Publications

(2025). Light sensor based covert channels on mobile devices. Information Sciences.

PDF Cite DOI

(2024). Enabling Obfuscation Detection in Binary Software through eXplainable AI. IEEE Transactions on Emerging Topics in Computing.

Cite DOI

(2024). A Forensic Framework for Screen Capture Validation in Legal Contexts. 2024 IEEE International Conference on Cyber Security and Resilience (CSR).

Cite DOI

(2024). Software Security - Introduction to the Special Theme. ERCIM News.

Cite

(2024). SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language. Computer Security. ESORICS 2023 International Workshops.

Cite

(2024). Model aggregation techniques in federated learning: A comprehensive survey. Future Generation Computer Systems.

PDF Cite DOI

(2024). Firmware Dynamic Analysis Through Rewriting. Device-Edge-Cloud Continuum: Paradigms, Architectures and Applications.

PDF Cite DOI

(2024). Editorial: Special issue on software protection and attacks. Journal of Information Security and Applications.

PDF Cite DOI

(2024). Activity Recognition and Prediction for Smart IoT Environments. Springer Cham.

Cite

(2023). Exploiting Bytecode Analysis for Reentrancy Vulnerability Detection in Ethereum Smart Contracts. 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech).

Cite DOI

(2023). Deep Learning-Based Detection of CSRF Vulnerabilities in Web Applications. 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/ PiCom/CBDCom/CyberSciTech).

Cite DOI

(2023). Exploiting number theory for dynamic software watermarking. Journal of Computer Virology and Hacking Techniques.

PDF Cite DOI

(2023). Explaining Binary Obfuscation. 2023 IEEE International Conference on Cyber Security and Resilience (CSR).

Cite DOI

(2023). Security and privacy for the Internet of Things. Frontiers in Computer Science.

Cite

(2023). SCOUT: Security by computing OUTliers on activity logs. Computers & Security.

PDF Cite DOI

(2023). FL-Enhance: A federated learning framework for balancing non-IID data with augmented and shared compressed samples. Information Fusion.

PDF Cite DOI

(2023). DKSM: A Decentralized Kerberos Secure Service-Management Protocol for Internet of Things. Internet of Things.

PDF Cite DOI

(2023). Demystifying machine learning models of massive IoT attack detection with Explainable AI for sustainable and secure future smart cities. Internet of Things.

PDF Cite DOI

(2023). An advanced data fabric architecture leveraging homomorphic encryption and federated learning. Information Fusion.

PDF Cite DOI

(2022). Identification and prediction of attacks to industrial control systems using temporal point processes. Journal of Ambient Intelligence and Humanized Computing.

PDF Cite DOI

(2022). Enabling Faster Security Assessment of Re-hosted Firmware. 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech).

Cite DOI

(2022). Some Experiments on High Performance Anomaly Detection. 2022 30th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP).

Cite

(2022). Neural Network based Temporal Point Processes for Attack Detection in Industrial Control Systems. 2022 IEEE International Conference on Cyber Security and Resilience (CSR).

Cite DOI

(2021). Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone. Proceedings of the 2021 Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) Attacks.

PDF Cite DOI

(2021). Some experiments on activity outlier detection. Proceedings of the 29th Italian Symposium on Advanced Database Systems, SEBD 2021, Pizzo Calabro (VV), Italy, September 5-9, 2021.

PDF Cite

(2021). Predicting activities of daily living via temporal point processes: Approaches and experimental results. Computers & Electrical Engineering.

Cite

(2021). Activity Daily Living prediction with Marked Temporal Point Processes. Proceedings of the 29th Italian Symposium on Advanced Database Systems, SEBD 2021, Pizzo Calabro (VV), Italy, September 5-9, 2021.

PDF Cite

(2021). A compact encoding of security logs for high performance activity detection. 29th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2021, Valladolid, Spain, March 10-12, 2021.

PDF Cite DOI

(2020). Smart Data Exchange. Proceedings of the 28th Italian Symposium on Advanced Database Systems, Villasimius, Sud Sardegna, Italy (virtual due to Covid-19 pandemic), June 21-24, 2020.

PDF Cite

(2020). Modeling and efficiently detecting security-critical sequences of actions. Future Generation Computer Systems.

PDF Cite DOI

(2020). Fast and effective Big Data exploration by clustering. Future Generation Computer Systems.

PDF Cite

(2020). Exploiting Marked Temporal Point Processes for Predicting Activities of Daily Living. 2020 IEEE International Conference on Human-Machine Systems (ICHMS).

Cite DOI

(2020). A survey of Big Data dimensions vs Social Networks analysis. Journal of Intelligent Information Systems.

Cite

(2019). How to implement a big data clustering algorithm: a brief report on lesson learned. Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, SAC 2019, Limassol, Cyprus, April 8-12, 2019.

PDF Cite DOI

(2019). High Performance Computing by the Crowd. Intelligent Methods and Big Data in Industrial Applications..

PDF Cite DOI

(2019). Exotic Compilers as a Malware Evasion Technique. Proceedings of the 27th Italian Symposium on Advanced Database Systems, Castiglione della Pescaia (Grosseto), Italy, June 16-19, 2019..

PDF Cite

(2019). An Overview of the Endless Battle between Virus Writers and Detectors: How Compilers Can Be Used as an Evasion Technique. Proceedings of the 8th International Conference on Data Science, Technology and Applications, DATA 2019, Prague, Czech Republic, July 26-28, 2019..

PDF Cite DOI

(2018). Trusted Environments for Volunteer Computing. 2018 IEEE International Conference on Information Reuse and Integration, IRI 2018, Salt Lake City, UT, USA, July 6-9, 2018.

PDF Cite DOI

(2018). Efficient Big Data Clustering. Proceedings of the 22nd International Database Engineering & Applications Symposium, IDEAS 2018, Villa San Giovanni, Italy, June 18-20, 2018.

PDF Cite DOI

(2018). Distributed computing by leveraging and rewarding idling user resources from P2P networks. Journal of Parallel and Distributed Computing.

PDF Cite DOI

(2018). Clustering Goes Big: CLUBS-P, an Algorithm for Unsupervised Clustering Around Centroids Tailored For Big Data Applications. 26th Euromicro International Conference on Parallel, Distributed and Network-based Processing, PDP 2018, Cambridge, United Kingdom, March 21-23, 2018.

PDF Cite DOI

(2018). Clustering Big Data. Proceedings of the 7th International Conference on Data Science, Technology and Applications, DATA 2018, Porto, Portugal, July 26-28, 2018.

PDF Cite DOI

(2017). Trusted Volunteer Computing. Proceedings of the 25th Italian Symposium on Advanced Database Systems, Squillace Lido (Catanzaro), Italy, June 25-29, 2017..

PDF Cite

(2017). High Performance Computing By The Crowd. 23rd International Symposium on Methodologies for Intelligent Systems, ISMIS 2017.

Cite

(2017). Efficient High Performance Computing by user networks. Proceedings of the 25th Italian Symposium on Advanced Database Systems, Squillace Lido (Catanzaro), Italy, June 25-29, 2017..

PDF Cite

(2017). Effective High Performance Computing using Peer To Peer Networks. 2017 International Conference on High Performance Computing & Simulation, HPCS 2017, Genoa, Italy, July 17-21, 2017.

PDF Cite DOI

(2017). A Peer to Peer Approach to Efficient High Performance Computing. Parallel, Distributed and Network-based Processing (PDP), 2017 25th Euromicro International Conference on.

Cite

(2015). VIPOC Project Research Summary (Discussion Paper).. 23rd Italian Symposium on Advanced Database Systems, SEBD 2015, Gaeta, Italy, June 14-17, 2015..

Cite

(2015). Hierarchical Big Data Clustering (Discussion Paper). 23rd Italian Symposium on Advanced Database Systems, SEBD 2015, Gaeta, Italy, June 14-17, 2015..

Cite

(2015). Big data techniques for supporting accurate predictions of energy production from renewable sources. Proceedings of the 19th International Database Engineering & Applications Symposium.

Cite

(2014). Virtual Power Operating Center (Vi-POC): Big Data Techniques for Renewable Energy Market. AIIA*.

Cite