Ficco, Massimo

Personal Information

Position: Associate Professor
Research areas:
  • Uncategorized

Publications

  • Ficco, M. (2019). Could emerging fraudulent energy consumption attacks make the cloud infrastructure costs unsustainable?. Information Sciences, 476, 474-490. [More] 
  • Ficco, M., Pietrantuono, R. & Russo, S. (2018). Aging-related performance anomalies in the apache storm stream processing system. Future Generation Computer Systems, 86, 975-994. [More] 
  • Kozik, R., Choraś, M., Ficco, M. & Palmieri, F. (2018). A scalable distributed machine learning approach for attack detection in edge computing environments. Journal of Parallel and Distributed Computing, 119, 18-26. [More] 
  • Ficco, M., Pietrantuono, R. & Russo, S. (2018). Hybrid Simulation and Test of Vessel Traffic Systems on the Cloud. IEEE Access, 6, 47273-47287. [More] 
  • Esposito, C., Castiglione, A., Palmieri, F., Ficco, M., Dobre, C., Iordache, G. V. et al. (2018). Event-based sensor data exchange and fusion in the Internet of Things environments. Journal of Parallel and Distributed Computing, 118, 328-343. [More] 
  • Esposito, C., Ficco, M., Castiglione, A., Palmieri, F. & Lu, H. (2018). Loss-tolerant event communications within industrial internet of things by leveraging on game theoretic intelligence. IEEE Internet of Things Journal, 5(3), 1679-1689. [More] 
  • Esposito, C., Castiglione, A., Palmieri, F. & Ficco, M. (2018). Building a network embedded FEC protocol by using game theory. Information Sciences, 433-434, 365-380. [More] 
  • Esposito, C., Ficco, M., Castiglione, A., Palmieri, F. & Santis, A. D. (2018). Distributed Group Key Management for Event Notification Confidentiality among Sensors. IEEE Transactions on Dependable and Secure Computing, . [More] 
  • Ficco, M., Esposito, C., Palmieri, F. & Castiglione, A. (2018). A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation. Future Generation Computer Systems, 78, 343-352. [More] 
  • Castiglione, A., Pop, F., Ficco, M. & Palmieri, F. (2018). Preface. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11161 LNCS, V. [More] 
  • Ficco, M., Amato, A. & Venticinque, S (2018). Hosting mission-critical applications on cloud: Technical issues and challenges. In, pages 179-191. [More] 
  • Ficco, M., Venticinque, S. & Rak, M (2018). Malware Detection for Secure Microgrids: CoSSMic Case Study. In, pages 336-341. [More] 
  • Ficco, M., Esposito, C., Xiang, Y. & Palmieri, F. (2017). Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems. IEEE Communications Magazine, 55(11), 98-104. [More] 
  • Esposito, C., Castiglione, A., Palmieri, F. & Ficco, M. (2017). Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design. Future Generation Computer Systems, 74, 325-336. [More] 
  • Ficco, M., Choraś, M. & Kozik, R. (2017). Simulation platform for cyber-security and vulnerability analysis of critical infrastructures. Journal of Computational Science, 22, 179-186. [More] 
  • Ficco, M. & Palmieri, F. (2017). Introducing fraudulent energy consumption in cloud infrastructures: A new generation of denial-of-service attacks. IEEE Systems Journal, 11(2), 460-470. [More] 
  • Esposito, C., Castiglione, A., Palmieri, F. & Ficco, M. (2017). Improving the gossiping effectiveness with distributed strategic learning (Invited paper). Future Generation Computer Systems, 71, 221-233. [More] 
  • Ficco, M. (2017). CIPRNet training lecture: Hybrid simulation of distributed large-scale critical infrastructures. Advances in Intelligent Systems and Computing, 525, 213-214. [More] 
  • Ficco, M. & Rak, M (2017). Security SLAs for cloud services: Hadoop case study. In, pages 103-114. [More] 
  • Ficco, M., Di Martino, B., Pietrantuono, R. & Russo, S. (2017). Optimized task allocation on private cloud for hybrid simulation of large-scale critical systems. Future Generation Computer Systems, 74, 104-118. [More] 
  • Palmieri, F., Ficco, M., Pardi, S. & Castiglione, A. (2016). A cloud-based architecture for emergency management and first responders localization in smart city environments. Computers and Electrical Engineering, 56, 810-830. [More] 
  • Ficco, M. & Palmieri, F (2016). Welcome Message from SecureSysCom 2016 International Workshop Organizers. In, pages xlvi. [More] 
  • Esposito, C., Castiglione, A., Palmieri, F., Ficco, M. & Choo, K. - (2016). A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things. In, pages 376-383. [More] 
  • Esposito, C., Castiglione, A., Palmieri, F. & Ficco, M (2016). Distributed strategic learning for effective gossiping in wireless networks. In, pages 509-514. [More] 
  • Esposito, C., Ficco, M., Palmieri, F. & Castiglione, A. (2016). Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory. IEEE Transactions on Computers, 65(8), 2348-2362. [More] 
  • Ficco, M., Pietrantuono, R. & Russo, S. (2016). Using multi-objective metaheuristics for the optimal selection of positioning systems. Soft Computing, 20(7), 2641-2664. [More] 
  • Ficco, M. (2016). Editorial: security and reliability of critical systems. Journal of Ambient Intelligence and Humanized Computing, 7(2), 149-151. [More] 
  • Ficco, M., Esposito, C., Chang, H. & Choo, K. -. (2016). Live Migration in Emerging Cloud Paradigms. IEEE Cloud Computing, 3(2), 12-19. [More] 
  • Ficco, M., Avolio, G., Palmieri, F. & Castiglione, A. (2016). An HLA-based framework for simulation of large-scale critical systems. Concurrency Computation, 28(2), 400-419. [More] 
  • Esposito, C. & Ficco, M. (2016). Recent developments on security and reliability in large-scale data processing with MapReduce. International Journal of Data Warehousing and Mining, 12(1), 49-68. [More] 
  • Ficco, M. & D’Antonio, S. (2016). 2ndworkshop on cyber security and resilience of large-scale systems. Studies in Computational Intelligence, 616, 401. [More] 
  • Esposito, C., Castiglione, A., Palmieri, F. & Ficco, M. (2016). A game-theoretic approach to network embedded FEC over large-scale networks. Communications in Computer and Information Science, 575, 353-364. [More] 
  • Gigante, G., Gargiulo, F., Ficco, M. & Pascarella, D. (2016). A semantic driven approach for consistency verification between requirements and FMEA. Studies in Computational Intelligence, 616, 403-413. [More] 
  • Ficco, M. & Rak, M (2016). Economic denial of sustainability mitigation in cloud computing. In, pages 229-238. [More] 
  • Ficco, M., Tasquier, L. & Aversa, R. (2016). Intrusion detection in federated clouds. International Journal of Computational Science and Engineering, 13(3), 219-232. [More] 
  • Amato, A., Aversa, R., Ficco, M. & Venticinque, S (2016). CoSSMic smart grid migration in federated clouds. In, pages 103-108. [More] 
  • Ficco, M., Palmieri, F. & Castiglione, A (2015). Supporting First Responders Localization during Crisis Management. In, pages 147-152. [More] 
  • D'Angelo, G., Palmieri, F., Ficco, M. & Rampone, S. (2015). An uncertainty-managing batch relevance-based approach to network anomaly detection. Applied Soft Computing Journal, 36, 408-418. [More] 
  • Ficco, M., Palmieri, F. & Castiglione, A. (2015). Modeling security requirements for cloud-based system development. Concurrency Computation, 27(8), 2107-2124. [More] 
  • Palmieri, F., Ricciardi, S., Fiore, U., Ficco, M. & Castiglione, A. (2015). Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures. Journal of Supercomputing, 71(5), 1620-1641. [More] 
  • Ficco, M. & Palmieri, F (2015). Message from SecureSysComm 2015 Workshop Chairs. In, pages xlviii. [More] 
  • Esposito, C., Ficco, M., Palmieri, F. & Castiglione, A. (2015). A knowledge-based platform for big data analytics based on publish/subscribe services and stream processing. Knowledge-Based Systems, 79, 3-17. [More] 
  • Gigante, G., Gargiulo, F. & Ficco, M. (2015). A semantic driven approach for requirements verification. Studies in Computational Intelligence, 570, 427-436. [More] 
  • Gargiulo, F., Gigante, G. & Ficco, M. (2015). A semantic driven approach for requirements consistency verification. International Journal of High Performance Computing and Networking, 8(3), 201-211. [More] 
  • Pietrantuono, R., Ficco, M., Russo, S. & Gigante, G (2015). Sampling UAV Most Informative Diagnostic Signals. In, pages 683-688. [More] 
  • Ficco, M. & Rak, M. (2015). Stealthy denial of service strategy in cloud computing. IEEE Transactions on Cloud Computing, 3(1), 80-94. [More] 
  • Ficco, M., Esposito, C. & Napolitano, A. (2014). Calibrating indoor positioning systemswith low efforts. IEEE Transactions on Mobile Computing, 13(4), 737-751. [More] 
  • Ficco, M., Avolio, G., Battaglia, L. & Manetti, V (2014). Hybrid simulation of distributed large-scale critical infrastructures. In, pages 616-621. [More] 
  • Esposito, C., Ficco, M., Palmieri, F. & Loia, V (2014). On reliability and security in knowledge grids. In, pages 20-27. [More] 
  • Ficco, M. (2014). Calibration-less indoor location systems based on wireless sensors. Journal of Ambient Intelligence and Humanized Computing, 5(2), 249-261. [More] 
  • Palmieri, F., Ficco, M. & Castiglione, A (2014). Adaptive stealth energy-related DoS attacks against cloud data centers. In, pages 265-272. [More] 
  • Ficco, M., Palmieri, F. & Castiglione, A. (2014). Hybrid indoor and outdoor location services for new generation mobile terminals. Personal and Ubiquitous Computing, 18(2), 271-285. [More] 
  • Battista, E., Casola, V., Mazzocca, N., Ficco, M. & Rak, M (2014). Developing secure cloud applications: A case study. In, pages 432-439. [More] 
  • Rak, M., Ficco, M., Battista, E., Casola, V. & Mazzocca, N. (2014). Developing secure cloud applications. Scalable Computing, 15(1), 49-62. [More] 
  • Ficco, M., Tasquier, L. & Aversa, R (2014). Agent-based intrusion detection for federated clouds. In, pages 586-591. [More] 
  • Ficco, M., Tasquier, L. & Di Martino, B. (2014). Interconnection of federated clouds. Studies in Computational Intelligence, 511, 243-248. [More] 
  • Zazzaro, G., Gigante, G., Zaccariello, E., Ficco, M. & Di Martino, B (2014). Supporting development of certified aeronautical components by applying text analysis techniques. In, pages 602-607. [More] 
  • Ficco, M. (2013). Security event correlation approach for cloud computing. International Journal of High Performance Computing and Networking, 7(3), 173-185. [More] 
  • Esposito, C., Ficco, M., Palmieri, F. & Castiglione, A. (2013). Interconnecting Federated Clouds by Using Publish-Subscribe Service. Cluster Computing, 16(4), 887-903. [More] 
  • Ficco, M. & Rak, M. (2013). SLA-Oriented Security Provisioning for Cloud Computing. Communications in Computer and Information Science, 367 CCIS, 230-244. [More] 
  • Ficco, M., Tasquier, L. & Aversa, R (2013). Intrusion detection in Cloud Computing. In, pages 276-283. [More] 
  • Ficco, M. & Aversa, R (2013). Hybrid localization for ubiquitous services. In, pages 1-8. [More] 
  • Ficco, M., Venticinque, S. & Martino, B. D. (2013). An advanced intrusion detection framework for cloud computing. Computer Systems Science and Engineering, 28(6), 401-411. [More] 
  • Rak, M., Ghani, H., Ficco, M., Suri, N., Luna, J., Panica, S. et al. (2012). Security issues in cloud federations. [More] 
  • Ficco, M. & Rak, M (2012). Intrusion tolerance in cloud applications: The mOSAIC approach. In, pages 170-176. [More] 
  • Ficco, M. & Rak, M (2012). Intrusion tolerance as a service: A SLA-based solution. In, pages 375-384. [More] 
  • Ficco, M. & Rak, M. (2012). Intrusion tolerance of stealth DoS attacks to web services. IFIP Advances in Information and Communication Technology, 376 AICT, 579-584. [More] 
  • Ficco, M., Rak, M. & Di Martino, B (2012). An intrusion detection framework for supporting SLA assessment in Cloud Computing. In, pages 244-249. [More] 
  • Aversa, R., Martino, B. D., Ficco, M. & Venticinque, S (2012). Simulation and support of critical activities by mobile agents in pervasive and ubiquitous scenarios. In, pages 815-822. [More] 
  • Ficco, M., Venticinque, S. & Martino, B. D. (2012). mOSAIC-based intrusion detection framework for cloud computing. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7566 LNCS(PART 2), 628-644. [More] 
  • Esposito, C. & Ficco, M. (2011). Deployment of RSS-based indoor positioning systems. International Journal of Wireless Information Networks, 18(4), 224-242. [More] 
  • Ficco, M. & Romano, L (2011). A generic intrusion detection and diagnoser system based on complex event processing. In, pages 275-284. [More] 
  • Ficco, M., Daidone, A., Coppolino, L., Romano, L. & Bondavalli, A (2011). An event correlation approach for fault diagnosis in SCADA infrastructures. In, pages 15-20. [More] 
  • Ficco, M. & Rak, M (2011). Intrusion tolerant approach for denial of service attacks to web services. In, pages 285-292. [More] 
  • Aversa, R., Martino, B. D., Ficco, M. & Venticinque, S. (2011). A simulation model for localization of pervasive objects using heterogeneous wireless networks. Simulation Modelling Practice and Theory, 19(8), 1758-1772. [More] 
  • Ficco, M. & Romano, L. (2010). A correlation approach to intrusion detection. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 45 LNICST, 203-215. [More] 
  • Ficco, M., Pietrantuono, R. & Russo, S. (2010). Supporting ubiquitous location information in interworking 3G and wireless networks. Communications of the ACM, 53(11), 116-123. [More] 
  • Martino, B. D., Ficco, M., Aversa, R. & Venticinque, S (2010). A positioning service for pervasive objects in dynamic environments. In, pages 244-249. [More] 
  • Esposito, C., Cotroneo, D. & Ficco, M (2009). Calibrating RSS-based indoor positioning systems. In, pages 1-6. [More] 
  • Ficco, M., Coppolino, L. & Romano, L (2009). A weight-based symptom correlation approach to SQL injection attacks. In, pages 9-16. [More] 
  • Ficco, M. & Russo, S. (2009). A hybrid positioning system for technology-independent location-aware computing. Software - Practice and Experience, 39(13), 1095-1125. [More] 
  • Ficco, M., D'Arienzo, M. & D'Angelo, G (2007). A bluetooth infrastructure for automatic services access in ubiquitous and nomadic computing environments. In, pages 17-24. [More] 
  • Flora, C. D., Ficco, M. & Russo, S (2006). An architecture for providing java applications with indoor and outdoor hybrid location sensing. In, pages 37-42. [More] 
  • Flora, C. D., Ficco, M. & Russo, S. (2006). Supporting location-aware distributed applications on mobile devices. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3732 LNCS, 464-471. [More] 
  • Cotroneo, D., Flora, C. D., Ficco, M. & Russo, S (2005). A strategy for application-transparent integration of nomadic computing domains. In, pages 50-57. [More] 
  • Flora, C. D., Ficco, M., Russo, S. & Vecchio, V (2005). Indoor and outdoor location based services for portable wireless devices. In. [More] 
  • Flora, C. D., Ficco, M. & Russo, S. (2004). Indoor positioning for location-aware applications on Java-based mobile devices. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3292, 383-393. [More] 
  • Cotroneo, D., Russo, S., Cornevilli, F., Ficco, M. & Vecchio, V (2004). Implementing positioning services over an ubiquitous infrastructure. In, pages 14-18. [More] 
  • Cotroneo, D., Russo, S., Ventre, G., Ficco, M. & Gargiulo, M (2002). Service differentiation of communication-bound processes in a real-time operating system. In, pages 207-214. [More] 
  • Cotroneo, D., Ficco, M. & Ventre, G. (2001). A service differentiation scheme for the end-system. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2158, 99-109. [More] 
  • Cotroneo, D., Ficco, M., Romano, S. P. & Ventre, G. (2000). Bringing service differentiation to the end system. IEEE International Conference on Networks, ICON, , 436-440. [More] 
 
You are here: Home Publications ficco-massimo