default search action
Luca Caviglione
Person information
- affiliation: National Research Council, Italy
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j68]Nunziato Cassavia, Luca Caviglione, Massimo Guarascio, Angelica Liguori, Marco Zuppelli:
Learning autoencoder ensembles for detecting malware hidden communications in IoT ecosystems. J. Intell. Inf. Syst. 62(4): 925-949 (2024) - [j67]Luca Caviglione, Wojciech Mazurczyk:
You Can't Do That on Protocols Anymore: Analysis of Covert Channels in IETF Standards. IEEE Netw. 38(5): 255-263 (2024) - [c54]Kai Hölk, Wojciech Mazurczyk, Marco Zuppelli, Luca Caviglione:
Investigating HTTP Covert Channels Through Fuzz Testing. ARES 2024: 19:1-19:9 - [c53]Marco Zuppelli, Massimo Guarascio, Luca Caviglione, Angelica Liguori:
No Country for Leaking Containers: Detecting Exfiltration of Secrets Through AI and Syscalls. ARES 2024: 78:1-78:8 - [c52]Luca Caviglione, Massimo Guarascio, Francesco Sergio Pisani, Marco Zuppelli:
A Few to Unveil Them All: Leveraging Mixture of Experts on Minimal Data for Detecting Covert Channels in Containerized Cloud Infrastructures. EuroS&P Workshops 2024: 731-739 - [c51]Angelica Liguori, Marco Zuppelli, Daniela Gallo, Massimo Guarascio, Luca Caviglione:
Erasing the Shadow: Sanitization of Images with Malicious Payloads Using Deep Autoencoders. ISMIS 2024: 115-125 - [c50]Luca Caviglione, Carmela Comito, Erica Coppolillo, Daniela Gallo, Massimo Guarascio, Angelica Liguori, Giuseppe Manco, Marco Minici, Simone Mungari, Francesco Sergio Pisani, Ettore Ritacco, Antonino Rullo, Paolo Zicari, Marco Zuppelli:
Dawn of LLM4Cyber: Current Solutions, Challenges, and New Perspectives in Harnessing LLMs for Cybersecurity. Ital-IA 2024: 170-175 - [c49]Luca Verderame, Luca Caviglione:
Design of a Hardening Module for Automatically Securing Containers. ITASEC 2024 - 2023
- [j66]Piotr Zórawski, Luca Caviglione, Wojciech Mazurczyk:
A Long-Term Perspective of the Internet Susceptibility to Covert Channels. IEEE Commun. Mag. 61(10): 171-177 (2023) - [j65]Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk:
Avoiding Research Tribal Wars Using Taxonomies. Computer 56(1): 93-96 (2023) - [j64]Nunziato Cassavia, Luca Caviglione, Massimo Guarascio, Angelica Liguori, Giuseppe Manco, Marco Zuppelli:
A federated approach for detecting data hidden in icons of mobile applications delivered via web and multiple stores. Soc. Netw. Anal. Min. 13(1): 114 (2023) - [j63]Enrico Cambiaso, Luca Caviglione, Marco Zuppelli:
DockerChannel: A framework for evaluating information leakages of Docker containers. SoftwareX 24: 101576 (2023) - [c48]Angelica Liguori, Simone Mungari, Marco Zuppelli, Carmela Comito, Enrico Cambiaso, Matteo Repetto, Massimo Guarascio, Luca Caviglione, Giuseppe Manco:
Using AI to face covert attacks in IoT and softwarized scenarios: challenges and opportunities. Ital-IA 2023: 397-402 - [c47]Enrico Cambiaso, Luca Caviglione:
Scamming the Scammers: Using ChatGPT to Reply Mails for Wasting Time and Resources. ITASEC 2023 - [c46]Marco Zuppelli, Matteo Repetto, Luca Caviglione, Enrico Cambiaso:
Information Leakages of Docker Containers: Characterization and Mitigation Strategies. NetSoft 2023: 462-467 - [c45]Luca Verderame, Luca Caviglione, Roberto Carbone, Alessio Merlo:
SecCo: Automated Services to Secure Containers in the DevOps Paradigm. RACS 2023: 10:1-10:6 - [c44]Luca Caviglione, Carmela Comito, Massimo Guarascio, Giuseppe Manco, Francesco Sergio Pisani, Marco Zuppelli:
ORISHA: Improving Threat Detection through Orchestrated Information Sharing (Discussion Paper). SEBD 2023: 514-524 - [i9]Enrico Cambiaso, Luca Caviglione:
Scamming the Scammers: Using ChatGPT to Reply Mails for Wasting Time and Resources. CoRR abs/2303.13521 (2023) - 2022
- [j62]Przemyslaw Szary, Wojciech Mazurczyk, Steffen Wendzel, Luca Caviglione:
Analysis of Reversible Network Covert Channels. IEEE Access 10: 41226-41238 (2022) - [j61]Aleksandra Mileva, Aleksandar Velinov, Vesna Dimitrova, Luca Caviglione, Steffen Wendzel:
Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection. Entropy 24(2): 176 (2022) - [j60]Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Amir Houmansadr:
Emerging topics in defending networked systems. Future Gener. Comput. Syst. 128: 317-319 (2022) - [j59]Luca Caviglione, Steffen Wendzel, Simon Vrhovec, Aleksandra Mileva:
Security and Privacy Issues of Home Globalization. IEEE Secur. Priv. 20(1): 10-11 (2022) - [j58]Luca Caviglione, Wojciech Mazurczyk:
Never Mind the Malware, Here's the Stegomalware. IEEE Secur. Priv. 20(5): 101-106 (2022) - [j57]Steffen Wendzel, Luca Caviglione, Aleksandra Mileva, Jean-François Lalande, Wojciech Mazurczyk:
Guest editorial: Information security methodology and replication studies. it Inf. Technol. 64(1-2): 1-3 (2022) - [j56]Nunziato Cassavia, Luca Caviglione, Massimo Guarascio, Giuseppe Manco, Marco Zuppelli:
Detection of Steganographic Threats Targeting Digital Images in Heterogeneous Ecosystems Through Machine Learning. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(3): 50-67 (2022) - [j55]Luca Caviglione, Andreas Schaffhauser, Marco Zuppelli, Wojciech Mazurczyk:
IPv6CC: IPv6 covert channels for testing networks against stegomalware and data exfiltration. SoftwareX 17: 100975 (2022) - [j54]Marco Zuppelli, Matteo Repetto, Andreas Schaffhauser, Wojciech Mazurczyk, Luca Caviglione:
Code Layering for the Detection of Network Covert Channels in Agentless Systems. IEEE Trans. Netw. Serv. Manag. 19(3): 2282-2294 (2022) - [c43]Massimo Guarascio, Marco Zuppelli, Nunziato Cassavia, Luca Caviglione, Giuseppe Manco:
Revealing MageCart-like Threats in Favicons via Artificial Intelligence. ARES 2022: 45:1-45:7 - [c42]Luca Caviglione, Martin Grabowski, Kai Gutberlet, Adrian Marzecki, Marco Zuppelli, Andreas Schaffhauser, Wojciech Mazurczyk:
Detection of Malicious Images in Production-Quality Scenarios with the SIMARGL Toolkit. ARES 2022: 46:1-46:7 - [c41]Steffen Wendzel, Luca Caviglione, Bernhard Fechner:
Steganography Hiding Patterns: A Brief Review. EICC 2022: 107-108 - [c40]Nunziato Cassavia, Luca Caviglione, Massimo Guarascio, Angelica Liguori, Marco Zuppelli:
Ensembling Sparse Autoencoders for Network Covert Channel Detection in IoT Ecosystems. ISMIS 2022: 209-218 - [c39]Massimo Guarascio, Marco Zuppelli, Nunziato Cassavia, Giuseppe Manco, Luca Caviglione:
Detection of Network Covert Channels in IoT Ecosystems Using Machine Learning. ITASEC 2022: 102-113 - [c38]Nunziato Cassavia, Luca Caviglione, Massimo Guarascio, Angelica Liguori, Giuseppe Surace, Marco Zuppelli:
Federated Learning for the Efficient Detection of Steganographic Threats Hidden in Image Icons. PerSOM 2022: 83-95 - 2021
- [j53]Luca Caviglione, Michal Choras, Igino Corona, Artur Janicki, Wojciech Mazurczyk, Marek Pawlicki, Katarzyna Wasielewska:
Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection. IEEE Access 9: 5371-5396 (2021) - [j52]Wojciech Mazurczyk, Luca Caviglione:
Cyber reconnaissance techniques. Commun. ACM 64(3): 86-95 (2021) - [j51]Luca Caviglione, Wojciech Mazurczyk, Matteo Repetto, Andreas Schaffhauser, Marco Zuppelli:
Kernel-level tracing for detecting stegomalware and covert channels in Linux environments. Comput. Networks 191: 108010 (2021) - [j50]Andrea Ranieri, Davide Caputo, Luca Verderame, Alessio Merlo, Luca Caviglione:
Deep Adversarial Learning on Google Home devices. J. Internet Serv. Inf. Secur. 11(4): 33-43 (2021) - [j49]Luca Caviglione, Steffen Wendzel, Aleksandra Mileva, Simon Vrhovec:
Guest Editorial: Multidisciplinary Solutions to Modern Cybersecurity Challenges. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(4): 1-3 (2021) - [j48]Corinna Heinz, Marco Zuppelli, Luca Caviglione:
Covert Channels in Transport Layer Security: Performance and Security Assessment. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(4): 22-36 (2021) - [j47]Luca Caviglione, Mauro Gaggero, Massimo Paolucci, Roberto Ronco:
Deep reinforcement learning for multi-objective placement of virtual machines in cloud datacenters. Soft Comput. 25(19): 12569-12588 (2021) - [j46]Luca Caviglione, Mauro Gaggero, Massimo Paolucci, Roberto Ronco:
Correction to: Deep reinforcement learning for multi-objective placement of virtual machines in cloud datacenters. Soft Comput. 25(19): 12589 (2021) - [j45]Luca Caviglione, Mauro Gaggero:
Multiobjective Placement for Secure and Dependable Smart Industrial Environments. IEEE Trans. Ind. Informatics 17(2): 1298-1306 (2021) - [c37]Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk, Aleksandra Mileva, Jana Dittmann, Christian Krätzer, Kevin Lamshöft, Claus Vielhauer, Laura Hartmann, Jörg Keller, Tom Neubert:
A Revised Taxonomy of Steganography Embedding Patterns. ARES 2021: 67:1-67:12 - [c36]Matteo Repetto, Luca Caviglione, Marco Zuppelli:
bccstego: A Framework for Investigating Network Covert Channels. ARES 2021: 68:1-68:7 - [c35]Aleksandra Mileva, Luca Caviglione, Aleksandar Velinov, Steffen Wendzel, Vesna Dimitrova:
Risks and Opportunities for Information Hiding in DICOM Standard. ARES 2021: 74:1-74:8 - [c34]Simon Vrhovec, Luca Caviglione, Steffen Wendzel:
Crème de la Crème: Lessons from Papers in Security Publications. ARES 2021: 92:1-92:9 - [c33]Marco Zuppelli, Luca Caviglione:
pcapStego: A Tool for Generating Traffic Traces for Experimenting with Network Covert Channels. ARES 2021: 95:1-95:8 - [c32]Marco Zuppelli, Luca Caviglione, Matteo Repetto:
Detecting Covert Channels Through Code Augmentation. ITASEC 2021: 133-144 - [c31]Marco Zuppelli, Giuseppe Manco, Luca Caviglione, Massimo Guarascio:
Sanitization of Images Containing Stegomalware via Machine Learning Approaches. ITASEC 2021: 374-386 - [c30]Luca Caviglione, Marco Zuppelli, Wojciech Mazurczyk, Andreas Schaffhauser, Matteo Repetto:
Code Augmentation for Detecting Covert Channels Targeting the IPv6 Flow Label. NetSoft 2021: 450-456 - [d1]Davide Caputo, Andrea Ranieri, Luca Verderame, Alessio Merlo, Luca Caviglione:
Google Home Pcap. IEEE DataPort, 2021 - [i8]Andrea Ranieri, Davide Caputo, Luca Verderame, Alessio Merlo, Luca Caviglione:
Deep Adversarial Learning on Google Home devices. CoRR abs/2102.13023 (2021) - [i7]Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk, Aleksandra Mileva, Jana Dittmann, Christian Krätzer, Kevin Lamshöft, Claus Vielhauer, Laura Hartmann, Jörg Keller, Tom Neubert:
A Revised Taxonomy of Steganography Embedding Patterns. CoRR abs/2106.08654 (2021) - 2020
- [j44]Jens Saenger, Wojciech Mazurczyk, Jörg Keller, Luca Caviglione:
VoIP network covert channels to enhance privacy and information sharing. Future Gener. Comput. Syst. 111: 96-106 (2020) - [j43]Davide Caputo, Luca Verderame, Andrea Ranieri, Alessio Merlo, Luca Caviglione:
Fine-hearing Google Home: why silence will not protect your privacy. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11(1): 35-53 (2020) - [j42]Steffen Wendzel, Luca Caviglione, Alessandro Checco, Aleksandra Mileva, Jean-François Lalande, Wojciech Mazurczyk:
Information Security Methodology, Replication Studies and Information Security Education. J. Univers. Comput. Sci. 26(7): 762-763 (2020) - [j41]Steffen Wendzel, Cédric Lévy-Bencheton, Luca Caviglione:
Not all areas are equal: analysis of citations in information security research. Scientometrics 122(1): 267-286 (2020) - [c29]Przemyslaw Szary, Wojciech Mazurczyk, Steffen Wendzel, Luca Caviglione:
Design and performance evaluation of reversible network covert channels. ARES 2020: 68:1-68:8 - [c28]Damian Puchalski, Luca Caviglione, Rafal Kozik, Adrian Marzecki, Slawomir Krawczyk, Michal Choras:
Stegomalware detection through structural analysis of media files. ARES 2020: 73:1-73:6 - [c27]Corinna Heinz, Wojciech Mazurczyk, Luca Caviglione:
Covert Channels in Transport Layer Security. EICC 2020: 6:1-6:6 - [c26]Davide Caputo, Luca Verderame, Alessio Merlo, Andrea Ranieri, Luca Caviglione:
Are you (Google) Home? Detecting Users' Presence through Traffic Analysis of Smart Speakers. ITASEC 2020: 105-118 - [c25]Alessandro Carrega, Luca Caviglione, Matteo Repetto, Marco Zuppelli:
Programmable Data Gathering for Detecting Stegomalware. NetSoft 2020: 422-429 - [e1]Luca Caviglione, Aleksandra Mileva, Steffen Wendzel:
EICC 2020: European Interdisciplinary Cybersecurity Conference, Rennes, France, November 18, 2020. ACM 2020, ISBN 978-1-4503-7599-3 [contents]
2010 – 2019
- 2019
- [j40]Mauro Gaggero, Donato Di Paola, Antonio Petitti, Luca Caviglione:
When Time Matters: Predictive Mission Planning in Cyber-Physical Scenarios. IEEE Access 7: 11246-11257 (2019) - [j39]Wojciech Mazurczyk, Luca Caviglione, Steffen Wendzel:
Recent Advancements in Digital Forensics, Part 2. IEEE Secur. Priv. 17(1): 7-8 (2019) - [j38]Mauro Gaggero, Luca Caviglione:
Model Predictive Control for Energy-Efficient, Quality-Aware, and Secure Virtual Machine Placement. IEEE Trans Autom. Sci. Eng. 16(1): 420-432 (2019) - [c24]Wojciech Mazurczyk, Przemyslaw Szary, Steffen Wendzel, Luca Caviglione:
Towards Reversible Storage Network Covert Channels. ARES 2019: 69:1-69:8 - [c23]Wojciech Mazurczyk, Krystian Powójski, Luca Caviglione:
IPv6 Covert Channels in the Wild. CECC 2019: 10:1-10:6 - 2018
- [j37]Sabine S. Schmidt, Wojciech Mazurczyk, Radoslaw Kulesza, Jörg Keller, Luca Caviglione:
Exploiting IP telephony with silence suppression for hidden data transfers. Comput. Secur. 79: 17-32 (2018) - [j36]Manlio Bacco, Andrea Berton, Alberto Gotta, Luca Caviglione:
IEEE 802.15.4 Air-Ground UAV Communications in Smart Farming Scenarios. IEEE Commun. Lett. 22(9): 1910-1913 (2018) - [j35]Al-Sakib Khan Pathan, Saiful Azad, Rasib Khan, Luca Caviglione:
Security mechanisms and data access protocols in innovative wireless networks. Int. J. Distributed Sens. Networks 14(9) (2018) - [j34]Krzysztof Cabaj, Luca Caviglione, Wojciech Mazurczyk, Steffen Wendzel, Alan Woodward, Sebastian Zander:
The New Threats of Information Hiding: The Road Ahead. IT Prof. 20(3): 31-39 (2018) - [j33]Luca Caviglione, Wojciech Mazurczyk, Steffen Wendzel, Sebastian Zander:
Emerging and Unconventional: New Attacks and Innovative Detection Techniques. Secur. Commun. Networks 2018: 9672523:1 (2018) - [c22]Luca Caviglione, Alessio Merlo, Mauro Migliardi:
Covert Channels in IoT Deployments Through Data Hiding Techniques. AINA Workshops 2018: 559-563 - [i6]Krzysztof Cabaj, Luca Caviglione, Wojciech Mazurczyk, Steffen Wendzel, Alan Woodward, Sebastian Zander:
The New Threats of Information Hiding: the Road Ahead. CoRR abs/1801.00694 (2018) - 2017
- [j32]Luca Caviglione, Mauro Gaggero, Enrico Cambiaso, Maurizio Aiello:
Measuring the Energy Consumption of Cyber Security. IEEE Commun. Mag. 55(7): 58-63 (2017) - [j31]Marcin Urbanski, Wojciech Mazurczyk, Jean-François Lalande, Luca Caviglione:
Detecting local covert channels using process activity correlation on Android smartphones. Comput. Syst. Sci. Eng. 32(2) (2017) - [j30]Wojciech Mazurczyk, Luca Caviglione, Steffen Wendzel:
Recent Advancements in Digital Forensics. IEEE Secur. Priv. 15(6): 10-11 (2017) - [j29]Luca Caviglione, Steffen Wendzel, Wojciech Mazurczyk:
The Future of Digital Forensics: Challenges and the Road Ahead. IEEE Secur. Priv. 15(6): 12-17 (2017) - [j28]Andrea Cardaci, Luca Caviglione, Erina Ferro, Alberto Gotta:
Using SPDY to improve Web 2.0 over satellite links. Int. J. Satell. Commun. Netw. 35(4): 307-321 (2017) - [j27]Luca Caviglione, Maciej Podolski, Wojciech Mazurczyk, Massimo Ianigro:
Covert Channels in Personal Cloud Storage Services: The Case of Dropbox. IEEE Trans. Ind. Informatics 13(4): 1921-1931 (2017) - [c21]Sabine S. Schmidt, Wojciech Mazurczyk, Jörg Keller, Luca Caviglione:
A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression. ARES 2017: 83:1-83:6 - 2016
- [j26]Mauro Gaggero, Luca Caviglione:
Predictive Control for Energy-Aware Consolidation in Cloud Datacenters. IEEE Trans. Control. Syst. Technol. 24(2): 461-474 (2016) - [j25]Luca Caviglione, Mauro Gaggero, Jean-François Lalande, Wojciech Mazurczyk, Marcin Urbanski:
Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence. IEEE Trans. Inf. Forensics Secur. 11(4): 799-810 (2016) - [c20]Mauro Gaggero, Luca Caviglione:
Model predictive control for the placement of virtual machines in cloud computing applications. ACC 2016: 1987-1992 - [c19]Donato Di Paola, Mauro Gaggero, Antonio Petitti, Luca Caviglione:
Optimal control of time instants for task replanning in robotic networks. ACC 2016: 1993-1998 - 2015
- [j24]Luca Caviglione, Wojciech Mazurczyk:
Understanding Information Hiding in iOS. Computer 48(1): 62-65 (2015) - [j23]Wojciech Mazurczyk, Luca Caviglione:
Steganography in Modern Smartphones and Mitigation Techniques. IEEE Commun. Surv. Tutorials 17(1): 334-357 (2015) - [j22]Luca Caviglione:
A first look at traffic patterns of Siri. Trans. Emerg. Telecommun. Technol. 26(4): 664-669 (2015) - [j21]Wojciech Mazurczyk, Luca Caviglione:
Information Hiding as a Challenge for Malware Detection. IEEE Secur. Priv. 13(2): 89-93 (2015) - [j20]Luca Caviglione, Nedo Celandroni, Matteo Collina, Haitham S. Cruickshank, Gorry Fairhurst, Erina Ferro, Alberto Gotta, Michele Luglio, Cesare Roseti, Ahmed Said Abdel Salam, Raffaello Secchi, Zhili Sun, Alessandro Vanelli-Coralli:
A deep analysis on future web technologies and protocols over broadband GEO satellite networks. Int. J. Satell. Commun. Netw. 33(5): 451-472 (2015) - [j19]Alessio Merlo, Mauro Migliardi, Luca Caviglione:
A survey on energy-aware security mechanisms. Pervasive Mob. Comput. 24: 77-90 (2015) - [c18]Luca Caviglione, Jean-François Lalande, Wojciech Mazurczyk, Steffen Wendzel:
Analysis of Human Awareness of Security and Privacy Threats in Smart Environments. HCI (22) 2015: 165-177 - [i5]Luca Caviglione, Jean-François Lalande, Wojciech Mazurczyk, Steffen Wendzel:
Analysis of Human Awareness of Security and Privacy Threats in Smart Environments. CoRR abs/1502.00868 (2015) - [i4]Wojciech Mazurczyk, Luca Caviglione:
Information Hiding as a Challenge for Malware Detection. CoRR abs/1504.04867 (2015) - 2014
- [j18]Luca Caviglione, Mauro Coccoli, Alessio Merlo:
A taxonomy-based model of security and privacy in online social networks. Int. J. Comput. Sci. Eng. 9(4): 325-338 (2014) - [j17]Luca Caviglione, Alberto Gotta:
Characterizing SPDY over High Latency Satellite Channels. EAI Endorsed Trans. Mob. Commun. Appl. 2(5): e3 (2014) - [c17]Mauro Gaggero, Luca Caviglione:
A predictive control approach for energy-aware consolidation of virtual machines in cloud computing. CDC 2014: 5308-5313 - [c16]Mauro Migliardi, Alessio Merlo, Luca Caviglione:
A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing. IMIS 2014: 241-246 - [c15]Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Michael Meier:
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats. ISSE 2014: 123-133 - [c14]Luca Caviglione, Alberto Gotta, A. Abdel Salam, Michele Luglio, Cesare Roseti, Francesco Zampognaro:
Performance Evaluation of HTTP and SPDY Over a DVB-RCS Satellite Link with Different BoD Schemes. PSATS 2014: 34-44 - [c13]Manlio Bacco, Luca Caviglione, Alberto Gotta:
Satellites, UAVs, Vehicles and Sensors for an Integrated Delay Tolerant Ad Hoc Network. PSATS 2014: 114-122 - [c12]Luca Caviglione, Mauro Coccoli, Alberto Grosso:
A Task Allocation Middleware for Wireless Sensor Networks in a Multi-Agent Environment. SENSORNETS 2014: 325-330 - [i3]Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Michael Meier:
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats. CoRR abs/1407.2029 (2014) - [i2]Wojciech Mazurczyk, Luca Caviglione:
Steganography in Modern Smartphones and Mitigation Techniques. CoRR abs/1410.6796 (2014) - [i1]Luca Caviglione, Wojciech Mazurczyk:
How to covertly leak data from iOS? CoRR abs/1411.3000 (2014) - 2013
- [j16]Luca Caviglione:
Extending HTTP models to Web 2.0 applications: the case of online social networks. Int. J. Comput. Sci. Eng. 8(3): 210-218 (2013) - [c11]Andrea Cardaci, Luca Caviglione, Alberto Gotta, Nicola Tonellotto:
Performance Evaluation of SPDY over High Latency Satellite Channels. PSATS 2013: 123-134 - 2012
- [j15]Luca Caviglione, Alessio Merlo:
The energy impact of security mechanisms in modern mobile devices. Netw. Secur. 2012(2): 11-14 (2012) - 2011
- [j14]Luca Caviglione, Cristiano Cervellera:
Design, optimization and performance evaluation of a content distribution overlay for streaming. Comput. Commun. 34(12): 1497-1509 (2011) - [j13]Luca Caviglione, Cristiano Cervellera:
An Optimized Content Replication and Distribution Framework for Vehicular Networks. J. Intell. Transp. Syst. 15(4): 179-192 (2011) - [c10]Luca Caviglione, Alessio Merlo, Mauro Migliardi:
What is Green Security? IAS 2011: 366-371 - [c9]Luca Caviglione, Giuseppe Ciaccio, Vittoria Gianuzzi:
Architecture of a communication middleware for VANET applications. Med-Hoc-Net 2011: 111-114 - [c8]Luca Caviglione, Mauro Coccoli, Alberto Grosso:
A framework for the delivery of contents in RFID-driven smart environments. RFID-TA 2011: 45-49 - [c7]Alberto Grosso, Mauro Coccoli, Antonio Boccalatte, Luca Caviglione:
A task allocation middleware targeting an RFID-enhanced environment. RFID-TA 2011: 313-318 - [c6]Luca Caviglione:
Extending HTTP Models to Web 2.0 Applications: The Case of Social Networks. UCC 2011: 361-365 - 2010
- [j12]Luca Caviglione:
A simple neural framework for bandwidth reservation of VoIP communications in cost-effective devices. IEEE Trans. Consumer Electron. 56(3): 1252-1257 (2010)
2000 – 2009
- 2009
- [j11]Cristiano Cervellera, Luca Caviglione:
Optimization of a peer-to-peer system for efficient content replication. Eur. J. Oper. Res. 196(2): 423-433 (2009) - [j10]Luca Caviglione:
Enabling cooperation of consumer devices through peer-to-peer overlays. IEEE Trans. Consumer Electron. 55(2): 414-421 (2009) - [j9]Luca Caviglione, Franco Davoli:
Using P2P overlays to provide QoS in service-oriented wireless networks. IEEE Wirel. Commun. 16(4): 32-38 (2009) - 2008
- [j8]Luca Caviglione, Franco Davoli:
Traffic volume analysis of a nation-wide eMule community. Comput. Commun. 31(10): 2485-2495 (2008) - [j7]Luca Caviglione, Cristiano Cervellera, Franco Davoli, Filippo Aldo Grassia:
Optimization of an eMule-like modifier strategy. Comput. Commun. 31(16): 3876-3882 (2008) - 2007
- [j6]Luca Caviglione, Cristiano Cervellera:
Design of a peer-to-peer system for optimized content replication. Comput. Commun. 30(16): 3107-3116 (2007) - [j5]Xing Liang, Felicia Li Chin Ong, Prashant Pillai, Pauline M. L. Chan, Vincenzo Mancuso, Georgios Koltsidas, Fotini-Niovi Pavlidou, Luca Caviglione, Erina Ferro, Alberto Gotta, Haitham S. Cruickshank, Sunil Iyengar, Gorry Fairhurst:
Fusion of digital television, broadband Internet and mobile communications - Part II: Future service scenarios. Int. J. Satell. Commun. Netw. 25(4): 409-440 (2007) - 2006
- [j4]Luca Caviglione:
Traffic analysis of an internet online game accessed via a wireless LAN. IEEE Commun. Lett. 10(10): 698-700 (2006) - [j3]Luca Caviglione:
Introducing emergent technologies in tactical and disaster recovery networks. Int. J. Commun. Syst. 19(9): 1045-1062 (2006) - [c5]Simon Oechsner, Tobias Hoßfeld, Kurt Tutschku, Frank-Uwe Andersen, Luca Caviglione:
Using Kademlia for the Configuration of B3G Radio Access Nodes. PerCom Workshops 2006: 141-145 - [c4]Tobias Hoßfeld, Simon Oechsner, Kurt Tutschku, Frank-Uwe Andersen, Luca Caviglione:
Supporting Vertical Handover by Using a Pastry Peer-to-Peer Overlay Network. PerCom Workshops 2006: 163-167 - 2005
- [j2]Luca Caviglione, Luca Veltri:
Using SIP as P2P Technology. Afr. J. Inf. Commun. Technol. 1(1) (2005) - [j1]Luca Caviglione, Franco Davoli:
Peer-to-peer middleware for bandwidth allocation in sensor networks. IEEE Commun. Lett. 9(3): 285-287 (2005) - [c3]Rafael Asorey-Cacheda, Francisco J. González-Castaño, M. Crespo-Alonso, Luca Caviglione, Franco Davoli:
A packet snif.ng and synchronization technique to boost P2P satellite networks. HOT-P2P 2005: 28-32 - [c2]Rafael Asorey-Cacheda, Francisco Javier González-Castaño, Luca Caviglione, Franco Davoli:
P2P in satellite networks: a tutorial on related problems and some possible solutions. ISWCS 2005: 733-736 - [c1]Luca Caviglione:
The "SaterLay": an Overlay System for Satellite Based Communities. ISWCS 2005: 888-891
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint