Quantitative comparison of unsupervised anomaly detection algorithms for intrusion detection F Falcão, T Zoppi, CBV Silva, A Santos, B Fonseca, A Ceccarelli, ... Proceedings of the 34th ACM/SIGAPP symposium on applied computing, 318-327, 2019 | 67 | 2019 |
Continuous and transparent user identity verification for secure internet services A Ceccarelli, L Montecchi, F Brancati, P Lollini, A Marguglio, A Bondavalli IEEE Transactions on Dependable and Secure Computing 12 (3), 270-283, 2014 | 60 | 2014 |
Systems‐of‐systems modeling using a comprehensive viewpoint‐based SysML profile M Mori, A Ceccarelli, P Lollini, B Frömel, F Brancati, A Bondavalli Journal of Software: Evolution and Process 30 (3), e1878, 2018 | 57 | 2018 |
Unsupervised algorithms to detect zero-day attacks: Strategy and application T Zoppi, A Ceccarelli, A Bondavalli Ieee Access 9, 90603-90615, 2021 | 54 | 2021 |
Foundations of measurement theory applied to the evaluation of dependability attributes A Bondavalli, A Ceccarelli, L Falai, M Vadursi 37th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2007 | 54 | 2007 |
Insider threat assessment: A model-based methodology N Nostro, A Ceccarelli, A Bondavalli, F Brancati ACM SIGOPS Operating Systems Review 48 (2), 3-12, 2014 | 53 | 2014 |
Unsupervised anomaly detectors to detect intrusions in the current threat landscape T Zoppi, A Ceccarelli, T Capecchi, A Bondavalli ACM/IMS Transactions on Data Science 2 (2), 1-26, 2021 | 52 | 2021 |
On failures of RGB cameras and their effects in autonomous driving applications F Secci, A Ceccarelli 2020 IEEE 31st International Symposium on Software Reliability Engineering …, 2020 | 45 | 2020 |
Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection T Zoppi, A Ceccarelli, T Puccetti, A Bondavalli Computers & Security 127, 103107, 2023 | 44 | 2023 |
Basic concepts on systems of systems A Ceccarelli, A Bondavalli, B Froemel, O Hoeftberger, H Kopetz Cyber-Physical Systems of Systems: Foundations–A Conceptual Model and Some …, 2016 | 43 | 2016 |
A new approach and a related tool for dependability measurements on distributed systems A Bondavalli, A Ceccarelli, L Falai, M Vadursi IEEE Transactions on Instrumentation and Measurement 59 (4), 820-831, 2010 | 40 | 2010 |
MADneSs: A multi-layer anomaly detection framework for complex dynamic systems T Zoppi, A Ceccarelli, A Bondavalli IEEE Transactions on Dependable and Secure computing 18 (2), 796-809, 2019 | 38 | 2019 |
Safe estimation of time uncertainty of local clocks A Bondavalli, F Brancati, A Ceccarelli 2009 International Symposium on Precision Clock Synchronization for …, 2009 | 35 | 2009 |
RGB cameras failures and their effects in autonomous driving applications A Ceccarelli, F Secci IEEE Transactions on Dependable and Secure Computing 20 (4), 2731-2745, 2022 | 34 | 2022 |
On the educated selection of unsupervised algorithms via attacks and anomaly classes T Zoppi, A Ceccarelli, L Salani, A Bondavalli Journal of Information Security and Applications 52, 102474, 2020 | 33 | 2020 |
Experimental assessment of low-cost GPS-based localization in railway worksite-like scenarios A Bondavalli, A Ceccarelli, F Gogaj, A Seminatore, M Vadursi Measurement 46 (1), 456-466, 2013 | 32 | 2013 |
Assuring resilient time synchronization A Bondavalli, A Ceccarelli, L Falai 2008 Symposium on Reliable Distributed Systems, 3-12, 2008 | 27 | 2008 |
Prepare for trouble and make it double! Supervised–Unsupervised stacking for anomaly-based intrusion detection T Zoppi, A Ceccarelli Journal of Network and Computer Applications 189, 103106, 2021 | 25 | 2021 |
FUSION—fog computing and blockchain for trusted industrial internet of things A Ceccarelli, M Cinque, C Esposito, L Foschini, C Giannelli, P Lollini IEEE Transactions on Engineering Management 69 (6), 2944-2958, 2020 | 24 | 2020 |
Model-based evaluation of scalability and security tradeoffs: A case study on a multi-service platform L Montecchi, N Nostro, A Ceccarelli, G Vella, A Caruso, A Bondavalli Electronic Notes in Theoretical Computer Science 310, 113-133, 2015 | 24 | 2015 |