Follow
Antonino Rullo
Antonino Rullo
Researcher @ICAR-CNR, Italian National Research Council
Verified email at icar.cnr.it - Homepage
Title
Cited by
Cited by
Year
Kalis—A system for knowledge-driven adaptable intrusion detection for the Internet of Things
D Midi, A Rullo, A Mudgerikar, E Bertino
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
2302017
Pareto-optimal adversarial defense of enterprise systems
E Serra, S Jajodia, A Pugliese, A Rullo, VS Subrahmanian
ACM Transactions on Information and System Security (TISSEC) 17 (3), 1-39, 2015
622015
Process mining applications in the healthcare domain: A comprehensive review
A Guzzo, A Rullo, E Vocaturo
Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 12 (2 …, 2022
432022
Pareto optimal security resource allocation for Internet of Things
A Rullo, D Midi, E Serra, E Bertino
ACM Transactions on Privacy and Security (TOPS) 20 (4), 1-30, 2017
312017
Intrusion detection with hypergraph-based attack models
A Guzzo, A Pugliese, A Rullo, D Saccà
Graph Structures for Knowledge Representation and Reasoning, 58-73, 2014
282014
Padua: Parallel architecture to detect unexplained activities
C Molinaro, V Moscato, A Picariello, A Pugliese, A Rullo, ...
ACM Transactions on Internet Technology (TOIT) 14 (1), 1-28, 2014
252014
Shortfall-based optimal placement of security resources for mobile IoT scenarios
A Rullo, E Serra, E Bertino, J Lobo
European Symposium on Research in Computer Security, 419-436, 2017
212017
A multi-perspective approach for the analysis of complex business processes behavior
A Guzzo, M Joaristi, A Rullo, E Serra
Expert Systems with Applications 177, 114934, 2021
192021
Redundancy as a measure of fault-tolerance for the Internet of Things: A review
A Rullo, E Serra, J Lobo
Policy-Based Autonomic Data Governance, 202-226, 2019
192019
A game of things: Strategic allocation of security resources for iot
A Rullo, D Midi, E Serra, E Bertino
2017 IEEE/ACM Second International Conference on Internet-of-Things Design …, 2017
162017
Past: Protocol-adaptable security tool for heterogeneous iot ecosystems
A Rullo, E Bertino, D Saccá
2018 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2018
142018
Malevolent activity detection with hypergraph-based models
A Guzzo, A Pugliese, A Rullo, D Saccà, A Piccolo
IEEE Transactions on Knowledge and Data Engineering 29 (5), 1115-1128, 2017
122017
PUF-based smart tags for supply chain management
A Falcone, C Felicetti, A Garro, A Rullo, D Saccà
Proceedings of the 16th International Conference on Availability …, 2021
112021
Strategic security resource allocation for internet of things
A Rullo, D Midi, E Serra, E Bertino
Distributed Computing Systems (ICDCS), 2016 IEEE 36th International …, 2016
112016
Exploiting silicon fingerprint for device authentication using CMOS-PUF and ECC
C Felicetti, M Lanuzza, A Rullo, D Saccà, F Crupi
2021 IEEE International Conference on Smart Internet of Things (SmartIoT …, 2021
82021
Extending inverse frequent itemsets mining to generate realistic datasets: complexity, accuracy and emerging applications
D Saccá, E Serra, A Rullo
Data Mining and Knowledge Discovery 33 (6), 1736-1774, 2019
82019
Guest Editorial Special Issue on Intrusion Detection for the Internet of Things
A Rullo, E Bertino, K Ren
IEEE Internet of Things Journal 10 (10), 8327-8330, 2023
72023
A framework for the multi-modal analysis of novel behavior in business processes
A Rullo, A Guzzo, E Serra, E Tirrito
Intelligent Data Engineering and Automated Learning–IDEAL 2020: 21st …, 2020
72020
Shortfall-based optimal security provisioning for Internet of Things
A Rullo, E Serra, E Bertino, J Lobo
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
72017
Machine learning methods for generating high dimensional discrete datasets
G Manco, E Ritacco, A Rullo, D Saccà, E Serra
Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 12 (2 …, 2022
6*2022
The system can't perform the operation now. Try again later.
Articles 1–20