Curriculum

Curriculum Docente

Posizione

  • 2021- : Professore Ordinario presso il Dipartimento di Informatica dell'Università degli Studi di Salerno;
  • 2018-20 : Professore Associato presso il Dipartimento di Ingegneria dell'Università della Campania Luigi Vanvitelli;
  • 2011-18 : Ricercatore presso il Dipartimento di Ingegneria dell'Università della Campania Luigi Vanvitelli;
  • 2008-10 : Ph.D. in Ingnegnia dell'Informazione, Università Parthenope;
  • 2006-10 : Ricercatore Senior presso il Consorzio Interuniversitario Nazionale per l'Informatica (CINI);
  • 2001-05 : Ricercatore Junior presso il Consorzio Interuniversitario Nazionale per l'Informatica (CINI);
  • 2000 : Laurea in Ingneria Informatica presso l'Università di Napoli Federico II.

Attività Didattica

  • 2022-24 : Programmazione ad Oggetti, Università di Salerno;
  • 2021-24 : IoT Laboratory, Università di Salerno;
  • 2019-21 : Ingegneria del Software, Università della Campania Luigi Vanvitelli;
  • 2017-21 : Laboratorio di Sviluppo di Applicazioni IoT, Università della Campania Luigi Vanvitelli;
  • 2017-20 : Laboratorio di Sviluppo di Applicazioni WEB 2.0, , Università della Campania Luigi Vanvitelli;
  • 2012-21 : Affidabilità dei Sistemi Software Complessi, Università della Campania Luigi Vanvitelli;
  • 2012-21 : Programmazione ad Oggetti, Università della Campania Luigi Vanvitelli;
  • 2011-12 : Ingegneria del Software e Sistemi Informativi, Università della Campania Luigi Vanvitelli;
  • 2009-10 : Ingegneria del Software II, Università della Campania Luigi Vanvitelli;
  • 2005-08 : Ingegneria del Software I, Università della Campania Luigi Vanvitelli;
  • 2006-08 : Tecnologie dei sistemi informatici: Basi di Dati e Reti, Università di Napoli Federico II;
  • 2003-06 : Elementi di Informatica ed Ulteriori Abilità Informatiche, Università di Napoli Federico II;
  • 2002-03 : Fondamenti di Informatica, Università di Napoli Federico II.

Research Interests

  • Cloud Security;
  • IoT Security;
  • Sicurezza e affidabilità delle infrastrutture critiche;
  • Machine learning e intelligenza artificiale;
  • Mobile Computing.

Progetti Scientifici

  • 2023-24: A multimodal AI-based toolbox and an interoperable health imaging repository for the empowerment of imaging analysis related to the diagnosis, prediction and follow-up of cancer (INCISIVE);
  • 2022-23 - SEcurity and RIghts in the CyberSpace (SERICS), PNRR MUR – M4C2 – Investimento 1.3;
  • 2021-22 - Piattaforma tecnologica Intelligente per la gestione dei processi industriali Logistico-produttivi di filiera, Ottimizzati in ottica di Tracciabilità e Anticontraffazione (PILOTA), Fondo per la Crescita Sostenibile – Sportello “Fabbrica intelligente” PON I&C 2014-2020.
  • 2021-22 - Safety and Security Standards of Space Systems, ground Segments and Satellite data assets, via prevention, detection, response and mitigation of physical and cyber threats (7SHIELD), H2020-SU-INFRA-2019.
  • 2020-21 - Improving resilience of sensitive industrial plants & infrastructures exposed to cyber-physical threats, by means of an open testbed stress-testing system (InfraStress), H2020-EU.3.7.4-833088.
  • 2018-21 - GreenCharge, H2020-EU.3.4.-769016.
  • 2018-19 - COMPACT - COmpetitive Methods to protect local Public Amministration from Sybersecurity Threats (H2020-EU.3.7.4-740712);
  • 2015-18 - MUSA - MUlti-cloud Secure Applications (H2020-ICT-2014-1);
  • 2014-16 - COSMMIC - Collaborating Smart Solar-Powered Microgrids, (FP7-SMARTCITIES-608806);
  • 2013-16 - SPECS - Secure Provisioning of Cloud Services based on SLA management (FP7-ICT 2013-2016);
  • 2014-16 - ITINERE - InTegrated and INteroperable systEm for Railway Enhanced application), Sportello dell’Innovazione di cui al D.D. N.1 del 05/02/14, POR Campania FESR 2007–2013 - O.O. 2.1;
  • 2013-16 - CRYSTAL, Critical System Engineering Acceleration, SP1-JTI-ARTEMIS-2012-AIPP1-332830;
  • 2013-15 - DISPLAY, Piattaforma di simulazione ibrida e distribuita per i sistemi ATM e VTS, potenziamento di laboratori pubblico-privato, PON Ricerca e Competitività 2007-2013 per le Regioni della Convergenza D.D. MIUR n.713/Ric. del 29 ottobre 2010 e D.D. MIUR n. 660Ric. e 664/Ric. dell’8/10/2012;
  • 2013-15 - MINIMINDS - Middleware for INteroperability and Integration of MIssioN Critical Dependable Systems, potenziamento di laboratori pubblico-privato, PON Ricerca e Competitività 2007-2013 per le Regioni della Convergenza D.D. MIUR n.713/Ric. del 29 ottobre 2010 e D.D. MIUR n. 660Ric. e 664/Ric. dell’8/10/2012;
  • 2010-13 - mOSAIC - Source API and Platform for Multiple Clouds, (FP7-ICT-2009-5-256910);
  • 2010-12 - DOTS-LCCI - Dependable Off-The-Shelf based Middleware Systems for Large-scale Complex Critical Infrastructures, Program of Relevant National Interest (PRIN), no. 2008LWRBHF;
  • 2009-10 - CRITICAL-STEP - Collaborazione scientifica nell’ambito del progetto Software Technology for an Evolutionary Partnership, (FP7-PEOPLE-230672);
  • 2008-10 - INSPIRE - INcreasing Security and Protection through Infrastructure REsilience (FP7-SEC-2008-225553);
  • 2008-09 - INTERSECTION, INfrastructure for heTErogeneous, Resilient, SEcure, Complex, Tightly Inter Operating Networks (FP7-SEC-216585);
  • 2008-10 - NET-UNO - Misura 3.17 of the POR Campania 2000/2006;
  • 2007-09 - COSMIC - Laboratorio Pubblico-Privato tra CINI, DIS UNINA, CRIAI e SELEX-SI (azienda Finmeccanica). Legge 287/1999 Art. 12/lab/Decr. Diret. 14/3/2005 prot. n° 602/Ric/2005 (MIUR);
  • 2003-06 - PON PETIT-OSA - Piattaforme Evolute di Telecomunicazioni e di Information Technology per l'Offerta di Servizi al Settore Ambiente, Fondo per le Agevolazioni alla Ricerca – FAR;
  • 2002-06 - FIRB WEB MINDS - Wide-scalE, Broadband, Middleware for Network Distributed Services, Fondo per gli Investimenti della Ricerca di Base;
  • 2003-05 - INTERMON - Advanced architecture for INTER-domain quality of service MONitoring, modelling and visualization (IST-FP5‐2001‐34123);
  • 2001-02 - CADENUS - Creation and Deployment of End-User Services in Premium IP Networks, (FP5-IST-1999-11017);
  • 2001-02 - LABNET 2, MURST Legge 488 Ricerca;
  • 2000-02 - GUARDIANS - Gateway for User Access to Remote Distributed Information and Network Services (FP5-IST-1999-20758).
  • 2000-01 - LABNET Infrastrutture, MURST Legge 488 Ricerca.

Editor

Pubblicazioni

Journal

  • D’Angelo, E. Farsimadan, M. Ficco, F. Palmieri, and A. Robustelli, Privacy-preserving Malware Detection in Android-based IoT Devices Through Federated Markov Chains, Future Generation Computer Systems, vol. 48, Nov. 2023, pp. 93-105, DOI: 10.1016/j.future.2023.05.021, ISSN: 0167-739X, Elsevier.
  • Pietrantuono, M. Ficco, and F. Palmieri, Survivability analysis of IoT systems under resource exhausting attacks, IEEE Transactions on Information Forensics and Security, vol. 18, May 2023, pp. 3277-3288, ISSN: 1556-6013, DOI: 10.1109/TIFS.2023.3278449, IEEE.
  • Pietrantuono, M. Ficco, and F. Palmieri, Testing the Resilience of MEC-based IoT Applications Against Resource Exhaustion Attacks, IEEE Transactions on Dependable and Secure Computing, Mar. 2023, pp. 1-15, ISSN: 1545-5971, DOI: 10.1109/TDSC.2023.3263137, IEEE.
  • Shahana Gajala Qureshi, Shishir Kumar Shandilya, Suresh Chandra Satapathy, and Massimo Ficco, Nature-Inspired Decision Support System for Securing Clusters of Wireless Sensor Networks in Advanced IoT Environments, Wireless Personal Communications, vol. 128, Jen. 2023, pp. 67–88, ISNN: 0929-6212, DOI: 10.1007/s11277-022-09601-5, Springer.
  • Ficco, Malware analysis by combining multiple detectors and observation windows, IEEE Transactions on Computers, Accepted in May. 2021, pp. 1-14, DOI: 10.1109/TC.2021.3082002, ISSN: 0018-9340, IEEE CPS Press.
  • D’Angelo, M. Ficco, and F. Palmieri. Association Rule-based Malware Classification using Common Subsequences of API Calls, Applied Soft Computing Journal, vol. 105, Jul. 2021, pp. 1-8, DOI: 10.1016/j.asoc.2021.107234, ISSN: 15684946, Elsevier.
  • Esposito, M. Ficco, and Brij B. Gupta. Blockchain-Based Authentication and Authorization for Smart City Applications, Information Processing & Management, vol. 58, no. 2, Mar. 2021, pp. 1-16, DOI: 10.1016/j.ipm.2020.102468, ISSN: 0306-4573, Elsevier.
  • D’Angelo, M. Ficco, and F. Palmieri. Malware detection in mobile environments based on Autoencoders and API-images, Journal of Parallel and Distributed Computing, vol. 137, Mar. 2020, pp. 26-33, DOI: 10.1016/j.jpdc.2019.11.001, ISSN: 0743-7315, Elsevier.
  • Ficco and F. Palmieri. Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios, Journal of Systems Architecture, vol. 97, Aug. 2019, pp. 107-129, DOI: 10.1016/j.sysarc.2019.04.004, ISSN: 2542-6605, Elsevier
  • Amato, R. Aversa, M. Ficco and S. Venticinque. Migrating mission-critical applications in federated cloud: a case study, Int. J. High Performance Computing and Networking, vol. 12, no. 4, Dec. 2018, pp. 379-390, DOI: 10.1504/IJHPCN.2018.096723, ISSN: 1740-1756, Inderscience.
  • Di Martino, M. Rak, M. Ficco, A. Esposito, S. A. Maisto,and S. Nacchia. Internet of things reference architectures, security and interoperability: A survey, Internet of Things, Sep. 2018, vol. 1-2, pp. 99-112, DOI: 10.1016/j.iot.2018.08.008, ISSN: 2542-6605, Elsevier.
  • Ficco, R. Pietrantuono, S. Russo. Hybrid Simulation and Test of Vessel Traffic Systems on the Cloud, IEEE Access, Dec. 2018, vol. 6 no. 1, pp. 47273-47287. DOI: 10.1109/ACCESS.2018.2865683, ISSN: 2169-3536, IEEE.
  • Ficco. Could Emerging Fraudulent Energy Consumption Attacks Make the Cloud Infrastructure Costs Unsustainable? Information Sciences, Feb. 2019, vol. 476, pp. 474-490, DOI: 10.1016/j.ins.2018.05.029, ISSN: 0020-0255, Elsevier.
  • Esposito, M. Ficco, A. Castiglione, F. Palmieri, and A. De Santis. Distributed group key management for event notification confidentiality among sensors, IEEE Transactions on Dependable and Secure Computing, Jan. 2018, http://ieeexplore.ieee.org/document/8274911/, 10.1109/TDSC.2018.2799227, ISSN: 1545-5971, IEEE (available online).
  • Kozik, M. Choraś, M. Ficco, and F. Palmieri. A scalable distributed machine learning approach for attack detection in edge computing environments, Journal of Parallel and Distributed Computing, vol. 119, Sep. 2018, pp. 18-26, DOI: 10.1016/j.jpdc.2018.03.006, ISSN: 0743-7315, Elsevier.
  • Esposito, A. Castiglione, F. Palmieri, and M. Ficco. Building a network embedded FEC protocol by using game theory, Information Sciences, vol. 433-434, Apr. 2018, pp. 365-380, DOI: 10.1016/j.ins.2017.04.010, ISSN: 0020-0255, Elsevier.
  • Esposito, A. Castiglione, F. Palmieri, M. Ficco, C. Dobre, G. Iordache, and F. Pop. Event-based sensor data exchange and fusion in the internet of things environments. Journal of Parallel and Distributed Computing, vol. 118, part 2, Aug. 2018, pp. 328-343, DOI: 10.1016/j.jpdc.2017.12.010, ISSN: 0743-7315, Elsevier
  • Ficco, C. Esposito, F. Palmieri, and A. Castiglione. A coral-reefs and game theory-based approach for optimizing elastic cloud resource allocation. Future Generation Computer Systems, vol. 78, no. 1, Jan. 2018, pp. 343-352, DOI: 10.1016/j.future.2016.05.025, ISSN: 0167-739X, Elsevier
  • Esposito, M. Ficco, A. Castiglione, F. Palmieri, and L. Huimin. Loss-tolerant event communications within industrial internet of things by leveraging on game theoretic Intelligence. IEEE Internet of Things Journal, vol. 5, no. 3, Jun. 2018, pp. 1679-1689, DOI: 10.1109/JIOT.2017.2782264, ISSN: 2327-4662, IEEE.
  • Ficco, C. Esposito, Y. Xiang, and F. Palmieri. Pseudo-dynamic testing of realistic edge-fog cloud ecosystems. IEEE Communications Magazine, vol. 55, no. 11, Nov. 2017, pp. 98-104, DOI: 10.1109/MCOM.2017.1700328, ISSN:0163-6804, IEEE
  • Ficco, R. Pietrantuono, and S. Russo. Aging-related performance anomalies in the apache storm stream processing system, Future Generation Computer Systems, vol. 86, Sep. 2018, pp. 975-994, DOI: 10.1016/j.future.2017.08.051, ISSN: 0167-739X, Elsevier
  • Ficco and F. Palmieri. Introducing fraudulent energy consumption in cloud infrastructures: A new generation of denial-of-service attacks, IEEE Systems Journal, vol. 11, no. 2, Jun. 2017, pp. 460-470, DOI: 10.1109/JSYST.2015.2414822, ISSN: 1932-8184, IEEE CPS Press.
  • Esposito, A. Castiglione, F. Palmieri, and M. Ficco. Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation, operators and mechanism design. Future Generation Computer Systems, vol. 74, Sep. 2017, pp. 325-336, DOI: 10.1016/j.future.2015.12.004, ISSN: 0167-739X, Elsevier.
  • Ficco, M. Choras, and R. Kozik. Simulation Platform for Cyber-Security and Vulnerability Analysis of Critical Infrastructures, Journal of Computational Science, vol. 22, Sep. 2017, pp. 179-186, DOI: 10.1016/j.jocs.2017.03.025, ISSN: 1877-7503, Elsevier.
  • Ficco, B. Di Martino, R. Pietrantuono, and S. Russo. Optimized task allocation on private cloud for hybrid simulation of large-scale critical systems, Future Generation Computer Systems, vol. 74, Sep. 2017, pp. 104-118, DOI: 10.1016/j.future.2016.01.022, ISSN: 0167-739X, Elsevier.
  • Esposito, A. Castiglione, F. Palmieri, and M. Ficco. Improving the gossiping effectiveness with distributed strategic learning (Invited Paper), Future Generation Computer Systems, vol. 71, Jun. 2017, pp. 221-233, DOI: 10.1016/j.future.2016.11.006, ISSN: 0167-739X, Elsevier.
  • Palmieri, M. Ficco, S. Pardi, and A. Castiglione. A cloud-based architecture for emergency management and first responders localization in smart city environments, Computers and Electrical Engineering, vol. 56, Nov. 2016, pp. 810-830, DOI: 10.1016/j.compeleceng.2016.02.012, ISSN: 0045-7906, Elsevier.
  • Ficco, C. Esposito, Henry Chang, and Kim-Kwang Raymond Choo. Live migration in emerging cloud paradigms, IEEE Cloud Computing, vol. 3, no. 2, March/April 2016, pp. 12-19, DOI: 10.1109/MCC.2016.48, ISSN: 2325-6095, IEEE CPS Press.
  • Ficco, R. Pietrantuono, and S. Russo. Using multi-objective metaheuristics for the optimal selection of positioning systems, Soft Computing, vol. 20, no. 7,Jul. 2016, pp. 2641-2664, DOI: 10.1007/s00500-015-1665-x, ISSN: 1432-7643, Springer.
  • Ficco, L. Tasquier, and R. Aversa. Intrusion detection in federated clouds. Int. J. Computational Science and Engineering, vol. 13, no. 3, Jun. 2016, pp. 219-232, DOI: http://dx.doi.org/10.1504/IJCSE.2016.078929, ISSN: 1742-7185. Inderscience Enterprises.
  • Ficco, G. Avolio, F. Palmieri, and A. Castiglione. An HLA-based framework for simulation of large-scale critical systems, Concurrency and Computation: Practice and Experience, vol. 28, no. 2, Feb. 2016, pp. 400-419, DOI: 10.1002/cpe.3472, ISSN: 1532-0634, Wiley
  • Esposito and M. Ficco. Recent developments on security and reliability in large-scale data processing with MapReduce, International Journal of Data Warehousing and Mining, vol. 12, no. 1, Jen. 2016, pp. 49-68, DOI: 10.4018/IJDWM.2016010104, ISSN: 1548-3924, IGI Global.
  • Esposito, M.Ficco, F. Palmieri, and A. Castiglione. Smart cloud storage service selection based on fuzzy logic, theory of evidence and game theory, IEEE Transactions on Computers, vol. 65, no. 8, Aug. 2016, pp. 2348-2362, DOI: 10.1109/TC.2015.2389952, ISSN: 0018-9340, IEEE CPS Press.
  • D'Angelo, F. Palmieri, M. Ficco, and S. Rampone. An uncertainty-managing batch relevance-based approach to network anomaly detection, Applied Soft Computing Journal, vol. 36, no. 17, Aug. 2015, pp. 408-418, DOI:10.1016/j.asoc.2015.07.029, ISSN: 15684946, Elsevier
  • Esposito, M. Ficco, F. Palmieri, and A. Castiglione. A knowledge-based platform for big data analytics based on publish/subscribe services and stream processing, Journal of Knowledge-Based Systems, vol. 79, May 2015, pp. 3-17, DOI: 10.1016/j.knosys.2014.05.003, ISSN: 0950-7051, Elsevier
  • Ficco, F. Palmieri, and A. Castiglione. Modeling security requirements for cloud-based system development, Concurrency and Computation: Practice and Experience, vol. 27, no. 8, Jun. 2015, pp. 2107-2124, DOI: 10.1002/cpe.3402, ISSN: 1532-0634, Wiley.
  • Gargiulo, G. Gigante, and M. Ficco. A semantic driven approach for requirements consistency verification, Int. Journal of High Performance Computing and Networking, vol. 8, no. 3, Sept. 2015, pp. 201-211, DOI: 10.1504/IJHPCN.2015.071261, ISSN: 1740-0562, Inderscience Enterprises Ltd.
  • Palmieri, S. Ricciardi, U. Fiore, M. Ficco, and A. Castiglione. Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures,Journal of Supercomputing, vol. 71, no. 5, May 2015, pp. 1620-1641, DOI: 10.1007/s11227-014-1242-6, ISSN: 0920-8542, Springer.
  • Ficco and M. Rak. Stealthy denial of service strategy in cloud computing, IEEE Transactions on Cloud Computing, vol. 3, no. 1, Jan. 2015, pp. 80–94, DOI: 10.1109/TCC.2014.2325045, ISSN: 2168-7161, IEEE CPS Press.
  • Rak, M. Ficco, E. Battista, V. Casola, and N. Mazzocca. Developing secure cloud applications, Scalable Computing: Practice and Experience, vol. 15, no. 1, Mar. 2014, pp. 49–62, DOI: 10.12694/scpe.v15i1.965, ISSN 1895-1767, Wiley
  • Ficco, C. Esposito, and A. Napolitano. Calibrating indoor positioning systems with low efforts, IEEE Transactions on Mobile Computing, vol. 13, no. 4, Apr. 2014, pp. 737-751, DOI: 10.1109/TMC.2013.29, ISSN: 1536-1233, IEEE CPS Press.
  • Ficco. Calibration-less Indoor Location Systems Based on Wireless Sensors. Journal of Ambient Intelligence and Humanized Computing, vol. 5, no. 2, Apr. 2014, pp. 249-261, DOI: 10.1007/s12652-013-0192-9, ISSN: 1868-5137, Springer.
  • Ficco, P. Palmieri, and A. Castiglione. Hybrid indoor and outdoor location services for new generation mobile terminals. Personal and Ubiquitous Computing, vol. 18, no. 2, Feb. 2014, pp. 271-285, DOI: 10.1007/s00779-013-0644-4, ISSN: 1617-4909, Springer.
  • Ficco, S. Venticinque, and B. Di Martino. An advanced intrusion detection framework for cloud computing. Journal of Computer Systems Science and Engineering, vol. 28, no. 6, Nov. 2013, CRL Publishing Ltd.
  • Esposito, M. Ficco, P. Palmieri, and A. Castiglione. Interconnecting federated clouds by using publish-subscribe service, Cluster Computing, vol. 6, no. 4, Dec. 2013, pp. 887-903, DOI: 10.1007/s10586-013-0261-z, ISSN: 1386-7857, Springer.
  • Ficco. Security event correlation approach for cloud computing. Journal of High Performance Computing and Networking, vol. 7, no. 3, Sep. 2013, pp.173-185, DOI: 10.1504/IJHPCN.2013.056525, ISSN: 1740-0562, Inderscience Enterprises.
  • Esposito and M. Ficco. Deployment of RSS-based indoor positioning systems. Journal of Wireless Information Networks, vol. 18, no. 4, Dec. 2011, pp. 224-242, DOI: 10.1007/s10776-011-0131-7, ISSN 1068-9605, Springer.
  • Aversa, B. Di Martino, M. Ficco, and S. Venticinque. A simulation model for localization of pervasive objects using heterogeneous wireless networks. Journal of Simulation Modelling Practice and Theory, vol. 19, no. 8, Sep. 2011, pp. 1758-1772, DOI: 10.1016/j.simpat.2011.02.005, ISSN: 1569-190X, Elsevier.
  • Ficco, R. Pietrantuono, and S. Russo. Bug localization in test-driven development. Advances in Software Engineering, vol. 2011, Jun. 2011, pp. 1-18, DOI: 10.1155/2011/492757, ISSN: 0965-9978, Hindawi Publishing Corporation.
  • Ficco, R. Piatrantuono, and S. Russo. Supporting ubiquitous location information in interworking 3G and wireless networks. Communications of the ACM, vol. 53, no.11, Nov. 2010, pp. 116-123, DOI: 10.1145/1839676.1839702, ACM Press.
  • Ficco. Achieving security by intrusion-tolerance based on event correlation. Special Issue on Data Dissemination for Large scale Complex Critical Infrastructures, International Journal of Network Protocols and Algorithms (NPA), vol. 2, no. 3, Oct.2010, pp. 70-84, DOI: 10.5296/npa.v2i3.420, ISSN: 1943-358, Macrothink Institute.
  • Ficco and S. Russo. A hybrid positioning system for technology-independent location-aware computing. Software: Practice and Experience (SPE), vol. 39, Feb. 2009, pp. 1095-1125, DOI: 10.1002/spe.919, ISSN: 0038-0644, Wiley InterScience Journal.

Conferenze

  • Natella, A. Ceccarelli, and M. Ficco. Federated and Generative Data Sharing for Data-Driven Security: Challenges and Approach. The IEEE Int. Conf on DASC/PiCom/CBDCom/CyberSciTech, Sep.12-15 2022, pp. 1-6, OI: 10.1109/DASC/PiCom/CBDCom/Cy55231.2022.9927754, ISBN: 978-1-6654-6297-6/22, IEEE CS Press.
  • Ficco, R. Palmiro, M. Rak, and D. Granata. MAVLink Protocol for Unmanned Aerial Vehicle: Vulnerabilities Analysis. The IEEE Int. Conf on DASC/PiCom/CBDCom/CyberSciTech, Sep. 12-15 2022, pp. 1-6, DOI: 10.1109/DASC/PiCom/CBDCom/Cy55231.2022.9927895, ISBN:978-1-6654-6297-6/22, IEEE CS Press.
  • Ficco. Detecting IoT Malware by Markov Chain Behavioral Models. The IEEE Int. Conf. on Cloud Engineering (IC2E), Prague, Czech Republic, Jun. 24-27, 2019, pp. 229-234. DOI: 10.1109/IC2E.2019.00015, ISBN: 978-1-7281-0218-4, IEEE CS Press.
  • Ficco, S. Venticinque, and M. Rak. Malware Detection for Secure Microgrids: CoSSMic Case Study. The IEEE Int. Conf. on iThings/GreenCom/CPSCom/SmartData 2017, Exeter, United Kingdom, Jun. 21-23, 2017, pp. 336-341. DOI: 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.56, ISBN:978-1-5386-3067-9, IEEE CS Press.
  • Esposito, A. Castiglione, F. Palmieri, M. Ficco, and K.K. Raymond Choo. A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things. The IEEE Dependable, Autonomic and Secure Computing (DASC), Auckland, New Zealand, Aug. 8-12, 2016, pp. 376-383. DOI: 10.1109/DASC-PICom-DataCom-CyberSciTec.2016.79, ISBN: 978-1-5090-4066-7, IEEE CS Press.
  • Esposito, A. Castiglione, F. Palmieri, and M. Ficco. Distributed Strategic Learning for Effective Gossiping in Wireless Networks. The IEEE INFOCOM -Workshop on Mobility Management in the Networks of the Future World, San Francisco, California, USA, Apr. 2016, pp. 509-514. DOI: 10.1109/INFCOMW.2016.7562130, ISBN:978-1-4673-9956-2, IEEE CS Press.
  • Amato, A. Aversa, M. Ficco, and S. Venticinque. CoSSMic smart grid migration in federated clouds. The IEEE 30th Int. Conf. on Advanced Information Networking and Applications (AINA’16), Crans-Montana, Switzerland, Mar. 27-29, 2016, pp.103-108. DOI:10.1109/WAINA.2016.39, ISBN: 9781509018574, IEEE CS Press.
  • Pietrantuono, M. Ficco, S. Russo, and G. Gigante. Sampling UAV most informative diagnostic signals. The 10th Int. Conf. on P2P, Parallel, Grid, Cloud and Internet Computing (3GPCIC 20153), Krakow, Poland, Nov. 2015, pp. 683-688. DOI: 10.1109/3PGCIC.2015.61, ISBN: 978-1-4673-9473-4, IEEE CS Press.
  • Ficco, F. Palmieri, and A. Castiglione. Supporting first responders localization during crisis management. The 9th Int. Conf. on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2015), Blumenau, Brazil, Jul. 2015, pp. 147-152. DOI: 10.1109/IMIS.2015.24, ISBN: 978-1-4799-8873-0, IEEE CS Press.
  • Esposito, M. Ficco, and F. Palmieri. On Reliability and Security in Knowledge Grids. The 9th Int. Conf. on P2P, Parallel, Grid, Cloud and Internet Computing (3GPCIC 2014), Guangzhou, China, Nov. 2014, pp. 20-27. DOI: 10.1109/3PGCIC.2014.131, ISBN: 978-1-4799-4171-1, IEEE CS Press.
  • Ficco, G. Avolio, L. Battaglia and V. Manetti. Hybrid Simulation of Distributed Large-Scale Critical Infrastructures. The Int. Conf. on Intelligent Networking and Collaborative Systems (INCoS 2014), Salerno, IT, Sep. 2014, pp. 616-621. DOI: 10.1109/INCoS.2014.35, ISBN: 978-1-4799-6387-4, IEEE CS Press.
  • Ficco, L. Tasquier, and R. Aversa. Agent-Based Intrusion Detection for Federated Clouds. The Int. Conf. on Intelligent Networking and Collaborative Systems (INCoS 2014), Salerno, IT, Sep. 2014, pp. 586-591. DOI: 10.1109/INCoS.2014.93, ISBN: 978-1-4799-6387-4, IEEE CS Press.
  • Palmieri, M. Ficco, and A. Castiglione. Adaptive Stealth Energy-related DoS Attacks Against Cloud Data Centers. The 8th Int. Conf. on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2014), Birmingham, UK, Jul. 2014, pp. 265-272, DOI: 10.1109/IMIS.2014.33, ISBN: 978-1-4799-4331-9, IEEE CS Press.
  • Zazzaro, G. Gigante, E. Zaccariello, M. Ficco, and B. Di Martino. Supporting Development of Certified Aeronautical Components by applying Text Analysis Techniques. The 8th Int. Conf. on Complex, Intelligent and Software Intensive Systems (CISIS 2014), Birmingham, UK, Jul. 2014, pp. 602-607, DOI: 10.1109/CISIS.2014.86, ISBN: 978-1-4799-4325-8, IEEE CS Press.
  • Venticinque, N. Mazzocca, S. Venticinque, and M. Ficco. Semantic Support for Log Analysis of Safety-Critical Embedded Systems. The 1st International Workshop on Real-time Big Data Analytics for Critical Infrastructure Protection (BIG4CIP 2014). Newcastle, UK, May 2014, CoRR abs/1405.2986.
  • Battista, V. Casola, N. Mazzocca, M. Ficco, and M. Rak. Developing Secure Cloud Applications: A Case Study. The 15th Int. Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC 2013), Timisoara, Romania, Sep. 2013, pp. 432-439. DOI: 10.1109/SYNASC.2013.63, ISBN: 978-1-4799-3035-7, IEEE CS Press.
  • Ficco, L. Tasquier, and R. Aversa. Intrusion Detection in Cloud Computing. The 8th Int. Conf. on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC 2013), Compiegne, France, Oct. 2013, pp. 276-283. DOI: 10.1109/3PGCIC.2013.47, ISBN: 978-0-7695-5094-7, IEEE CS Press.
  • Ficco and R. Aversa. Hybrid Localization for Ubiquitous Services. The 10th IEEE Int. Conf. on Ubiquitous Intelligence and Computing (UIC 2013), Vietri sul Mare, Italy, Dec. 2013, pp. 1-8. DOI: 10.1109/UIC-ATC.2013.17, ISBN: 978-1-4799-2481-3, IEEE CS Press.
  • Ficco and M. Rak. Intrusion tolerance in cloud applications: The mOSAIC approach. The 6th Int. Conf. on Complex, Intelligent, and Software Intensive Systems (CISIS 2012), Palermo, Italy, Jul. 2012, pp. 170-176. DOI: 10.1109/CISIS.2012.202, ISBN: 978-1-4673-1233-2, IEEE CS Press.
  • Aversa, B. Di Martino, M. Ficco, and S. Venticinque. Simulation and Support of Critical Activities by Mobile Agents in Pervasive and Ubiquitous Scenarios. The 10th IEEE Int. Symp. on Parallel and Distributed Processing with Applications (ISPA 2012), Leganes, Madrid, 10-13 Jul. 2012, pp. 815-822. DOI: 10.1109/ISPA.2012.119, ISBN: 978-1-4673-1631-6, IEEE CS Press.
  • Rak and M. Ficco. Intrusion Tolerance as a Service: A SLA-Based Solution. The 2nd Int. Conf. on Cloud Computing and Services Science (CLOSER 2012), Porto, Portugal, Apr. 2012, pp. 375-384. DOI: 10.5220/0003941003750384, ISBN: 978-989-8565-05-1, Science and Technology Publications
  • Ficco, M. Rak, and B. Di Martino. An intrusion detection framework for supporting SLA assessment in cloud computing. The 4th Int. Conf. on Computational Aspects of Social Networks (CASoN 2012), Sao Carlos, Brazil, Nov. 2012, pp. 244-249. DOI: 10.1109/CASoN.2012.6412410, ISBN: 978-1-4673-4793-8, IEEE CS Press.
  • Ficco and M. Rak. Intrusion Tolerant Approach for Denial of Service Attacks to Web Services. The 1st Int. Conf. on Data Compression, Communications and Processing (CCP 2011), Palinuro, Italy, Jun. 2011, pp. 285-292. DOI: 10.1109/CCP.2011.44, ISBN: 978-0-7695-4528-8, IEEE CS Press.
  • Ficco, A. Daidone, L. Coppolino, L. Romano, and A. Bondavalli. An Event Correlation Approach for Fault Diagnosis in SCADA Infrastructures. The 13th European Workshop on Dependable Computing (EWDC 2011), Pisa, Italy, May 2011, pp. 15-20. DOI: 10.1145/1978582.1978586, ISBN: 978-1-4503-0284-5, ACM Press.
  • Ficco and L. Romano. A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing. The 1st Int. Conf. on Data Compression, Communications and Processing (CCP 2011), Palinuro, Italy, Jun. 2011, pp. 275-284. DOI: 10.1109/CCP.2011.43, ISBN: 978-0-7695-4528-8, IEEE CS Press.
  • Di Martino, M. Ficco, R. Aversa, and S. Venticinque. A Positioning Service for Pervasive Objects in Dynamic Environments. The IEEE Int. Symp. on Wireless Pervasive Computing (ISWPC 2010), Modena, Italy, May 2010, pp. 244-249. DOI: 1109/ISWPC.2010.5483729, ISBN: 978-1-4244-6857-7, IEEE CS Press.
  • Di Martino, M. Ficco, R. Aversa, and S. Venticinque. Mobile Agent-Based Provision of Context-Awareness for Positioning. The 7th ACM Int. Conf. on Pervasive Services (ICPS 2010), Berlin, Germany, Jul. 2010, pp. 134-141. ISBN: 978-1-4503-0249-4, ACM Press.
  • Ficco, C. Esposito, and D. Cotroneo. Calibrating RSS-based Indoor Positioning Systems. The 5th IEEE Int. Conf. on Wireless and Mobile Computing, Networking and Communications (WiMob 2009), Marrakech, Marocco. Oct. 2009, pp. 1-6. DOI: 10.1109/WiMob.2009.11, ISBN: 978-0-7695-3841-9, IEEE CS Press.
  • Ficco, L. Coppolino, and L. Romano. A Weight-Based Symptom Correlation Approach to SQL Injection Attacks. The 4th Latin-American Symp. on Dependable Computing (LADC2009), Paraìba, Brazil. Sep. 2009, pp. 9-16. DOI: 10.1109/LADC.2009.14, ISBN: 978-0-7695-3760-3, ACM Press.
  • Ficco, G. D’Angelo, and M. D’Arienzo. A Bluetooth Infrastructure for Automatic Services Access in Ubiquitous and Nomadic Computing Environments. The 5th ACM Int. Work. on Mobility Management and Wireless Access (MobiWac2007), Chania, Crete Island, Greece. Sep. 2007, pp. 17-24. DOI: 10.1145/1298091.1298095, ISBN: 978-1-59593-809-1, ACM Press.
  • di Flora, M. Ficco, and S. Russo. An Architecture for Providing Java Applications with Indoor and Outdoor Hybrid Location Sensing. The IEEE Int. Work. on Future Embedded & Ubiquitous Systems (SEUS 2006), Gyeongju, Korea. Apr. 2006, pp. 37-42. DOI: 10.1109/SEUS-WCCIA.2006.11, ISBN: 0-7695-2560-1, IEEE CS Press.
  • di Flora, M. Ficco, S. Russo, and V. Vecchio. Indoor and outdoor location based services for portable wireless devices. The 25th IEEE Int. Conf. on Distributed Computing Systems Workshops (IWDCS 2005), Columbus, Ohio (USA). Jun. 2005, pp. 244-250. DOI: 10.1109/ICDCSW.2005.77, ISBN: 0-7695-2328-5, IEEE CS Press.
  • di Flora, D. Cotroneo, M. Ficco, and S. Russo. A strategy for application-transparent integration of nomadic computing domains. The IEEE Int. Work. on Software Technologies for Future Embedded and Ubiquitous Systems (SEUS 2005), Seattle, Washington (USA). May 2005, pp. 50-57. DOI: 10.1109/SEUS.2005.3, ISBN: 0-7695-2357-9, IEEE CS Press.
  • Cotroneo, M. Ficco, V. Vecchio, F. Cornevilli, and S. Russo. Implementing positioning services over an ubiquitous infrastructure. The IEEE Int. Work. on Software Technologies for Future Embedded and Ubiquitous Systems (WSTFEUS 2004), Vienna, Austria. May 2004, pp. 14-18. DOI: 10.1109/WSTFES.2004.1300407, ISBN: 0-7695-2123-1, IEEE CS Press.
  • Cotroneo, M. Ficco, M. Gargiulo, S. Russo, G. Ventre. Service Differentiation of Communication-bound Processes in a real-time Operating System. The 7th IEEE Int. Work. on Object-oriented Real-time Dependable Systems (WORDS 2002), San Diego, CA (USA). January 2002, pp. 207-214. DOI: 10.1109/WORDS.2002.1000054, ISBN:0-7695-1576-2, IEEE CS Press.
  • Cotroneo, M. Ficco, M. Pirrò, S. Mattera, S. Russo. Un approccio di Reverse Engineering per i sistemi di telecomunicazione. The Work. AICA Programmazione Parallela: Ricerca ed Applicazioni, Como, settembre 2001, pp. 1127-1136.
  • Cotroneo, M. Ficco, S.P. Romano, G. Ventre. Bringing Service Differentiation to the End System, The IEEE Int. Conf. on Networks’ 2000 (ICON 2000), Singapore. September 2000, pp. 436-440. DOI: 10.1109/WORDS.2002.1000054, ISBN: 0769515762, IEEE CS Press.

Conferenze Paper in Proceedings di Springer LNCS

  • Ambrisi, R. Aversa, D. Branco, M. Ficco, S. Venticinque, G. Renda, and S. Mataluna. Intelligent Agents for Diffused Cyber-Physical Museums, Intelligent Distributed Computing XIV. IDC 2021, Eds. D. Camacho, D. Rosaci, Giuseppe M. L. Sarné, Studies in Computational Intelligence, vol. 1026, May 2022, pp. 285–295. DOI: 10.1007/978-3-030-96627-0_26, ISBN: 978-3-030-96627-0, Springer.
  • Ambrisi, R. Aversa, M. Ficco, and D. Cacace. Intelligent Cloud Agents in Multi-participant Conversations for Cyber-Physical Exploitation of Cultural Heritage, Advanced Information Networking and Applications. AINA 2021, Eds. L. Barolli, I. Woungang, T. Enokido, Lecture Notes in Networks and Systems, vol. 227, 01 May 2021, pp. 97–106, DOI: 10.1007/978-3-030-75078-7_11, ISBN: 978-3-030-75078-7, Springer.
  • Ficco, D. Granata, M. Rak, and G. Salzillo. Threat Modeling of Edge-Based IoT Applications, Quality of Information and Communications Technology, Eds. Ana C. R. Paiva, A. R. Cavalli, P. V. Martins, R. Pérez-Castillo, Communications in Computer and Information Science, vol. 1439, Sep. 8-11, 2021, pp. 282-296, DOI: 10.1007/978-3-030-85347-1_21, ISBN: 978-3-030-85346-4, Springer.
  • Massimo Ficco. Comparing API Call Sequence Algorithms for Malware Detection, Advances in Intelligent Systems and Computing, Eds. L. Barolli, et al., Web, Artificial Intelligence and Network Applications, vol. 1150, AISC, Mar. 2020, pp. 847-856, DOI: 10.1007/978-3-030-44038-1_77, ISSN:2194-5357, Springer.
  • Massimo Ficco. CIPRNet Training Lecture: Hybrid Simulation of Distributed Large-Scale Critical Infrastructures. Image Processing and Communications Challenges, Ryszard S. Choraś. Advances in Intelligent Systems and Computing, vol. 525, Oct. 2016, pp 213-214. DOI: 10.1007/978-3-319-47274-4_25, ISBN: 978-3-319-47273-7, Springer
  • Ficco, C. Esposito, A. Castiglione, F. Palmieri and M. Ficco. A game-theoretic approach to network embedded FEC over large-scale networks. Computational Intelligence and Intelligent Systems. Eds. K. Li, J. Li, Y. Liu, and A. Castiglione. Communications in Computer and Information Science, vol. 575, 2016, pp. 353-364. DOI: 10.1007/978-981-10-0356-1_37, ISBN: 978-981-10-0355-4, Springer Singapore
  • Gigante, F. Gargiulo, M. Ficco, and D. Pascarella. A Semantic Driven Approach for Consistency Verification Between Requirements and FMEA. Intelligent Distributed Computing IX, Eds. P. Navais, D. Camacho, C. Analide, Amal El F. Seghrouchni, and C. Badica. Studies in Computational Intelligence, vol. 616, 2016, pp. 403-413. DOI: 10.1007/978-3-319-25017-5_38, ISBN: 978-3-319-25015-1, Springer
  • Gigante, F, Gargiulo, and M. Ficco. A Semantic Driven Approach for Requirements Verification. Intelligent Distributed Computing VIII, Eds. D. Camacho, L. Braubach, S. Venticinque and C. Badica. Studies in Computational Intelligence, vol. 570, 2015, pp. 427-436. DOI: 10.1007/978-3-319-10422-5_44, ISBN: 978-3-319-10421-8, Springer
  • Ficco, L. Tasquier, and B. Di Martino. Interconnection of Federated Clouds. Intelligent Distributed Computing VII, Eds. Filip Zavoral, Jason J. Jung, and Costin Badica. Studies in Computational Intelligence, vol. 511, 2014, pp. 243-248. ISBN: 978-3-319-01570-5, DOI: 10.1007/978-3-319-01571-2_29, Springer
  • Ficco and M. Rak. SLA-Oriented Security Provisioning for Cloud Computing, Cloud Computing and Services Science, Eds. Ivan I. Ivanov, et al., LNCS, vol. 367, 2013, pp. 230-244. DOI: 10.1007/978-3-319-04519-1_15, ISBN: 978-3-319-04518-4, Springer
  • Ficco and M. Rak. Intrusion Tolerance of Stealth DoS Attacks to Web Services. Information Security and Privacy, Eds. D. Gritzalis, S. Furnell, and M. Theoharidou, LNCS, vol. 376, 2012, pp. 579-584. DOI: 10.1007/978-3-642-30436-1_52, ISBN: 978-3-642-30435-4, Springer
  • Ficco, S. Venticinque, and B. Di Martino. mOSAIC-Based Intrusion Detection Framework for Cloud Computing. On the Move to Meaningful Internet Systems: OTM 2012, Eds. R. Meersman et al., LNCS, vol. 7566, 2012, pp. 628-644. DOI: 10.1007/978-3-642-33615-7_12, ISBN: 978-3-642-33614-0, Springer
  • Ficco and L. Romano. A Correlation Approach to Intrusion Detection. Mobile Lightweight Wireless Systems, Eds. P. Chatzimisios, C. Verikoukis, I. Santamaria, and M. Laddomada, vol. 45, 2010, pp. 203-215. DOI: 10.1007/978-3-642-16644-0_19, ISBN: 1867-8211, Springer LNICST
  • di Flora, M. Ficco, and S. Russo. Supporting Location-Aware Distributed Applications on Mobile Devices. State of the art in Scientific Computing. Eds. Jack Dongarra, Kaj Madsen, and Jerzy Wasniewski, LNCS, vol. 3732, 2006, pp. 464-471. DOI: 10.1007/11558958_55, ISBN: 978-3-540-29067-4, Springer
  • di Flora, M. Ficco, and S. Russo. Indoor Positioning for Location-Aware Applications on Java-based Mobile Devices. Java Technologies for Real-Time and Embedded Systems, Eds. Robert Meersman, Zahir Tari, Angelo Corsaro et al., LNCS, vol. 3292, 2004, pp. 383-393. DOI: 10.1007/978-3-540-30470-8_53, ISBN: 978-3-540-23664-1, Springer.
  • Cotroneo, M. Ficco, G. Ventre. A Service Differentiation scheme for the end-system, Interactive Distributed Multimedia Systems (IDMS 2001), Ed. Doug Shepherd, Joe Finney et al., LNCS, vol. 2158, 2001, pp. 99-109, DOI: 10.1007/3-540-44763-6_11, ISBN: 978-3-540-42530-4, Springer.

Capitoli di Libri

  • Ficco, A. Amato, and S. Venticinque. Hosting Mission-Critical Applications on Cloud: Technical Issues and Challenges. Network, Smart and Open, Eds. R. Lamboglia, A. Cardoni, R.P. Dameri, and D. Mancini. Chapter 12, Feb. 2018, pp. 179-191. DOI: 10.1007/978-3-319-62636-9_12, ISBN: 978-3-319-62635-2, Springer International Publishing.
  • Ficco and M. Rak. Security SLAs for Cloud Services: Hadoop Case Study. Reshaping Accounting and Management Control Systems, Eds. K. Corsi, N. G. Castellano, R. Lamboglia, D. Mancini, Chapter 7, vol. 20, Mar. 2017, pp. 103-114. DOI: 10.1007/978-3-319-49538-5_7, ISBN: 978-3-319-49537-8, Springer Heidelberg.
  • Ficco and M. Rak. Economic Denial of Sustainability Mitigation in Cloud Computing. Organizational Innovation and Change, Eds. P. Spagnoletti, M. De Marco, N. Pouloudi, D. V. Teeni, J. Brocke, R. Winter. Chapter 18, vol. 13, Oct. 2016, pp. 229-238. DOI: 10.1007/978-3-319-22921-8_18, ISBN: 978-3-319-22920-1, Springer Heidelberg.
  • Ficco, M. Rak, S. Venticinque, L. Tasquier, and G. Aversano. Cloud evaluation: benchmarking and monitoring. Quantitative Assessments of Distributed Systems, Eds. D. Bruneo and S. Distefano. Chapter 7, Apr. 2015, pp. 175-200. DOI: 10.1002/9781119131151.ch7, ISBN: 978-1-118-59521-3, Wiley & Sons.
  • Di Martino, M. Ficco, S. Venticinque, and M. Rak. Addressing Open Issues on Performance Evaluation in Cloud Computing. Large Scale Network-Centric Computing Systems, Eds. H. Sarbazi-Azad, Albert Y. Zomaya. Chapter 19, Oct. 2013, pp. 463-483. DOI: 10.1002/9781118640708.ch19, ISBN: 978-0-470-93688-7, Wiley-IEEE CS Press.
  • Rak, M. Ficco, J. Luna, H. Ghani, N. Suri, S. Panica, and D. Petcu. Security Issues in Cloud Federations. Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice, Eds. Massimo Villari, Ivona Brandic, and Francesco Tusa. Chapter 10, May 2012, pp. 176-194. DOI: 10.4018/978-1-4666-1631-8, ISBN: 9781466616318, IGI Global.

Libri

  • Massimo Ficco and Francesco Palmieri. Security and Resilience in Intelligent Data-Centric Systems and Communication Networks, 1st Edition, Series: Intelligent Data-Centric Systems: Sensor Collected Intelligence, Sep. 2017, pp. 1-366, ISBN: 9780128113738, Elsevier Academic Press.

Proceedings

  • Mauro Iacono, Francesco Palmieri, Marco Gribaudo, and Massimo Ficco. Communications of the ECMS, vol. 33, Issue 1, Jun. 2019. The 33rd European Conf. on Modelling and Simulation (ECMS 2019), Caserta, Italy, Jun. 11-14, 2019. ISSN: 2522-2414.
  • Fatos Xhafa, Fang-Yie Leu, Massimo Ficco, and Chao-Tung Yang. Advances on P2P, Parallel, Grid, Cloud and Internet Computing. The 13th Int. Conf. on P2P, Parallel, Grid, Cloud and Internet Computing (3GPCIC-18), Taichung, Taiwan, Oct. 27-29, 2018. Lecture Notes on Data Engineering and Comm. Technologies, vol. 24, ISBN: 978-3-030-02607-3, Springer Publishing.
  • Arcangelo Castiglione, Florin Pop, Massimo Ficco, and Francesco Palmieri. Cyberspace Safety and Security, The 10th Int. Sym. on Cyberspace Safety and Security (CSS 2018), Amalfi, Italy, Oct. 29-31, 2018, LNCS, vol. 11161, ISBN: 978-3-030-01688-3, Springer Publishing.

Curatela

  • Massimo Ficco. Internet-of-Things and Fog-Computing as enablers of new security and privacy threats, Internet of Things, 2019, pp. 1-7, DOI: 10.1016/j.