Antonino Rullo
Antonino Rullo
Geverifieerd e-mailadres voor dimes.unical.it
Titel
Geciteerd door
Geciteerd door
Jaar
Kalis—A system for knowledge-driven adaptable intrusion detection for the Internet of Things
D Midi, A Rullo, A Mudgerikar, E Bertino
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
652017
Pareto-optimal adversarial defense of enterprise systems
E Serra, S Jajodia, A Pugliese, A Rullo, VS Subrahmanian
ACM Transactions on Information and System Security (TISSEC) 17 (3), 1-39, 2015
402015
Padua: Parallel architecture to detect unexplained activities
C Molinaro, V Moscato, A Picariello, A Pugliese, A Rullo, ...
ACM Transactions on Internet Technology (TOIT) 14 (1), 1-28, 2014
172014
Intrusion detection with hypergraph-based attack models
A Guzzo, A Pugliese, A Rullo, D Saccà
Graph Structures for Knowledge Representation and Reasoning, 58-73, 2014
162014
Shortfall-based optimal placement of security resources for mobile IoT scenarios
A Rullo, E Serra, E Bertino, J Lobo
European Symposium on Research in Computer Security, 419-436, 2017
14*2017
Pareto optimal security resource allocation for Internet of Things
A Rullo, D Midi, E Serra, E Bertino
ACM Transactions on Privacy and Security (TOPS) 20 (4), 1-30, 2017
102017
A game of things: Strategic allocation of security resources for iot
A Rullo, D Midi, E Serra, E Bertino
2017 IEEE/ACM Second International Conference on Internet-of-Things Design …, 2017
82017
Strategic security resource allocation for internet of things
A Rullo, D Midi, E Serra, E Bertino
Distributed Computing Systems (ICDCS), 2016 IEEE 36th International …, 2016
72016
Malevolent activity detection with hypergraph-based models
A Guzzo, A Pugliese, A Rullo, D Saccà, A Piccolo
IEEE Transactions on Knowledge and Data Engineering 29 (5), 1115-1128, 2017
52017
Past: Protocol-adaptable security tool for heterogeneous iot ecosystems
A Rullo, E Bertino, D Saccá
2018 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2018
42018
Extending inverse frequent itemsets mining to generate realistic datasets: Complexity, accuracy and emerging applications
D Saccá, E Serra, A Rullo
Data Mining and Knowledge Discovery 33 (6), 1736-1774, 2019
22019
Optimal Placement of Security Resources for the Internet of Things
A Rullo, E Serra, E Bertino, J Lobo
The Internet of Things for Smart Urban Ecosystems, 95-124, 2019
22019
The AC-index: Fast online detection of correlated alerts
A Pugliese, A Rullo, A Piccolo
International Workshop on Security and Trust Management, 107-122, 2015
22015
Redundancy as a Measure of Fault-Tolerance for the Internet of Things: A Review
A Rullo, E Serra, J Lobo
Policy-Based Autonomic Data Governance, 202-226, 2019
12019
Hypergraph-Based Attack Models for Network Intrusion Detection.
A Guzzo, A Pugliese, A Rullo, D Saccà
SEBD, 61-68, 2014
12014
Cyber defense of enterprise information systems: advanced isues and techniques
A Rullo, A Pugliese, D Saccà, S Greco
2014
Think before you Act! Minimising Action Execution in Wrappers.
T Furche, G Grasso, C Schallhart, AJ Sellers, A Rullo
VLDS, 29-34, 2012
2012
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–17