Massimiliano Albanese

ORCID: 0000-0002-2675-5810
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Information and Cyber Security
  • Advanced Malware Detection Techniques
  • Video Analysis and Summarization
  • Advanced Image and Video Retrieval Techniques
  • Software System Performance and Reliability
  • Anomaly Detection Techniques and Applications
  • Image Retrieval and Classification Techniques
  • Recommender Systems and Techniques
  • Semantic Web and Ontologies
  • Internet Traffic Analysis and Secure E-voting
  • Complex Network Analysis Techniques
  • Security and Verification in Computing
  • Software-Defined Networks and 5G
  • Music and Audio Processing
  • Human Pose and Action Recognition
  • Distributed systems and fault tolerance
  • Advanced Software Engineering Methodologies
  • Smart Grid Security and Resilience
  • Advanced Database Systems and Queries
  • Data Management and Algorithms
  • Web Data Mining and Analysis
  • Data Quality and Management
  • Mobile Ad Hoc Networks
  • Scientific Computing and Data Management

George Mason University
2015-2024

University of Maryland, College Park
2007-2022

University of Naples Federico II
2004-2022

University of Massachusetts Dartmouth
2022

Tohoku University
2022

University of Waterloo
2022

InterDigital (United States)
2022

China Telecom (China)
2022

University at Buffalo, State University of New York
2022

University of Milan
2016-2022

Diversity has long been regarded as a security mechanism for improving the resilience of software and networks against various attacks. More recently, diversity found new applications in cloud computing security, moving target defense, robustness network routing. However, most existing efforts rely on intuitive imprecise notions diversity, few models are mostly designed single system running diverse replicas or variants. At higher abstraction level, global property entire network, its effect...

10.1109/tifs.2016.2516916 article EN publisher-specific-oa IEEE Transactions on Information Forensics and Security 2016-01-12

The cyber situational awareness of an organization determines its effectiveness in responding to attacks. Mission success is highly dependent on the availability and correct operation complex computer networks, which are vulnerable various types Today, capabilities limited many ways, such as inaccurate incomplete vulnerability analysis, failure adapt evolving networks attacks, inability transform raw data into intelligence, for handling uncertainty. We describe advanced mission-centric...

10.1109/milcom.2011.6127490 article EN 2011-11-01

Recognition of human activities in restricted settings such as airports, parking lots and banks is significant interest security automated surveillance systems. In settings, data usually the form videos with wide variation quality granularity. Interpretation identification requires an activity model that a) rich enough to handle complex multi-agent interactions, b) robust uncertainty low-level processing c) can ambiguities unfolding activities. We present a computational framework for...

10.1109/tmm.2008.2001369 article EN IEEE Transactions on Multimedia 2008-10-01

Attack graph analysis has been established as a powerful tool for analyzing network vulnerability. However, previous approaches to hardening look exact solutions and thus do not scale. Further, elements have treated independently, which is inappropriate real environments. For example, the cost patching many systems may be nearly same single one. Or vulnerability effect blocking traffic with firewall, while port deny legitimate service. By failing account such interdependencies, resulting...

10.1109/dsn.2012.6263942 article EN 2012-06-01

The extraordinary technological progress we have witnessed in recent years has made it possible to generate and exchange multimedia content at an unprecedented rate. As a consequence, massive collections of objects are now widely available large population users. the task browsing such could be daunting, Recommender Systems being developed assist users finding items that match their needs preferences. In this article, present novel approach recommendation systems, based on modeling as social...

10.1145/2532640 article EN ACM Transactions on Internet Technology 2013-11-01

Distributed Denial of Service attacks against high-profile targets have become more frequent in recent years. In response to such massive attacks, several architectures adopted proxies introduce layers indirection between end users and target services reduce the impact a DDoS attack by migrating new shuffling clients across so as isolate malicious clients. However, reactive nature these solutions presents weaknesses that we leveraged develop - proxy harvesting which enables collect...

10.1109/cns.2016.7860486 article EN 2016-10-01

One of the most important challenge in information access field is overload. To cope with this problem, paper, we present a strategy for semantic multimedia recommender system that computes customized recommendations using contents and low-level features objects, past behavior individual users users' community as whole. We have implemented prototype browsing Uffizi Gallery digital picture collection. Then, investigated effectiveness proposed approach, based on satisfaction. The obtained...

10.1109/icsc.2011.47 article EN 2011-09-01

Techniques aimed at continuously changing a system's attack surface, usually referred to as Moving Target Defense (MTD), are emerging powerful tools for thwarting cyber attacks. Such mechanisms increase the uncertainty, complexity, and cost attackers, limit exposure of vulnerabilities, ultimately overall resiliency. In this paper, we propose an MTD approach protecting resource-constrained distributed devices through fine-grained reconfiguration different architectural layers. order show...

10.1109/iri.2013.6642449 article EN 2013-08-01

Botnets are increasingly being used for exfiltrating sensitive data from mission-critical systems. Research has shown that botnets have become extremely sophisticated and can operate in stealth mode by minimizing their host network footprint. In order to defeat exfiltration modern botnets, we propose a moving target defense approach dynamically deploying detectors across network. Specifically, several strategies based on centrality measures periodically change the placement of detectors. Our...

10.1145/2995272.2995280 article EN 2016-10-24

Moving Target Defense (MTD) has recently emerged as a game changer in the security landscape due to its proven potential introduce asymmetric uncertainty that gives defender tactical advantage over attacker. Many different MTD techniques have been developed, but, despite huge progress made this area, critical gaps still exist with respect problem of studying and quantifying cost benefits deploying MTDs. In fact, all existing address very narrow set attack vectors, and, lack shared metrics,...

10.1109/tdsc.2018.2882825 article EN IEEE Transactions on Dependable and Secure Computing 2018-11-22

Mechanisms for continuously changing or shifting a system's attack surface are emerging as game-changers in cyber security. In this paper, we propose novel defense mechanism protecting the identity of nodes Mobile Ad Hoc Networks and defeat attacker's reconnaissance efforts. The proposed turns classical - Sybil into an effective mechanism, with legitimate periodically their virtual order to increase uncertainty attacker. To preserve communication among nodes, modify network layer by...

10.1109/cns.2013.6682717 article EN 2013-10-01

There are numerous applications where we wish to discover unexpected activities in a sequence of time-stamped observation data--for instance, may want detect inexplicable events transactions at website or video an airport tarmac. In this paper, start with known set $({\cal A})$ (both innocuous and dangerous) that monitor. However, addition, identify "unexplained" subsequences poorly explained (e.g., because they contain occurrences have never been seen anticipated before, i.e., not A})$). We...

10.1109/tkde.2013.33 article EN IEEE Transactions on Knowledge and Data Engineering 2013-04-22

Distributed denial-of-service attacks are an increasing problem facing web applications, for which many defense techniques have been proposed, including several moving-target strategies. These strategies typically work by relocating targeted services over time, uncertainty the attacker, while trying not to disrupt legitimate users or incur excessive costs. Prior has shown, however, whether and how a rational defender would choose method against adaptive under what conditions. We formulate...

10.1145/2995272.2995279 article EN 2016-10-24

Today, numerous applications require the ability to monitor a continuous stream of fine-grained data for occurrence certain high-level activities. A number computerized systems-including ATM networks, web servers, and intrusion detection systems-systematically track every atomic action we perform, thus generating massive streams timestamped observation data, possibly from multiple concurrent In this paper, address problem efficiently detecting occurrences activities such interleaved streams....

10.1109/tkde.2011.246 article EN IEEE Transactions on Knowledge and Data Engineering 2011-12-06

In recent years, Moving Target Defense (MTD) has emerged as a potential game changer in the security landscape, due to its create asymmetric uncertainty that favors defender. Many different MTD techniques have then been proposed, each addressing an often very specific set of attack vectors. Despite huge progress made this area, there are still some critical gaps with respect analysis and quantification cost benefits deploying techniques. fact, common metrics assess performance these lacking...

10.1145/3140549.3140550 article EN 2017-10-30

Cyber attacks are typically preceded by a reconnaissance phase in which attackers aim at collecting valuable information about the target system, including network topology, service dependencies, and unpatched vulnerabilities. Unfortunately, when system configurations static, will always be able, given enough time, to acquire accurate knowledge engineer effective exploits. To address this important problem, many adaptive techniques have been devised dynamically change some aspects of...

10.1109/cns.2014.6997517 article EN IEEE Conference on Communications and Network Security 2014-10-01
Coming Soon ...