Search Results - "Castiglione, Arcangelo"
-
1
An intrusion detection approach based on improved deep belief network
Published in Applied intelligence (Dordrecht, Netherlands) (01-10-2020)“…In today’s interconnected society, cyberattacks have become more frequent and sophisticated, and existing intrusion detection systems may not be adequate in…”
Get full text
Journal Article -
2
A Systematic Review of Consensus Mechanisms in Blockchain
Published in Mathematics (Basel) (01-05-2023)“…Since the birth of Bitcoin, blockchain has shifted from a critical cryptocurrency technology to an enabling technology. Due to its immutability and…”
Get full text
Journal Article -
3
Secure group communication schemes for dynamic heterogeneous distributed computing
Published in Future generation computer systems (01-09-2017)“…Nowadays Sensor Networks and Ad Hoc Networks are widely used communication facilities, mainly because of their many application settings. Again, though above…”
Get full text
Journal Article -
4
On the protection of consumer genomic data in the Internet of Living Things
Published in Computers & security (01-05-2018)“…•Many companies are emerging to provide direct-to-consumer DNA sequencing and analysis.•Internet of Living Things characterize networks of biological…”
Get full text
Journal Article -
5
An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree
Published in Sensors (Basel, Switzerland) (09-10-2020)“…The Time-based One-Time Password (TOTP) algorithm is commonly used for two-factor authentication. In this algorithm, a shared secret is used to derive a…”
Get full text
Journal Article -
6
Guest Editorial: IoT‐based secure health monitoring and tracking through estimated computing
Published in IET cyber-physical systems (01-06-2024)Get full text
Journal Article -
7
A Cluster-Based Multidimensional Approach for Detecting Attacks on Connected Vehicles
Published in IEEE internet of things journal (15-08-2021)“…Nowadays, modern vehicles are becoming even more connected, intelligent, and smart. A modern vehicle encloses several cyber-physical systems, such as actuators…”
Get full text
Journal Article -
8
A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment
Published in Computer communications (01-07-2021)“…In recent times, we can see a massive increase in the number of devices that are being connected to the internet. These devices include but are not limited to…”
Get full text
Journal Article -
9
DNS tunnels detection via DNS-images
Published in Information processing & management (01-05-2022)“…DNS tunneling is a typical attack adopted by cyber-criminals to compromise victims’ devices, steal sensitive data, or perform fraudulent actions against third…”
Get full text
Journal Article -
10
Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey
Published in Soft computing (Berlin, Germany) (01-05-2022)“…Federated learning ( FL ) is a promising decentralized deep learning technology, which allows users to update models cooperatively without sharing their data…”
Get full text
Journal Article -
11
A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control
Published in Future generation computer systems (01-05-2023)“…With the increasing sales of the medical device market, the medical incidents caused by passive medical devices are increasing, which needs to be solved from…”
Get full text
Journal Article -
12
Effective classification of android malware families through dynamic features and neural networks
Published in Connection science (03-07-2021)“…Due to their open nature and popularity, Android-based devices have attracted several end-users around the World and are one of the main targets for attackers…”
Get full text
Journal Article -
13
MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning
Published in Computer standards and interfaces (01-04-2022)“…•A Blockchain-based secure storage and sharing scheme for ELRs in MOOCs learning systems is proposed.•Aimed to leverage Blockchain, the proposed scheme can…”
Get full text
Journal Article -
14
Secure weighted possibilistic c-means algorithm on cloud for clustering big data
Published in Information sciences (01-04-2019)“…The weighted possibilistic c-means algorithm is an important soft clustering technique for big data analytics with cloud computing. However, the private data…”
Get full text
Journal Article -
15
Modeling and analysis of port supply chain system based on Fabric blockchain
Published in Computers & industrial engineering (01-10-2022)“…With the development of international trade, the core position of port transportation progressively emerges. However, most current port supply chain systems…”
Get full text
Journal Article -
16
One-pass lossless data hiding and compression of remote sensing data
Published in Future generation computer systems (01-01-2019)“…The information obtained by means of spectral remote sensing (i.e., the hyperspectral images) are involved in several real-life scenarios and applications…”
Get full text
Journal Article -
17
High-precision linearized interpretation for fully connected neural network
Published in Applied soft computing (01-09-2021)“…Despite the widespread application of deep neural networks in finance, medical treatment, and autonomous driving, these networks face multiple security…”
Get full text
Journal Article -
18
Securing the internet of vehicles through lightweight block ciphers
Published in Pattern recognition letters (01-07-2020)“…•We discuss and analyze the main security issues affecting the CAN bus in the automotive.•We study the feasibility of using encryption algorithms for securing…”
Get full text
Journal Article -
19
Quantum technique for access control in cloud computing II: Encryption and key distribution
Published in Journal of network and computer applications (01-02-2018)“…This is the second paper of the series of papers dealing with access control problems in cloud computing by adopting quantum techniques. In this paper we study…”
Get full text
Journal Article -
20
Cloud-based adaptive compression and secure management services for 3D healthcare data
Published in Future generation computer systems (01-02-2015)“…Several studies show that the lack of access to resources and shared data is one of the main causes of errors in the healthcare sector. In particular, 3D…”
Get full text
Journal Article