Leonardo Aniello
Leonardo Aniello
Associate Professor, University of Southampton
Verified email at - Homepage
Cited by
Cited by
Survey of machine learning techniques for malware analysis
D Ucci, L Aniello, R Baldoni
Computers & Security 81, 123-147, 2019
PBFT vs proof-of-authority: applying the CAP theorem to permissioned blockchain
S De Angelis, L Aniello, R Baldoni, F Lombardi, A Margheri, V Sassone
Second Italian Conference on Cybersecurity (ITASEC), 2018
Adaptive online scheduling in storm
L Aniello, R Baldoni, L Querzoni
Proceedings of the 7th ACM international conference on Distributed event …, 2013
Blockchain-based database to ensure data integrity in cloud computing environments
E Gaetani, L Aniello, R Baldoni, F Lombardi, A Margheri, V Sassone
First Italian Conference on Cybersecurity (ITASEC), 2017
A blockchain-based infrastructure for reliable and cost-effective IoT-aided smart grids
F Lombardi, L Aniello, S De Angelis, A Margheri, V Sassone
IET Digital Library, 2018
A prototype evaluation of a tamper-resistant high performance blockchain-based transaction log for a distributed database
L Aniello, R Baldoni, E Gaetani, F Lombardi, A Margheri, V Sassone
2017 13th European Dependable Computing Conference (EDCC), 151-154, 2017
Cloud-based data stream processing
T Heinze, L Aniello, L Querzoni, Z Jerzak
Proceedings of the 8th ACM International Conference on Distributed Event …, 2014
Elastic symbiotic scaling of operators and resources in stream processing systems
F Lombardi, L Aniello, S Bonomi, L Querzoni
IEEE Transactions on Parallel and Distributed Systems 29 (3), 572-585, 2017
Android malware family classification based on resource consumption over time
L Massarelli, L Aniello, C Ciccotelli, L Querzoni, D Ucci, R Baldoni
2017 12th International Conference on Malicious and Unwanted Software …, 2017
An event-based platform for collaborative threats detection and monitoring
G Lodi, L Aniello, GA Di Luna, R Baldoni
Information Systems 39, 175-195, 2014
Anti-BlUFf: towards counterfeit mitigation in IC supply chains using blockchain and PUF
L Aniello, B Halak, P Chai, R Dhall, M Mihalea, A Wilczynski
International Journal of Information Security 20, 445-460, 2021
Malware family identification with BIRCH clustering
G Pitolli, L Aniello, G Laurenza, L Querzoni, R Baldoni
2017 International Carnahan conference on security technology (ICCST), 1-6, 2017
Inter-domain stealthy port scan detection through complex event processing
L Aniello, G Lodi, R Baldoni
Proceedings of the 13th European Workshop on Dependable Computing, 67-72, 2011
A collaborative event processing system for protection of critical infrastructures from cyber attacks
L Aniello, GA Di Luna, G Lodi, R Baldoni
International Conference on Computer Safety, Reliability, and Security, 310-323, 2011
PDF Malware Detection: A Survey and Taxonomy of Current Techniques
M Elingiusti, L Aniello, L Querzoni, R Baldoni
Cyber Threat Intelligence 70, 169, 2018
Pascal: An architecture for proactive auto-scaling of distributed services
F Lombardi, A Muti, L Aniello, R Baldoni, S Bonomi, L Querzoni
Future Generation Computer Systems 98, 342-361, 2019
Malware triage based on static features and public apt reports
G Laurenza, L Aniello, R Lazzeretti, R Baldoni
Cyber Security Cryptography and Machine Learning: First International …, 2017
An architecture for automatic scaling of replicated services
L Aniello, S Bonomi, F Lombardi, A Zelli, R Baldoni
Networked Systems: Second International Conference, NETYS 2014, Marrakech …, 2014
Cloud2edge elastic AI framework for prototyping and deployment of AI inference engines in autonomous vehicles
S Grigorescu, T Cocias, B Trasnea, A Margheri, F Lombardi, L Aniello
Sensors 20 (19), 5450, 2020
The goods, the bads and the uglies: Supporting decisions in malware detection through visual analytics
M Angelini, L Aniello, S Lenti, G Santucci, D Ucci
2017 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2017
The system can't perform the operation now. Try again later.
Articles 1–20