Massimo Ficco

ORCID: 0000-0003-4199-8199
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Cloud Computing and Resource Management
  • Cloud Data Security Solutions
  • Indoor and Outdoor Localization Technologies
  • Advanced Malware Detection Techniques
  • IoT and Edge/Fog Computing
  • Blockchain Technology Applications and Security
  • Software System Performance and Reliability
  • Smart Grid Security and Resilience
  • Context-Aware Activity Recognition Systems
  • Distributed systems and fault tolerance
  • Internet Traffic Analysis and Secure E-voting
  • Bluetooth and Wireless Communication Technologies
  • Caching and Content Delivery
  • Peer-to-Peer Network Technologies
  • Service-Oriented Architecture and Web Services
  • Information and Cyber Security
  • Software-Defined Networks and 5G
  • Privacy-Preserving Technologies in Data
  • Anomaly Detection Techniques and Applications
  • Simulation Techniques and Applications
  • Software Testing and Debugging Techniques
  • Underwater Vehicles and Communication Systems
  • Distributed and Parallel Computing Systems
  • Energy Efficient Wireless Sensor Networks

University of Salerno
2016-2024

University of Campania "Luigi Vanvitelli"
2013-2022

University of Naples Federico II
2002-2017

Azienda Ospedaliera Universitaria Università degli Studi della Campania Luigi Vanvitelli
2017

Consorzio Interuniversitario Nazionale per l'Informatica
2001-2011

Istituto Nazionale di Fisica Nucleare, Sezione di Napoli
2011

Parthenope University of Naples
2009-2010

University of Illinois Urbana-Champaign
2010

Huawei Technologies (United States)
2010

University of Waterloo
2010

Cloud platforms encompass a large number of storage services that can be used to manage the needs customers. Each these services, offered by different provider, is characterized specific features, limitations and prices. In presence multiple options, it crucial select best solution fitting customer requirements in terms quality service costs. Most available approaches are not able handle uncertainty expression subjective preferences from customers, result wrong (or sub-optimal) selections...

10.1109/tc.2015.2389952 article EN IEEE Transactions on Computers 2015-01-08

The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-by-use nature. According this paradigm, effects Denial Service (DoS) attacks involve not only quality delivered service, but also service maintenance costs in terms resource consumption. Specifically, longer detection delay is, higher be incurred. Therefore, a particular attention has paid for stealthy DoS attacks. They aim at minimizing their visibility, same time, they can as harmful brute-force are...

10.1109/tcc.2014.2325045 article EN IEEE Transactions on Cloud Computing 2014-07-02

Malware developers continually attempt to modify the execution pattern of malicious code hiding it inside apparent normal applications, which makes its detection and classification challenging. This paper proposes an ensemble detector, exploits capabilities main analysis algorithms proposed in literature designed offer greater resilience specific evasion techniques. In particular, presents different methods optimally combine both generic specialized detectors during process, can be used...

10.1109/tc.2021.3082002 article EN IEEE Transactions on Computers 2021-01-01

The spread of the Internet Things (IoT) involving an uncountable number applications, combined with rise Machine Learning (ML), has enabled rapid growth pervasive and intelligent systems in a variety domains, including healthcare, environment, railway transportation Industry 4.0. While this opens up favorable scenarios, it also raises new challenges. huge amount data collected processed by ML applications requires efficient scalable solutions that contrast constrained capabilities IoT...

10.1016/j.inffus.2023.102189 article EN cc-by-nc-nd Information Fusion 2023-12-08

Cloud computing is a new business model, which represents an opportunity for users, companies, and public organisations to reduce costs increase efficiency, as well alternative way providing services resources. In this pay-by-use security plays key role. Cyber attacks are serious danger, can compromise the quality of service delivered customers, provided cloud resources services. paper, hybrid hierarchical event correlation approach intrusion detection in presented. It consists detecting...

10.1504/ijhpcn.2013.056525 article EN International Journal of High Performance Computing and Networking 2013-01-01

Recently, the positioning techniques based on IEEE 802.11 signal strength are becoming dominant solutions in mobile device localization within indoor scenarios. Such characterized by two main pitfalls that compromise their effective usage real application environments. First, during calibration, a large amount of manual effort is required for acquiring massive collection training samples. Second, accuracy directly related to deployment wireless access points into workspace, which extremely...

10.1109/tmc.2013.29 article EN IEEE Transactions on Mobile Computing 2013-05-31

Currently, cloud computing is the target business environment for many enterprises and government organizations. However, despite huge potential gains that can be achieved, security represents a fundamental issue, which prevents massive adoption in mission-critical Information Technology sectors. The most common issues are amplified since new complex features, with their inherent weaknesses, enter into problem space, particularly those associated to multitenancy elasticity. Thus, threats,...

10.1109/jsyst.2015.2414822 article EN IEEE Systems Journal 2015-04-11

There is an increasing involvement of the Internet Things (IoT) in many our daily activities, with aim improving their efficiency and effectiveness. We are witnessing advent smart cities, which IoT exploited to improve management a city's assets, as well factories, where paving way for forth industrial revolution. These applications other ones imply several non-functional requirements be satisfied by adopted solution, security assumes paramount importance. Secure communications among nodes...

10.1109/tdsc.2018.2799227 article EN IEEE Transactions on Dependable and Secure Computing 2018-01-30

Internet of Things (IoT) is become one the most important technological sector in recent years, and focus attention many fields, including military applications, healthcare, agriculture, industry, space science, made it very attractive for cyber-attacks. Especially wide diffusion Adroid platform, IoT devices are main targets malware threats. Considering great Android market share, needed to build effective tools able detecting zero-day malware. Therefore, several static dynamic analysis...

10.1109/ic2e.2019.00037 article EN 2019-06-01
Coming Soon ...