Search filters

List of works by Aniello Castiglione

A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems

A Forensic Analysis of Images on Online Social Networks

A Novel Anti-forensics Technique for the Android OS

A Novel Methodology to Acquire Live Big Data Evidence from the Cloud

article

A Secure Distributed Video Surveillance System Based on Portable Devices

A botnet-based command and control approach relying on swarm intelligence

scientific article published in February 2014

A cloud-based architecture for emergency management and first responders localization in smart city environments

A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation

A distributed approach to network anomaly detection based on independent component analysis

A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy

A secure file sharing service for distributed computing environments

Advanced services for efficient management of smart farms

An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications

An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats

article published in 2010

An Extensible Framework for Efficient Secure SMS

An asynchronous covert channel using spam

An intelligent security architecture for distributed firewalling environments

article by Alfredo De Santis et al published 30 September 2011 in Journal of Ambient Intelligence and Humanized Computing

Analyzing the Internet Stability in Presence of Disasters

Automated Construction of a False Digital Alibi

Automatic, Selective and Secure Deletion of Digital Evidence

article

Biometrics in the Cloud: Challenges and Research Opportunities

scientific article published in July 2017

CHIS: A big data infrastructure to manage digital cultural items

article published in 2018

CNN-based anti-spoofing two-tier multi-factor authentication system

scholarly article by Muhammad Sajjad et al published February 2018 in Pattern Recognition Letters

CSP-E 2 : An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems

Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective

journal article from 'IEEE Cloud Computing' published in 2017

Characterizing and Classifying Card-Sharing Traffic through Wavelet Analysis

Cloud-Based Biometrics (Biometrics as a Service) for Smart Cities, Nations, and Beyond

article published in 2018

Context Aware Ubiquitous Biometrics in Edge of Military Things

Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace

Data fusion technique in SPIDER Peer-to-Peer networks in smart cities for security enhancements

Device Tracking in Private Networks via NAPT Log Analysis

E-mail-Based Covert Channels for Asynchronous Message Steganography

Efficient k -NN query over encrypted data in cloud with limited key-disclosure and offline data owner

Energy efficiency of elastic frequency grids in multilayer IP/MPLS-over-flexgrid networks

Engineering a secure mobile messaging framework

Event-based sensor data exchange and fusion in the Internet of Things environments

Exploiting Battery-Drain Vulnerabilities in Mobile Smart Devices

Exploiting mean field analysis to model performances of big data architectures

article

GRASP-based resource re-optimization for effective big data access in federated clouds

GRIMD: distributed computing for chemists and biologists

scientific article published on 29 January 2014

How to Forge a Digital Alibi on Mac OS X

Hybrid indoor and outdoor location services for new generation mobile terminals

IEEE Access Special Section Editorial: Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies

Information theoretic-based detection and removal of slander and/or false-praise attacks for robust trust management with Dempster-Shafer combination of linguistic fuzzy terms

article by Christian Esposito et al published 31 August 2017 in Concurrency and Computation: Practice and Experience

Integrity for an Event Notification Within the Industrial Internet of Things by Using Group Signatures

Interconnecting Federated Clouds by Using Publish-Subscribe Service

Layered multicast for reliable event notification over large-scale networks

Loss-Tolerant Event Communications Within Industrial Internet of Things by Leveraging on Game Theoretic Intelligence

scholarly article published June 2018

Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things

scholarly article by Zhe Liu et al published 2018 in IEEE Transactions on Dependable and Secure Computing

Modeling energy consumption in next-generation wireless access-over-WDM networks with hybrid power sources

article

Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes

journal article from 'Future Generation Computer Systems' published in 2018

Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel

Network anomaly detection with the restricted Boltzmann machine

New Steganographic Techniques for the OOXML File Format

On Data Sovereignty in Cloud-based Computation Offloading for Smart Cities Applications

On Secure Data Management in Health-Care Environment

article

On asynchronous enforcement of security policies in “Nomadic” storage facilities

On the Construction of a False Digital Alibi on the Android OS

On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines

article

Policy-Based Broadcast Access Authorization for Flexible Data Sharing in Clouds

scientific article published in 2022

Prosperity of IT security technologies in homeland defense

article published in 2013

Recognizing human behaviours in online social networks

SECR3T: Secure End-to-End Communication over 3G Telecommunication Networks

scholarly article published June 2011

Source Camera Identification in Real Practice: A Preliminary Experimentation

Steganography and Secure Communication on Online Social Networks and Online Photo Sharing

Supporting dynamic updates in storage clouds with the Akl–Taylor scheme

Text Compression and Encryption through Smart Devices for Mobile Communication

The AVQ Algorithm: Watermarking and Compression Performances

The Digital Profiling Techniques Applied to the Analysis of a GPS Navigation Device

The Forensic Analysis of a False Digital Alibi

Towards a Lawfully Secure and Privacy Preserving Video Surveillance System

Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design

article by Christian Esposito et al published September 2017 in Future Generation Computer Systems

Trustworthiness Evaluation-Based Routing Protocol for Incompletely Predictable Vehicular Ad Hoc Networks

scientific article published in 2022

Trustworthy Opportunistic Access to the Internet of Services

Using Screen Brightness to Improve Security in Mobile Social Network Access

Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks

Waiting for Tactile: Robotic and Virtual Experiences in the Fog

scientific article published on 16 June 2021

Walking on the Cloud: Gait Recognition, a Wearable Solution