Maria Carla Calzarossa

ORCID: 0000-0003-1015-3142
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Distributed and Parallel Computing Systems
  • Cloud Computing and Resource Management
  • Parallel Computing and Optimization Techniques
  • Web Data Mining and Analysis
  • Distributed systems and fault tolerance
  • Advanced Data Storage Technologies
  • Peer-to-Peer Network Technologies
  • Caching and Content Delivery
  • Complex Network Analysis Techniques
  • Software System Performance and Reliability
  • Advanced Queuing Theory Analysis
  • Advanced Malware Detection Techniques
  • IoT and Edge/Fog Computing
  • Spam and Phishing Detection
  • Network Traffic and Congestion Control
  • Simulation Techniques and Applications
  • Green IT and Sustainability
  • Explainable Artificial Intelligence (XAI)
  • Blockchain Technology Applications and Security
  • Network Security and Intrusion Detection
  • Open Education and E-Learning
  • Advanced Data Processing Techniques
  • Opinion Dynamics and Social Influence
  • Real-Time Systems Scheduling
  • Information Systems Education and Curriculum Development

University of Pavia
2015-2025

Gestione Sistemi per l’Informatica (Italy)
2004

Cornell University
1997

Utrecht University
1997

Institut Fourier
1997

Université de Rennes
1997

Institut de Recherche en Informatique et Systèmes Aléatoires
1997

Karlsruhe University of Education
1997

University of California, Berkeley
1985-1986

Polytechnic University of Turin
1984

Phishing is a security threat with serious effects on individuals as well the targeted brands. Although this has been around for quite long time, it still very active and successful. In fact, tactics used by attackers have evolving continuously in years to make attacks more convincing effective. context, phishing detection of primary importance. The literature offers many diverse solutions that cope issue particular websites. This paper provides broad comprehensive review state art field...

10.1109/access.2023.3247135 article EN cc-by-nc-nd IEEE Access 2023-01-01

The performance of a system is determined by its characteristics as well the composition load being processed. Hence, quantitative description fundamental part all evaluation studies. Several methodologies for construction workload models, which are functions objective study, architecture to be analyzed, and techniques adopted, presented. A survey few applications these various types systems (i.e., batch, interactive, database, network-based, parallel, supercomputer), given.< <ETX...

10.1109/5.236191 article EN Proceedings of the IEEE 1993-01-01

IoT technologies are becoming pervasive in public and private sectors represent presently an integral part of our daily life. The advantages offered by these frequently coupled with serious security issues that often not properly overseen or even ignored. threat landscape is extremely wide complex involves a variety hardware software technologies. In this framework, the application layer protocols paramount importance since at basis communications among applications services running on...

10.3390/fi12030055 article EN cc-by Future Internet 2020-03-17

Abstract Phishing is a very dangerous security threat that affects individuals as well companies and organizations. To fight the risks associated with this threat, it important to detect phishing websites in timely manner. Machine learning models work for purpose they can predict cases, using information on underlying websites. In paper, we contribute research detection of by proposing an explainable machine model provide not only accurate predictions phishing, but also explanations which...

10.1002/qre.3411 article EN cc-by-nc-nd Quality and Reliability Engineering International 2023-07-17

The knowledge of workload fluctuations is fundamental in all performance studies which the dynantic characteristics resource demands must be taken into account. Among several data sequences that may considered, arrival pattern components certainly one most important. An approach to identification rate functions through a numerical fitting technique allows have concise representations patterns during one-day periods presented. variability over different days also investigated. considered as...

10.1109/tc.1985.1676552 article EN IEEE Transactions on Computers 1985-02-01

The pervasiveness of complex technological infrastructures and services coupled with the continuously evolving threat landscape poses new sophisticated security risks. These risks are mostly associated many diverse vulnerabilities related to software or hardware flaws, misconfigurations operational weaknesses. In this scenario, a timely assessment mitigation affecting environments paramount importance. To cope these compelling issues, we propose an AI-assisted methodological framework aimed...

10.1109/access.2023.3244490 article EN cc-by IEEE Access 2023-01-01

The technologies aimed at Web content discovery, retrieval and management face the compelling need of coping with its highly dynamic nature coupled complex user interactions. This paper analyzes temporal patterns changes three major news websites objective modeling predicting their dynamics. It has been observed that are characterized by a time dependent behavior large fluctuations significant differences across hours days. To explain this behavior, we represent change as series. trend...

10.1016/j.jnca.2015.06.008 article EN cc-by-nc-nd Journal of Network and Computer Applications 2015-07-05

Cloud technologies are being used nowadays to cope with the increased computing and storage requirements of services applications. Nevertheless, decisions about resources be provisioned corresponding scheduling plans far from easily made especially because variability uncertainty affecting workload demands as well technological infrastructure performance. In this paper we address these issues by formulating a multi-objective constrained optimization problem aimed at identifying optimal for...

10.1109/access.2021.3091310 article EN cc-by IEEE Access 2021-01-01

Resource provisioning and task scheduling in Cloud environments are quite challenging because of the fluctuating workload patterns unpredictable behaviors unstable performance infrastructure. It is therefore important to properly master uncertainties associated with workloads In this paper, we propose a probabilistic approach for resource that allows users estimate advance, i.e., offline, resources be provisioned, thus reducing risk impact overprovisioning or underprovisioning. particular,...

10.1109/iscc.2016.7543834 article EN 2016-06-01

10.1016/s0166-5316(01)00047-5 article EN Performance Evaluation 2001-10-01

The Medea (MEasurements Description, Evaluation and Analysis) software tool provides a user-friendly environment for systematically applying workload characterization techniques to raw data produced by monitoring parallel programs. Medea's models are especially useful program tuning performance debugging, testing alternative system configurations supporting benchmarking studies.< <ETX xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">&gt;</ETX>

10.1109/88.473615 article EN IEEE Parallel & Distributed Technology Systems & Applications 1995-01-01

Internet and online-based social systems are rising as the dominant mode of communication in society. However, public or semi-private environment under which most online communications operate do not make them suitable channels for speaking with others about personal emotional problems. This has led to emergence platforms support offering free, anonymous, confidential conversations live listeners. Yet very little is known way these utilized, if their features design foster strong user...

10.1145/2808797.2809311 preprint EN 2015-08-25
Coming Soon ...