Francesco Palmieri
#154,633
Most Influential Person Now
Francesco Palmieri's AcademicInfluence.com Rankings
Francesco Palmiericomputer-science Degrees
Computer Science
#8407
World Rank
#8839
Historical Rank
Network Security
#11
World Rank
#11
Historical Rank
Machine Learning
#3436
World Rank
#3479
Historical Rank
Artificial Intelligence
#3735
World Rank
#3790
Historical Rank

Download Badge
Computer Science
Francesco Palmieri's Degrees
- Masters Computer Science Stanford University
- Bachelors Computer Science University of California, Berkeley
Similar Degrees You Can Earn
Why Is Francesco Palmieri Influential?
(Suggest an Edit or Addition)Francesco Palmieri's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Network anomaly detection with the restricted Boltzmann machine (2013) (334)
- Using generative adversarial networks for improving classification effectiveness in credit card fraud detection (2017) (269)
- Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory (2016) (193)
- Optimal filtering algorithms for fast learning in feedforward neural networks (1992) (174)
- Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes (2018) (168)
- Generalized support vector machines (1999) (152)
- Cloud-based adaptive compression and secure management services for 3D healthcare data (2015) (131)
- Ll-filters-a new class of order statistic filters (1989) (108)
- Temporal convolutional neural (TCN) network for an effective weather forecasting using time-series data from the local weather station (2020) (101)
- Interconnecting Federated Clouds by Using Publish-Subscribe Service (2013) (100)
- Theoretical analysis of evolutionary algorithms with an infinite population size in continuous space. Part II: Analysis of the diversification role of crossover (1994) (99)
- Comments on "Theoretical analysis of evolutionary algorithms with an infinite population size in continuous space. I. Basic properties of selection and mutation" [and reply] (1998) (98)
- A distributed approach to network anomaly detection based on independent component analysis (2014) (96)
- Internet traffic modeling by means of Hidden Markov Models (2008) (94)
- Theoretical analysis of evolutionary algorithms with an infinite population size in continuous space. Part I: Basic properties of selection and mutation (1994) (91)
- A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing (2015) (89)
- A scalable distributed machine learning approach for attack detection in edge computing environments (2018) (87)
- Network anomaly detection through nonlinear analysis (2010) (85)
- Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM (2018) (77)
- A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation (2018) (75)
- MEKA-a fast, local algorithm for training feedforward neural networks (1990) (73)
- Developing a trust model for pervasive computing based on Apriori association rules learning and Bayesian classification (2017) (71)
- A nonlinear, recurrence-based approach to traffic classification (2009) (70)
- GGA: A modified genetic algorithm with gradient-based local search for solving constrained optimization problems (2021) (69)
- Exploiting mean field analysis to model performances of big data architectures (2014) (68)
- A cloud-based architecture for emergency management and first responders localization in smart city environments (2016) (67)
- Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures (2015) (66)
- Hierarchical and Shared Access Control (2016) (64)
- An artificial neural network for sound localization using binaural cues. (1996) (63)
- Malware detection in mobile environments based on Autoencoders and API-images (2020) (61)
- Cryptographic Hierarchical Access Control for Dynamic Structures (2016) (60)
- Anti-Hebbian learning in topologically constrained linear networks: a tutorial (1993) (57)
- Network traffic classification using deep convolutional recurrent autoencoder neural networks for spatial-temporal features extraction (2021) (55)
- Modeling energy-efficient secure communications in multi-mode wireless mobile devices (2015) (55)
- Joint end-to-end loss-delay hidden Markov model for periodic UDP traffic over the Internet (2006) (54)
- A triadic closure and homophily-based recommendation system for online social networks (2015) (52)
- Scalable service discovery in ubiquitous and pervasive computing architectures: A percolation-driven approach (2013) (51)
- Location of partial discharges in shielded cables in the presence of high noise (1992) (51)
- Hybrid indoor and outdoor location services for new generation mobile terminals (2014) (49)
- Security, Privacy and Trust for Smart Mobile- Internet of Things (M-IoT): A Survey (2019) (48)
- Energy-Aware RWA for WDM Networks with Dual Power Sources (2011) (48)
- An uncertainty-managing batch relevance-based approach to network anomaly detection (2015) (48)
- A distributed scheduling framework based on selfish autonomous agents for federated cloud environments (2013) (48)
- An asynchronous covert channel using spam (2012) (45)
- Saving Energy in Data Center Infrastructures (2011) (44)
- Distributed classification of multiple moving targets with binary wireless sensor networks (2011) (42)
- An energy-aware dynamic RWA framework for next-generation wavelength-routed networks (2012) (41)
- Evaluating Network-Based DoS Attacks under the Energy Consumption Perspective: New Security Issues in the Coming Green ICT Area (2011) (40)
- GRASP-based resource re-optimization for effective big data access in federated clouds (2016) (40)
- Towards an energy-aware Internet: modeling a cross-layer optimization approach (2013) (40)
- Objective priors from maximum entropy in data classification (2013) (39)
- On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines (2013) (39)
- Analyzing Local Strategies for Energy-Efficient Networking (2011) (38)
- A Denial of Service Attack to UMTS Networks Using SIM-Less Devices (2014) (38)
- VPN scalability over high performance backbones evaluating MPLS VPN against traditional approaches (2003) (38)
- Modeling performances of concurrent big data applications (2015) (38)
- Introducing Fraudulent Energy Consumption in Cloud Infrastructures: A New Generation of Denial-of-Service Attacks (2017) (38)
- A botnet-based command and control approach relying on swarm intelligence (2014) (37)
- Detecting unfair recommendations in trust-based pervasive environments (2019) (37)
- Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems (2017) (37)
- A study on forecasting electricity production and consumption in smart cities and factories (2019) (37)
- Providing true end-to-end security in converged voice over IP infrastructures (2009) (36)
- Automatic security assessment for next generation wireless mobile networks (2011) (36)
- Efficient sparse FIR filter design (2002) (36)
- One-pass lossless data hiding and compression of remote sensing data (2019) (35)
- Event-based sensor data exchange and fusion in the Internet of Things environments (2018) (35)
- FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment (2013) (34)
- Modeling security requirements for cloud‐based system development (2015) (33)
- An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications (2013) (32)
- CHIS: A big data infrastructure to manage digital cultural items (2017) (31)
- On the protection of consumer genomic data in the Internet of Living Things (2017) (31)
- Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design (2017) (31)
- On Secure Data Management in Health-Care Environment (2013) (30)
- An explicit algorithm for training support vector machines (1999) (30)
- Supporting dynamic updates in storage clouds with the Akl-Taylor scheme (2017) (30)
- Knowledge elicitation based on genetic programming for non destructive testing of critical aerospace systems (2020) (29)
- An MPLS-based architecture for scalable QoS and traffic engineering in converged multiservice mobile IP networks (2005) (28)
- Network-aware scheduling for real-time execution support in data-intensive optical Grids (2009) (28)
- Distributed Group Key Management for Event Notification Confidentiality Among Sensors (2020) (28)
- Non-deterministic security driven meta scheduler for distributed cloud organizations (2017) (27)
- Association rule-based malware classification using common subsequences of API calls (2021) (27)
- Analysis of Wide-Band Cross Correlation for Time-Delay Estimation (1993) (27)
- Secure and distributed video surveillance via portable devices (2014) (27)
- On the Protection of fMRI Images in Multi-domain Environments (2015) (27)
- Using Screen Brightness to Improve Security in Mobile Social Network Access (2018) (27)
- An HLA‐based framework for simulation of large‐scale critical systems (2016) (27)
- Towards a federated Metropolitan Area Grid environment: The SCoPE network-aware infrastructure (2010) (27)
- End-to-end packet-channel Bayesian model applied to heterogeneous wireless networks (2005) (26)
- An Artificial Intelligence-Based Trust Model for Pervasive Computing (2015) (26)
- A class of nonlinear adaptive filters (1988) (26)
- Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT (2018) (25)
- E-mail-Based Covert Channels for Asynchronous Message Steganography (2011) (25)
- Text Compression and Encryption through Smart Devices for Mobile Communication (2013) (25)
- New Steganographic Techniques for the OOXML File Format (2011) (24)
- Integrity for an Event Notification Within the Industrial Internet of Things by Using Group Signatures (2018) (24)
- Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios (2019) (24)
- Condensation-based routing in mobile ad-hoc networks (2012) (23)
- On-Board Format-Independent Security of Functional Magnetic Resonance Images (2017) (23)
- A Secure Distributed Video Surveillance System Based on Portable Devices (2012) (22)
- Simple and robust methods for support vector expansions (1999) (22)
- Software Radio : Sampling Rate Selection, Design and Synchronization (2011) (21)
- A hidden Markov model for Internet channels (2003) (21)
- Multimedia-based battery drain attacks for Android devices (2014) (21)
- GMPLS-based service differentiation for scalable QoS support in all-optical Grid applications (2006) (20)
- A Fraud-Resilient Blockchain-Based Solution for Invoice Financing (2020) (20)
- An intelligent security architecture for distributed firewalling environments (2013) (20)
- A honeypot system with honeyword-driven fake interactive sessions (2015) (20)
- A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants (2017) (19)
- Energy-Oriented Models for WDM Networks (2010) (19)
- A secure file sharing service for distributed computing environments (2014) (19)
- Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome (2014) (18)
- A backpropagation algorithm for multilayer hybrid order statistic filters (1989) (18)
- Towards a Lawfully Secure and Privacy Preserving Video Surveillance System (2010) (18)
- A Method for Automatic Extraction of Fujisaki-Model Parameters (2002) (18)
- Securing the internet of vehicles through lightweight block ciphers (2020) (18)
- A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems (2014) (17)
- A Cluster-Based Multidimensional Approach for Detecting Attacks on Connected Vehicles (2021) (17)
- Stackelberg games for modeling defense scenarios against cloud security threats (2018) (17)
- Adaptive Stealth Energy-Related DoS Attacks against Cloud Data Centers (2014) (17)
- Bayesian resource discovery in infrastructure-less networks (2017) (17)
- Network anomaly detection based on logistic regression of nonlinear chaotic invariants (2019) (17)
- Low-complexity dominance-based sphere decoder for MIMO systems (2013) (17)
- The Diversification Role of Crossover in the Genetic Algorithms (1993) (17)
- An HMM Approach to Internet Traffic Modeling (2006) (16)
- A data-driven approximate dynamic programming approach based on association rule learning: Spacecraft autonomy as a case study (2019) (16)
- MIH-SPFP: MIH-based secure cross-layer handover protocol for Fast Proxy Mobile IPv6-IoT networks (2019) (16)
- Low-Resource Footprint, Data-Driven Malware Detection on Android (2020) (16)
- Self-association and Hebbian learning in linear neural networks (1995) (16)
- A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things (2016) (16)
- Data Fusion with Entropic Priors (2011) (15)
- Enhancing COVID-19 tracking apps with human activity recognition using a deep convolutional neural network and HAR-images (2021) (15)
- Securing PIN‐based authentication in smartwatches with just two gestures (2020) (15)
- Information theoretic‐based detection and removal of slander and/or false‐praise attacks for robust trust management with Dempster‐Shafer combination of linguistic fuzzy terms (2018) (15)
- Hiding Information into OOXML Documents: New Steganographic Perspectives (2011) (14)
- An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update (2014) (14)
- A Novel NTT-Based Authentication Scheme for 10-GHz Quantum Key Distribution Systems (2016) (13)
- Mobile sensor networks based on autonomous platforms for homeland security (2012) (13)
- Effective classification of android malware families through dynamic features and neural networks (2021) (13)
- Optimal correlating transform for erasure channels (2005) (13)
- Hebbian learning and self-association in nonlinear neural networks (1994) (13)
- Discovering genomic patterns in SARS‐CoV‐2 variants (2020) (13)
- Compression‐based steganography (2020) (13)
- Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks (2013) (13)
- A hybrid load-balancing and energy-aware RWA algorithm for telecommunication networks (2016) (12)
- A GRASP-based network re-optimization strategy for improving RWA in multi-constrained optical transport infrastructures (2010) (12)
- CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices (2020) (12)
- Enhanced Security Strategies for MPLS Signaling (2007) (12)
- Special Issue on Security and Privacy in Machine Learning (2019) (12)
- SimulNet: a wavelength-routed optical network simulation framework (2009) (12)
- Loss-Tolerant Event Communications Within Industrial Internet of Things by Leveraging on Game Theoretic Intelligence (2018) (12)
- Soft iterative decoding for overloaded CDMA (2005) (12)
- Towards Service Orchestration Between Smart Grids and Telecom Networks (2013) (11)
- Automated extraction of fragments of Bayesian networks from textual sources (2017) (11)
- QRP07-2: An HMM Approach to Internet Traffic Modeling (2006) (11)
- SPARK: A smart parametric online RWA algorithm (2007) (11)
- Modeling energy consumption in next-generation wireless access-over-WDM networks with hybrid power sources (2013) (11)
- Gotta CAPTCHA ’Em All: A Survey of 20 Years of the Human-or-computer Dilemma (2021) (11)
- Two channel TI-ADC for communication signals (2011) (11)
- Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies (2008) (11)
- Selfish routing and wavelength assignment strategies with advance reservation in inter-domain optical networks (2012) (11)
- Exploiting Battery-Drain Vulnerabilities in Mobile Smart Devices (2017) (11)
- Bayesian Modelling for Packet Channels (2003) (10)
- Evaluating energy savings in WoL-enabled networks of PCs (2013) (10)
- Energy efficiency of elastic frequency grids in multilayer IP/MPLS-over-flexgrid networks (2015) (10)
- Learning Non-Linear Functions With Factor Graphs (2013) (10)
- Considerations about learning Word2Vec (2021) (10)
- Adaptive channel equalization using generalized order statistic filters (1991) (10)
- Separability and Gain Control for Overloaded CDMA (2005) (10)
- Distributed Linear Block Coding for Cooperative Wireless Communications (2007) (10)
- Cloud Message Queueing and Notification: Challenges and Opportunities (2018) (10)
- Distributed temporal link prediction algorithm based on label propagation (2019) (10)
- Simulink Implementation of Belief Propagation in Normal Factor Graphs (2015) (10)
- Frequency analysis and synthesis of a class of nonlinear filters (1990) (10)
- Adaptive recursive order statistic filters (1990) (10)
- A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment (2016) (9)
- Device Tracking in Private Networks via NAPT Log Analysis (2012) (9)
- Intent Classification in Question-Answering Using LSTM Architectures (2020) (9)
- A tree-search algorithm for ML decoding in underdetermined MIMO systems (2009) (9)
- A combination of clustering-based under-sampling with ensemble methods for solving imbalanced class problem in intelligent systems (2021) (9)
- Interoperable Access Control by Means of a Semantic Approach (2016) (9)
- Traffic matrix estimation with software-defined NFV: Challenges and opportunities (2017) (9)
- Secure and reliable data communication in developing regions and rural areas (2015) (9)
- Multi-Class Independent Component Analysis (MUCICA) for Rank-Deficient Distributions (2000) (9)
- Packet interleaving over lossy channels (2004) (8)
- An energy‐aware engineered control plane for wavelength‐routed networks (2015) (8)
- Swarm-based Distributed Job Scheduling in Next-Generation Grids (2007) (8)
- A machine learning evolutionary algorithm-based formula to assess tumor markers and predict lung cancer in cytologically negative pleural effusions (2020) (8)
- On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures (2016) (8)
- Improving the gossiping effectiveness with distributed strategic learning (Invited paper) (2017) (8)
- Gotta CAPTCHA 'Em All: A Survey of Twenty years of the Human-or-Computer Dilemma (2021) (8)
- A Comparison of Algorithms for Learning Hidden Variables in Normal Graphs (2013) (8)
- Multi-Layer Independent Component Analysis (MLICA) (1999) (8)
- A wave propagation-based adaptive probabilistic broadcast containment strategy for reactive MANET routing protocols (2017) (8)
- Hybrid order statistic filters for adaptive image restoration (1990) (8)
- A Reliability and latency-aware routing framework for 5G transport infrastructures (2020) (7)
- Tree-search ML detection for underdetermined MIMO systems with M-PSK constellations (2010) (7)
- An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats (2010) (7)
- A Comparison of Algorithms for Learning Hidden Variables in Bayesian Factor Graphs in Reduced Normal Form (2016) (7)
- Building a network embedded FEC protocol by using game theory (2017) (7)
- Percolation-based routing in the Internet (2012) (7)
- Analyzing the Internet Stability in Presence of Disasters (2013) (7)
- An Analysis of Word2Vec for the Italian Language (2020) (7)
- A Deep Learning Approach for Maximum Activity Links in D2D Communications (2019) (7)
- Analysis of wide-band cross-correlation for target detection and time delay estimation (1991) (6)
- On the optimal tuning and placement of FEC codecs within multicasting trees for resilient publish/subscribe services in edge-IoT architectures (2018) (6)
- An Empirical Evaluation of Prediction by Partial Matching in Assembly Assistance Systems (2021) (6)
- Sampling theorem for polynomial interpolation (1986) (6)
- Two-dimensional multi-layer Factor Graphs in Reduced Normal Form (2015) (6)
- A Fault Avoidance Strategy Improving the Reliability of the EGI Production Grid Infrastructure (2010) (6)
- Entropic priors for short-term stochastic process classification (2011) (6)
- A Comparison of Signal Compression Methods by Sparse Solution of Linear Systems (2002) (6)
- Securing visual search queries in ubiquitous scenarios empowered by smart personal devices (2020) (6)
- Format-Independent Protection of DNA Microarray Images (2015) (6)
- Gain design and power allocation for overloaded MIMO-OFDM systems with channel state information and iterative multiuser detection (2011) (6)
- A genetic approach for the maximum network lifetime problem with additional operating time slot constraints (2020) (6)
- K-Trek: A Peer-to-Peer Approach to Distribute Knowledge in Large Environments (2003) (6)
- Noncausal filters: possible implementations and their complexity (2003) (6)
- Transformative computing approaches for advanced management solutions and cognitive processing (2020) (6)
- Introducing Virtual Private Overlay Network Services in Large Scale Grid Infrastructures (2007) (6)
- A Minimum Cut Interference-based Integrated RWA Algorithm for Multi-constrained Optical Transport Networks (2008) (6)
- Towards Building Deep Networks with Bayesian Factor Graphs (2015) (6)
- Multiple description image coder using correlating transforms (2004) (6)
- Audit-Based Access Control in Nomadic Wireless Environments (2006) (6)
- MPLS DiffServ-Enabled Traffic Engineering: A Scalable QoS Model for Optical-Speed Media Streaming Networks (2004) (5)
- PERMS: An efficient rescue route planning system in disasters (2021) (5)
- Heterogeneous Network Handover Using 3GPP ANDSF (2015) (5)
- Saving energy in aggressive intrusion detection through dynamic latency sensitivity recognition (2017) (5)
- DLCD-CCE: A Local Community Detection Algorithm for Complex IoT Networks (2020) (5)
- Ambient Intelligence in the Internet of Things (2017) (5)
- Maximum Network Lifetime Problem with Time Slots and coverage constraints: heuristic approaches (2021) (5)
- Chapter 19 – Towards Energy-Oriented Telecommunication Networks (2013) (5)
- Eco-sustainable routing in optical networks (2013) (5)
- Chapter 10 – Green Data center Infrastructures in the Cloud Computing Era (2013) (5)
- A new algorithm for training multilayer perceptrons (1989) (5)
- A Game-Theoretic Approach to Network Embedded FEC over Large-Scale Networks (2015) (5)
- Inversion of F/sub 0/ model for natural-sounding speech synthesis (2003) (5)
- Belief propagation and learning in convolution multi-layer factor graphs (2014) (5)
- An Energy-Division Multiple Access Scheme (2006) (5)
- HMM-Based Monitoring of Packet Channels (2004) (5)
- Enhanced Network Support for Scalable Computing Clouds (2010) (5)
- Group gain design for overloaded CDMA (2007) (5)
- Notes on Factor Graphs (2009) (5)
- Emerging Trends in Machine Learning for Signal Processing (2017) (5)
- Layered multicast for reliable event notification over large-scale networks (2017) (4)
- Improving Authentication in Voice Over IP Infrastructures (2007) (4)
- Vehicle-to-Everything (V2X) Communication Scenarios for Vehicular Ad-hoc Networking (VANET): An Overview (2021) (4)
- Distributed strategic learning for effective gossiping in wireless networks (2016) (4)
- Internet loss-delay modeling by use of input/output hidden Markov models (2004) (4)
- A Multiobjective Wavelength Routing Approach Combining Network and Traffic Engineering With Energy Awareness (2017) (4)
- Entropic priors for hidden-Markov model classification (2011) (4)
- Performance Modeling of Big Data-Oriented Architectures (2016) (4)
- INTERLEAVING FOR PACKET CHANNELS (2004) (4)
- Automated detection and containment of worms and viruses into heterogeneous networks: a simple network immune system (2007) (4)
- Analyses of the genetic algorithms in the continuous space (1992) (4)
- A distributed coding cooperative scheme for wireless communications (2005) (4)
- Self-association in multilayer linear networks with limited connectivity (1998) (4)
- Searching for a binary factorial code using the ICA framework (1998) (4)
- Large Scale Voice over IP Experiences on High Performance Intranets (2006) (4)
- Independent component analysis for mixture densities (1999) (4)
- Data hiding using compressed archives (2018) (4)
- Discrete independent component analysis (DICA) with belief propagation (2015) (4)
- Asymptotic multiuser efficiency in overloaded CDMA (2006) (4)
- On the Performance of Energy-Division Multiple Access with Regular Constellations (2012) (3)
- Inhibitory synapses in neural networks with sigmoidal nonlinearities (1999) (3)
- Supporting First Responders Localization during Crisis Management (2015) (3)
- QAM Receiver with Band-Pass Sampling and blind synchronization (2009) (3)
- An Ant Colony-based framework for Internet-scale Peer-to-Peer Grids (2007) (3)
- A self-organizing neural network for nonlinear filtering (1992) (3)
- Optimized realization of Bayesian networks in reduced normal form using latent variable model (2019) (3)
- Constrained minimum lightpath affinity routing in multi-layer optical transport networks (2010) (3)
- Adaptive nonlinear filtering with the support vector method (1998) (3)
- Network Forensics of WhatsApp: A Practical Approach Based on Side-Channel Analysis (2020) (3)
- Building a bayesian factor tree from examples (2010) (3)
- An algorithm for transform coding for lossy packet networks (2001) (3)
- Securing Information Exchange in VANETs by Using Pairing-Based Cryptography (2017) (3)
- A Distributed Flow Correlation Attack to Anonymizing Overlay Networks Based on Wavelet Multi-Resolution Analysis (2021) (3)
- On Asymptotic Efficiency for Asynchronous CDMA (2007) (3)
- Prosody modification and Fujisaki's model: Preserving natural soundness (2004) (3)
- On the Performance of Energy-Division Multiple Access Over Fading Channels (2013) (3)
- A Low Cost and Effective Link Protection Approach for Enhanced Survivability in Optical Transport Networks (2006) (3)
- Securing the MPLS Control Plane (2005) (3)
- Privacy-Aware Routing for Sharing Sensitive Information across Wide-Area Networks (2016) (3)
- Ensuring Privacy and Confidentiality in Digital Video Surveillance Systems (2012) (3)
- Insights into peer to peer traffic through nonlinear analysis (2010) (3)
- On Reliability and Security in Knowledge Grids (2014) (3)
- Percolation-Based Replica Discovery in Peer-to-Peer Grid Infrastructures (2009) (3)
- Probability Learning and Soft Quantization in Bayesian Factor Graphs (2012) (3)
- Distributed strategic learning and game theoretic formulation of network embedded coding (2017) (2)
- Bayesian Feature Fusion Using Factor Graph in Reduced Normal Form (2021) (2)
- Sparse sampling for Software Defined Radio receivers (2010) (2)
- CirclePIN (2020) (2)
- New bounds for correct generalization (1997) (2)
- Cyberspace Safety and Security (2018) (2)
- Innovative Mobile Internet Services and Applications (2015) (2)
- Characterizing and Classifying Card-Sharing Traffic through Wavelet Analysis (2011) (2)
- Advances in Security and Privacy in Sensor Networks (2014) (2)
- Consistency of sequence classification with entropic priors (2012) (2)
- Enhanced Network Support for Federated Cloud Infrastructures (2016) (2)
- Window functions obtained from B-S (1985) (2)
- A Scheme for Multiuser Communications based on Energy Division (2007) (2)
- A jitter model for OFDM systems (2008) (2)
- Bidirectional MIMO equalizer design (2006) (2)
- New energy-optimization challenges in the next-generation Internet ecosystem (2019) (2)
- Support Vector Machine for Nonparametric Binary Hypothesis Testing (1999) (2)
- COMPUTATIONAL OPTIMIZATION FOR NORMAL FORM REALIZATION OF BAYESIAN MODEL GRAPHS (2018) (2)
- Lightweight Ciphers in Automotive Networks: A Preliminary Approach (2019) (2)
- From Examples to Bayesian Inference (2011) (2)
- Generalized Independent Component Analysis as Density Estimation (2002) (2)
- MODEL FOR NATURAL-SOUNDING SPEECH SYNTHESIS Pierluigi (2003) (2)
- Image restoration based on perception-related cost functions (1991) (2)
- A secure payment system for multimedia on demand on mobile VANET clouds (2016) (2)
- Network-Aware Replica Optimization in the SCoPE Grid Infrastructure (2008) (2)
- Approximate state-space Gaussian processes via spectral transformation (2017) (1)
- Security and Privacy for Smart, Connected, and Mobile IoT Devices and Platforms (2018) (1)
- Distributed Strategic Learning for Building Network Embedded Coding to Achieve Reliable Event Notification (2016) (1)
- A machine learning‐based memory forensics methodology for TOR browser artifacts (2020) (1)
- Special issue on advances in security and privacy in IoT (2019) (1)
- A Wide Area Network Optimization Service for Effective Access to Heterogeneous DataGrid Infrastructures (2010) (1)
- A Scheduling Framework for Latency Optimization on 5G Mobile Edge Computing Infrastructures (2019) (1)
- The untrusted handover security of the S-PMIPv6 on LTE-A (2015) (1)
- Analyzing the effects of ElectroMagnetic Interference on state-ofthe-art copper twisted pair Ethernet cabling (2002) (1)
- Optimal control of system governed by nonlinear volterra integral and fractional derivative equations (2021) (1)
- A Distribution-Free VC-Dimension-Based Performance Bound (1998) (1)
- Exploring regularities and self-similarity in Internet traffic (2001) (1)
- How the Big Data Is Leading the Evolution of ICT Technologies and Processes (2015) (1)
- Training Semiparametric Support Vector Machines (1999) (1)
- Optimal Data Replica Placement in Large-Scale Federated Architectures (2016) (1)
- Time-Delay Fractional Optimal Control Problems: A Survey Based on Methodology (2021) (1)
- Bayesian Clustering on Images with Factor Graphs in Reduced Normal Form (2015) (1)
- On time diversity for packet channels (2008) (1)
- Dealing with Reliable Event-Based Communications by Means of Layered Multicast (2015) (1)
- Congestion control for UDP traffic (2004) (1)
- Unsupervised rank-deficient density estimation via multi-class independent component analysis (2000) (1)
- On the File Recovery in Systems Infected by Ransomware (2020) (1)
- Genetic-based traffic engineering in GMPLS networks (2005) (1)
- Secure Lossy Image Compression via Adaptive Vector Quantization (2018) (1)
- A New Design Paradigm for MIMO Dispersive Channel DF Equalizer (2007) (1)
- Notes on Cutset Conditioning on Factor Graphs with Cycles (2009) (1)
- Inter-domain Routing Stability Dynamics During Infrastructure Stress Events: The Internet Worm Menace (2008) (1)
- Multi-class Image Coding via EM-KLT Algorithm (2003) (1)
- Dynamic network optimization for effective QoS support in large Grid infrastructures (2009) (1)
- A Scalable PKI for Secure Routing in the Internet (2004) (1)
- Special Issue on Intelligent Systems in Sensor Networks and Internet of Things (2020) (1)
- On the undetectability of payloads generated through automatic tools: A human‐oriented approach (2021) (1)
- Privacy-preserving Secure Media Streaming for Multi-user Smart Environments (2021) (1)
- Dynamic Latency Sensitivity Recognition: An Application to Energy Saving (2017) (1)
- Principal components via cascades of block-layers (1997) (1)
- The Computational Neural Map and its Capacity (1997) (1)
- EM Algorithm: A Neural Network View (1998) (1)
- From Spiking Neurons to Dynamic Perceptrons (1999) (1)
- Analysis and applications of darwinian optimization algorithms in multi-dimensional spaces (1993) (1)
- Vulsploit: A Module for Semi-automatic Exploitation of Vulnerabilities (2020) (1)
- Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence (2015) (1)
- Context Analysis Using a Bayesian Normal Graph (2017) (1)
- Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness (2013) (1)
- An High Performance Traffic Engineering Model for All-Optical Networks - Evolutionary GMPLS Control Plane Services in All-Optical Cross-Connects (2004) (0)
- Exploiting enhanced reliability features in MPLS traffic engineered optical speed networks (2002) (0)
- On the Optimization of GLite-Based Job Submission (2011) (0)
- Interconnecting Federated Clouds by Using Publish-Subscribe Service (2013) (0)
- A triadic closure and homophily-based recommendation system for online social networks (2015) (0)
- A Converged Charging Framework for Mobile Voice and Data Applications (2009) (0)
- Intelligent Data-Centric Critical Systems: Security and Resilience Key Challenges (2018) (0)
- Testing the Resilience of MEC-based IoT Applications Against Resource Exhaustion Attacks (2023) (0)
- Secure and distributed video surveillance via portable devices (2013) (0)
- Green, Pervasive, and Cloud Computing (2016) (0)
- On the impact of lightweight ciphers in automotive networks (S) (2020) (0)
- Hybrid indoor and outdoor location services for new generation mobile terminals (2013) (0)
- 23rd Italian Workshop on Neural Networks (2013) (0)
- On the Performance of Energy-Division Multiple Access Over Fading Channels (2012) (0)
- Improving the performance of wireless links via end-to-end standard TCP tuning techniques (2002) (0)
- Eco-sustainable routing in optical networks (2013) (0)
- Introducing MPLS in M obile D ata N etworks : A n H igh P erformance F ramework for QoS-P owered IP Mobility (0)
- Introducing Public E-Mail Gateways: An Effective Hardening Strategy Against Spam (2005) (0)
- Human oriented solutions for intelligent analysis, multimedia and communication systems (2021) (0)
- Optimizing bulk data transfers using network measurements: A practical case (2010) (0)
- Special issue on advanced techniques for security and privacy of internet-of-things with machine learning (2020) (0)
- Evolutionary passive optical ring architectures for user-empowered MANs (2005) (0)
- Evolutionary switching devices for all-optical networks (2003) (0)
- Network anaomaly detection based on the observation of multi-scale traffic dynamics (2012) (0)
- Bounds and Protocols for Graph-Based Distributed Secret Sharing (2023) (0)
- A perspective of the journal's life in the last three years (2014) (0)
- Guest Editorial: Soft Computing Applications for Novel and Upcoming Distributed and Parallel Systems From Cloud Computing and Beyond (2019) (0)
- Design and implementation of a high performance metropolitan multicasting infrastructure (0)
- MLPKV: A Local Differential Multi-Layer Private Key-Value Data Collection Scheme for Edge Computing Environments (2023) (0)
- Message from SecureSysComm 2015 Workshop Chairs (2016) (0)
- Providing effective inter-domain traffic engineering in the Internet (2002) (0)
- A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems (2013) (0)
- Efficient and Secure Transmission of Digital Data in the 5G Era (2022) (0)
- Probing a Deep Neural Network (2020) (0)
- Transparent Authentication across Heterogeneous Wireless Network Technologies: a Minimum-impact Architectural Framework (2005) (0)
- On the Performance of Energy-Division Multiple Access with Regular Constellations (2010) (0)
- A Methodological Perspective on Lawful Internet Surveillance (2020) (0)
- INCoS-2014 Organizing Committee (2014) (0)
- Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures (2014) (0)
- Energy-aware Optimization of Data Centers and Cybersecurity Issues (2022) (0)
- K-Trek: A Peer-to-Peer Infrastructure for Distributing Using Knowledge in Large Environments (2003) (0)
- Evaluating Evolutionary IP-Based Transport Services on a Dark Fiber Large-Scale Network Testbed (2005) (0)
- An Algebraic Approach for Path-Diversity Multiple-Description-Coding Scenario (2005) (0)
- Authors' Reply (1998) (0)
- Sampling Rate Selection, Timing Jitter and Time Interleaved ADCs (2012) (0)
- Dynamic Layer-2 VPN Services for Improving Security in the Grid Environment (2006) (0)
- Introducing MPLS in Mobile Data Networks: An High Performance Framework for QoS-Powered IP Mobility (2003) (0)
- Managing Network-Aware Grid Services on Metropolitan Scale: The SCoPE Experience (2009) (0)
- Information-Preserving Networks And The Mirrored Transform (2019) (0)
- Improved Protocols for Distributed Secret Sharing (2022) (0)
- On Asymptotic EfficiencyforAsynchronous CDMA (2007) (0)
- Foreword by Prof. Ing. Francesco Palmieri, Ph.D. (2017) (0)
- Software Radio: From an Idea to Reality (2012) (0)
- An agent-based network-aware approach to grid resource scheduling (2009) (0)
- Special Issue: Novel Algorithms and Protocols for Networks (2021) (0)
- ,a Schm E for Ltro Unication (2009) (0)
- Minimum interference optical multicast (2005) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Francesco Palmieri?
Francesco Palmieri is affiliated with the following schools: