关注
Leonardo Aniello
Leonardo Aniello
Associate Professor, University of Southampton
在 soton.ac.uk 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Survey of machine learning techniques for malware analysis
D Ucci, L Aniello, R Baldoni
Computers & Security 81, 123-147, 2019
5822019
PBFT vs proof-of-authority: applying the CAP theorem to permissioned blockchain
S De Angelis, L Aniello, R Baldoni, F Lombardi, A Margheri, V Sassone
Second Italian Conference on Cybersecurity (ITASEC), 2018
5182018
Adaptive online scheduling in storm
L Aniello, R Baldoni, L Querzoni
Proceedings of the 7th ACM international conference on Distributed event …, 2013
3402013
Blockchain-based database to ensure data integrity in cloud computing environments
E Gaetani, L Aniello, R Baldoni, F Lombardi, A Margheri, V Sassone
First Italian Conference on Cybersecurity (ITASEC), 2017
2992017
A blockchain-based infrastructure for reliable and cost-effective IoT-aided smart grids
F Lombardi, L Aniello, S De Angelis, A Margheri, V Sassone
IET Digital Library, 2018
1452018
A prototype evaluation of a tamper-resistant high performance blockchain-based transaction log for a distributed database
L Aniello, R Baldoni, E Gaetani, F Lombardi, A Margheri, V Sassone
2017 13th European Dependable Computing Conference (EDCC), 151-154, 2017
1182017
Cloud-based data stream processing
T Heinze, L Aniello, L Querzoni, Z Jerzak
Proceedings of the 8th ACM International Conference on Distributed Event …, 2014
792014
Elastic symbiotic scaling of operators and resources in stream processing systems
F Lombardi, L Aniello, S Bonomi, L Querzoni
IEEE Transactions on Parallel and Distributed Systems 29 (3), 572-585, 2017
672017
Android malware family classification based on resource consumption over time
L Massarelli, L Aniello, C Ciccotelli, L Querzoni, D Ucci, R Baldoni
2017 12th International Conference on Malicious and Unwanted Software …, 2017
572017
An event-based platform for collaborative threats detection and monitoring
G Lodi, L Aniello, GA Di Luna, R Baldoni
Information Systems 39, 175-195, 2014
542014
Anti-BlUFf: towards counterfeit mitigation in IC supply chains using blockchain and PUF
L Aniello, B Halak, P Chai, R Dhall, M Mihalea, A Wilczynski
International Journal of Information Security 20, 445-460, 2021
48*2021
Malware family identification with BIRCH clustering
G Pitolli, L Aniello, G Laurenza, L Querzoni, R Baldoni
2017 International Carnahan conference on security technology (ICCST), 1-6, 2017
422017
Inter-domain stealthy port scan detection through complex event processing
L Aniello, G Lodi, R Baldoni
Proceedings of the 13th European Workshop on Dependable Computing, 67-72, 2011
342011
A collaborative event processing system for protection of critical infrastructures from cyber attacks
L Aniello, GA Di Luna, G Lodi, R Baldoni
International Conference on Computer Safety, Reliability, and Security, 310-323, 2011
302011
PDF Malware Detection: A Survey and Taxonomy of Current Techniques
M Elingiusti, L Aniello, L Querzoni, R Baldoni
Cyber Threat Intelligence 70, 169, 2018
282018
Pascal: An architecture for proactive auto-scaling of distributed services
F Lombardi, A Muti, L Aniello, R Baldoni, S Bonomi, L Querzoni
Future Generation Computer Systems 98, 342-361, 2019
262019
Malware triage based on static features and public apt reports
G Laurenza, L Aniello, R Lazzeretti, R Baldoni
Cyber Security Cryptography and Machine Learning: First International …, 2017
242017
An architecture for automatic scaling of replicated services
L Aniello, S Bonomi, F Lombardi, A Zelli, R Baldoni
Networked Systems: Second International Conference, NETYS 2014, Marrakech …, 2014
242014
Cloud2edge elastic AI framework for prototyping and deployment of AI inference engines in autonomous vehicles
S Grigorescu, T Cocias, B Trasnea, A Margheri, F Lombardi, L Aniello
Sensors 20 (19), 5450, 2020
232020
The goods, the bads and the uglies: Supporting decisions in malware detection through visual analytics
M Angelini, L Aniello, S Lenti, G Santucci, D Ucci
2017 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2017
212017
系统目前无法执行此操作,请稍后再试。
文章 1–20