SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Gulisano Vincenzo Massimiliano 1984) "

Sökning: WFRF:(Gulisano Vincenzo Massimiliano 1984)

  • Resultat 1-10 av 79
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  •  
2.
  •  
3.
  • Almgren, Magnus, 1972, et al. (författare)
  • Cybersecurity in the Smart Grid
  • 2013
  • Ingår i: Chalmers Energy Conference 2013.
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)
  •  
4.
  • Almgren, Magnus, 1972, et al. (författare)
  • Detection of intrusions and malware, and vulnerability assessment
  • 2015
  • Ingår i: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). - Cham : Springer International Publishing. - 1611-3349 .- 0302-9743. - 9783319205496 ; 9148
  • Konferensbidrag (refereegranskat)
  •  
5.
  • Bodunov, Oleh, et al. (författare)
  • The DEBS 2019 grand challenge
  • 2019
  • Ingår i: DEBS 2019 - Proceedings of the 13th ACM International Conference on Distributed and Event-Based Systems. - New York, NY, USA : ACM. ; , s. 205-208
  • Konferensbidrag (refereegranskat)abstract
    • The ACM DEBS 2019 Grand Challenge is the ninth in a series of challenges which seek to provide a common ground and evaluation criteria for a competition aimed at both research and industrial event-based systems. The focus of the 2019 Grand Challenge is on the application of machine learning to LiDAR data. The goal of the challenge is to perform classification of objects found in urban environments and sensed in several 3D scenes by the LiDAR. The applications of LIDAR and object detection go well beyond autonomous vehicles and are suitable for use in agriculture, waterway maintenance and flood prevention, and construction. This paper describes the specifics of the data streams provided in the challenge as well as the benchmarking platform that supports the testing of corresponding solutions.
  •  
6.
  • Bortolussi, Luca, et al. (författare)
  • Automatic Translation of Spatio-Temporal Logics to Streaming-Based Monitoring Applications for IoT-Equipped Autonomous Agents
  • 2019
  • Ingår i: M4IoT 2019 - Proceedings of the 2019 Workshop on Middleware and Applications for the Internet of Things, Part of Middleware 2019 Conference. - New York, NY, USA : ACM. ; , s. 7-12
  • Konferensbidrag (refereegranskat)abstract
    • Environments in which IoT-equipped autonomous agents and humans tightly interact require safety rules that monitor the agents' behaviors. In this context, expressive and human-comprehensible rules based on Spatio-Temporal Logics (STLs) are desirable because they are informative and easy to maintain. Unfortunately, STLs usually build on ad-hoc platforms implementing the logic semantics. We tackle this limitation with a mechanism to transparently compile STL rules to monitoring applications composed of standard data streaming operators, thus opening up the use of high-throughput and low-latency Stream Processing Engines for monitoring rule compliance in realistic, data-rich IoT scenarios. Our contribution can favor a broader and faster adoption of STLs for IoT-equipped agent monitoring by separating the concerns of designing a rule from those of implementing its semantics. Together with our formal description of how to translate STLs to the streaming domain, we evaluate our prototype implementation based on Apache Flink, studying the effects of parameters such as time and space resolution on the monitoring performance.
  •  
7.
  • Botev, Viktor, 1987, et al. (författare)
  • Detecting Non-Technical Energy Losses through Structural Periodic Patterns in AMI data
  • 2016
  • Ingår i: BDSG/BigData: Proceedings of the Workshop on Big Data in Smart Grids at the IEEE International Conference on BigData. ; , s. 3121-3130
  • Konferensbidrag (refereegranskat)abstract
    • The introduction of Advanced Metering Infrastructures in electricity networks brings new means of dealing with issues influencing financial margins and system-safety problems, thanks to the information reported continuously by smart meters. Such an issue is the detection of Non-Technical Losses (NTLs) in electric power grids. We introduce a data-driven method, called Structure&Detect, to identify possible sources of NTLs; the method is based on spectral analysis of structural periodic patterns in consumption traces, that allows for scalable processing, using features in the frequency domain. Structure&Detect uses only on consumption traces, with no need for exogenous data about customers (e.g., trust or credit history) or explicit information from domain experts. As such, it complies better with privacy concerns that may be present when processing data from different sources. Using real-world consumption traces, we show that it provides high accuracy and detection rates comparable to methods that require additional, customer-specific information. Moreover, Structure&Detect can also be used orthogonally due to its high detection rate, as a filter, providing a narrowed-down input set to methods requiring different treatment (e.g. additional data or on-site inspection) and thus make the search for NTLs more scalable. Structure&Detect also enables processing each meter trace on-the-fly, as well as in a parallel and distributed fashion. These properties make Structure& Detect suitable for online analysis that can address common big data challenges such as the need for scalable, distributed and parallel analysis close to IoT edge devices, such as smart meters.
  •  
8.
  • Butun, Ismail, 1981, et al. (författare)
  • Intrusion Detection in Industrial Networks via Data Streaming
  • 2020
  • Ingår i: Industrial IoT: Challenges, Design Principles, Applications, and Security. - Cham : Springer International Publishing. ; , s. 213-238
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • Given the increasing threat surface of industrial networks due to distributed, Internet-of-Things (IoT) based system architectures, detecting intrusions in  Industrial IoT (IIoT) systems is all the more important, due to the safety implications of potential threats. The continuously generated data in such systems form both a challenge but also a possibility: data volumes/rates are high and require processing and communication capacity but they contain information useful for system operation and for detection of unwanted situations. In this chapter we explain that  stream processing (a.k.a. data streaming) is an emerging useful approach both for general applications and for intrusion detection in particular, especially since it can enable data analysis to be carried out in the continuum of edge-fog-cloud distributed architectures of industrial networks, thus reducing communication latency and gradually filtering and aggregating data volumes. We argue that usefulness stems also due to  facilitating provisioning of agile responses, i.e. due to potentially smaller latency for intrusion detection and hence also improved possibilities for intrusion mitigation. In the chapter we outline architectural features of IIoT networks, potential threats and examples of state-of-the art intrusion detection methodologies. Moreover, we give an overview of how leveraging distributed and parallel execution of streaming applications in industrial setups can influence the possibilities of protecting these systems. In these contexts, we give examples using electricity networks (a.k.a. Smart Grid systems). We conclude that future industrial networks, especially their Intrusion Detection Systems (IDSs), should take advantage of data streaming concept by decoupling semantics from the deployment.
  •  
9.
  • Callau-Zori, Mar, et al. (författare)
  • STONE: A stream-based DDoS defense framework
  • 2013
  • Ingår i: Proceedings of the ACM Symposium on Applied Computing, SAC 2013; Coimbra; Portugal; 18 March 2013 through 22 March 2013. - New York, NY, USA : ACM. - 9781450316569 ; , s. 807-812
  • Konferensbidrag (refereegranskat)abstract
    • An effective Distributed Denial of Service (DDoS) defense mechanism must guarantee legitimate users access to an Internet service masking the effects of possible attacks. That is, it must be able to detect threats and discard malicious packets in a online fashion. Given that emerging data streaming technology can enable such mitigation in an effective manner, in this paper we present STONE, a stream-based DDoS defense framework, which integrates anomaly-based DDoS detection and mitigation with scalable data streaming technology. With STONE, the traffic of potential targets is analyzed via continuous data streaming queries maintaining information used for both attack detection and mitigation. STONE provides minimal degradation of legitimate users traffic during DDoS attacks and it also faces effectively flash crowds. Our preliminary evaluation based on an implemented prototype and conducted with real legitimate and malicious traffic traces shows that STONE is able to provide fast detection and precise mitigation of DDoS attacks leveraging scalable data streaming technology.
  •  
10.
  • Cederman, Daniel, 1981, et al. (författare)
  • Brief announcement: Concurrent data structures for efficient streaming aggregation
  • 2014
  • Ingår i: Annual ACM Symposium on Parallelism in Algorithms and Architectures. - New York, NY, USA : ACM. - 9781450328210 ; , s. 76-78
  • Konferensbidrag (refereegranskat)abstract
    • We briefly describe our study on the problem of streaming multiway aggregation [5], where large data volumes are received from multiple input streams. Multiway aggregation is a fundamental computational component in data stream management systems, requiring low-latency and high throughput solutions. We focus on the problem of designing concurrent data structures enabling for low-latency and highthroughput multiway aggregation; an issue that has been overlooked in the literature. We propose two new concurrent data structures and their lock-free linearizable implementations, supporting both order-sensitive and order-insensitive aggregate functions. Results from an extensive evaluation show significant improvement in the aggregation performance, in terms of both processing throughput and latency over the commonly-used techniques based on queues.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 79
Typ av publikation
konferensbidrag (62)
tidskriftsartikel (14)
rapport (2)
bokkapitel (1)
Typ av innehåll
refereegranskat (72)
övrigt vetenskapligt/konstnärligt (7)
Författare/redaktör
Gulisano, Vincenzo M ... (79)
Papatriantafilou, Ma ... (62)
Tsigas, Philippas, 1 ... (20)
Nikolakopoulos, Ioan ... (16)
Almgren, Magnus, 197 ... (14)
Palyvos-Giannas, Dim ... (13)
visa fler...
Duvignau, Romaric, 1 ... (9)
Najdataei, Hannaneh, ... (9)
Fu, Zhang, 1982 (5)
Cederman, Daniel, 19 ... (4)
Tudor, Valentin, 198 ... (4)
Jerzak, Zbigniew (4)
Ziekow, Holger (4)
Van Rooij, Joris, 19 ... (4)
Walulya, Ivan, 1985 (3)
Göransson, Lisa, 198 ... (2)
Landsiedel, Olaf, 19 ... (2)
Skoogh, Anders, 1980 (2)
Sourdis, Ioannis, 19 ... (2)
Petersen Moura Tranc ... (2)
Subramaniyan, Mukund ... (2)
Smirnov, Pavel (2)
Strohbach, M. (2)
Medvet, Eric (2)
Ramakrishnan Geethak ... (2)
Callau-Zori, Mar (2)
Jiménez-Péris, Ricar ... (2)
Patiño-Martínez, Mar ... (2)
Ashjaei, Seyed Moham ... (1)
Lundqvist, M (1)
Papadopoulos, Alessa ... (1)
Maggi, F. (1)
Nilsson, Hampus (1)
Hryha, Eduard, 1980 (1)
Nyborg, Lars, 1958 (1)
Chen, Zhuoer, 1989 (1)
Hawkins, Richard (1)
Butun, Ismail, 1981 (1)
Koppisetty, Ashok Ch ... (1)
Bäckström, Karl, 199 ... (1)
Brauer, P. (1)
Engström, Jan (1)
Bodunov, Oleh (1)
Martin, André (1)
Bortolussi, Luca (1)
Botev, Viktor, 1987 (1)
Corneo, Lorenzo (1)
Svensson, Joel Bo, 1 ... (1)
Jaradat, Omar, 1981- (1)
Clegg, Kester (1)
visa färre...
Lärosäte
Chalmers tekniska högskola (79)
Mälardalens universitet (2)
Uppsala universitet (1)
Språk
Engelska (79)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (67)
Teknik (55)
Medicin och hälsovetenskap (1)
Humaniora (1)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy