Survey of machine learning techniques for malware analysis D Ucci, L Aniello, R Baldoni Computers & Security 81, 123-147, 2019 | 582 | 2019 |
PBFT vs proof-of-authority: applying the CAP theorem to permissioned blockchain S De Angelis, L Aniello, R Baldoni, F Lombardi, A Margheri, V Sassone Second Italian Conference on Cybersecurity (ITASEC), 2018 | 518 | 2018 |
Adaptive online scheduling in storm L Aniello, R Baldoni, L Querzoni Proceedings of the 7th ACM international conference on Distributed event …, 2013 | 340 | 2013 |
Blockchain-based database to ensure data integrity in cloud computing environments E Gaetani, L Aniello, R Baldoni, F Lombardi, A Margheri, V Sassone First Italian Conference on Cybersecurity (ITASEC), 2017 | 299 | 2017 |
A blockchain-based infrastructure for reliable and cost-effective IoT-aided smart grids F Lombardi, L Aniello, S De Angelis, A Margheri, V Sassone IET Digital Library, 2018 | 145 | 2018 |
A prototype evaluation of a tamper-resistant high performance blockchain-based transaction log for a distributed database L Aniello, R Baldoni, E Gaetani, F Lombardi, A Margheri, V Sassone 2017 13th European Dependable Computing Conference (EDCC), 151-154, 2017 | 118 | 2017 |
Cloud-based data stream processing T Heinze, L Aniello, L Querzoni, Z Jerzak Proceedings of the 8th ACM International Conference on Distributed Event …, 2014 | 79 | 2014 |
Elastic symbiotic scaling of operators and resources in stream processing systems F Lombardi, L Aniello, S Bonomi, L Querzoni IEEE Transactions on Parallel and Distributed Systems 29 (3), 572-585, 2017 | 67 | 2017 |
Android malware family classification based on resource consumption over time L Massarelli, L Aniello, C Ciccotelli, L Querzoni, D Ucci, R Baldoni 2017 12th International Conference on Malicious and Unwanted Software …, 2017 | 57 | 2017 |
An event-based platform for collaborative threats detection and monitoring G Lodi, L Aniello, GA Di Luna, R Baldoni Information Systems 39, 175-195, 2014 | 54 | 2014 |
Anti-BlUFf: towards counterfeit mitigation in IC supply chains using blockchain and PUF L Aniello, B Halak, P Chai, R Dhall, M Mihalea, A Wilczynski International Journal of Information Security 20, 445-460, 2021 | 48* | 2021 |
Malware family identification with BIRCH clustering G Pitolli, L Aniello, G Laurenza, L Querzoni, R Baldoni 2017 International Carnahan conference on security technology (ICCST), 1-6, 2017 | 42 | 2017 |
Inter-domain stealthy port scan detection through complex event processing L Aniello, G Lodi, R Baldoni Proceedings of the 13th European Workshop on Dependable Computing, 67-72, 2011 | 34 | 2011 |
A collaborative event processing system for protection of critical infrastructures from cyber attacks L Aniello, GA Di Luna, G Lodi, R Baldoni International Conference on Computer Safety, Reliability, and Security, 310-323, 2011 | 30 | 2011 |
PDF Malware Detection: A Survey and Taxonomy of Current Techniques M Elingiusti, L Aniello, L Querzoni, R Baldoni Cyber Threat Intelligence 70, 169, 2018 | 28 | 2018 |
Pascal: An architecture for proactive auto-scaling of distributed services F Lombardi, A Muti, L Aniello, R Baldoni, S Bonomi, L Querzoni Future Generation Computer Systems 98, 342-361, 2019 | 26 | 2019 |
Malware triage based on static features and public apt reports G Laurenza, L Aniello, R Lazzeretti, R Baldoni Cyber Security Cryptography and Machine Learning: First International …, 2017 | 24 | 2017 |
An architecture for automatic scaling of replicated services L Aniello, S Bonomi, F Lombardi, A Zelli, R Baldoni Networked Systems: Second International Conference, NETYS 2014, Marrakech …, 2014 | 24 | 2014 |
Cloud2edge elastic AI framework for prototyping and deployment of AI inference engines in autonomous vehicles S Grigorescu, T Cocias, B Trasnea, A Margheri, F Lombardi, L Aniello Sensors 20 (19), 5450, 2020 | 23 | 2020 |
The goods, the bads and the uglies: Supporting decisions in malware detection through visual analytics M Angelini, L Aniello, S Lenti, G Santucci, D Ucci 2017 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2017 | 21 | 2017 |