Alessandra De Benedictis

Publications*

International Conferences

 

A. De Benedictis, A. Gaglione, N. Mazzocca. Securing a Tiered Re-Taskable Sensing System. In: Proceedings of the Sixth International Conference on Information Assurance and Security, IAS 2010, August 23-25, 2010, Atlanta, Georgia, USA. IEEE Computer Society. pp. 260-264.2010. download

 

V. Casola, A. De Benedictis, A. Mazzeo, N. Mazzocca. SeNsIM-SEC: security in heterogeneous sensor networks. In: Proceedings of the Sixth Conference on Network Architectures and Information System Security (SAR-SSI 2011). download

 

V. Casola, A. De Benedictis, A. Drago, N. Mazzocca. Analysis and comparison of security protocols in wireless sensor networks. In 2nd International Workshop on Resilience Assessment of Complex Systems (RACOS 2011). download

 

V. Casola, A. De Benedictis, A. Drago, M. Esposito, F. Flammini and N. Mazzocca. Securing freight trains for hazardous material transportation: a WSN-based monitoring system. In International Defence and Homeland Security Simulation Workshop (DHSS 2012), in cooperation with the I3M 2012 MultiConference, September 19-21 2012, Wien, Austria. download

 

M. Albanese, A. De Benedictis, S. Jajodia, and P. Shakarian. A Probabilistic Framework for Localization of Attackers in MANETs. In: Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS) 2012, September 10-12 2012, Pisa, Italy. download

 

A. De Benedictis, B. Koosha, M. Albanese, and V. Casola. A Probabilistic Framework for Distributed Localization of Attackers in MANETs. In Proceedings of the 9th International Workshop on Security and Trust Management (STM 2013). download

M. Albanese, V. Casola, and A. De Benedictis.
A moving target defense approach for protecting resource-constrained distributed devices. In Proceedings of the 14th IEEE International Conference on Information Reuse and Integration (IRI 2013), San Francisco, USA, August 2013. download


M. Albanese, A. De Benedictis, S. Jajodia, and K. Sun.
A Moving Target Defense Mechanism for MANETs Based on Identity Virtualization. In Proceedings of the 1st IEEE Conference on Communications and Network Security (CNS 2013). download

V. Casola, A. De Benedictis, M. Rak, G. Aversano, and U. Villano.
An SLA-based Approach to Manage Sensor Networks as-a-Service. In Proceedings of the 5th International Conference on Cloud Computing Technology and Science (CloudCom 2013). download


International Journals and Book Chapters

 

A. De Benedictis, A. Gaglione, N. Mazzocca. A Secure Architecture for Re-Taskable Sensing Systems. In: Journal of Information Assurance and Security, Vol. 6, Issue 4, 2011 pp. 240-247. download

 

V. Casola, A. De Benedictis, A. Drago, and N. Mazzocca. SeNsiM-SEC: secure sensor networks integration to monitor rail freight transport.  In the International Journal on System of Systems Engineering 4, no. 3 (2013): 291-316. (Inderscience), Special Issue Situation Awareness: Theory and Methodology. download


M. Albanese,  A. De Benedictis,  S. Jajodia, D. Torrieri.
A Probabilistic Framework for Jammer Identification in MANETs. In Ad Hoc Networks, Available online 27 November 2013, ISSN 1570-8705, http://dx.doi.org/10.1016/j.adhoc.2013.11.007. download


M. Albanese, V. Casola, and A. De Benedictis.
A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices. In Advances in Intelligent and Soft Computing, edited by Springer Verlag. 2013. download


V. Casola, A. De Benedictis, M. Rak, G. Aversano, and U. Villano.
An SLA-based Sensing Brokering Platform to Provide Sensor Networks as-a-Service. Submitted to Int. J. of Business Process Integration and Management.

 

 

Copyright Notice

Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works, must be obtained from the IEEE, ACM, Elsevier or the other copyright holders.
By choosing to view this document, you agree to all provisions of the copyright laws protecting it.