Lorenzo Rinieri

ORCID: 0000-0003-1767-7256
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Information and Cyber Security
  • Smart Grid Security and Resilience
  • IoT and Edge/Fog Computing
  • Blockchain Technology Applications and Security
  • Digital Transformation in Industry
  • Advanced Malware Detection Techniques
  • Software-Defined Networks and 5G
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Advanced Wireless Communication Technologies
  • Flexible and Reconfigurable Manufacturing Systems
  • Petri Nets in System Modeling
  • Formal Methods in Verification
  • Network Security and Intrusion Detection
  • Cloud Computing and Resource Management
  • Software Reliability and Analysis Research
  • Telecommunications and Broadcasting Technologies
  • Currency Recognition and Detection
  • Wireless Communication Security Techniques

University of Bologna
2022-2024

Industry 4.0 has revolutionized process innovation while facilitating and encouraging many new possibilities. The objective of is the radical enhancement productivity, a goal that presupposes integration Operational Technology (OT) networks with Information (IT) networks, which were hitherto isolated. This disruptive approach enabled by adopting several emerging technologies in Enterprise processes. In this manuscript, we discuss what believe to be one main challenges preventing full...

10.3390/fi15030095 article EN cc-by Future Internet 2023-02-27

The Edge Computing paradigm is increasingly gaining traction in modern telecommunication scenarios, as it enables the offloading of computational tasks from end devices to a variety nodes located close proximity them. This approach essential for meeting ever-stricter Quality Service requirements imposed by applications. Concurrently, advent Data Plane Programmability allows unmatched flexibility on networking plane, supporting processing multiple protocols logically centralized fashion with...

10.1016/j.comnet.2024.110397 article EN cc-by-nc-nd Computer Networks 2024-04-09

The ubiquitous diffusion of connected devices in every context the daily life citizens, public bodies, and companies is stimulating creation new applications that require very high wireless communication performances. To fulfill this need, sixth generation standards (6G) planned to roll out by 2030. While structuring standard, it crucial take into account security aspects given impact technologies will rely on its reliability resiliency. In paper, we provide an overview be used 6G achieve...

10.3390/electronics13112162 article EN Electronics 2024-06-01

In this manuscript we describe the implementation of a digital twin for industrial networks. The aim is to provide playground cyber-security analysis and validation without risk interfering any extent with real cyber-physical system its environment. proposed methodology provides very high degree automation, following telecom-oriented NFV-MANO approach, shows that different network topologies may be activated in matter just few minutes. Each topology then used as sort cyber-range...

10.1109/isncc55209.2022.9851731 article EN 2022 International Symposium on Networks, Computers and Communications (ISNCC) 2022-07-19

Nowadays, as the cyber-threat landscape is evolving and digital assets are proliferating becoming more interconnected with internet heterogeneous devices, it fundamental to be able obtain a sensible measure of security networks, systems. Industrial cyber–physical systems (ICPSs), in particular, can exposed high operational risks that entail damage revenues, assets, even people. A way overcome open question measuring use metrics. With metrics possible rely on proven indicators benchmark...

10.3390/electronics13071208 article EN Electronics 2024-03-25

The correct and efficient measurement of security properties is key to the deployment effective cyberspace protection strategies. In this work, we propose GRAPH4, which a system that combines different metrics design an attack detection approach leverages advantages modern network architectures. GRAPH4 makes use graphs are generated by control plane extract view components requiring monitoring, based on specific must be detected knowledge complete layout. It enables distribution tasks...

10.3390/fi15110368 article EN cc-by Future Internet 2023-11-15

Cyber-physical systems, by definition, have an effect on assets and people in the real world. Security factors, thus, should play a central role every decision regarding their deployment configuration, but this is possible only if said factors are properly defined can be objectively measured. In paper, we summarize state of art security metrics, advocate need for research effort aimed at taking field to new level formal soundness practical usability.

10.1109/isncc55209.2022.9851735 article EN 2022 International Symposium on Networks, Computers and Communications (ISNCC) 2022-07-19
Coming Soon ...