Follow
Luca Caviglione
Luca Caviglione
Verified email at ge.imati.cnr.it - Homepage
Title
Cited by
Cited by
Year
The future of digital forensics: Challenges and the road ahead
L Caviglione, S Wendzel, W Mazurczyk
IEEE Security & Privacy 15 (6), 12-17, 2017
1612017
Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence
L Caviglione, M Gaggero, JF Lalande, W Mazurczyk, M Urbanski
IEEE Transactions on Information Forensics and Security 11 (4), 799-810, 2016
1552016
Steganography in modern smartphones and mitigation techniques
W Mazurczyk, L Caviglione
IEEE Communications Surveys & Tutorials 17 (1), 334-357, 2014
1362014
Information hiding as a challenge for malware detection
W Mazurczyk, L Caviglione
IEEE Security & Privacy 13 (2), 89 - 93, 2015
1312015
The new Threats of Information Hiding: The Road Ahead
K Cabaj, L Caviglione, W Mazurczyk, S Wendzel, A Woodward, S Zander
IT Professional 20 (3), 31-39, 2018
1182018
A survey on energy-aware security mechanisms
A Merlo, M Migliardi, L Caviglione
Pervasive and Mobile Computing 24, 77-90, 2015
902015
IEEE 802.15.4 air-ground UAV communications in smart farming scenarios
M Bacco, A Berton, A Gotta, L Caviglione
IEEE Communications Letters 22 (9), 1910-1913, 2018
842018
Tight arms race: Overview of current malware threats and trends in their detection
L Caviglione, M Choraś, I Corona, A Janicki, W Mazurczyk, M Pawlicki, ...
IEEE Access 9, 5371-5396, 2020
752020
Covert channels in personal cloud storage services: The case of Dropbox
L Caviglione, M Podolski, W Mazurczyk, M Ianigro
IEEE Transactions on Industrial Informatics 13 (4), 1921-1931, 2016
602016
Supporting vertical handover by using a pastry peer-to-peer overlay network
T Hoßfeld, S Oechsner, K Tutschku, FU Andersen, L Caviglione
Pervasive Computing and Communications Workshops, 2006. PerCom Workshops …, 2006
592006
Trends and challenges in network covert channels countermeasures
L Caviglione
Applied Sciences 11 (4), 1641, 2021
582021
Cyber reconnaissance techniques
W Mazurczyk, L Caviglione
Communications of the ACM 64 (3), 86-95, 2021
532021
Hidden and uncontrolled–on the emergence of network steganographic threats
S Wendzel, W Mazurczyk, L Caviglione, M Meier
ISSE 2014 Securing Electronic Business Processes: Highlights of the …, 2014
482014
A taxonomy-based model of security and privacy in online social networks
L Caviglione, M Coccoli, A Merlo
IJCSE 9 (4), 325-338, 2014
462014
The energy impact of security mechanisms in modern mobile devices
L Caviglione, A Merlo
Network Security 2012 (2), 11-14, 2012
462012
Big data for social media learning analytics: potentials and challenges
S Manca, L Caviglione, J Raffaghelli
Journal of e-Learning and Knowledge Society 12 (2), 2016
452016
FIRST: Future Internet-a Role for Satellite Technology
L Caviglione, B Collini-Nocker, G Fairhurst
IEEE International Workshop on Satellite and Space Communications (IWSSC 08 …, 2008
42*2008
Deep reinforcement learning for multi-objective placement of virtual machines in cloud datacenters
L Caviglione, M Gaggero, M Paolucci, R Ronco
Soft Computing 25 (19), 12569-12588, 2021
40*2021
What is green security?
L Caviglione, A Merlo, M Migliardi
2011 7th international conference on information assurance and security (IAS …, 2011
382011
Model Predictive Control for Energy-Efficient, Quality-Aware, and Secure Virtual Machine Placement
M Gaggero, L Caviglione
IEEE Transactions on Automation Science and Engineering 16 (1), 420- 432, 2019
372019
The system can't perform the operation now. Try again later.
Articles 1–20