Export 45 results:
Author [ Title] Type Year Filters: Author is Alberto Ferrante [Clear All Filters]
"AETHER: Self-Adaptive Networked Entities: Autonomous Computing Elements for Future Pervasive Applications and Technologies",
Reconfigurable Computing: From FPGAs to Hardware/Software Codesign, New York, USA, Springer, pp. 149–184, 2011.
"An Algorithm for Extended Dynamic Range Video in Embedded Systems",
SENSORNETS 2013 - 2nd International Conference on Sensor Networks, Barcelona, Spain, INSTICC, 02/2013.
"Application-Driven Optimization of VLIW Architectures: A Hardware-Software Approach",
RTAS '05: Proceedings of the 11th IEEE Real Time on Embedded Technology and Applications Symposium, Washington, DC, USA, IEEE Computer Society, pp. 128–137, 03/2005.
"Can we Achieve both Privacy Protection and Efficient Malware Detection on Smartphones?",
1st Interdisciplinary Cyber Research Workshop 2015, Tallin, Estona, Tallinn University of Technology, 07/2015.
"Coordinated management of hardware and software self-adaptivity",
Journal of Systems Architecture, vol. 55, issue 3, no. {3}, pp. 170 - 179, 03/2009.
"Dynamic Adaptation of Security and QoS in Energy-Harvesting Sensors Nodes",
e-Business and Telecommunications, vol. 222, Berlin Heidelberg, Springer, pp. 243-258, 2012.
"Enabling Self-adaptivity in Component-based Streaming Applications",
ACM SIGBED Review - Special Issue on the 2nd International Workshop on Adaptive and Reconfigurable Embedded Systems, vol. 6, no. {3}: ACM SIGBED, pp. 14:1-14:4, 10/2009.
"Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection",
Foundations and Practice of Security, vol. 10723, Cham, Springer International Publishing, pp. 242-258, 02/2018.
"A Framework for Security and Workload Gradual Adaptation",
SECRYPT, Seville, Spain, ICETE, 07/2011.
"A Friend or a Foe? Detecting Malware Using Memory and CPU Features",
SECRYPT 2016, 13th International Conference on Security and Cryptography, Lisbon, Portugal, SciTePress Digital Library, 07/2016.
"A General Practitioner or a Specialist for Your Infected Smartphone?",
36th IEEE Symposium on Security and Privacy , San Jose, CA, USA, IEEE Computer Society Technical Committee on Security and Privacy, 05/2015.
"Gradual Adaptation of Security for Sensor Networks",
IEEE WoWMoM 2010: Proceedings of the IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, Montreal, Canada, June 13, 2010.
"Hardware-assisted Security Enhanced Linux in Embedded Systems: a Proposal",
Proceedings of the 5th Workshop on Embedded Systems Security (WESS'2010), Scottsdale, Arizona, USA, October 24, 2010.
"High-level Architecture of an IPSec-dedicated System on Chip",
proceedings of NGI 2007, Trondheim, Norway, IEEE Press, May, 2007.
"IPSec Database Query Acceleration",
E-business and Telecommunications, vol. 23: Springer Berlin Heidelberg, pp. 188-200, 2009.
"MalAware: Effective and Efficient Run-time Mobile Malware Detector",
The 14th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2016), Auckland, New Zealand, IEEE Computer Society Press, 08/2016.
"A Memory Unit for Priority Management in IPSec Accelerators",
proceedings of ICC07. Glasgow, Scotland: IEEE Communications Society, Glasgow, Scotland, June 24, 2007.
"A Methodology for Testing IPSec-based Systems",
SoftCOM 2004, Split, pp. 22-26, October, 2004.
"Modeling Requirements For Security-enhanced Design of Embedded Systems",
ICETE SECRYPT, Vienna, Austria, ICETE, 08/2014.
"Negotiation of Security Services: a Multi-criteria Decision Approach",
Proceedings of the 4th Workshop on Embedded Systems Security, Grenoble, France, October, 2009.