SCIENTIFIC PUBLICATIONS

A Novel Cyber-Security Framework Leveraging Programmable Capabilities in Digital Services*

Authors: Matteo Repetto, Alessandro Carrega, and Armend Duzha

Visualizing Syscalls using Self-Organizing Maps for System Intrusion Detection

Authors: Max Landauer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner, and Andreas Rauber

System Log Clustering Approaches For Cyber Security Applications: A Survey

Authors: Max Landauer, Florian Skopik, Markus Wurzenberger, and Andreas Rauber

A Framework for Cyber Threat Intelligence Extraction from Raw Log Data

Authors: Max Landauer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner, and Andreas Rauber

La Sicurezza Informatica Dei Nuovi Servizi Digitali: Un Nuovo Approccio Architetturale

Authors: Raffaele Bolla, Maurizio Giribaldi, Giuseppe Piro and Matteo Repetto

Data Log Management for Cyber-Security Programmability of Cloud Services and Applications

Authors: Alessandro Carrega and Matteo Repetto 

Automated Security Management for Virtual Services

Authors: M. Repetto, A. Carrega, J. Yusupov, F. Valenza, F. Risso and G. Lamanna

Towards Novel Security Architectures for Network Functions Virtualization

Authors: M. Repetto, A. Carrega and G. Lamanna

An Architecture to Manage Security Services for Cloud Applications

Authors: M. Repetto, A. Carrega and G. Lamanna

Machine Learning Techniques for Transmission Parameters Classification in Multi-agent Managed Network

Authors: Dariusz Żelasko, Paweł Pławiak and Joanna Kołodziej

Adaptive Context-aware Energy Optimization for Services on Mobile Devices With Use of Machine Learning Considering Security Aspects

Authors: Piotr Nawrocki, Bartlomiej Sniezynski, Joanna Kolodziej and Pawel Szynkiewicz

An Architecture to Manage Security Operations for Digital Service Chains

Authors: Matteo Repetto, Alessandro Carregab and Riccardo Rapuzzib

Creating Character-based Templates for Log Data to Enable Security Event Classification

Authors: M. Wurzenberger, G. Höld, M. Landauer, F. Skopik and W. Kastner

Authentication and Authorization in Cyber-Security Frameworks: a Novel Approach for Securing Digital Service Chains

Authors: G. Grieco, D. Striccoli, G. Piro, R. Bolla, G. Boggia, L.A. Grieco

Attestation of Trusted and Reliable Service Function Chains in the ETSI-NFV Framework

Authors: A. Suriano, D. Striccoli, G. Piro, R. Bolla and G. Boggia

Adaptive Context-aware Service Optimization in Mobile Cloud Computing Accounting for Security Aspects

Authors: Piotr Nawrocki, Bartlomiej Sniezynski, Joanna Kolodziej and Pawel Szynkiewicz

The Cookie Hunter: Automated Black-box Auditing for Web Authentication and Authorization Flaws

Authors: Kostas Drakonakis, Sotiris Ioannidis and Jason Polakis

Have it Your Way: Generating Customized Log Datasets With a Model-Driven Simulation Testbed

Authors: Max Landauer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner, and Andreas Rauber

An Autonomous Cybersecurity Framework for Next-generation Digital Service Chains

Authors: M. Repetto, D. Striccoli, G. Piro, A. Carrega, G. Boggia, R. Bolla

Intelligent Mobile Wireless Network for Toxic Gas Clouds Monitoring and Tracking

Authors: M. Krzyszton, E. Niewiadomska-Szynkiewicz

Security aspects in blockchain-based scheduling in mobile multi-cloud computing

Authors: A.Wilczynski, J.Kolodziej, D.Grzonka

Security-aware job allocation in mobile cloud computing

Authors: P. Nawrocki, J. Pajor, B. Sniezynski, J. Kolodziej

Real-Time Scheduling in Drop Computing

Authors: S-E Nistor, G-M Grosu, R-M Hampau, R-I Ciobanu, F. Pop, C. Dobre, P. Szynkiewiczz

Cybersecurity of Digital Service Chains. Challenges, Methodologies, and Tools

Editors: J. Kolodziej, M. Repetto, A Duzha

The Seven Golden Principles of Effective Anomaly-Based Intrusion Detection

Authors: Florian Skopik, Markus Wurzenberger, Max Landauer

Online Log Data Analysis With Efficient Machine Learning: A Review

Authors: Florian Skopik, Max Landauer, Markus Wurzenberger

Blind Spots of Security Monitoring in Enterprise Infrastructures: A Survey

Authors: Florian Skopik, Max Landauer, Markus Wurzenberger

A Framework for Automatic Labeling of Log Datasets from Model-driven Testbeds for HIDS Evaluation

Authors: Landauer, Max and Frank, Maximilian and Skopik, Florian and Hotwagner, Wolfgang and Wurzenberger, Markus and Rauber, Andreas

Dealing with Security Alert Flooding: Using Machine Learning for Domain-Independent Alert Aggregation

Authors: Landauer, Max and Skopik, Florian and Wurzenberger, Markus and Rauber, Andreas

An Effective and Efficient Approach to Improve Visibility Over Network Communications

Authors: M. Zuppelli, A. Carrega, M. Repetto

Iterative Selection of Categorical Variables for Log Data Anomaly Detection

Authors: Max Landauer, Georg Höld, Markus Wurzenberger, Florian Skopik, Andreas Rauber

Smart Log Data Analytics: Techniques for Advanced Security Analysis

Authors: Florian Skopik, Markus Wurzenberger, Max Landauer

bccstego: A Framework for Investigating Network Covert Channels

Authors: M. Repetto, L. Caviglione, M. Zuppelli

Evaluating ML-based DDoS Detection with Grid Search Hyperparameter Optimization

Authors: O. R. Sanchez, M. Repetto, A. Carrega, R. Bolla

Leveraging the 5G architecture to mitigate amplification attacks

Authors: M. Repetto, A. Carrega, G. Lamanna, J. Yusupov, O. Toscano, G. Bruno, M. Nuovo, M. Cappelli

Feature Selection Evaluation towards a Lightweight Deep Learning DDoS Detector

Authors: O. R. Sanchez, M. Repetto, A. Carrega, R. Bolla, and J. F. Pajo

Detecting Covert Channels Through Code Augmentation

Authors: Marco Zuppelli, Luca Caviglione and Matteo Repetto

Automating Mitigation of Amplification Attacks in NFV Services

Authors: Matteo Repetto, Gianmarco Bruno, Jaloliddin Yusupov, Guerino Lamanna, Benjamin Ertl, and Alessandro Carrega