Luca Caviglione
Luca Caviglione
Email verificata su - Home page
Citata da
Citata da
The future of digital forensics: Challenges and the road ahead
L Caviglione, S Wendzel, W Mazurczyk
IEEE Security & Privacy 15 (6), 12-17, 2017
Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence
L Caviglione, M Gaggero, JF Lalande, W Mazurczyk, M Urbanski
IEEE Transactions on Information Forensics and Security 11 (4), 799-810, 2016
Information hiding as a challenge for malware detection
W Mazurczyk, L Caviglione
IEEE Security & Privacy 13 (2), 89 - 93, 2015
Steganography in modern smartphones and mitigation techniques
W Mazurczyk, L Caviglione
IEEE Communications Surveys & Tutorials 17 (1), 334-357, 2014
The new Threats of Information Hiding: The Road Ahead
K Cabaj, L Caviglione, W Mazurczyk, S Wendzel, A Woodward, S Zander
IT Professional 20 (3), 31-39, 2018
Tight arms race: Overview of current malware threats and trends in their detection
L Caviglione, M Choraś, I Corona, A Janicki, W Mazurczyk, M Pawlicki, ...
IEEE Access 9, 5371-5396, 2020
IEEE 802.15.4 air-ground UAV communications in smart farming scenarios
M Bacco, A Berton, A Gotta, L Caviglione
IEEE Communications Letters 22 (9), 1910-1913, 2018
A survey on energy-aware security mechanisms
A Merlo, M Migliardi, L Caviglione
Pervasive and Mobile Computing 24, 77-90, 2015
Trends and challenges in network covert channels countermeasures
L Caviglione
Applied Sciences 11 (4), 1641, 2021
Covert channels in personal cloud storage services: The case of Dropbox
L Caviglione, M Podolski, W Mazurczyk, M Ianigro
IEEE Transactions on Industrial Informatics 13 (4), 1921-1931, 2016
Cyber reconnaissance techniques
W Mazurczyk, L Caviglione
Communications of the ACM 64 (3), 86-95, 2021
Supporting vertical handover by using a pastry peer-to-peer overlay network
T Hoßfeld, S Oechsner, K Tutschku, FU Andersen, L Caviglione
Pervasive Computing and Communications Workshops, 2006. PerCom Workshops …, 2006
Hidden and uncontrolled–on the emergence of network steganographic threats
S Wendzel, W Mazurczyk, L Caviglione, M Meier
ISSE 2014 Securing Electronic Business Processes: Highlights of the …, 2014
Deep reinforcement learning for multi-objective placement of virtual machines in cloud datacenters
L Caviglione, M Gaggero, M Paolucci, R Ronco
Soft Computing 25 (19), 12569-12588, 2021
Big data for social media learning analytics: potentials and challenges
S Manca, L Caviglione, J Raffaghelli
Journal of e-Learning and Knowledge Society 12 (2), 2016
The energy impact of security mechanisms in modern mobile devices
L Caviglione, A Merlo
Network Security 2012 (2), 11-14, 2012
A taxonomy-based model of security and privacy in online social networks
L Caviglione, M Coccoli, A Merlo
IJCSE 9 (4), 325-338, 2014
FIRST: Future Internet-a Role for Satellite Technology
L Caviglione, B Collini-Nocker, G Fairhurst
IEEE International Workshop on Satellite and Space Communications (IWSSC 08 …, 2008
Model Predictive Control for Energy-Efficient, Quality-Aware, and Secure Virtual Machine Placement
M Gaggero, L Caviglione
IEEE Transactions on Automation Science and Engineering 16 (1), 420- 432, 2019
A Revised Taxonomy of Steganography Embedding Patterns
S Wendzel, L Caviglione, W Mazurczyk, A Mileva, J Dittmann, C Krätzer, ...
The 16th International Conference on Availability, Reliability and Security …, 2021
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20