Seguir
Luca Caviglione
Luca Caviglione
Dirección de correo verificada de ge.imati.cnr.it - Página principal
Título
Citado por
Citado por
Año
The future of digital forensics: Challenges and the road ahead
L Caviglione, S Wendzel, W Mazurczyk
IEEE Security & Privacy 15 (6), 12-17, 2017
1642017
Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence
L Caviglione, M Gaggero, JF Lalande, W Mazurczyk, M Urbanski
IEEE Transactions on Information Forensics and Security 11 (4), 799-810, 2016
1592016
Steganography in modern smartphones and mitigation techniques
W Mazurczyk, L Caviglione
IEEE Communications Surveys & Tutorials 17 (1), 334-357, 2014
1382014
Information hiding as a challenge for malware detection
W Mazurczyk, L Caviglione
IEEE Security & Privacy 13 (2), 89 - 93, 2015
1352015
The new Threats of Information Hiding: The Road Ahead
K Cabaj, L Caviglione, W Mazurczyk, S Wendzel, A Woodward, S Zander
IT Professional 20 (3), 31-39, 2018
1202018
A survey on energy-aware security mechanisms
A Merlo, M Migliardi, L Caviglione
Pervasive and Mobile Computing 24, 77-90, 2015
902015
IEEE 802.15.4 air-ground UAV communications in smart farming scenarios
M Bacco, A Berton, A Gotta, L Caviglione
IEEE Communications Letters 22 (9), 1910-1913, 2018
862018
Tight arms race: Overview of current malware threats and trends in their detection
L Caviglione, M Choraś, I Corona, A Janicki, W Mazurczyk, M Pawlicki, ...
IEEE Access 9, 5371-5396, 2020
832020
Trends and challenges in network covert channels countermeasures
L Caviglione
Applied Sciences 11 (4), 1641, 2021
632021
Covert channels in personal cloud storage services: The case of Dropbox
L Caviglione, M Podolski, W Mazurczyk, M Ianigro
IEEE Transactions on Industrial Informatics 13 (4), 1921-1931, 2016
602016
Supporting vertical handover by using a pastry peer-to-peer overlay network
T Hoßfeld, S Oechsner, K Tutschku, FU Andersen, L Caviglione
Pervasive Computing and Communications Workshops, 2006. PerCom Workshops …, 2006
602006
Cyber reconnaissance techniques
W Mazurczyk, L Caviglione
Communications of the ACM 64 (3), 86-95, 2021
532021
Hidden and uncontrolled–on the emergence of network steganographic threats
S Wendzel, W Mazurczyk, L Caviglione, M Meier
ISSE 2014 Securing Electronic Business Processes: Highlights of the …, 2014
482014
The energy impact of security mechanisms in modern mobile devices
L Caviglione, A Merlo
Network Security 2012 (2), 11-14, 2012
462012
Big data for social media learning analytics: potentials and challenges
S Manca, L Caviglione, J Raffaghelli
Journal of e-Learning and Knowledge Society 12 (2), 2016
452016
A taxonomy-based model of security and privacy in online social networks
L Caviglione, M Coccoli, A Merlo
IJCSE 9 (4), 325-338, 2014
452014
FIRST: Future Internet-a Role for Satellite Technology
L Caviglione, B Collini-Nocker, G Fairhurst
IEEE International Workshop on Satellite and Space Communications (IWSSC 08 …, 2008
44*2008
Deep reinforcement learning for multi-objective placement of virtual machines in cloud datacenters
L Caviglione, M Gaggero, M Paolucci, R Ronco
Soft Computing 25 (19), 12569-12588, 2021
42*2021
Model Predictive Control for Energy-Efficient, Quality-Aware, and Secure Virtual Machine Placement
M Gaggero, L Caviglione
IEEE Transactions on Automation Science and Engineering 16 (1), 420- 432, 2019
402019
What is green security?
L Caviglione, A Merlo, M Migliardi
2011 7th international conference on information assurance and security (IAS …, 2011
382011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20