Export 43 results:Author Title Type [ Year]
Filters: Author is Alberto Ferrante [Clear All Filters]
"Security and Packets Delivery Trade-Off for WSN", Consumer Communications and Networking Conference (CCNC), 2010 7th IEEE, 2010.
"AETHER: Self-Adaptive Networked Entities: Autonomous Computing Elements for Future Pervasive Applications and Technologies", Reconfigurable Computing: From FPGAs to Hardware/Software Codesign, New York, USA, Springer, pp. 149–184, 2011.
"A Framework for Security and Workload Gradual Adaptation", SECRYPT, Seville, Spain, ICETE, 07/2011.
"System Policies for Gradual Tuning of Security and Workload in Wireless Sensor Networks", Proceedings of the IEEE Wireless Telecommunication Symposium (WTS), New York, USA, April, 2011.
"Dynamic Adaptation of Security and QoS in Energy-Harvesting Sensors Nodes", e-Business and Telecommunications, vol. 222, Berlin Heidelberg, Springer, pp. 243-258, 2012.
"Security Enhanced Linux on Embedded Systems: a Hardware-accelerated Implementation", 17th Asia and South Pacific Design Automation Conference, ASP-DAC 2012, Sydney, Australia, 02/2012.
"An Algorithm for Extended Dynamic Range Video in Embedded Systems", SENSORNETS 2013 - 2nd International Conference on Sensor Networks, Barcelona, Spain, INSTICC, 02/2013.
"A Security-enhanced Design Methodology For Embedded Systems", ICETE SECRYPT 2013, Reykjavik, Iceland, ICETE, 07/2013.
"Modeling Requirements For Security-enhanced Design of Embedded Systems", ICETE SECRYPT, Vienna, Austria, ICETE, 08/2014.
"A Resource-optimized Approach to Efficient Early Detection of Mobile Malware", 3rd International Workshop on Security of Mobile Applications - IWSMA 2014, Fribourg, Switzerland, 09/2014.
"Risk Assessment of Atrial Fibrillation: a Failure Prediction Approach", 41st Computing in Cardiology Conference (CinC), Cambridge, MA, USA, IEEE Computer Society, 09/2014.
"Can we Achieve both Privacy Protection and Efficient Malware Detection on Smartphones?", 1st Interdisciplinary Cyber Research Workshop 2015, Tallin, Estona, Tallinn University of Technology, 07/2015.
"A General Practitioner or a Specialist for Your Infected Smartphone?", 36th IEEE Symposium on Security and Privacy , San Jose, CA, USA, IEEE Computer Society Technical Committee on Security and Privacy, 05/2015.
"Security Challenges for Hardware Designers of Mobile Systems", 2015 Mobile Systems Technologies Workshop (MST), May, 2015.
"A Friend or a Foe? Detecting Malware Using Memory and CPU Features", SECRYPT 2016, 13th International Conference on Security and Cryptography, Lisbon, Portugal, SciTePress Digital Library, 07/2016.
"MalAware: Effective and Efficient Run-time Mobile Malware Detector", The 14th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2016), Auckland, New Zealand, IEEE Computer Society Press, 08/2016.
"Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features", 2016 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, Austria, 08/2016.
"Trojan Families Identification Using Dynamic Features and Low Complexity Classifiers", 24th EICAR Annual Conference 2016 "Trustworthiness in IT Security Products", Nuremberg, Germany, EICAR, 10/2016.
"What Does the Memory Say? Towards the most indicative features for efficient malware detection", CCNC 2016, The 13th Annual IEEE Consumer Communications & Networking Conference, Las Vegas, NV, USA, IEEE Communication Society, 01/2016.
"Runtime Classification of Mobile Malware for Resource-constrained Devices", Lecture Notes in Communications in Computer and Information Science, vol. 764: Springer International Publishing AG, pp. 195-215, 2017.