A survey on energy-aware security mechanisms
A Merlo, M Migliardi, L Caviglione - Pervasive and Mobile Computing, 2015 - Elsevier
The increasing adoption of mobile devices as the preferred tool to access the Internet
imposes to deepen the investigation of security aspects. In parallel, their power constrained …
imposes to deepen the investigation of security aspects. In parallel, their power constrained …
Measuring the energy consumption of cyber security
The Internet is a core tool for develo** commercial and social relationships. As a
consequence, cyber security must be properly assessed, for instance, to face new and …
consequence, cyber security must be properly assessed, for instance, to face new and …
On energy-based profiling of malware in android
A Merlo, M Migliardi, P Fontanelli - … international conference on …, 2014 - ieeexplore.ieee.org
The growing spread of malware on Android OS requires new approaches for the detection
and recognition of malicious applications on mobile devices. An emerging idea is …
and recognition of malicious applications on mobile devices. An emerging idea is …
Green Security: A Framework for Measurement and Optimization of Energy Consumption of Cybersecurity Solutions
Information and communication technology (ICT) is playing an expanding and critical role in
our modern lives. Due to its proliferation, ICT has a significant impact on global energy …
our modern lives. Due to its proliferation, ICT has a significant impact on global energy …
A survey of green, energy-aware security and some of its recent developments in networking and mobile computing
M Migliardi, A Merlo… - 2014 Eighth International …, 2014 - ieeexplore.ieee.org
Since its inception, the field of Green, Energy-Aware Security (GEAS) has gathered
momentum and has seen many interesting developments in some of its different …
momentum and has seen many interesting developments in some of its different …
[PDF][PDF] Evolution of software quality models: usability, security and greenness issues
O Gordieiev, V Kharchenko… - Proceedings of the 19-th …, 2015 - researchgate.net
software quality models (SQMs) are usually represented by a set of interconnected
characteristics (subcharacteristics). SQMs were analyzed beginning with first SQMs. At that …
characteristics (subcharacteristics). SQMs were analyzed beginning with first SQMs. At that …
Anomaly Detection in IDSs by means of unsupervised greedy learning of finite mixture models
N Greggio - Soft Computing, 2018 - Springer
Nowadays, the worldwide Internet diffusion has made sharing information a piece of cake.
This leads to the problem of protecting this huge amount of information (private data …
This leads to the problem of protecting this huge amount of information (private data …
RUM extractor: a Facebook extractor for data analysis
RM Duwairi, M Alfaqeeh - … on Future Internet of Things and …, 2015 - ieeexplore.ieee.org
Social Network Analysis (SNA) is a field of study that focuses on analyzing user profiles and
participations on social network channels in order to model relationships between people …
participations on social network channels in order to model relationships between people …
Optimizing network energy consumption through intrusion prevention systems
A Merlo, M Migliardi, D Raso, E Spadacini - International Joint Conference …, 2014 - Springer
Security is of paramount importance in computer networks; in fact network attacks may
cause huge economic damages as shown by the fluctuations of stocks of firms subjected to …
cause huge economic damages as shown by the fluctuations of stocks of firms subjected to …
Balancing delays and energy consumption in IPS-enabled networks
A Merlo, M Migliardi, E Spadacini - 2016 30th International …, 2016 - ieeexplore.ieee.org
We are witnessing a growing interest around the cost of security in terms of energy
consumption. For instance, in wired networking, some proposals have been put forward to …
consumption. For instance, in wired networking, some proposals have been put forward to …