default search action
Antonino Rullo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Antonino Rullo, Daniele Midi, Anand Mudgerikar, Elisa Bertino:
Kalis2.0 - A SECaaS-Based Context-Aware Self-Adaptive Intrusion Detection System for IoT. IEEE Internet Things J. 11(7): 12579-12601 (2024) - [c19]Luca Caviglione, Carmela Comito, Erica Coppolillo, Daniela Gallo, Massimo Guarascio, Angelica Liguori, Giuseppe Manco, Marco Minici, Simone Mungari, Francesco Sergio Pisani, Ettore Ritacco, Antonino Rullo, Paolo Zicari, Marco Zuppelli:
Dawn of LLM4Cyber: Current Solutions, Challenges, and New Perspectives in Harnessing LLMs for Cybersecurity. Ital-IA 2024: 170-175 - 2023
- [j10]Antonino Rullo, Michele Ianni, Edoardo Serra:
Editorial: Security and privacy for the Internet of Things. Frontiers Comput. Sci. 5 (2023) - [j9]Antonino Rullo, Elisa Bertino, Kui Ren:
Guest Editorial Special Issue on Intrusion Detection for the Internet of Things. IEEE Internet Things J. 10(10): 8327-8330 (2023) - [c18]Carmelo Felicetti, Antonella Guzzo, Giuseppe Manco, Francesco Pasqua, Ettore Ritacco, Antonino Rullo, Domenico Saccà:
Deep Learning/PUF-based Item Identification for Supply Chain Management in a Distributed Ledger Framework. BCCA 2023: 28-35 - [c17]Carmelo Felicetti, Antonino Rullo, Domenico Saccà:
Security of IoT Devices with PUF-Based ID Tags: Preventing Hardware Substitution by Combining SRAM Cells Pattern Signature and ML Techniques. DASC/PiCom/CBDCom/CyberSciTech 2023: 905-910 - 2022
- [j8]Antonella Guzzo, Antonino Rullo, Eugenio Vocaturo:
Process mining applications in the healthcare domain: A comprehensive review. WIREs Data Mining Knowl. Discov. 12(2) (2022) - [j7]Giuseppe Manco, Ettore Ritacco, Antonino Rullo, Domenico Saccà, Edoardo Serra:
Machine learning methods for generating high dimensional discrete datasets. WIREs Data Mining Knowl. Discov. 12(2) (2022) - [c16]Giuseppe Manco, Ettore Ritacco, Antonino Rullo, Domenico Saccà, Edoardo Serra:
Generating Synthetic Discrete Datasets with Machine Learning. SEBD 2022: 341-350 - 2021
- [j6]Antonella Guzzo, Mikel Joaristi, Antonino Rullo, Edoardo Serra:
A multi-perspective approach for the analysis of complex business processes behavior. Expert Syst. Appl. 177: 114934 (2021) - [c15]Alberto Falcone, Carmelo Felicetti, Alfredo Garro, Antonino Rullo, Domenico Saccà:
PUF-based Smart Tags for Supply Chain Management. ARES 2021: 41:1-41:7 - [c14]Domenico Saccà, Edoardo Serra, Antonino Rullo:
Multi-Sorted Inverse Frequent Itemsets Mining for Generating Realistic No-SQL Datasets (Discussion Paper). SEBD 2021: 347-354 - [c13]Carmelo Felicetti, Marco Lanuzza, Antonino Rullo, Domenico Saccà, Felice Crupi:
Exploiting Silicon Fingerprint for Device Authentication Using CMOS-PUF and ECC. SmartIoT 2021: 229-236 - 2020
- [c12]Antonino Rullo, Antonella Guzzo, Edoardo Serra, Erika Tirrito:
A Framework for the Multi-modal Analysis of Novel Behavior in Business Processes. IDEAL (1) 2020: 51-63
2010 – 2019
- 2019
- [j5]Domenico Saccà, Edoardo Serra, Antonino Rullo:
Extending inverse frequent itemsets mining to generate realistic datasets: complexity, accuracy and emerging applications. Data Min. Knowl. Discov. 33(6): 1736-1774 (2019) - [p1]Antonino Rullo, Edoardo Serra, Elisa Bertino, Jorge Lobo:
Optimal Placement of Security Resources for the Internet of Things. The Internet of Things for Smart Urban Ecosystems 2019: 95-124 - 2018
- [c11]Antonino Rullo, Elisa Bertino, Domenico Saccà:
PAST: Protocol-Adaptable Security Tool for Heterogeneous IoT Ecosystems. DSC 2018: 1-8 - [c10]Antonino Rullo, Edoardo Serra, Jorge Lobo:
Redundancy as a Measure of Fault-Tolerance for the Internet of Things: A Review. PADG@ESORICS 2018: 202-226 - 2017
- [j4]Antonino Rullo, Daniele Midi, Edoardo Serra, Elisa Bertino:
Pareto Optimal Security Resource Allocation for Internet of Things. ACM Trans. Priv. Secur. 20(4): 15:1-15:30 (2017) - [j3]Antonella Guzzo, Andrea Pugliese, Antonino Rullo, Domenico Saccà, Antonio Piccolo:
Malevolent Activity Detection with Hypergraph-Based Models. IEEE Trans. Knowl. Data Eng. 29(5): 1115-1128 (2017) - [c9]Antonino Rullo, Edoardo Serra, Elisa Bertino, Jorge Lobo:
Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios. ESORICS (2) 2017: 419-436 - [c8]Daniele Midi, Antonino Rullo, Anand Mudgerikar, Elisa Bertino:
Kalis - A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things. ICDCS 2017: 656-666 - [c7]Antonino Rullo, Edoardo Serra, Elisa Bertino, Jorge Lobo:
Shortfall-Based Optimal Security Provisioning for Internet of Things. ICDCS 2017: 2585-2586 - [c6]Antonino Rullo, Daniele Midi, Edoardo Serra, Elisa Bertino:
A Game of Things: Strategic Allocation of Security Resources for IoT. IoTDI 2017: 185-190 - 2016
- [c5]Antonino Rullo, Daniele Midi, Edoardo Serra, Elisa Bertino:
Strategic Security Resource Allocation for Internet of Things. ICDCS 2016: 737-738 - 2015
- [j2]Edoardo Serra, Sushil Jajodia, Andrea Pugliese, Antonino Rullo, V. S. Subrahmanian:
Pareto-Optimal Adversarial Defense of Enterprise Systems. ACM Trans. Inf. Syst. Secur. 17(3): 11:1-11:39 (2015) - [c4]Andrea Pugliese, Antonino Rullo, Antonio Piccolo:
The AC-Index: Fast Online Detection of Correlated Alerts. STM 2015: 107-122 - 2014
- [j1]Cristian Molinaro, Vincenzo Moscato, Antonio Picariello, Andrea Pugliese, Antonino Rullo, V. S. Subrahmanian:
PADUA: Parallel Architecture to Detect Unexplained Activities. ACM Trans. Internet Techn. 14(1): 3:1-3:28 (2014) - [c3]Antonella Guzzo, Andrea Pugliese, Antonino Rullo, Domenico Saccà:
Hypergraph-Based Attack Models for Network Intrusion Detection. SEBD 2014: 61-68 - 2013
- [c2]Antonella Guzzo, Andrea Pugliese, Antonino Rullo, Domenico Saccà:
Intrusion Detection with Hypergraph-Based Attack Models. GKR 2013: 58-73 - 2012
- [c1]Tim Furche, Giovanni Grasso, Christian Schallhart, Andrew Jon Sellers, Antonino Rullo:
Think before you Act! Minimising Action Execution in Wrappers. VLDS 2012: 29-34
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint