- Network Security and Intrusion Detection
- Cloud Computing and Resource Management
- Cloud Data Security Solutions
- Indoor and Outdoor Localization Technologies
- Advanced Malware Detection Techniques
- IoT and Edge/Fog Computing
- Blockchain Technology Applications and Security
- Software System Performance and Reliability
- Smart Grid Security and Resilience
- Context-Aware Activity Recognition Systems
- Distributed systems and fault tolerance
- Internet Traffic Analysis and Secure E-voting
- Bluetooth and Wireless Communication Technologies
- Caching and Content Delivery
- Peer-to-Peer Network Technologies
- Service-Oriented Architecture and Web Services
- Information and Cyber Security
- Software-Defined Networks and 5G
- Privacy-Preserving Technologies in Data
- Anomaly Detection Techniques and Applications
- Simulation Techniques and Applications
- Software Testing and Debugging Techniques
- Underwater Vehicles and Communication Systems
- Distributed and Parallel Computing Systems
- Energy Efficient Wireless Sensor Networks
University of Salerno
2016-2024
University of Campania "Luigi Vanvitelli"
2013-2022
University of Naples Federico II
2002-2017
Azienda Ospedaliera Universitaria Università degli Studi della Campania Luigi Vanvitelli
2017
Consorzio Interuniversitario Nazionale per l'Informatica
2001-2011
Istituto Nazionale di Fisica Nucleare, Sezione di Napoli
2011
Parthenope University of Naples
2009-2010
University of Illinois Urbana-Champaign
2010
Huawei Technologies (United States)
2010
University of Waterloo
2010
Cloud platforms encompass a large number of storage services that can be used to manage the needs customers. Each these services, offered by different provider, is characterized specific features, limitations and prices. In presence multiple options, it crucial select best solution fitting customer requirements in terms quality service costs. Most available approaches are not able handle uncertainty expression subjective preferences from customers, result wrong (or sub-optimal) selections...
The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-by-use nature. According this paradigm, effects Denial Service (DoS) attacks involve not only quality delivered service, but also service maintenance costs in terms resource consumption. Specifically, longer detection delay is, higher be incurred. Therefore, a particular attention has paid for stealthy DoS attacks. They aim at minimizing their visibility, same time, they can as harmful brute-force are...
Malware developers continually attempt to modify the execution pattern of malicious code hiding it inside apparent normal applications, which makes its detection and classification challenging. This paper proposes an ensemble detector, exploits capabilities main analysis algorithms proposed in literature designed offer greater resilience specific evasion techniques. In particular, presents different methods optimally combine both generic specialized detectors during process, can be used...
The spread of the Internet Things (IoT) involving an uncountable number applications, combined with rise Machine Learning (ML), has enabled rapid growth pervasive and intelligent systems in a variety domains, including healthcare, environment, railway transportation Industry 4.0. While this opens up favorable scenarios, it also raises new challenges. huge amount data collected processed by ML applications requires efficient scalable solutions that contrast constrained capabilities IoT...
Cloud computing is a new business model, which represents an opportunity for users, companies, and public organisations to reduce costs increase efficiency, as well alternative way providing services resources. In this pay-by-use security plays key role. Cyber attacks are serious danger, can compromise the quality of service delivered customers, provided cloud resources services. paper, hybrid hierarchical event correlation approach intrusion detection in presented. It consists detecting...
Recently, the positioning techniques based on IEEE 802.11 signal strength are becoming dominant solutions in mobile device localization within indoor scenarios. Such characterized by two main pitfalls that compromise their effective usage real application environments. First, during calibration, a large amount of manual effort is required for acquiring massive collection training samples. Second, accuracy directly related to deployment wireless access points into workspace, which extremely...
Currently, cloud computing is the target business environment for many enterprises and government organizations. However, despite huge potential gains that can be achieved, security represents a fundamental issue, which prevents massive adoption in mission-critical Information Technology sectors. The most common issues are amplified since new complex features, with their inherent weaknesses, enter into problem space, particularly those associated to multitenancy elasticity. Thus, threats,...
There is an increasing involvement of the Internet Things (IoT) in many our daily activities, with aim improving their efficiency and effectiveness. We are witnessing advent smart cities, which IoT exploited to improve management a city's assets, as well factories, where paving way for forth industrial revolution. These applications other ones imply several non-functional requirements be satisfied by adopted solution, security assumes paramount importance. Secure communications among nodes...
Internet of Things (IoT) is become one the most important technological sector in recent years, and focus attention many fields, including military applications, healthcare, agriculture, industry, space science, made it very attractive for cyber-attacks. Especially wide diffusion Adroid platform, IoT devices are main targets malware threats. Considering great Android market share, needed to build effective tools able detecting zero-day malware. Therefore, several static dynamic analysis...