The future of digital forensics: Challenges and the road ahead L Caviglione, S Wendzel, W Mazurczyk IEEE Security & Privacy 15 (6), 12-17, 2017 | 186 | 2017 |
Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence L Caviglione, M Gaggero, JF Lalande, W Mazurczyk, M Urbanski IEEE Transactions on Information Forensics and Security 11 (4), 799-810, 2016 | 161 | 2016 |
Information hiding as a challenge for malware detection W Mazurczyk, L Caviglione IEEE Security & Privacy 13 (2), 89 - 93, 2015 | 148 | 2015 |
Steganography in modern smartphones and mitigation techniques W Mazurczyk, L Caviglione IEEE Communications Surveys & Tutorials 17 (1), 334-357, 2014 | 145 | 2014 |
The new Threats of Information Hiding: The Road Ahead K Cabaj, L Caviglione, W Mazurczyk, S Wendzel, A Woodward, S Zander IT Professional 20 (3), 31-39, 2018 | 138 | 2018 |
Tight arms race: Overview of current malware threats and trends in their detection L Caviglione, M Choraś, I Corona, A Janicki, W Mazurczyk, M Pawlicki, ... IEEE Access 9, 5371-5396, 2020 | 129 | 2020 |
IEEE 802.15.4 air-ground UAV communications in smart farming scenarios M Bacco, A Berton, A Gotta, L Caviglione IEEE Communications Letters 22 (9), 1910-1913, 2018 | 97 | 2018 |
A survey on energy-aware security mechanisms A Merlo, M Migliardi, L Caviglione Pervasive and Mobile Computing 24, 77-90, 2015 | 96 | 2015 |
Trends and challenges in network covert channels countermeasures L Caviglione Applied Sciences 11 (4), 1641, 2021 | 77 | 2021 |
Cyber reconnaissance techniques W Mazurczyk, L Caviglione Communications of the ACM 64 (3), 86-95, 2021 | 70 | 2021 |
Covert channels in personal cloud storage services: The case of Dropbox L Caviglione, M Podolski, W Mazurczyk, M Ianigro IEEE Transactions on Industrial Informatics 13 (4), 1921-1931, 2016 | 64 | 2016 |
Supporting vertical handover by using a pastry peer-to-peer overlay network T Hoßfeld, S Oechsner, K Tutschku, FU Andersen, L Caviglione Pervasive Computing and Communications Workshops, 2006. PerCom Workshops …, 2006 | 58 | 2006 |
Deep reinforcement learning for multi-objective placement of virtual machines in cloud datacenters L Caviglione, M Gaggero, M Paolucci, R Ronco Soft Computing 25 (19), 12569-12588, 2021 | 55* | 2021 |
Big data for social media learning analytics: potentials and challenges S Manca, L Caviglione, J Raffaghelli Journal of e-Learning and Knowledge Society 12 (2), 2016 | 52 | 2016 |
Hidden and uncontrolled–on the emergence of network steganographic threats S Wendzel, W Mazurczyk, L Caviglione, M Meier ISSE 2014 Securing Electronic Business Processes: Highlights of the …, 2014 | 49 | 2014 |
Model Predictive Control for Energy-Efficient, Quality-Aware, and Secure Virtual Machine Placement M Gaggero, L Caviglione IEEE Transactions on Automation Science and Engineering 16 (1), 420- 432, 2019 | 48 | 2019 |
A Revised Taxonomy of Steganography Embedding Patterns S Wendzel, L Caviglione, W Mazurczyk, A Mileva, J Dittmann, C Krätzer, ... The 16th International Conference on Availability, Reliability and Security …, 2021 | 47 | 2021 |
Kernel-level tracing for detecting stegomalware and covert channels in Linux environments L Caviglione, W Mazurczyk, M Repetto, A Schaffhauser, M Zuppelli Computer Networks 191, 108010, 2021 | 47 | 2021 |
The energy impact of security mechanisms in modern mobile devices L Caviglione, A Merlo Network Security 2012 (2), 11-14, 2012 | 47 | 2012 |
FIRST: Future Internet-a Role for Satellite Technology L Caviglione, B Collini-Nocker, G Fairhurst IEEE International Workshop on Satellite and Space Communications (IWSSC 08 …, 2008 | 47* | 2008 |