy-aware security mechanisms

scholarly article by Alessio Merlo et al published December 2015 in Pervasive and Mobile Computing

A task allocation middleware targeting an RFID-enhanced environment

A taxonomy-based model of security and privacy in online social networks

An Optimized Architecture for Supporting Data Streaming in Interactive Grids

An Optimized Content Replication and Distribution Framework for Vehicular Networks

scholarly article by Luca Caviglione & Cristiano Cervellera published October 2011 in Journal of Intelligent Transportation Systems

An overlay scheme to provide loose QoS for wireless nodes

Analysis and Development of Green-Aware Security Mechanisms for Modern Internet Applications

article

Analysis of Human Awareness of Security and Privacy Threats in Smart Environments

Analysis, Development and Deployment of Statistical Anomaly Detection Techniques for Real E-Mail Traffic

article

Architecture of a communication middleware for VANET applications

scholarly article published June 2011

Can satellites face trends? The case of Web 2.0

Design of a peer-to-peer system for optimized content replication

article

Design, optimization and performance evaluation of a content distribution overlay for streaming

Efficient Detection and Recovery of Malicious PowerShell Scripts Embedded into Digital Images

scientific article published in 2022

Emerging and Unconventional: New Attacks and Innovative Detection Techniques

Enabling cooperation of consumer devices through peer-to-peer overlays

Exploiting IP telephony with silence suppression for hidden data transfers

Extending HTTP Models to Web 2.0 Applications: The Case of Social Networks

Extending HTTP models to Web 2.0 applications: the case of online social networks

FIRST: Future Internet — a role for satellite technology

Fusion of digital television, broadband Internet and mobile communications—Part II: Future service scenarios

Handling local user mobility and QoS in a controlled ad-hoc environment

article

IEEE 802.15.4 Air-Ground UAV Communications in Smart Farming Scenarios

Information Hiding as a Challenge for Malware Detection

Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection

scientific article published on 26 January 2022

Introducing emergent technologies in tactical and disaster recovery networks

Investigating HTTP Covert Channels Through Fuzz Testing

scientific article published on 25 July 2024

On Social Network Engineering for Secure Web Data and Services

On the Usage of Overlays to Provide QoS Over IEEE 802.11b/g/e Pervasive and Mobile Networks

Opportunities, integration and issues of applying new technologies over e-learning platforms

article published in 2011

Optimization of a peer-to-peer system for efficient content replication

Optimization of an eMule-like modifier strategy

article published in 2008

P2P in satellite networks: a tutorial on related problems and some possible solutions

Peer-to-peer infrastructures to support the delivery of Learning Objects

Peer-to-peer middleware for bandwidth allocation in sensor networks

Predictive Control for Energy-Aware Consolidation in Cloud Datacenters

Privacy problems with Web 2.0

SecCo

scientific article published on 29 August 2023

Security in peer-to-peer applications and remote instrumentation over satellite: a scenario including Public Protection and Disaster Relief (PPDR)

Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence

scholarly article by Luca Caviglione et al published April 2016 in IEEE Transactions on Information Forensics and Security

Steganography in Modern Smartphones and Mitigation Techniques

Supporting Vertical Handover by Using a Pastry Peer-to-Peer Overlay Network

Survey of IPv6 functional interoperability for mobile Internet

The energy impact of security mechanisms in modern mobile devices

The “SaterLay”: an Overlay System for Satellite Based Communities

Traffic analysis of an internet online game accessed via a wireless LAN

article

Traffic volume analysis of a nation-wide eMule community

Understanding Information Hiding in iOS

Understanding and exploiting the reverse patterns of peer-to-peer file sharing applications

Using Kademlia for the Configuration of B3G Radio Access Nodes

Using P2P overlays to provide QoS in service-oriented wireless networks

What is Green Security?