Alberto Ferrante
http://usi.to/esg
Pubblicazioni
Pubblicazioni principali (5)
- Butera L., Ferrante A., Prevostini M., Alippi C., Jermini M. (2022) Precise Agriculture: Effective Deep Learning Strategies to Detect Pest Insect
- Ferrante A., Malek M., Martinelli F., Mercaldo F., Milosevic J. (2018) Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection
- Milosevic J., Malek M., Ferrante A. (2017) Runtime Classification of Mobile Malware for Resource-constrained Devices
- Ferrante A., Milosevic J., Janjusevic M. (2013) A Security-enhanced Design Methodology For Embedded Systems
- Fiorin L., Ferrante A., Padarnitsas K., Regazzoni F. (2012) Security Enhanced Linux on Embedded Systems: a Hardware-accelerated Implementation
Articolo pubblicato in rivista scientifica (4)
- Butera L., Ferrante A., Prevostini M., Alippi C., Jermini M. (2022) Precise Agriculture: Effective Deep Learning Strategies to Detect Pest Insect, IEEE/CAA Journal of Automatica Sinica, vol. 9, no. 2:246-258
- Derin O., Ferrante A., Taddeo A. (2009) Coordinated management of hardware and software self-adaptivity, Journal of Systems Architecture, 55 (3):170-179. ISSN 1383-7621
- Derin O., Ferrante A. (2009) Enabling Self-adaptivity in Component-based Streaming Applications, ACM SIGBED Review - Special Issue on the 2nd International Workshop on Adaptive and Reconfigurable Embedded Systems, 6 (3):14:1-14:4. ISSN 1551-3688
- Taddeo A., Ferrante A. (2007) Scheduling Small packets in IPSec Multi-accelerator Based Systems, Journal of Communication(JCM) Academy publisher, 2 (2):53-60
Contributo in libro (5)
- Ferrante A., Malek M., Martinelli F., Mercaldo F., Milosevic J. (2018) Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection. Foundations and Practice of Security. Springer International Publishing, 242-258. ISBN 978-3-319-75650-9
- Milosevic J., Malek M., Ferrante A. (2017) Runtime Classification of Mobile Malware for Resource-constrained Devices. Lecture Notes in Communications in Computer and Information Science. Springer International Publishing AG, 195-215
- Taddeo A., Mura M., Ferrante A. (2012) Dynamic Adaptation of Security and QoS in Energy-Harvesting Sensors Nodes. e-Business and Telecommunications. Springer. Communications in Computer and Information Science, 243-258. ISBN 978-3-642-25205-1
- Gamrat C., Philippe J., Jesshope C., Shafarenko A., Bisdounis L., Bondi U., Ferrante A., Cabestany J., Huebner M., Parsinnen J., Kadlec J., Danek M., Tain B., Eisenbach S., Auguin M., Diguet J., Lenormand E., Roux J. (2011) AETHER: Self-Adaptive Networked Entities: Autonomous Computing Elements for Future Pervasive Applications and Technologies. Reconfigurable Computing: From FPGAs to Hardware/Software Codesign. Springer, 149-184. ISBN 978-1-4614-0061-5
- Ferrante A., Chandra S., Piuri V. (2009) IPSec Database Query Acceleration. E-business and Telecommunications. Springer Berlin Heidelberg. Communications in Computer and Information Science, 188-200. ISBN 978-3-540-88652-5
Contributo in atti di conferenza (34)
- Wahab M. A., Milosevic J., Regazzoni F., Ferrante A. (2019) Power and Performance Optimized Hardware Classifiers for Eefficient Oon-device Malware Detection. Cryptography and Security in Computing Systems. ACM. Valencia, Spain
- Bianchi F. M., Livi L., Ferrante A., Milosevic J., Malek M. (2018) Time series kernel similarities for predicting Paroxysmal Atrial Fibrillation from ECGs. IJCNN 2018 : International Joint Conference on Neural Networks. IEEE. Rio, Brazil
- Milosevic J., Malek M., Ferrante A. (2016) A Friend or a Foe? Detecting Malware Using Memory and CPU Features. SECRYPT 2016, 13th International Conference on Security and Cryptography. SciTePress Digital Library. Lisbon, Portugal
- Milosevic J., Ferrante A., Malek M. (2016) MalAware: Effective and Efficient Run-time Mobile Malware Detector. The 14th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2016). IEEE Computer Society Press. Auckland, New Zealand
- Ferrante A., Medvet E., Mercaldo F., Milosevic J., Visaggio C. A. (2016) Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features. 2016 11th International Conference on Availability, Reliability and Security (ARES),. Salzburg, Austria. Aug. 31 2016-Sept. 2 2016
- Milosevic J., Ferrante A., Malek M. (2016) Trojan Families Identification Using Dynamic Features and Low Complexity Classifiers. 24th EICAR Annual Conference 2016 "Trustworthiness in IT Security Products". Nuremberg, Germany. 10/2016
- Milosevic J., Ferrante A., Malek M. (2016) What Does the Memory Say? Towards the most indicative features for efficient malware detection. CCNC 2016, The 13th Annual IEEE Consumer Communications \& Networking Conference. IEEE Communication Society. Las Vegas, NV, USA
- Milosevic J., Ferrante A., Malek M. (2015) Can we Achieve both Privacy Protection and Efficient Malware Detection on Smartphones?. 1st Interdisciplinary Cyber Research Workshop 2015. Tallinn University of Technology. Tallin, Estona
- Milosevic J., Ferrante A., Regazzoni F. (2015) Security Challenges for Hardware Designers of Mobile Systems. 2015 Mobile Systems Technologies Workshop (MST)
- Milosevic J., Dittrich A., Ferrante A., Malek M. (2014) A Resource-optimized Approach to Efficient Early Detection of Mobile Malware. 3rd International Workshop on Security of Mobile Applications - IWSMA 2014. Fribourg, Switzerland
- Ferrante A., Kaitovic I., Milosevic J. (2014) Modeling Requirements For Security-enhanced Design of Embedded Systems. ICETE SECRYPT. ICETE. Vienna, Austria
- Milosevic J., Dittrich A., Ferrante A., Malek M., Rojas Quiros C., Braojos R., Ansaloni G., Atienza D. (2014) Risk Assessment of Atrial Fibrillation: a Failure Prediction Approach. 41st Computing in Cardiology Conference (CinC). IEEE Computer Society. Cambridge, MA, USA
- Ferrante A., Milosevic J., Janjusevic M. (2013) A Security-enhanced Design Methodology For Embedded Systems. ICETE SECRYPT 2013. ICETE. Reykjavik, Iceland
- Ferrante A., Chelodi M., Bruschi F., Mozzetti V. (2013) An Algorithm for Extended Dynamic Range Video in Embedded Systems. SENSORNETS 2013 - 2nd International Conference on Sensor Networks. INSTICC. Barcelona, Spain
- Fiorin L., Ferrante A., Padarnitsas K., Regazzoni F. (2012) Security Enhanced Linux on Embedded Systems: a Hardware-accelerated Implementation. 17th Asia and South Pacific Design Automation Conference, ASP-DAC 2012. Sydney, Australia
- Taddeo A., Morales L. G. G., Ferrante A. (2011) A Framework for Security and Workload Gradual Adaptation. SECRYPT. ICETE. Seville, Spain
- Taddeo A., Morales L. G. G., Ferrante A. (2011) System Policies for Gradual Tuning of Security and Workload in Wireless Sensor Networks. Proceedings of the IEEE Wireless Telecommunication Symposium (WTS). New York, USA
- Taddeo A., Micconi L., Ferrante A. (2010) Gradual Adaptation of Security for Sensor Networks. IEEE WoWMoM 2010: Proceedings of the IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks. Montreal, Canada
- Fiorin L., Ferrante A., Padarnitsas K., Carucci S. (2010) Hardware-assisted Security Enhanced Linux in Embedded Systems: a Proposal. Proceedings of the 5th Workshop on Embedded Systems Security (WESS''2010). Scottsdale, Arizona, USA
- Taddeo A., Mura M., Ferrante A. (2010) QoS and Security in Energy-harvesting Wireless Sensor Networks. Proceedings of ICETE SECRYPT. Athens, Greece
- Derin O., Ferrante A. (2010) Scheduling energy consumption with local renewable micro-generation and dynamic electricity prices. CPSWEEK/GREEMBED 2010: Proceedings of the First Workshop on Green and Smart Embedded System Technology: Infrastructures, Methods and Tools. Stockholm, Sweden
- Taddeo A., Ferrante A. (2010) Security and Packets Delivery Trade-Off for WSN. Consumer Communications and Networking Conference (CCNC), 2010 7th IEEE
- Taddeo A., Ferrante A. (2009) A Security Service Protocol for MANETs. Consumer Communications and Networking Conference. CCNC 2009. IEEE. in Las Vegas, Nevada, USA
- Taddeo A., Marcon P., Ferrante A. (2009) Negotiation of Security Services: a Multi-criteria Decision Approach. Proceedings of the 4th Workshop on Embedded Systems Security. Grenoble, France
- Taddeo A., Ferrante A. (2009) Run-time Selection of Security Algorithms For Networked Devices. 5th ACM International Symposium on QoS and Security for Wireless and Mobile Networks. Tenerife, Canary Islands, Spain
- Derin O., Ferrante A. (2009) Simulation of a Self-adaptive Run-time Environment with Hardware and Software Components. SINTER ''09: Proceedings of the 2009 ESEC/FSE workshop on Software integration and evolution @ runtime. ACM. Amsterdam, The Netherlands. ISBN 978-1-60558-681-6
- Ferrante A., Pompei R., Stulova A., Taddeo A. (2008) A Protocol For Pervasive Distributed Computing Reliability. SecPri_WiMob 2008. IEEE. Avignon, France
- Dadda L., Ferrante A., Macchetti M. (2007) A Memory Unit for Priority Management in IPSec Accelerators. proceedings of ICC07. Glasgow, Scotland: IEEE Communications Society. Glasgow, Scotland
- Ferrante A., Chandra S., Piuri V. (2007) A Query Unit for the IPSec Databases. SECRYPT 2007. Barcelona, Spain
- Ferrante A., Piuri V. (2007) High-level Architecture of an IPSec-dedicated System on Chip. proceedings of NGI 2007. IEEE Press. Trondheim, Norway
- Ferrante A., Taddeo A., Sami M. G., Mantovani F., Fridkins J. (2007) Self-adaptive Security at Application Level: a Proposal. ReCoSoC 2007, Jun. 2007, in proceedings of ReCoSoC 2007
- Taddeo A., Ferrante A., Piuri V. (2006) Scheduling Small Packets in IPSec-based Systems. CCNC. Las Vegas, NV, USA
- Ferrante A., Piscopo G., Scaldaferri S. (2005) Application-Driven Optimization of VLIW Architectures: A Hardware-Software Approach. RTAS ''05: Proceedings of the 11th IEEE Real Time on Embedded Technology and Applications Symposium. IEEE Computer Society. Washington, DC, USA. ISBN 0-7695-2302-1
- Boiko U., Ferrante A., Lo Duca A., Piuri V. (2004) A Methodology for Testing IPSec-based Systems. SoftCOM 2004. Split
Relazione in convegno scientifico (1)
- Milosevic J., Ferrante A., Malek M. (2015) A General Practitioner or a Specialist for Your Infected Smartphone?. IEEE Computer Society Technical Committee on Security and Privacy. 36th IEEE Symposium on Security and Privacy. San Jose, California, USA. May 18-20, 2015