A survey on energy-aware security mechanisms

A Merlo, M Migliardi, L Caviglione - Pervasive and Mobile Computing, 2015 - Elsevier
The increasing adoption of mobile devices as the preferred tool to access the Internet
imposes to deepen the investigation of security aspects. In parallel, their power constrained …

Measuring the energy consumption of cyber security

L Caviglione, M Gaggero, E Cambiaso… - IEEE Communications …, 2017 - ieeexplore.ieee.org
The Internet is a core tool for develo** commercial and social relationships. As a
consequence, cyber security must be properly assessed, for instance, to face new and …

On energy-based profiling of malware in android

A Merlo, M Migliardi, P Fontanelli - … international conference on …, 2014 - ieeexplore.ieee.org
The growing spread of malware on Android OS requires new approaches for the detection
and recognition of malicious applications on mobile devices. An emerging idea is …

Green Security: A Framework for Measurement and Optimization of Energy Consumption of Cybersecurity Solutions

S Brudni, S Anidgar, O Brodt, D Mimran… - 2024 IEEE 9th …, 2024 - ieeexplore.ieee.org
Information and communication technology (ICT) is playing an expanding and critical role in
our modern lives. Due to its proliferation, ICT has a significant impact on global energy …

A survey of green, energy-aware security and some of its recent developments in networking and mobile computing

M Migliardi, A Merlo… - 2014 Eighth International …, 2014 - ieeexplore.ieee.org
Since its inception, the field of Green, Energy-Aware Security (GEAS) has gathered
momentum and has seen many interesting developments in some of its different …

[PDF][PDF] Evolution of software quality models: usability, security and greenness issues

O Gordieiev, V Kharchenko… - Proceedings of the 19-th …, 2015 - researchgate.net
software quality models (SQMs) are usually represented by a set of interconnected
characteristics (subcharacteristics). SQMs were analyzed beginning with first SQMs. At that …

Anomaly Detection in IDSs by means of unsupervised greedy learning of finite mixture models

N Greggio - Soft Computing, 2018 - Springer
Nowadays, the worldwide Internet diffusion has made sharing information a piece of cake.
This leads to the problem of protecting this huge amount of information (private data …

RUM extractor: a Facebook extractor for data analysis

RM Duwairi, M Alfaqeeh - … on Future Internet of Things and …, 2015 - ieeexplore.ieee.org
Social Network Analysis (SNA) is a field of study that focuses on analyzing user profiles and
participations on social network channels in order to model relationships between people …

Optimizing network energy consumption through intrusion prevention systems

A Merlo, M Migliardi, D Raso, E Spadacini - International Joint Conference …, 2014 - Springer
Security is of paramount importance in computer networks; in fact network attacks may
cause huge economic damages as shown by the fluctuations of stocks of firms subjected to …

Balancing delays and energy consumption in IPS-enabled networks

A Merlo, M Migliardi, E Spadacini - 2016 30th International …, 2016 - ieeexplore.ieee.org
We are witnessing a growing interest around the cost of security in terms of energy
consumption. For instance, in wired networking, some proposals have been put forward to …