Certifying Accuracy, Privacy, and Robustness of ML-Based Malware Detection

N Bena, M Anisetti, G Gianini, CA Ardagna - SN Computer Science, 2024 - Springer
Recent advances in artificial intelligence (AI) are radically changing how systems and
applications are designed and developed. In this context, new requirements and regulations …

Data management for continuous learning in EHR systems

V Bellandi, P Ceravolo, J Maggesi… - ACM Transactions on …, 2024 - dl.acm.org
To gain a comprehensive understanding of a patient's health, advanced analytics must be
applied to the data collected by electronic health record (EHR) systems. However, managing …

Continuous Management of Machine Learning-Based Application Behavior

M Anisetti, CA Ardagna, N Bena… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Modern applications are increasingly driven by Machine Learning (ML) models whose non-
deterministic behavior is affecting the entire application life cycle from design to operation …

Automated Fog Node Audit and Certification Scheme with Multiple Attestation Certificate Authorities

S Anath, T Quazi, B Naidoo - IEEE Access, 2025 - ieeexplore.ieee.org
Fog computing is a complementary paradigm to cloud computing. It aims to improve the
performance of Internet of Things (IoT) applications by positioning fog computing nodes …

Enhancing Semantic Exploration: A Distributed Repository Approach

V Bellandi, P Ceravolo, S Siccardi - BIG DATA BIG DATA BIG DATA BIG …, 2024 - dl.acm.org
In the modern digital era centralized and distributed systems emerge as two prominent
paradigms for organizing ICT infrastructure, each presenting distinct advantages and …

Beyond Cloud Service Certification

M Anisetti, CA Ardagna, E Damiani… - A Journey into Security …, 2024 - Springer
Cloud computing has been a driving force for many technological innovations and
transformations in various domains and industries. It offers scalable and cost-effective …

Data Pipelines Assessment: The Role of Data Engine Deployment Models

CA Ardagna, V Bellandi, M Luzzara… - CEUR WORKSHOP …, 2024 - air.unimi.it
In this paper, we explore different deployment models for data engines and elucidate their
implications on data pipeline behavior. Specifically, we examine the impact on data sharing …

[PDF][PDF] A Transparent Certification Scheme Based on Blockchain for Service-Based Systems

N Bena, M Pedrinazzi, M Anisetti… - … Conference on Web …, 2024 - perso.liris.cnrs.fr
Modern service-based systems are characterized by applications composed of
heterogeneous services provided by multiple, untrusted providers, and deployed along the …

[图书][B] A Journey Into Security Certification: From the Cloud to Artificial Intelligence

M Anisetti, CA Ardagna, E Damiani, N El Ioini - 2024 - books.google.com
This book, authored by some of the pioneers in the security certification domain, provides a
foundational knowledge base for designing and deploying effective security certification …

Conclusions and Open Issues

M Anisetti, CA Ardagna, E Damiani… - A Journey into Security …, 2024 - Springer
Since its early introduction in the Eighties, certification has been a primary way to document
the verification of systems behavior. Certification schemes and corresponding processes …