Dr Leonardo Mostarda


NameDr Leonardo Mostarda
Job titleSL- Telecomms, Comp Ntwrks,Ntwrk Security
Research institute
Primary appointmentS&T School Leadership
Contact categoryAcademic staff (past)

Research outputs

Threshold signature in off-chain components to manage inter-chain transactions

Bigiotti, A., Mostarda, L., Navarra A, Shah, P. and Trestian, R. 2024. Threshold signature in off-chain components to manage inter-chain transactions. 6th Conference on Blockchain Research & Applications for Innovative Networks and Services. Berlin, Germany 09 - 11 Oct 2024 IEEE. pp. 1-4 https://doi.org/10.1109/brains63024.2024.10732513

Cyber-threat detection system using a hybrid approach of transfer learning and multi-model image representation

Ullah, F., Ullah, S., Naeem, M., Mostarda, L., Rho, S. and Cheng, X. 2022. Cyber-threat detection system using a hybrid approach of transfer learning and multi-model image representation. Sensors. 22 (15), pp. 1-26. https://doi.org/10.3390/s22155883

Comparative analysis of clustering algorithms and moodle plugin for creation of student heterogeneous groups in online university courses

Nalli, G., Amendola, D., Perali, A. and Mostarda, L. 2021. Comparative analysis of clustering algorithms and moodle plugin for creation of student heterogeneous groups in online university courses. Applied Sciences. 11. https://doi.org/10.3390/app11135800

Application of machine learning to the learning analytics of the Moodle platform to create heterogeneous groups in on-line courses

Nalli, G., Mostarda, L., Perali, A., Pilati, S. and Amendola, A. 2019. Application of machine learning to the learning analytics of the Moodle platform to create heterogeneous groups in on-line courses. Italian Journal of Educational Research. p. 156–173.

On the performance, availability and energy consumption modelling of clustered IoT systems

Ever, E., Shah, P., Mostarda, L., Omondi, F. and Gemikonakli, O. 2019. On the performance, availability and energy consumption modelling of clustered IoT systems. Computing. 101 (12), pp. 1935-1970. https://doi.org/10.1007/s00607-019-00720-9

Multi-path routing for mission critical applications in software-defined networks

Ramirez, R., Vien, Q., Trestian, R., Mostarda, L. and Shah, P. 2019. Multi-path routing for mission critical applications in software-defined networks. Duong, T. and Vo, N. (ed.) 14th EAI International Conferenceon Industrial Networks and Intelligent Systems, INISCOM 2018. Da Nang, Vietnam 27 - 28 Aug 2018 Springer, Cham. pp. 38-48 https://doi.org/10.1007/978-3-030-05873-9_4

Analysis and verification of ECA rules in intelligent environments

Cacciagrano, D., Corradini, F., Culmone, R., Gorogiannis, N., Mostarda, L., Raimondi, F. and Vannucchi, C. 2018. Analysis and verification of ECA rules in intelligent environments. Journal of Ambient Intelligence and Smart Environments. 10 (3), pp. 261-273. https://doi.org/10.3233/ais-180487

Does the assumption of exponential arrival distributions in wireless sensor networks hold?

Doddapaneni, K., Tasiran, A., Omondi, F., Ever, E., Shah, P., Mostarda, L. and Gemikonakli, O. 2018. Does the assumption of exponential arrival distributions in wireless sensor networks hold? International Journal of Sensor Networks. 26 (2), pp. 81-100. https://doi.org/10.1504/IJSNET.2018.089258

Symbolic verification of event–condition–action rules in intelligent environments

Vannucchi, C., Diamanti, M., Mazzante, G., Cacciagrano, D., Culmone, R., Gorogiannis, N., Mostarda, L. and Raimondi, F. 2017. Symbolic verification of event–condition–action rules in intelligent environments. Journal of Reliable Intelligent Environments. 3 (2), pp. 117-130. https://doi.org/10.1007/s40860-017-0036-z

Symbolic model-checking for resource-bounded ATL

Alechina, N., Logan, B., Nguyen, H., Raimondi, F. and Mostarda, L. 2015. Symbolic model-checking for resource-bounded ATL. 2015 International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2015. Istanbul, Turkey 04 - 08 May 2015 pp. 1809-1810

Packet arrival analysis in wireless sensor networks

Doddapaneni, K., Shah, P., Ever, E., Tasiran, A., Omondi, F., Mostarda, L. and Gemikonakli, O. 2015. Packet arrival analysis in wireless sensor networks. IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2015. Gwangiu, South Korea 24 - 27 Mar 2015 IEEE. pp. 164-169 https://doi.org/10.1109/WAINA.2015.101

Implementing adaptation and reconfiguration strategies in heterogeneous WSN

Di Marco, A., Gallo, F., Gemikonakli, O., Mostarda, L. and Raimondi, F. 2013. Implementing adaptation and reconfiguration strategies in heterogeneous WSN. 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013). Barcelona, Spain 25 - 28 Mar 2013 IEEE. pp. 477-483 https://doi.org/10.1109/AINA.2013.102

Effects of IDSs on the WSNs lifetime: evidence for the need of new approaches

Doddapaneni, K., Ever, E., Gemikonakli, O. and Mostarda, L. 2012. Effects of IDSs on the WSNs lifetime: evidence for the need of new approaches. The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). Liverpool, United Kingdom 25 - 27 Jun 2012 IEEE. pp. 907-912 https://doi.org/10.1109/TrustCom.2012.137

A model-driven engineering framework for architecting and analysing Wireless Sensor Networks

Doddapaneni, K., Ever, E., Gemikonakli, O., Malavolta, I., Mostarda, L. and Muccini, H. 2012. A model-driven engineering framework for architecting and analysing Wireless Sensor Networks. Third International Workshop on Software Engineering for Sensor Network Applications (SESENA'12). Zurich, Switzerland 02 Jun 2012 IEEE Press Piscataway, NJ, USA. pp. 1-7 https://doi.org/10.1109/SESENA.2012.6225729

UHEED - an unequal clustering algorithm for wireless sensor networks

Ever, E., Luchmun, R., Mostarda, L., Navarra, A. and Shah, P. 2012. UHEED - an unequal clustering algorithm for wireless sensor networks. Sensornets 2012. Rome, Italy 24 - 26 Feb 2012

Place and time authentication of cultural assets.

Mostarda, L., Dong, C. and Dulay, N. 2008. Place and time authentication of cultural assets. Springer.

A policy-based publish/subscribe middleware for sense-and-react applications

Russello, G., Mostarda, L. and Dulay, N. 2011. A policy-based publish/subscribe middleware for sense-and-react applications. Journal of Systems and Software. 84 (4), pp. 638-654. https://doi.org/10.1016/j.jss.2010.10.023

A distributed intrusion detection approach for secure software architecture.

Inverardi, P. and Mostarda, L. 2005. A distributed intrusion detection approach for secure software architecture. Springer. https://doi.org/10.1007/11494713_12

A state machine-based approach for reliable adaptive distributed systems.

Mostarda, L., Sykes, D. and Dulay, N. 2010. A state machine-based approach for reliable adaptive distributed systems. Sterritt, R. and McCann, J. (ed.) IEEE. https://doi.org/10.1109/EASe.2010.19

Context-based authentication and transport of cultural assets.

Mostarda, L., Dong, C. and Dulay, N. 2010. Context-based authentication and transport of cultural assets. Personal and Ubiquitous Computing. 14 (4), pp. 321-334. https://doi.org/10.1007/s00779-009-0233-8

An architectural framework for analyzing tradeoffs between software security and performance.

Cortellessa, V., Trubiani, C., Mostarda, L. and Dulay, N. 2010. An architectural framework for analyzing tradeoffs between software security and performance. ISARCS 2010: 1st International Symposium on Architecting Critical Systems Federated with CompArch 2010. Prague 23 - 25 Jun 2010 pp. 1-18

Distributed fault tolerant controllers

Mostarda, L., Ball, R. and Dulay, N. 2010. Distributed fault tolerant controllers. Springer. https://doi.org/10.1007/978-3-642-13645-0_11

Distributed orchestration of pervasive services.

Mostarda, L., Marinovic, S. and Dulay, N. 2010. Distributed orchestration of pervasive services. and Applications. IEEE. pp. 166-173 https://doi.org/10.1109/AINA.2010.100

Policies for self tuning home networks.

Pediaditakis, D., Mostarda, L., Dong, C. and Dulay, N. 2009. Policies for self tuning home networks. POLICY 2009, IEEE International Symposium on Policies for Distributed Systems and Networks.. London 20 - 22 Jul 2009 pp. 29-32

Synthesis of decentralized and concurrent adaptors for correctly assembling distributed component-based systems

Autili, M., Mostarda, L., Navarra, A. and Tivoli, M. 2008. Synthesis of decentralized and concurrent adaptors for correctly assembling distributed component-based systems. Journal of Systems and Software. 81 (12), pp. 2210-2236. https://doi.org/10.1016/j.jss.2008.04.006

Distributed intrusion detection systems for enhancing security in mobile wireless sensor networks.

Mostarda, L. and Navarra, A. 2008. Distributed intrusion detection systems for enhancing security in mobile wireless sensor networks. International Journal of Distributed Sensor Networks. 4 (2), pp. 83-109. https://doi.org/10.1080/15501320802001119

DALICA: Agent-based ambient intelligence for cultural-heritage scenarios

Costantini, S., Mostarda, L., Tocchio, A. and Tsintza, P. 2008. DALICA: Agent-based ambient intelligence for cultural-heritage scenarios. IEEE Intelligent Systems. 23 (2), pp. 34-41. https://doi.org/10.1109/MIS.2008.24

ESCAPE: a component-based policy framework for sense and react applications.

Russello, G., Mostarda, L. and Dulay, N. 2008. ESCAPE: a component-based policy framework for sense and react applications. Springer. https://doi.org/10.1007/978-3-540-87891-9_14

DALICA: intelligent agents for user profile deduction.

Costantini, S., Mostarda, L., Tocchio, A., Tsintza, P. and Knowledge Systems Institute Graduate School. 2007. DALICA: intelligent agents for user profile deduction. I. Illinois Knowledge Systems Institute Graduate School,.

Agents and security in a cultural assets transport scenario.

Costantini, S., Mostarda, L., Tocchio, A. and Tsintza, P. 2007. Agents and security in a cultural assets transport scenario. Workshop from Objects to Agents.. Genova, Italy 24 - 25 Sep 2007

A geo time authentication system.

Mostarda, L., Tocchio, A., Inverardi, P. and Costantini, S. 2007. A geo time authentication system. Springer. https://doi.org/10.1007/978-0-387-73655-6_9

A distributed monitoring system for enhancing security and dependability at architectural level.

Inverardi, P. and Mostarda, L. 2007. A distributed monitoring system for enhancing security and dependability at architectural level. Springer. https://doi.org/10.1109/AINA.2006.145

DESERT: a decentralized monitoring tool generator.

Inverardi, P. and Mostarda, L. 2007. DESERT: a decentralized monitoring tool generator. IEEE.

Distributed IDSs for enhancing security in mobile wireless sensor networks.

Inverardi, P., Mostarda, L. and Navarra, A. 2006. Distributed IDSs for enhancing security in mobile wireless sensor networks. 20th International Conference on Advanced Information Networking and Applications (AINA). IEEE. pp. 116-120 https://doi.org/10.1109/AINA.2006.145

Synthesis of correct and distributed adaptors for component-based systems: an automatic approach.

Inverardi, P., Mostarda, L., Tivoli, M. and Autili, M. 2005. Synthesis of correct and distributed adaptors for component-based systems: an automatic approach. IEEE. pp. 405-409
  • 62
    total views of outputs
  • 2
    total downloads of outputs
  • 1
    views of outputs this month
  • 1
    downloads of outputs this month