Leonardo Aniello
Leonardo Aniello
Associate Professor, University of Southampton
Bekræftet mail på soton.ac.uk - Startside
Citeret af
Citeret af
PBFT vs proof-of-authority: applying the CAP theorem to permissioned blockchain
S De Angelis, L Aniello, R Baldoni, F Lombardi, A Margheri, V Sassone
Second Italian Conference on Cybersecurity (ITASEC), 2018
Survey of machine learning techniques for malware analysis
D Ucci, L Aniello, R Baldoni
Computers & Security 81, 123-147, 2019
Adaptive online scheduling in storm
L Aniello, R Baldoni, L Querzoni
Proceedings of the 7th ACM international conference on Distributed event …, 2013
Blockchain-based database to ensure data integrity in cloud computing environments
E Gaetani, L Aniello, R Baldoni, F Lombardi, A Margheri, V Sassone
First Italian Conference on Cybersecurity (ITASEC), 2017
A blockchain-based infrastructure for reliable and cost-effective IoT-aided smart grids
F Lombardi, L Aniello, S De Angelis, A Margheri, V Sassone
IET Digital Library, 2018
A prototype evaluation of a tamper-resistant high performance blockchain-based transaction log for a distributed database
L Aniello, R Baldoni, E Gaetani, F Lombardi, A Margheri, V Sassone
2017 13th European Dependable Computing Conference (EDCC), 151-154, 2017
Cloud-based data stream processing
T Heinze, L Aniello, L Querzoni, Z Jerzak
Proceedings of the 8th ACM International Conference on Distributed Event …, 2014
Elastic symbiotic scaling of operators and resources in stream processing systems
F Lombardi, L Aniello, S Bonomi, L Querzoni
IEEE Transactions on Parallel and Distributed Systems 29 (3), 572-585, 2017
Android malware family classification based on resource consumption over time
L Massarelli, L Aniello, C Ciccotelli, L Querzoni, D Ucci, R Baldoni
2017 12th International Conference on Malicious and Unwanted Software …, 2017
An event-based platform for collaborative threats detection and monitoring
G Lodi, L Aniello, GA Di Luna, R Baldoni
Information Systems 39, 175-195, 2014
Inter-domain stealthy port scan detection through complex event processing
L Aniello, G Lodi, R Baldoni
Proceedings of the 13th European Workshop on Dependable Computing, 67-72, 2011
Malware family identification with BIRCH clustering
G Pitolli, L Aniello, G Laurenza, L Querzoni, R Baldoni
2017 International Carnahan conference on security technology (ICCST), 1-6, 2017
A collaborative event processing system for protection of critical infrastructures from cyber attacks
L Aniello, GA Di Luna, G Lodi, R Baldoni
Computer Safety, Reliability, and Security: 30th International Conference …, 2011
Anti-BlUFf: towards counterfeit mitigation in IC supply chains using blockchain and PUF
L Aniello, B Halak, P Chai, R Dhall, M Mihalea, A Wilczynski
International Journal of Information Security 20, 445-460, 2021
An architecture for automatic scaling of replicated services
L Aniello, S Bonomi, F Lombardi, A Zelli, R Baldoni
Networked Systems: Second International Conference, NETYS 2014, Marrakech …, 2014
Malware triage based on static features and public apt reports
G Laurenza, L Aniello, R Lazzeretti, R Baldoni
Cyber Security Cryptography and Machine Learning: First International …, 2017
Pascal: An architecture for proactive auto-scaling of distributed services
F Lombardi, A Muti, L Aniello, R Baldoni, S Bonomi, L Querzoni
Future Generation Computer Systems 98, 342-361, 2019
PDF Malware Detection: A Survey and Taxonomy of Current Techniques
M Elingiusti, L Aniello, L Querzoni, R Baldoni
Cyber Threat Intelligence 70, 169, 2018
An architecture for semi-automatic collaborative malware analysis for cis
G Laurenza, D Ucci, L Aniello, R Baldoni
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
The goods, the bads and the uglies: Supporting decisions in malware detection through visual analytics
M Angelini, L Aniello, S Lenti, G Santucci, D Ucci
2017 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2017
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–20