Dr Leonardo Mostarda
Name | Dr Leonardo Mostarda |
---|---|
Job title | SL- Telecomms, Comp Ntwrks,Ntwrk Security |
Research institute | |
Primary appointment | S&T School Leadership |
Contact category | Academic staff (past) |
Research outputs
Threshold signature in off-chain components to manage inter-chain transactions
Bigiotti, A., Mostarda, L., Navarra A, Shah, P. and Trestian, R. 2024. Threshold signature in off-chain components to manage inter-chain transactions. 6th Conference on Blockchain Research & Applications for Innovative Networks and Services. Berlin, Germany 09 - 11 Oct 2024 IEEE. pp. 1-4 https://doi.org/10.1109/brains63024.2024.10732513Cyber-threat detection system using a hybrid approach of transfer learning and multi-model image representation
Ullah, F., Ullah, S., Naeem, M., Mostarda, L., Rho, S. and Cheng, X. 2022. Cyber-threat detection system using a hybrid approach of transfer learning and multi-model image representation. Sensors. 22 (15), pp. 1-26. https://doi.org/10.3390/s22155883Comparative analysis of clustering algorithms and moodle plugin for creation of student heterogeneous groups in online university courses
Nalli, G., Amendola, D., Perali, A. and Mostarda, L. 2021. Comparative analysis of clustering algorithms and moodle plugin for creation of student heterogeneous groups in online university courses. Applied Sciences. 11. https://doi.org/10.3390/app11135800Application of machine learning to the learning analytics of the Moodle platform to create heterogeneous groups in on-line courses
Nalli, G., Mostarda, L., Perali, A., Pilati, S. and Amendola, A. 2019. Application of machine learning to the learning analytics of the Moodle platform to create heterogeneous groups in on-line courses. Italian Journal of Educational Research. p. 156–173.On the performance, availability and energy consumption modelling of clustered IoT systems
Ever, E., Shah, P., Mostarda, L., Omondi, F. and Gemikonakli, O. 2019. On the performance, availability and energy consumption modelling of clustered IoT systems. Computing. 101 (12), pp. 1935-1970. https://doi.org/10.1007/s00607-019-00720-9Multi-path routing for mission critical applications in software-defined networks
Ramirez, R., Vien, Q., Trestian, R., Mostarda, L. and Shah, P. 2019. Multi-path routing for mission critical applications in software-defined networks. Duong, T. and Vo, N. (ed.) 14th EAI International Conferenceon Industrial Networks and Intelligent Systems, INISCOM 2018. Da Nang, Vietnam 27 - 28 Aug 2018 Springer, Cham. pp. 38-48 https://doi.org/10.1007/978-3-030-05873-9_4Analysis and verification of ECA rules in intelligent environments
Cacciagrano, D., Corradini, F., Culmone, R., Gorogiannis, N., Mostarda, L., Raimondi, F. and Vannucchi, C. 2018. Analysis and verification of ECA rules in intelligent environments. Journal of Ambient Intelligence and Smart Environments. 10 (3), pp. 261-273. https://doi.org/10.3233/ais-180487Does the assumption of exponential arrival distributions in wireless sensor networks hold?
Doddapaneni, K., Tasiran, A., Omondi, F., Ever, E., Shah, P., Mostarda, L. and Gemikonakli, O. 2018. Does the assumption of exponential arrival distributions in wireless sensor networks hold? International Journal of Sensor Networks. 26 (2), pp. 81-100. https://doi.org/10.1504/IJSNET.2018.089258Symbolic verification of event–condition–action rules in intelligent environments
Vannucchi, C., Diamanti, M., Mazzante, G., Cacciagrano, D., Culmone, R., Gorogiannis, N., Mostarda, L. and Raimondi, F. 2017. Symbolic verification of event–condition–action rules in intelligent environments. Journal of Reliable Intelligent Environments. 3 (2), pp. 117-130. https://doi.org/10.1007/s40860-017-0036-zSymbolic model-checking for resource-bounded ATL
Alechina, N., Logan, B., Nguyen, H., Raimondi, F. and Mostarda, L. 2015. Symbolic model-checking for resource-bounded ATL. 2015 International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2015. Istanbul, Turkey 04 - 08 May 2015 pp. 1809-1810Packet arrival analysis in wireless sensor networks
Doddapaneni, K., Shah, P., Ever, E., Tasiran, A., Omondi, F., Mostarda, L. and Gemikonakli, O. 2015. Packet arrival analysis in wireless sensor networks. IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2015. Gwangiu, South Korea 24 - 27 Mar 2015 IEEE. pp. 164-169 https://doi.org/10.1109/WAINA.2015.101Implementing adaptation and reconfiguration strategies in heterogeneous WSN
Di Marco, A., Gallo, F., Gemikonakli, O., Mostarda, L. and Raimondi, F. 2013. Implementing adaptation and reconfiguration strategies in heterogeneous WSN. 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013). Barcelona, Spain 25 - 28 Mar 2013 IEEE. pp. 477-483 https://doi.org/10.1109/AINA.2013.102Effects of IDSs on the WSNs lifetime: evidence for the need of new approaches
Doddapaneni, K., Ever, E., Gemikonakli, O. and Mostarda, L. 2012. Effects of IDSs on the WSNs lifetime: evidence for the need of new approaches. The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). Liverpool, United Kingdom 25 - 27 Jun 2012 IEEE. pp. 907-912 https://doi.org/10.1109/TrustCom.2012.137A model-driven engineering framework for architecting and analysing Wireless Sensor Networks
Doddapaneni, K., Ever, E., Gemikonakli, O., Malavolta, I., Mostarda, L. and Muccini, H. 2012. A model-driven engineering framework for architecting and analysing Wireless Sensor Networks. Third International Workshop on Software Engineering for Sensor Network Applications (SESENA'12). Zurich, Switzerland 02 Jun 2012 IEEE Press Piscataway, NJ, USA. pp. 1-7 https://doi.org/10.1109/SESENA.2012.6225729UHEED - an unequal clustering algorithm for wireless sensor networks
Ever, E., Luchmun, R., Mostarda, L., Navarra, A. and Shah, P. 2012. UHEED - an unequal clustering algorithm for wireless sensor networks. Sensornets 2012. Rome, Italy 24 - 26 Feb 2012Place and time authentication of cultural assets.
Mostarda, L., Dong, C. and Dulay, N. 2008. Place and time authentication of cultural assets. Springer.A policy-based publish/subscribe middleware for sense-and-react applications
Russello, G., Mostarda, L. and Dulay, N. 2011. A policy-based publish/subscribe middleware for sense-and-react applications. Journal of Systems and Software. 84 (4), pp. 638-654. https://doi.org/10.1016/j.jss.2010.10.023A distributed intrusion detection approach for secure software architecture.
Inverardi, P. and Mostarda, L. 2005. A distributed intrusion detection approach for secure software architecture. Springer. https://doi.org/10.1007/11494713_12A state machine-based approach for reliable adaptive distributed systems.
Mostarda, L., Sykes, D. and Dulay, N. 2010. A state machine-based approach for reliable adaptive distributed systems. Sterritt, R. and McCann, J. (ed.) IEEE. https://doi.org/10.1109/EASe.2010.19Context-based authentication and transport of cultural assets.
Mostarda, L., Dong, C. and Dulay, N. 2010. Context-based authentication and transport of cultural assets. Personal and Ubiquitous Computing. 14 (4), pp. 321-334. https://doi.org/10.1007/s00779-009-0233-8An architectural framework for analyzing tradeoffs between software security and performance.
Cortellessa, V., Trubiani, C., Mostarda, L. and Dulay, N. 2010. An architectural framework for analyzing tradeoffs between software security and performance. ISARCS 2010: 1st International Symposium on Architecting Critical Systems Federated with CompArch 2010. Prague 23 - 25 Jun 2010 pp. 1-18Distributed fault tolerant controllers
Mostarda, L., Ball, R. and Dulay, N. 2010. Distributed fault tolerant controllers. Springer. https://doi.org/10.1007/978-3-642-13645-0_11Distributed orchestration of pervasive services.
Mostarda, L., Marinovic, S. and Dulay, N. 2010. Distributed orchestration of pervasive services. and Applications. IEEE. pp. 166-173 https://doi.org/10.1109/AINA.2010.100Policies for self tuning home networks.
Pediaditakis, D., Mostarda, L., Dong, C. and Dulay, N. 2009. Policies for self tuning home networks. POLICY 2009, IEEE International Symposium on Policies for Distributed Systems and Networks.. London 20 - 22 Jul 2009 pp. 29-32Synthesis of decentralized and concurrent adaptors for correctly assembling distributed component-based systems
Autili, M., Mostarda, L., Navarra, A. and Tivoli, M. 2008. Synthesis of decentralized and concurrent adaptors for correctly assembling distributed component-based systems. Journal of Systems and Software. 81 (12), pp. 2210-2236. https://doi.org/10.1016/j.jss.2008.04.006Distributed intrusion detection systems for enhancing security in mobile wireless sensor networks.
Mostarda, L. and Navarra, A. 2008. Distributed intrusion detection systems for enhancing security in mobile wireless sensor networks. International Journal of Distributed Sensor Networks. 4 (2), pp. 83-109. https://doi.org/10.1080/15501320802001119DALICA: Agent-based ambient intelligence for cultural-heritage scenarios
Costantini, S., Mostarda, L., Tocchio, A. and Tsintza, P. 2008. DALICA: Agent-based ambient intelligence for cultural-heritage scenarios. IEEE Intelligent Systems. 23 (2), pp. 34-41. https://doi.org/10.1109/MIS.2008.24ESCAPE: a component-based policy framework for sense and react applications.
Russello, G., Mostarda, L. and Dulay, N. 2008. ESCAPE: a component-based policy framework for sense and react applications. Springer. https://doi.org/10.1007/978-3-540-87891-9_14DALICA: intelligent agents for user profile deduction.
Costantini, S., Mostarda, L., Tocchio, A., Tsintza, P. and Knowledge Systems Institute Graduate School. 2007. DALICA: intelligent agents for user profile deduction. I. Illinois Knowledge Systems Institute Graduate School,.Agents and security in a cultural assets transport scenario.
Costantini, S., Mostarda, L., Tocchio, A. and Tsintza, P. 2007. Agents and security in a cultural assets transport scenario. Workshop from Objects to Agents.. Genova, Italy 24 - 25 Sep 2007A geo time authentication system.
Mostarda, L., Tocchio, A., Inverardi, P. and Costantini, S. 2007. A geo time authentication system. Springer. https://doi.org/10.1007/978-0-387-73655-6_9A distributed monitoring system for enhancing security and dependability at architectural level.
Inverardi, P. and Mostarda, L. 2007. A distributed monitoring system for enhancing security and dependability at architectural level. Springer. https://doi.org/10.1109/AINA.2006.145DESERT: a decentralized monitoring tool generator.
Inverardi, P. and Mostarda, L. 2007. DESERT: a decentralized monitoring tool generator. IEEE.Distributed IDSs for enhancing security in mobile wireless sensor networks.
Inverardi, P., Mostarda, L. and Navarra, A. 2006. Distributed IDSs for enhancing security in mobile wireless sensor networks. 20th International Conference on Advanced Information Networking and Applications (AINA). IEEE. pp. 116-120 https://doi.org/10.1109/AINA.2006.145Synthesis of correct and distributed adaptors for component-based systems: an automatic approach.
Inverardi, P., Mostarda, L., Tivoli, M. and Autili, M. 2005. Synthesis of correct and distributed adaptors for component-based systems: an automatic approach. IEEE. pp. 405-40962
total views of outputs2
total downloads of outputs1
views of outputs this month1
downloads of outputs this month