Kalis—A system for knowledge-driven adaptable intrusion detection for the Internet of Things D Midi, A Rullo, A Mudgerikar, E Bertino 2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017 | 214 | 2017 |
Pareto-optimal adversarial defense of enterprise systems E Serra, S Jajodia, A Pugliese, A Rullo, VS Subrahmanian ACM Transactions on Information and System Security (TISSEC) 17 (3), 1-39, 2015 | 60 | 2015 |
Process mining applications in the healthcare domain: A comprehensive review A Guzzo, A Rullo, E Vocaturo Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 12 (2 …, 2022 | 34 | 2022 |
Pareto optimal security resource allocation for Internet of Things A Rullo, D Midi, E Serra, E Bertino ACM Transactions on Privacy and Security (TOPS) 20 (4), 1-30, 2017 | 29 | 2017 |
Intrusion detection with hypergraph-based attack models A Guzzo, A Pugliese, A Rullo, D Saccà Graph Structures for Knowledge Representation and Reasoning, 58-73, 2014 | 25 | 2014 |
Padua: Parallel architecture to detect unexplained activities C Molinaro, V Moscato, A Picariello, A Pugliese, A Rullo, ... ACM Transactions on Internet Technology (TOIT) 14 (1), 1-28, 2014 | 24 | 2014 |
Shortfall-based optimal placement of security resources for mobile IoT scenarios A Rullo, E Serra, E Bertino, J Lobo European Symposium on Research in Computer Security, 419-436, 2017 | 19 | 2017 |
A multi-perspective approach for the analysis of complex business processes behavior A Guzzo, M Joaristi, A Rullo, E Serra Expert Systems with Applications 177, 114934, 2021 | 17 | 2021 |
Redundancy as a measure of fault-tolerance for the Internet of Things: A review A Rullo, E Serra, J Lobo Policy-Based Autonomic Data Governance, 202-226, 2019 | 17 | 2019 |
A game of things: Strategic allocation of security resources for iot A Rullo, D Midi, E Serra, E Bertino 2017 IEEE/ACM Second International Conference on Internet-of-Things Design …, 2017 | 16 | 2017 |
Past: Protocol-adaptable security tool for heterogeneous iot ecosystems A Rullo, E Bertino, D Saccá 2018 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2018 | 13 | 2018 |
Malevolent activity detection with hypergraph-based models A Guzzo, A Pugliese, A Rullo, D Saccà, A Piccolo IEEE Transactions on Knowledge and Data Engineering 29 (5), 1115-1128, 2017 | 12 | 2017 |
PUF-based smart tags for supply chain management A Falcone, C Felicetti, A Garro, A Rullo, D Saccà Proceedings of the 16th International Conference on Availability …, 2021 | 10 | 2021 |
Strategic security resource allocation for internet of things A Rullo, D Midi, E Serra, E Bertino Distributed Computing Systems (ICDCS), 2016 IEEE 36th International …, 2016 | 10 | 2016 |
Exploiting silicon fingerprint for device authentication using CMOS-PUF and ECC C Felicetti, M Lanuzza, A Rullo, D Saccà, F Crupi 2021 IEEE International Conference on Smart Internet of Things (SmartIoT …, 2021 | 8 | 2021 |
Extending inverse frequent itemsets mining to generate realistic datasets: complexity, accuracy and emerging applications D Saccá, E Serra, A Rullo Data Mining and Knowledge Discovery 33 (6), 1736-1774, 2019 | 8 | 2019 |
Shortfall-based optimal security provisioning for Internet of Things A Rullo, E Serra, E Bertino, J Lobo 2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017 | 7 | 2017 |
Machine learning methods for generating high dimensional discrete datasets G Manco, E Ritacco, A Rullo, D Saccà, E Serra Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 12 (2 …, 2022 | 6* | 2022 |
A framework for the multi-modal analysis of novel behavior in business processes A Rullo, A Guzzo, E Serra, E Tirrito Intelligent Data Engineering and Automated Learning–IDEAL 2020: 21st …, 2020 | 6 | 2020 |
The AC-index: Fast online detection of correlated alerts A Pugliese, A Rullo, A Piccolo Security and Trust Management: 11th International Workshop, STM 2015, Vienna …, 2015 | 5 | 2015 |