SCIENTIFIC PUBLICATIONS

A Novel Cyber-Security Framework Leveraging Programmable Capabilities in Digital Services*
Authors: Matteo Repetto, Alessandro Carrega, and Armend Duzha

Visualizing Syscalls using Self-Organizing Maps for System Intrusion Detection
Authors: Max Landauer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner, and Andreas Rauber

System Log Clustering Approaches For Cyber Security Applications: A Survey
Authors: Max Landauer, Florian Skopik, Markus Wurzenberger, and Andreas Rauber

A Framework for Cyber Threat Intelligence Extraction from Raw Log Data
Authors: Max Landauer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner, and Andreas Rauber

La Sicurezza Informatica Dei Nuovi Servizi Digitali: Un Nuovo Approccio Architetturale
Authors: Raffaele Bolla, Maurizio Giribaldi, Giuseppe Piro and Matteo Repetto

Data Log Management for Cyber-Security Programmability of Cloud Services and Applications
Authors: Alessandro Carrega and Matteo Repetto

Automated Security Management for Virtual Services
Authors: M. Repetto, A. Carrega, J. Yusupov, F. Valenza, F. Risso and G. Lamanna

Towards Novel Security Architectures for Network Functions Virtualization
Authors: M. Repetto, A. Carrega and G. Lamanna

An Architecture to Manage Security Services for Cloud Applications
Authors: M. Repetto, A. Carrega and G. Lamanna

Machine Learning Techniques for Transmission Parameters Classification in Multi-agent Managed Network
Authors: Dariusz Żelasko, Paweł Pławiak and Joanna Kołodziej

Adaptive Context-aware Energy Optimization for Services on Mobile Devices With Use of Machine Learning Considering Security Aspects
Authors: Piotr Nawrocki, Bartlomiej Sniezynski, Joanna Kolodziej and Pawel Szynkiewicz

An Architecture to Manage Security Operations for Digital Service Chains
Authors: Matteo Repetto, Alessandro Carregab and Riccardo Rapuzzib

Creating Character-based Templates for Log Data to Enable Security Event Classification
Authors: M. Wurzenberger, G. Höld, M. Landauer, F. Skopik and W. Kastner

Authentication and Authorization in Cyber-Security Frameworks: a Novel Approach for Securing Digital Service Chains
Authors: G. Grieco, D. Striccoli, G. Piro, R. Bolla, G. Boggia, L.A. Grieco

Attestation of Trusted and Reliable Service Function Chains in the ETSI-NFV Framework
Authors: A. Suriano, D. Striccoli, G. Piro, R. Bolla and G. Boggia

Adaptive Context-aware Service Optimization in Mobile Cloud Computing Accounting for Security Aspects
Authors: Piotr Nawrocki, Bartlomiej Sniezynski, Joanna Kolodziej and Pawel Szynkiewicz

The Cookie Hunter: Automated Black-box Auditing for Web Authentication and Authorization Flaws
Authors: Kostas Drakonakis, Sotiris Ioannidis and Jason Polakis

Have it Your Way: Generating Customized Log Datasets With a Model-Driven Simulation Testbed
Authors: Max Landauer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner, and Andreas Rauber

An Autonomous Cybersecurity Framework for Next-generation Digital Service Chains
Authors: M. Repetto, D. Striccoli, G. Piro, A. Carrega, G. Boggia, R. Bolla

Intelligent Mobile Wireless Network for Toxic Gas Clouds Monitoring and Tracking
Authors: M. Krzyszton, E. Niewiadomska-Szynkiewicz

Security aspects in blockchain-based scheduling in mobile multi-cloud computing
Authors: A.Wilczynski, J.Kolodziej, D.Grzonka

Security-aware job allocation in mobile cloud computing
Authors: P. Nawrocki, J. Pajor, B. Sniezynski, J. Kolodziej

Real-Time Scheduling in Drop Computing
Authors: S-E Nistor, G-M Grosu, R-M Hampau, R-I Ciobanu, F. Pop, C. Dobre, P. Szynkiewiczz

Editors: J. Kolodziej, M. Repetto, A Duzha

The Seven Golden Principles of Effective Anomaly-Based Intrusion Detection
Authors: Florian Skopik, Markus Wurzenberger, Max Landauer

Authors: Florian Skopik, Max Landauer, Markus Wurzenberger

Authors: Florian Skopik, Max Landauer, Markus Wurzenberger

A Framework for Automatic Labeling of Log Datasets from Model-driven Testbeds for HIDS Evaluation
Authors: Landauer, Max and Frank, Maximilian and Skopik, Florian and Hotwagner, Wolfgang and Wurzenberger, Markus and Rauber, Andreas

Authors: Landauer, Max and Skopik, Florian and Wurzenberger, Markus and Rauber, Andreas

Authors: M. Zuppelli, A. Carrega, M. Repetto

Iterative Selection of Categorical Variables for Log Data Anomaly Detection
Authors: Max Landauer, Georg Höld, Markus Wurzenberger, Florian Skopik, Andreas Rauber

Authors: Florian Skopik, Markus Wurzenberger, Max Landauer

Authors: M. Repetto, L. Caviglione, M. Zuppelli

Evaluating ML-based DDoS Detection with Grid Search Hyperparameter Optimization
Authors: O. R. Sanchez, M. Repetto, A. Carrega, R. Bolla

Authors: M. Repetto, A. Carrega, G. Lamanna, J. Yusupov, O. Toscano, G. Bruno, M. Nuovo, M. Cappelli

Authors: O. R. Sanchez, M. Repetto, A. Carrega, R. Bolla, and J. F. Pajo

Detecting Covert Channels Through Code Augmentation
Authors: Marco Zuppelli, Luca Caviglione and Matteo Repetto

Authors: Matteo Repetto, Gianmarco Bruno, Jaloliddin Yusupov, Guerino Lamanna, Benjamin Ertl, and Alessandro Carrega