SCIENTIFIC PUBLICATIONS
A Novel Cyber-Security Framework Leveraging Programmable Capabilities in Digital Services*
Authors: Matteo Repetto, Alessandro Carrega, and Armend Duzha
Visualizing Syscalls using Self-Organizing Maps for System Intrusion Detection
Authors: Max Landauer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner, and Andreas Rauber
System Log Clustering Approaches For Cyber Security Applications: A Survey
Authors: Max Landauer, Florian Skopik, Markus Wurzenberger, and Andreas Rauber
A Framework for Cyber Threat Intelligence Extraction from Raw Log Data
Authors: Max Landauer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner, and Andreas Rauber
La Sicurezza Informatica Dei Nuovi Servizi Digitali: Un Nuovo Approccio Architetturale
Authors: Raffaele Bolla, Maurizio Giribaldi, Giuseppe Piro and Matteo Repetto
Data Log Management for Cyber-Security Programmability of Cloud Services and Applications
Authors: Alessandro Carrega and Matteo Repetto
Automated Security Management for Virtual Services
Authors: M. Repetto, A. Carrega, J. Yusupov, F. Valenza, F. Risso and G. Lamanna
Towards Novel Security Architectures for Network Functions Virtualization
Authors: M. Repetto, A. Carrega and G. Lamanna
An Architecture to Manage Security Services for Cloud Applications
Authors: M. Repetto, A. Carrega and G. Lamanna
Machine Learning Techniques for Transmission Parameters Classification in Multi-agent Managed Network
Authors: Dariusz Żelasko, Paweł Pławiak and Joanna Kołodziej
Adaptive Context-aware Energy Optimization for Services on Mobile Devices With Use of Machine Learning Considering Security Aspects
Authors: Piotr Nawrocki, Bartlomiej Sniezynski, Joanna Kolodziej and Pawel Szynkiewicz
An Architecture to Manage Security Operations for Digital Service Chains
Authors: Matteo Repetto, Alessandro Carregab and Riccardo Rapuzzib
Creating Character-based Templates for Log Data to Enable Security Event Classification
Authors: M. Wurzenberger, G. Höld, M. Landauer, F. Skopik and W. Kastner
Authentication and Authorization in Cyber-Security Frameworks: a Novel Approach for Securing Digital Service Chains
Authors: G. Grieco, D. Striccoli, G. Piro, R. Bolla, G. Boggia, L.A. Grieco
Attestation of Trusted and Reliable Service Function Chains in the ETSI-NFV Framework
Authors: A. Suriano, D. Striccoli, G. Piro, R. Bolla and G. Boggia
Adaptive Context-aware Service Optimization in Mobile Cloud Computing Accounting for Security Aspects
Authors: Piotr Nawrocki, Bartlomiej Sniezynski, Joanna Kolodziej and Pawel Szynkiewicz
The Cookie Hunter: Automated Black-box Auditing for Web Authentication and Authorization Flaws
Authors: Kostas Drakonakis, Sotiris Ioannidis and Jason Polakis
Have it Your Way: Generating Customized Log Datasets With a Model-Driven Simulation Testbed
Authors: Max Landauer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner, and Andreas Rauber
An Autonomous Cybersecurity Framework for Next-generation Digital Service Chains
Authors: M. Repetto, D. Striccoli, G. Piro, A. Carrega, G. Boggia, R. Bolla
Intelligent Mobile Wireless Network for Toxic Gas Clouds Monitoring and Tracking
Authors: M. Krzyszton, E. Niewiadomska-Szynkiewicz
Security aspects in blockchain-based scheduling in mobile multi-cloud computing
Authors: A.Wilczynski, J.Kolodziej, D.Grzonka
Security-aware job allocation in mobile cloud computing
Authors: P. Nawrocki, J. Pajor, B. Sniezynski, J. Kolodziej
Real-Time Scheduling in Drop Computing
Authors: S-E Nistor, G-M Grosu, R-M Hampau, R-I Ciobanu, F. Pop, C. Dobre, P. Szynkiewiczz
Editors: J. Kolodziej, M. Repetto, A Duzha
The Seven Golden Principles of Effective Anomaly-Based Intrusion Detection
Authors: Florian Skopik, Markus Wurzenberger, Max Landauer
Authors: Florian Skopik, Max Landauer, Markus Wurzenberger
Authors: Florian Skopik, Max Landauer, Markus Wurzenberger
A Framework for Automatic Labeling of Log Datasets from Model-driven Testbeds for HIDS Evaluation
Authors: Landauer, Max and Frank, Maximilian and Skopik, Florian and Hotwagner, Wolfgang and Wurzenberger, Markus and Rauber, Andreas
Authors: Landauer, Max and Skopik, Florian and Wurzenberger, Markus and Rauber, Andreas
Authors: M. Zuppelli, A. Carrega, M. Repetto
Iterative Selection of Categorical Variables for Log Data Anomaly Detection
Authors: Max Landauer, Georg Höld, Markus Wurzenberger, Florian Skopik, Andreas Rauber
Authors: Florian Skopik, Markus Wurzenberger, Max Landauer
Authors: M. Repetto, L. Caviglione, M. Zuppelli
Evaluating ML-based DDoS Detection with Grid Search Hyperparameter Optimization
Authors: O. R. Sanchez, M. Repetto, A. Carrega, R. Bolla
Authors: M. Repetto, A. Carrega, G. Lamanna, J. Yusupov, O. Toscano, G. Bruno, M. Nuovo, M. Cappelli
Authors: O. R. Sanchez, M. Repetto, A. Carrega, R. Bolla, and J. F. Pajo
Detecting Covert Channels Through Code Augmentation
Authors: Marco Zuppelli, Luca Caviglione and Matteo Repetto
Authors: Matteo Repetto, Gianmarco Bruno, Jaloliddin Yusupov, Guerino Lamanna, Benjamin Ertl, and Alessandro Carrega