- Software Engineering Research
- Software Engineering Techniques and Practices
- Software Reliability and Analysis Research
- Advanced Software Engineering Methodologies
- Advanced Malware Detection Techniques
- Service-Oriented Architecture and Web Services
- Business Process Modeling and Analysis
- Software System Performance and Reliability
- Open Source Software Innovations
- IoT and Edge/Fog Computing
- Context-Aware Activity Recognition Systems
- Quantum Computing Algorithms and Architecture
- Network Security and Intrusion Detection
- Software Testing and Debugging Techniques
- Information and Cyber Security
- Vehicular Ad Hoc Networks (VANETs)
- Usability and User Interface Design
- Quantum Information and Cryptography
- Model-Driven Software Engineering Techniques
- Digital and Cyber Forensics
- Green IT and Sustainability
- Privacy, Security, and Data Protection
- Spreadsheets and End-User Computing
- Ethics and Social Impacts of AI
- Artificial Intelligence in Healthcare and Education
University of Bari Aldo Moro
2016-2025
Blekinge Institute of Technology
2020
Universität Hamburg
2019
Superconducting and other Innovative Materials and Devices Institute
2017
University of Castilla-La Mancha
2015
Laboratoire d'Informatique de Paris-Nord
2011
Università degli Studi Internazionali di Roma
2011
In recent months, the impact of Artificial Intelligence (AI) on citizens' lives has gained considerable public interest, driven by emergence Generative AI models, ChatGPT in particular. The rapid development these models sparked heated discussions regarding their benefits, limitations, and associated risks. hold immense promise across multiple domains, such as healthcare, finance, education, to cite a few, presenting diverse practical applications. Nevertheless, concerns about potential...
Patients with Parkinson's disease (PD) may have difficulties in speaking because of reduced coordination the muscles that control breathing, phonation, articulation, and prosody. Symptoms occur are weakening volume voice, voice monotony, changes quality speed speech, uncontrolled repetition words, difficult speech intelligibility. To date, evaluation intelligibility is performed based on unified PD rating scale. Specifically, section 3.1 (eloquence) cited scale provides specialist some tips...
Medical practice for determining haemoglobin (Hb) concentration, which is important anemic patients in need of blood transfusion, requires a sample. In this paper, we propose non-invasive approach to Hb estimation based on the image analysis specific conjunctival region. Our goal develop device that not expensive and simple use assessing condition; could be used by physician decide whether take sample or even patient at home inform physician; way, can avoid having go frequently laboratory...
This paper examines the cloud computing for education (CCE) literature, and analyzes if research is developing scientifically with adequate empirical validation. All aspects of investigations covered in literature are shown as weak, hence, necessary scientific development CCE requires extending its scope interest, involving scholars synergistically to create maintain a “common agenda.” Background: A need develop on has been recognized, considerable efforts made an accurate understanding...
The diffusion of embedded and portable communication devices on modern vehicles entails new security risks since in-vehicle protocols are still insecure vulnerable to attacks. Increasing interest is being given the implementation automotive cybersecurity systems. In this work we propose an efficient high-performing intrusion detection system based unsupervised Kohonen Self-Organizing Map (SOM) network, identify attack messages sent a Controller Area Network (CAN) bus. SOM network found wide...
Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other using various protocols that, if not properly designed, may be vulnerable to local or remote attacks. The paper presents a vehicle-security operation center for improving automotive security (V-SOC4AS) enhance the detection, response, prevention...
Abstract The Information Security Management Systems (ISMS) are global and risk-driven processes that allow companies to develop their cybersecurity strategy by defining security policies, valuable assets, controls, technologies for protecting systems information from threats vulnerabilities. Despite the implementation of such management infrastructures, incidents or breaches happen. Each incident has associated a level severity set mitigation so in order restore ISMS, appropriate controls...
The potential for visually detectable clinical signs of anaemia and their correlation with the severity pathology have supported research on non-invasive prevention methods. Physical examination a suspected diagnosis is practice performed by specialist to evaluate pallor exposed tissues. aim presented herein quantify minimize subjective nature palpebral conjunctiva, suggesting method diagnostic support autonomous monitoring. Here we describe methodology system extracting key data from...
Context. A Smart city is intended as a able to offer advanced integrated services, based on information and communication technology (ICT) technologies intelligent (smart) use of urban infrastructures for improving the quality life its citizens. This goal pursued by numerous cities worldwide, through smart projects that should contribute realization an vision capable harmonizing used services developed in various application domains which operates. However, current scenario quite different....
ABSTRACT With the advent of Quantum Computing and its exponential research endeavors in past couple decades, we are looking at a Golden Era Computing. We transitioning into an age Hybrid Classical‐Quantum Computers, where quantum computational resources selectively harnessed for resource‐intensive tasks. On one hand, promises immense future innovation, it also comes with privacy security challenges. To date, Privacy by Design (PbD) Security (SbD) frameworks guidelines Software Engineering...
During its life, a legacy system is subjected to many maintenance activities, which cause degradation of the quality system: When this exceeds critical threshold, needs be reengineered. In order preserve asset represented by system, familiarity with it gained system's maintainers and users, continuity execution current operations during reengineering process, reengineered gradually. Moreover, each program within short period time. The paper proposes process model, applied an in-use confirm...
Patients with Parkinson's disease may have difficulties in speaking because of the reduced coordination muscles that control breathing, phonation, articulation and prosody. Symptoms occur changes are weakening volume voice, voice monotony, quality speed speech, uncontrolled repetition words. The evaluation some disorders mentioned can be achieved through measuring variation parameters an objective manner. It done to evaluate response treatments intra-daily frequency pre / post-treatment, as...
The diffusion of connected devices in modern vehicles involves a lack security the in-vehicle communication networks such as controller area network (CAN) bus. CAN bus protocol does not provide systems to counter cyber and physical attacks. Thus, an intrusion-detection system identify attacks anomalies on is desirable. In present work, we propose distance-based aimed at identifying attack messages injected using Kohonen self-organizing map (SOM) network. It power classifier that can be...
Modern vehicles, nowadays, come loaded with hundreds of different sensors generating a huge amount data. This data is shared and processed among Electronic Control Units (ECUs) through an in-vehicle network, such as the CAN bus, to improve driver's experience safety. However, implementation new features increases exposure cyber-attacks. The which designed grant reliable communication, has many security weaknesses that might be exploited by attacker. need for highly accurate real-time...