Publications

(2025). Light sensor based covert channels on mobile devices. Information Sciences.

Cite DOI URL

(2025). Federated Learning in radiomics: A comprehensive meta-survey on medical image analysis. Computer Methods and Programs in Biomedicine.

Cite DOI URL

(2025). A cross-architecture malware detection approach based on intermediate representation. Journal of Information Security and Applications.

Cite DOI URL

(2024). A Forensic Framework for Screen Capture Validation in Legal Contexts. 2024 IEEE International Conference on Cyber Security and Resilience (CSR).

Cite DOI

(2024). Enabling Obfuscation Detection in Binary Software through eXplainable AI. IEEE Transactions on Emerging Topics in Computing.

Cite DOI

(2024). Software Security - Introduction to the Special Theme. ERCIM News.

Cite

(2024). SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language. Computer Security. ESORICS 2023 International Workshops.

Cite

(2024). Model aggregation techniques in federated learning: A comprehensive survey. Future Generation Computer Systems.

Cite DOI URL

(2024). Firmware Dynamic Analysis Through Rewriting. Device-Edge-Cloud Continuum: Paradigms, Architectures and Applications.

Cite DOI URL

(2024). Editorial: Special issue on software protection and attacks. Journal of Information Security and Applications.

Cite DOI URL

(2024). CheckMATE '24 - Research on Offensive and Defensive Techniques in the context of Man At The End (MATE) Attacks. Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security.

Cite DOI URL

(2024). Activity Recognition and Prediction for Smart IoT Environments. Springer Cham.

Cite

(2023). Exploiting Bytecode Analysis for Reentrancy Vulnerability Detection in Ethereum Smart Contracts. 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech).

Cite DOI

(2023). Deep Learning-Based Detection of CSRF Vulnerabilities in Web Applications. 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/ PiCom/CBDCom/CyberSciTech).

Cite DOI

(2023). Exploiting number theory for dynamic software watermarking. Journal of Computer Virology and Hacking Techniques.

Cite DOI URL

(2023). Explaining Binary Obfuscation. 2023 IEEE International Conference on Cyber Security and Resilience (CSR).

Cite DOI

(2023). Security and privacy for the Internet of Things. Frontiers in Computer Science.

Cite

(2023). SCOUT: Security by computing OUTliers on activity logs. Computers & Security.

Cite DOI URL

(2023). FL-Enhance: A federated learning framework for balancing non-IID data with augmented and shared compressed samples. Information Fusion.

Cite DOI URL

(2023). DKSM: A Decentralized Kerberos Secure Service-Management Protocol for Internet of Things. Internet of Things.

Cite DOI URL

(2023). Demystifying machine learning models of massive IoT attack detection with Explainable AI for sustainable and secure future smart cities. Internet of Things.

Cite DOI URL

(2023). An advanced data fabric architecture leveraging homomorphic encryption and federated learning. Information Fusion.

Cite DOI URL

(2022). Identification and prediction of attacks to industrial control systems using temporal point processes. Journal of Ambient Intelligence and Humanized Computing.

Cite DOI URL

(2022). Enabling Faster Security Assessment of Re-hosted Firmware. 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech).

Cite DOI

(2022). Some Experiments on High Performance Anomaly Detection. 2022 30th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP).

Cite

(2022). Neural Network based Temporal Point Processes for Attack Detection in Industrial Control Systems. 2022 IEEE International Conference on Cyber Security and Resilience (CSR).

Cite DOI

(2021). Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone. Proceedings of the 2021 Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) Attacks.

Cite DOI URL

(2021). Some experiments on activity outlier detection. Proceedings of the 29th Italian Symposium on Advanced Database Systems, SEBD 2021, Pizzo Calabro (VV), Italy, September 5-9, 2021.

PDF Cite

(2021). Predicting activities of daily living via temporal point processes: Approaches and experimental results. Computers & Electrical Engineering.

Cite

(2021). Activity Daily Living prediction with Marked Temporal Point Processes. Proceedings of the 29th Italian Symposium on Advanced Database Systems, SEBD 2021, Pizzo Calabro (VV), Italy, September 5-9, 2021.

PDF Cite

(2021). A compact encoding of security logs for high performance activity detection. 29th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2021, Valladolid, Spain, March 10-12, 2021.

Cite DOI URL

(2020). Smart Data Exchange. Proceedings of the 28th Italian Symposium on Advanced Database Systems, Villasimius, Sud Sardegna, Italy (virtual due to Covid-19 pandemic), June 21-24, 2020.

PDF Cite

(2020). Modeling and efficiently detecting security-critical sequences of actions. Future Generation Computer Systems.

Cite DOI URL

(2020). Fast and effective Big Data exploration by clustering. Future Generation Computer Systems.

Cite URL

(2020). Exploiting Marked Temporal Point Processes for Predicting Activities of Daily Living. 2020 IEEE International Conference on Human-Machine Systems (ICHMS).

Cite DOI

(2020). A survey of Big Data dimensions vs Social Networks analysis. Journal of Intelligent Information Systems.

Cite

(2019). How to implement a big data clustering algorithm: a brief report on lesson learned. Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, SAC 2019, Limassol, Cyprus, April 8-12, 2019.

Cite DOI URL

(2019). High Performance Computing by the Crowd. Intelligent Methods and Big Data in Industrial Applications..

Cite DOI URL

(2019). Exotic Compilers as a Malware Evasion Technique. Proceedings of the 27th Italian Symposium on Advanced Database Systems, Castiglione della Pescaia (Grosseto), Italy, June 16-19, 2019..

PDF Cite

(2019). An Overview of the Endless Battle between Virus Writers and Detectors: How Compilers Can Be Used as an Evasion Technique. Proceedings of the 8th International Conference on Data Science, Technology and Applications, DATA 2019, Prague, Czech Republic, July 26-28, 2019..

Cite DOI URL

(2018). Trusted Environments for Volunteer Computing. 2018 IEEE International Conference on Information Reuse and Integration, IRI 2018, Salt Lake City, UT, USA, July 6-9, 2018.

Cite DOI URL

(2018). Efficient Big Data Clustering. Proceedings of the 22nd International Database Engineering & Applications Symposium, IDEAS 2018, Villa San Giovanni, Italy, June 18-20, 2018.

Cite DOI URL

(2018). Distributed computing by leveraging and rewarding idling user resources from P2P networks. Journal of Parallel and Distributed Computing.

Cite DOI URL

(2018). Clustering Goes Big: CLUBS-P, an Algorithm for Unsupervised Clustering Around Centroids Tailored For Big Data Applications. 26th Euromicro International Conference on Parallel, Distributed and Network-based Processing, PDP 2018, Cambridge, United Kingdom, March 21-23, 2018.

Cite DOI URL

(2018). Clustering Big Data. Proceedings of the 7th International Conference on Data Science, Technology and Applications, DATA 2018, Porto, Portugal, July 26-28, 2018.

Cite DOI URL

(2017). Trusted Volunteer Computing. Proceedings of the 25th Italian Symposium on Advanced Database Systems, Squillace Lido (Catanzaro), Italy, June 25-29, 2017..

PDF Cite

(2017). High Performance Computing By The Crowd. 23rd International Symposium on Methodologies for Intelligent Systems, ISMIS 2017.

Cite

(2017). Efficient High Performance Computing by user networks. Proceedings of the 25th Italian Symposium on Advanced Database Systems, Squillace Lido (Catanzaro), Italy, June 25-29, 2017..

PDF Cite

(2017). Effective High Performance Computing using Peer To Peer Networks. 2017 International Conference on High Performance Computing & Simulation, HPCS 2017, Genoa, Italy, July 17-21, 2017.

Cite DOI URL

(2017). A Peer to Peer Approach to Efficient High Performance Computing. Parallel, Distributed and Network-based Processing (PDP), 2017 25th Euromicro International Conference on.

Cite

(2015). VIPOC Project Research Summary (Discussion Paper).. 23rd Italian Symposium on Advanced Database Systems, SEBD 2015, Gaeta, Italy, June 14-17, 2015..

Cite

(2015). Hierarchical Big Data Clustering (Discussion Paper). 23rd Italian Symposium on Advanced Database Systems, SEBD 2015, Gaeta, Italy, June 14-17, 2015..

Cite

(2015). Big data techniques for supporting accurate predictions of energy production from renewable sources. Proceedings of the 19th International Database Engineering & Applications Symposium.

Cite

(2014). Virtual Power Operating Center (Vi-POC): Big Data Techniques for Renewable Energy Market. AIIA*.

Cite