Francesco Marino

ORCID: 0000-0001-7662-1661
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cognitive Radio Networks and Spectrum Sensing
  • Algorithms and Data Compression
  • Advanced MIMO Systems Optimization
  • Software-Defined Networks and 5G
  • Network Packet Processing and Optimization
  • DNA and Biological Computing
  • IoT and Edge/Fog Computing
  • Power Line Communications and Noise
  • Blockchain Technology Applications and Security
  • Distributed Sensor Networks and Detection Algorithms
  • Security and Verification in Computing
  • Wireless Communication Networks Research
  • Cooperative Communication and Network Coding
  • Security in Wireless Sensor Networks
  • Cloud Computing and Resource Management
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Access Control and Trust
  • User Authentication and Security Systems
  • Web Data Mining and Analysis
  • Geotechnical Engineering and Underground Structures
  • Network Security and Intrusion Detection
  • Data-Driven Disease Surveillance
  • Ethics in Clinical Research
  • Image Enhancement Techniques

RUAG (Switzerland)
2023

University of Catania
2020-2022

Italian Society of Physiotherapy
2021

Scuola Superiore Sant'Anna
2017-2020

Bambino Gesù Children's Hospital
2020

Institute of Informatics and Telematics
2016-2018

Telecom Italia (Italy)
2018

University of Naples Federico II
2013-2016

University of Bologna
2014

Smart cities are demanding solutions for improved traffic efficiency, in order to guarantee optimal access mobility resources available urban areas. Intelligent video analytics deployed directly on board embedded sensors offers great opportunities gather highly informative data about and transport, allowing reconstruction of a real-time neat picture patterns. In this paper, we present visual sensor network which each node embeds computer vision logics analyzing real time traffic. The nodes...

10.3390/s17112588 article EN cc-by Sensors 2017-11-10

Fake news on children's and adolescent health are spreading. Internet availability decreasing costs of media devices contributing to an easy access technology by families. Public organizations working contrast misinformation promote scientific communication. In this context, a new form communication is emerging social influencers. Aim study evaluate the role paediatric influencers (PI) in communicating information about children adolescents' health.A group PI was enrolled from December 2019...

10.1186/s13052-021-01111-7 article EN cc-by ˜The œItalian Journal of Pediatrics/Italian journal of pediatrics 2021-08-11

In this paper, experimental results about secret key extraction from the physical parameters of an ultra-wideband (UWB) channel are presented. probing phase, reciprocity UWB is verified. A quantization scheme then proposed together with a alignment technique. The scheme, tested real measurements in indoor scenario, shown to yield raw keys good randomness properties and tolerable mismatch percentages between Alice Bob, as well unfavorable random error distribution for Eve.

10.1109/icuwb.2014.6958955 article EN 2014-09-01

Abstract Internet of Things (IoT) nodes participating in the implementation next‐generation IoT applications will need standard methods to authenticate each other and secure their communications. However, use certificates public key infrastructure (PKI) technologies, widely employed Internet, is not straightforward this context because limitations involved entities. This paper presents for (PKIoT) architecture, a solution which aims at enabling certificate‐based authentication forthcoming...

10.1002/ett.3681 article EN Transactions on Emerging Telecommunications Technologies 2019-07-08

Fifth generation softwarized network systems will make it possible to flexibly partition the infrastructure into logically independent slices, hosting end-to-end services able dynamically meet diverse requirements of vertical industries. However, high dynamicity NFV-related operations and interdependence multiple slices running on top a shared underlying pose peculiar security challenges. In this article we investigate how such challenges can be addressed in context management orchestration...

10.1109/mcom.001.1900712 article EN IEEE Communications Magazine 2020-07-01

The attractive characteristics of the TV White Space makes it ideal candidate for enabling multiple and independently-operated secondary networks via Cognitive Radio paradigm. However, so far, there are no regulatory requirements coexistence among heterogenous over TVWS. Hence, their mutual interference can be very severe. This issue is even more crucial in urban Smart Grid scenarios, where latency energy tight Neighborhood Area Networks (NANs) likely to located within same geographical...

10.1109/iccw.2015.7247241 article EN 2015-06-01

The paper deals with the reduction of channel outage in a smart grid scenario since it plays crucial role on control performance Demand/Response Management. A study two-way cognitive-based switching procedure is carried out and tools for optimum sensing-time evaluation are provided. Such considers cost function that takes into account both sensing-accuracy improvement gained by increasing sensing time transmission-capacity degradation induced increasing.

10.1109/emtc.2014.6996657 article EN 2014-11-01

Due to its attractive characteristics, the TV white space (TVWS) spectrum is considered ideal candidate enable deployment of smart grid networks (SGNs) via cognitive radio paradigm. However, intermittent availability TVWS as well scarcity in urban scenarios could compromise tight requirements terms reliability, latency, and data rate. This degradation be even more severe when mobile nodes, e.g., electric vehicles, are considered. Stemming from this, we first develop an analytical framework...

10.1109/access.2016.2620564 article EN cc-by-nc-nd IEEE Access 2016-01-01

The Vaccine Safety Net's Web Analytics Project (VSN-WAP) was launched in October 2017 to monitor the behavior of users visiting websites belonging VSN, a global network providing science-based information on vaccine safety. Participating could provide web metrics two ways: through Google (GA) script, which automatically forwarded central account and manual input (MI) reduced subset (Sessions, Page Views, New Users, Bounce Rate, Views/Session Average Session Duration), were pooled with...

10.1016/j.vaccine.2020.07.070 article EN cc-by-nc-nd Vaccine 2020-08-09

Softwarization is a systemic trend which appears under several paradigms impacting networks, services and terminals evolution. Even the Internet of Things (IoT) scenario going to be affected by this revolution. The efforts that are being made provide IoT objects with embedded logic reconfiguration capabilities architectures defined support standard Machine-2-Machine (M2M) transactions clear expressions trend. In direction, powerful framework enable softwarization in constrained T-Res, where...

10.1109/netsoft.2017.8004202 article EN 2017-07-01

A key issue in spectrum sensing design is the optimization of time, namely, time that maximizes transmission throughput achievable by cognitive users (CUs), while limiting interference against primary user (PU). In a mobile network scenario, this becomes more challenging than associated with traditional case (i.e., stationary scenario), since addition to temporal PU activity, spatial effects due relative mobility between PUs and CUs have be also taken into account. fact, can deeply influence...

10.1109/tvt.2015.2505087 article EN IEEE Transactions on Vehicular Technology 2015-12-03

To fully unleash the potentials of cognitive radio (CR) paradigm, new challenges must be addressed. Specifically, as regards network layer, problem route priority, i.e., prioritizing routes for CR packet transmission, is crucial, since communication opportunities provided by a are deeply affected primary-user (PU) activity. Furthermore, whenever layer exploits proactively acquired information on PU activity, update packets need to exchanged among users, inducing so overhead independently...

10.1109/tcomm.2015.2459039 article EN IEEE Transactions on Communications 2015-07-21

In this paper, we address the choice of routing update period in Cognitive Radio Ad Hoc Networks with objective maximizing capacity available at an arbitrary node acting as source. To aim, first, problem is reformulated to account for slotted nature time induced by spectrum sensing functionality. Then, analytically derive source function through closed-form expressions. The mathematical analysis carried out adopting three different strategies and two PU activity models. theoretical validate...

10.1109/iwmn.2013.6663785 article EN 2013-10-01

The problem of choosing the route providing best communication opportunities among available routes is particularly challenging in self-organizing Cognitive Radio networks, since are deeply affected by primary-user (PU) activity. Furthermore, whenever selection exploits proactively acquired information on PU activity, routing update packets need to be periodically exchanged nodes. time interval between these exchanges, i.e., period, affects overall provided a route, regardless adopted...

10.1109/seconw.2014.6979699 article EN 2014-06-01

MedCo is the first operational system that makes sensitive medical-data available for research in a simple, privacy-conscious and secure way. It enables consortium of clinical sites to collectively protect their data securely share them with investigators, without single points failure. In this short paper, we report on our ongoing effort deployment within context Swiss Personalized Health Network (SPHN) Molecular Tumor Board.

10.3233/shti200345 article EN Studies in health technology and informatics 2020-01-01

In this demo we show the functionalities of Open Source MANO extended with advanced authorization capabilities able to enhance security support in terms preservation virtual resources and slices integrity a dynamic context users, services resources. The presented extension consists Usage Control System integrated enhancing traditional operations ongoing usage control on established slices, user behaviour by continuously reconsidering granting light mutable attribute environment (e.g.,...

10.1109/netsoft.2019.8806635 article EN 2019-06-01

The increasing need for physical security in critical environment has led to a widespread of video surveillance systems. Effective systems should be able detect the presence unauthorized people monitored environments while preserving privacy authorized ones. To this aim, our paper proposes adoption usage control model scenario enforce policies that continuously whether person holds right stay give space (e.g., room) from moment when enters space. In some scenarios, is allowed room only under...

10.1109/pdp.2016.64 article EN 2016-02-01

<p>“Costantinopoli” quarry is located in the hearth of “Vallo di Diano” Province Salerno. The reuse abandoned quarries aimed to define a number small “environmentally friendly” projects order counterbalance current environmental impact.</p><p>The project provides “new green economy” through development a<i>bio-agriculture</i>, a<i>bio- factory</i>and a<i>eco-sustainable research</i>and combines ecology, horticulture, science, art,...

10.2749/222137810796025230 article EN Report 2010-01-01

Mobile users have got used to getting useful information while they are literally on the move. An implication of this habit is that certain live information, such as for navigation, dating and handling emergencies, should be tailored user's current location. While technically feasible with technology, it raises concerns location privacy. To address delicate tradeoff between privacy appropriateness location, paper discusses three delivery protocols. One widely adopted Android's protocol,...

10.1109/pdp2018.2018.00089 article EN 2018-03-01
Coming Soon ...