Angelo Spognardi

Assistant professor
at Computer Science Department
Sapienza University of Rome, Italy

IIT CNR associate
IMT Lucca guest scholar

Address

roomVia Regina Elena 295, Building G, room G28
markunread_mailbox 00161 Rome, Italy
phoneTel. +39 06 4925 5164

Short biography

Angelo Spognardi
is assistant professor at Computer Science department, Sapienza University of Rome, since March 2017.
He has previously been Assistant professor at Section for Embedded Systems Engineering (ESE) Compute DTU, Technical University of Denmark, also collaborating with the DTU IoT Center and the DTU Cyber Security section.
From 2012 to 2015, he has been with a research fellowship at the Information Security Group of the Institute of Informatics and Telematics in Pisa, Italy, part of the Italian National Research Council (CNR). He still also actively collaborates with the Sysma group of the IMT Institute for Advanced Studies of Lucca, Italy.
From 2010 to 2012, Angelo participated to the ExTraBIRE European project, investigating on the resiliency of the Italian infrastructure and on the exterior routing protocols like BGP, in collaboration with the CASPUR consortium (the actual CINECA) as a research fellowship at Computer Science dept. of Sapienza University of Rome, Italy. Here, he also investigated the security of Unattended Wireless Sensor Networks as a research fellowship between 2008 and 2009.
In 2008, Angelo was Post-doctoral researcher at INRIA Rhone-Alpes in Grenoble, France, under the supervision of prof. Claude Castelluccia. He worked within the Planète equipe, investigating the security of Wireless Sensor Networks.
He received his MSc in 2004 and his PhD in Computer Science in 2008 at the Computer Science dept. of Sapienza University of Rome, under the guidance of prof. Luigi V. Mancini. During his PhD he visited several international research center like Universitat Rovira i Virgili of Tarragona, the INRIA in Grenoble and the Computer Science dept. of UCI (University of California Irvine).
His main research activity is focused on information security. In particular: fake phenomenon in Social Media, fake content analysis within review based systems and social networks; analisys of the effects of fake information on evaluation metrics and resilient metrics; fake follower detection on Twitter; system and network security, with a particular emphasis on mobile and resource constrained devices, like Wireless Sensor Networks, mobile devices and RFID systems.
Angelo has been lecturer and assistant of several undergraduate and post-graduate courses, like Network Security, IT Security, Computer Security, Operating Systems, Programming Languages. He followed many master students during his research activity and has been in the TC committee of several international conferences. He also participated to other European projects like Web-Minds (Wide-scalE, Broadband, MIddleware for Network Distributed Services) and Ubisec & Sens (Ubiquitous Sensing and Security in the European Homelands).

Social network anomaly detection

Techniques and experiments to discriminate between anomalous accounts like the fake followers, bots (mainly the emerging social bots) and spammers.

  • Thesis available!!

Information reliability

A myriad of websites exists on the Internet: finding reliable information is an issue that quests for solution. We tackle several challenges, like the reliability of reviews, the protection against malicious reviews and the maturity degree of Wikipedia articles.

IoT and WSN security

Efficient security solutions for resource constrained devices

Secure routing

An enhanced version of BGP that leverages Identity Based Cryptography to secure BGP.

Escaping the Filter Bubble

Use the web as a black-box and study its output to understand and determine the amount of personalization actualized by Web service providers.

Mobile network user profiling

We face a challenging scenario that considers profiling users without the traffic payload, without opening encrypted traffic and, in addition, when the user is behind NAT.

Network anomaly detection

The study of the possible metrics for netflow records, exploiting a real time framework able to process thousands of records per seconds.

Twitter formalization

A formal approach to model interactions among Twitter accounts, to clearly and precisely determine the effects of actions performed by Twitter accounts, such as post, retweet, reply to or delete tweets.

Cryptofraglets

Cryptofraglets resemble the chemical reactions in living organisms and can be adopted to specify and concretely analyze secure protocols, like the ones adopted in RFID systems or Wireless Sensor Networks.

Research interests

Social network anomaly detection
Twitter pirate During the election challenger Romney experienced a sudden campaign, the Twitter account of jump in the number of followers, which, later, have been proved to be made of many "fake". The fake followers on Twitter correspond to accounts that exhibit "non-human" characteristics, with the purpose to increase the number of followers of a different account.
In collaboration with the Wafi group of IIT, we are working on a detection engine for Twitter followers able to discriminate between anomalous accounts like the fake followers, but also bots and spammers.
Information reliability
Check of quality A myriad of health-related websites exists on the Internet: finding reliable information is an issue that quests for solution. For example, a recent report by IMS Health showed that 50% of surveyed physicians who use the Internet have consulted Wikipedia for medical information. However, Wikipedia medicine articles has not received much attention by Academia and it presents open distinctive challenges. Our research activity tries to assess the maturity of Wikipedia medicine articles combining quantitative features with a qualitative decision protocol and proposing the maturity degree as a measure of content level, stability, and structural properties. Our research proposal is based on the well known decision protocol Analytic Hierarchy Process (AHP), exploiting its ability to evaluate the relevance of any possible alternative.
IoT and WSN security
A Wireless SensorThe evolution of the Computer Science is changing our lives: as opposite to the application of powerful server wired together to provide many applications to scientist and Internet surfers, the miniaturization of computers in tiny devices with reduced capability is opening the new era of the ubiquitous computing, the Internet-of-things (IoT). In this new scenario, Wireless Sensor Networks and RFID systems play a central role, opening unimaginable possibilities, but also big security challenges. Our research activity is mainly focused on providing efficient solutions specifically suited for such resource constrained devices for their security requirements, like confidentiality (cryptographic key management), integrity (clone and intrusion detection, RFID counterfeiting) and availability (redundancy and replication).
Secure routing
A computer network topology Routing information are exchanged by Autonomous System routers using the Border Gateway Protocol (BGP), the de-facto standard protocol for inter-domain routing. However, the lack of security mechanisms expose BGP to a wide range of threats that are constantly undermining security of the Internet. Most prominent attacks include prefix hijacking and announcement of false routes to maliciously attract or divert traffic. Most of the security proposals advanced for BGP rely on digital signatures to authorize Autonomous Systems to propagate route announcements. Together with the security group of Dept. of Computer Science of Sapienza Università di Roma, we proposed an enhanced version of BGP that leverages Identity Based Cryptography to secure BGP, introducing only a constant overhead to verify authenticity of routes and without the requirement of a Public Key Infrastructure.
Escaping the Filter Bubble
The filter bubbleAccessing the information spread in the Web nowadays cannot be imagined without the use of Web services like Facebook, Bing, Google Web Search or Yahoo! Search. This is particularly true for any website: being on the first page of a query results means to have a great advantage against competing websites. Recently, major search engines started implementing a personalization of the results, where different users searching for the same terms may observe different results. Eli Pariser demonstrated how personalization in Facebook and Google could change the perception of the world and called this phenomenon the Filter Bubbles.
In collaboration with the IIT-CNR of Pisa and the IMT Lucca, we are interested on understand the amount of personalization that the Web services actualize and at which extent it can impact on the unaware users.
Mobile network user profiling
User fingerpring on his smartphoneUser tracking on Internet is considered an easy task when there is the availability of traffic payloads and timing. A much more challenging scenario is the one that considers profiling users without the traffic payload, without opening encrypted traffic and, in addition, when the user is behind NAT. With the help of Hidden Markov Models it is possible to build trained classifiers able tofingerprint and track user in such a harsh setting. In a joint effort with the security group of Dept. of Computer Science of Sapienza Università di Roma, we are investigating how to enhance our classifiers, improving its detection ability and evaluating its correlation with the amount of training traffic.
Network anomaly detection
Plot with spikesDetection and mitigation of (D)DoS attacks is still an open challenge, because of their artlessness and simplicity: the attacking entities can be botnets of unaware compromised hosts, but also volunteers attackers that want to express their disagreement against private companies or public entities (the so calledhacktivism). With the collaboration of thesecurity group of Dept. of Computer Science of Sapienza Università di Roma, we are applying information theory based metrics to detect network anomalies. We are studying several possible metrics on a real dataset of netflow records, exploiting a real time framework able to process thousands of records per seconds. We are able to provide evidences of DDoS and DoS attacks and we are actually studying which metrics are more effective for detection purposes.
Twitter formalization
Diagram with Twitter user interactionsTwitter has shown to be a precious platform for reliable communications in emergency (like the earthquake of Haiti 2011) and for mass coordination (like the Twitter Revolution). This use of Twitter in cooperative, possibly critical, setting calls for a more precise awareness of the dynamics regulating message spreading. To this aim, collaborating with the IMT Lucca we are proposing a formal approach to model interactions among Twitter accounts. It allows users to clearly and precisely determine the effects of actions performed by Twitter accounts, such as post, retweet, reply to or delete tweets. In fact, despite the apparent easiness and simplicity of Twitter interactions, the achievement of a full user experience-awareness on Twitter should not be given for granted: the effects of (a sequence of) Twitter interactions could be, indeed, subtle.
Cryptofraglets
Molecular operations Fraglets represent an execution model for communication protocols that resembles the chemical reactions in living organisms. The strong connection between their way of transforming and reacting and formal rewriting systems makes a fraglet program amenable to automatic verification. The model can be enriched and executed to specify security protocols and properties (leading to the definition of cryptofraglets). Practical examples can be provided: for example cryptofraglets can be adopted to specify and concretely analyze secure protocols, like the ones adopted in RFID systems or Wireless Sensor Networks.

Journals

  • J15. A Study on Text-Score Disagreement in Online Reviews with M. Fazzolari, V. Cozza and M. Petrocchi
    In Springer Cognitive Computation, Volume 9(5), pages. 689-701, October 2017
    star
  • J14. A language-based approach to modelling and analysis of Twitter interactions with A. Maggi, M. Petrocchi and F. Tiezzi.
    In Elsevier Journal of Logical and Algebraic Methods in Programming, Volume 87 February 2017 Pages 67-91.
    star
  • J13. DNA-Inspired Online Behavioral Modeling and Its Application to Spambot Detection with S. Cresci, R. Di Pietro, M. Petrocchi, M. Tesconi.
    In IEEE Intelligent Systems, Volume 31 Issue 5 September-October 2016.
    star
  • J12. Social Fingerprinting - or the Truth About You with S. Cresci, R. Di Pietro, M. Petrocchi and M. Tesconi.
    In ERCIM News Special theme: Cybersecurity., Vol 106 July 2016.
    star
  • J11. Bioinspired Security Analysis of Wireless Protocols with M. Petrocchi, P. Santi.
    In Mobile Networks and Applications, Volume 21 Issue 1 February 2016 pages 139-148.
    star
  • J10. Fame for sale: efficient detection of fake Twitter followers with S. Cresci, R. Di Pietro, M. Petrocchi, M. Tesconi.
    In Elsevier Decision Support Systems, Volume 80 December 2015 pages 56-71.
    star
  • J09. Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers with G. Ateniese, L. V. Mancini, D. Vitali, A. Villani, G. Felici.
    In Inderscience International Journal on Security andNetworks, January 2015 Vol 10 Issue 3 pages137-150.
    star
  • J08. Large-Scale Traffic Anomaly Detection: Analysis of Real Netflow Datasets with D. Vitali, A. Villani, R. Battistoni and L. V. Mancini.
    In Springer E-Business and Telecommunications: Communications in Computer and Information Science, 2014. LNCS 455, September 2014 pages 192-208.
    star
  • J07. Discriminating Between the Wheat and the Chaff in Online Recommendation Systems with R. Di Pietro, M. Petrocchi and M. Tesconi.
    In ERCIM News Special theme: Linked Open Data., Vol 96 January 2014
    star
  • J06. Clone Wars: Distributed Detection of Clone Attack in Mobile WSNs with M. Conti, R. Di Pietro.
    In Elsevier Journal of Computer and System Sciences, special issue on Wireless Networks Intrusion, Vol 80 Issue 3 April 2013 pages 654-669.
    star
  • J05. Intrusion-resilient Integrity in Data-Centric Unattended WSNs with R. Di Pietro, C. Soriente, G. Tsudik.
    In Elsevier Pervasive and Mobile Computing., Volume 7 Issue 4 August 2011 pages 495-508.
    star
  • J04. Who counterfeited my Viagra? (Probabilistic item removal detection via RFID tag cooperation) with M. Conti, R. Di Pietro.
    In EURASIP Journal on Wireless Communications and Networking, special issue on Security and Resilience for Smart Devices and Applications. , Volume 2011 (2011).
    star
  • J03. eRIPP-FS: Enforcing Privacy and Security in RFID with M. Conti, R. Di Pietro, L. V. Mancini.
    In Wiley-Blackwell Security and Communication Networks Journal., Voume 3 Issue 1 January/February 2010 pages 58-70.
    star
  • J02. Playing Hide-and-Seek with a Focused Mobile Adversary in Unattended Wireless Sensor Networks with R. Di Pietro, L. V. Mancini, C. Soriente, G. Tsudik.
    In Elsevier Journal Ad-Hoc Networks., Volume 7 Issue 8 November 2009 pages 1463-1475.
    star
  • J01. Data Security in Unattended Sensor Networks with R. Di Pietro, L. V. Mancini, C. Soriente, G. Tsudik.
    In IEEE Transactions on Computers, Special Issue on Autonomic Network Computing., Volume 58 Issue 11 November 2009 pages 1500-1511.
    star

Conferences

  • C35. Exploiting digital DNA for the analysis of similarities in Twitter behaviours with with S. Cresci, R. Di Pietro, M. Petrocchi, M. Tesconi.
    In 4th IEEE International Conference on Data Science and Advanced Analytics - DSAA2017, 19-21 October 2017, Tokyo Japan.
    star
  • C34. Analysis of DDoS-Capable IoT Malwares with with M. De Donno, N. Dragoni and A. Giaretta
    In Proceedings of 1st IEEE International Conference on Security, Privacy, and Trust (INSERT), 3-6 September 2017, Prague, Czech Republic.
    star
  • C33. A Taxonomy of Distributed Denial of Service Attacks with with M. De Donno, N. Dragoni and A. Giaretta
    In In Proceedings of the International Conference on Information Society (i-Society), 2017, IEEE.
    star
  • C32. Security Flaws in OAuth 2.0 Framework: A Case Study with with M. Argyriou and N. Dragoni.
    In proceedings of 3nd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2017), 12 September 2017 Trento Italy.
    star
  • C31. The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race, with with S. Cresci, R. Di Pietro, M. Petrocchi, M. Tesconi.
    In proceedings of the 26th International World Wide Web Conference, 2017 (WWW'2017) alt-track on WebSci, 3-7 April 2017 Perth Australia.
    star
  • C30. Security And Privacy Issues in Healthcare Monitoring Systems: A Case Study with D. T. Handler, L. Hauge and N. Dragoni.
    In proceedings of 10th International Conference on Health Informatics (HEALTHINF 2017) at BIOSTEC 2017, 21-23 February 2017 Porto Portugal.
    star
  • C29. SafeDroid: A Distributed Malware Detection Service for Android with R. Goyal, N. Dragoni and M. Argyriou.
    In proceedings of 9th IEEE International Conference on Service-Oriented Computing and Applications (IEEE SOCA 2016), 4-6 November 2016 Macau China.
    star
  • C28. A matter of words: NLP for quality evaluation of Wikipedia medical articles with V. Cozza, M. Petrocchi.
    In proceedings of 16th International Conference on Web Engineering (ICWE2016), June 6-9 2016 Lugano Switzerland.
    star
  • C27. Evaluation of Professional Cloud Password Management Tools with D. Schougaard, N. Dragoni.
    In proceedings of 2nd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2016), June 6-9 2016 Lugano Switzerland.
    star
  • C26. Experimental measures of news personalization in Google News with V. Cozza, V. T. Hoang, M. Petrocchi.
    In proceedings of 2nd International Workshop on Mining the Social Web (SoWeMine 2016), June 6-9 2016 Lugano Switzerland.
    star
  • C25. Mind The Tracker You Wear - A Security Analysis of Wearable Health Trackers with R. Goyal, N. Dragoni.
    In proceedings of 31th ACM/SIGAPP Symposium On Applied Computing, Health-Healthcare (ACM SAC 2016), April 4-8 2016 Pisa Italy.
    star
  • C24. TRAP: using TaRgeted Ads to unveil Google personal Profiles with M. Conti, V. Cozza, M. Petrocchi.
    In proceedings of the 7th IEEE International Workshop on Information Forensics and Security (IEEE WIFS 2015), November 16-19 2015 Rome Italy.
    star
  • C23. VISIO: Visual Approach for Singularity Detection in Recommendation Systems with A. Colantonio, R. Di Pietro, M. Petrocchi.
    In proceedings of 12th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2015), September 2015, Valencia, Spain.
    star
  • C22. Twitlang(er): interactions modeling language (and interpreter) for Twitter with R. De Nicola, A. Maggi, M. Petrocchi, F. Tiezzi.
    In proceedings of 13th International Conference on Software Engineering and Formal Methods (SEFM 2015)., September 2015 York United Kingdom.
    star
  • C21. Domain-specific queries and Web search personalization: some investigations with V. T. Hoang, R. De Nicola, F. Tiezzi, M. Petrocchi.
    In proceedings of 11th Workshop on Automated Specification and Verification of Web Systems (WWV 2015)., June 2015 Oslo Norway
    star
  • C20. Visual Detection of Singularities in Review Platforms with A. Colantonio, R. Di Pietro, M. Petrocchi.
    In proceedings of 30th ACM/SIGAPP Symposium On Applied Computing - Multimedia & Visualization (ACM SAC 2015, MMV)., April 2015 Salamanca Spain (poster)
    star
  • C19. Cryptofraglets reloaded: Bioinspired Security Modeling of a RFID Protocol and Properties with M. Petrocchi, P. Santi.
    In proceedings of 8th International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), Bio-inspired Wireless Network Security., December 2014 Boston Massachusetts USA.
    star
  • C18. Improved Automatic Maturity Assessment of Wikipedia Medical Articles with R. Conti, E. Marzini, I. Matteucci, P. Mori, M. Petrocchi.
    In proceedings of 13th International Conference on Ontologies, DataBases, and Applications of Semantics (ODBASE 2014), October 2014 Amantea Italy.
    star
  • C17. A Lot of Slots (outliers confinement in review-based systems) with R. Di Pietro, M. Petrocchi.
    In proceedings of 15th International Conference on Web Information System Engineering (WISE 2014), October 2014 Thessaloniki Greece.
    star
  • C16. A Criticism to Society (as seen by Twitter analytics) with S. Cresci, R Di Pietro, M. Petrocchi, M. Tesconi. In The
    In First International Workshop on Big Data Analytics for Security (DASec), June 2014 Madrid Spain.
    star
  • C15. No NAT'd User left Behind: Fingerprinting Users behind NAT from NetFlow Records alone with N. Verde, E. Gabrielli, G. Ateniese, L. V. Mancini.
    In 34th International Conference on Distributed Computing Systems (ICDCS 2014), June 2014 Madrid Spain.
    star
  • C14. Maturity assessment of Wikipedia medical articles with R. Conti, E. Marzini, I. Matteucci, P. Mori, M. Petrocchi.
    In 27th International Symposium on Computer-Based Medical Systems (CBMS 2014), May 2014 New York USA.
    star
  • C13. DDoS detection with information theory metrics and netflows: a real case with D. Vitali, A.Villani, R. Battistoni and L. V. Mancini.
    In 9th International Conference on Security and Cryptography (Secrypt 2012), July 2012 Rome Italy.
    star
  • C12. Relieve Internet Routing security of Public Key Infrastructure with C. Soriente, D. Vitali, A. Villani and L. V. Mancini.
    In 21th IEEE International Conference on Computer Communication Networks (ICCCN 2012), July 2012 Munich Germany.
    star
  • C11. Wireless Sensor Replica Detection in Mobile Environments with M. Conti, R. Di Pietro.
    In 13th International Conference On Distributed Computing And Networking (ICDCN 2012), Jenuary 2012 Hong Kong China.
    star
  • C10. MhRep: Multi-hop Replication Scheme for Data Survival in Unattended Wireless Sensor Networks with D. Vitali, L. V. Mancini and A. Villani.
    In Dependable Network Computing and Mobile Systems (IEEE DNCMS 2011), October 2011 Madrid Spain.
    star
  • C09. Replication schemes in Unattended Sensor Networks with L. V. Mancini, D. Vitali.
    In New Technology, Mobility and Security (IFIP NTMS 2011) - Security Track, February 2011 Paris France.
    star
  • C08. Collaborative Authentication in Unattended Sensor Networks with R. Di Pietro, C. Soriente, G. Tsudik.
    In ACM Conference on Wireless Network Security (ACM WiSec'09), March 2009 Zurich Swiss.
    star
  • C07. Catch Me (If You Can): Data Survival in Unattended Sensor Networks with R. Di Pietro, L. V. Mancini, C. Soriente, G. Tsudik.
    In IEEE International Conference on Pervasive Computing and Communications (IEEE PerCom'08), March 2008 Hong Kong.
    star
  • C06. FastRIPP: RFID Privacy Preserving protocol with Forward Secrecy and Fast Resynchronization with M. Conti, R. Di Pietro, L. V. Mancini.
    In 33th Annual Conference of the IEEE Industrial Electronics Society (IEEE IECON '07), November 2007 Taipei Taiwan.
    star
  • C05. RoK: a Robust Key Pre-distribution Protocol for Multi-Phase Wireless Sensor Networks with C. Castelluccia.
    In 3rd International Conference on Security and Privacy in Communication Networks (IEEE SecureComm '07), September 2007 Nice France.
    star
  • C04. RIPP-FS: an RFID Identification, Privacy Preserving protocol with Forward Secrecy with M. Conti, R. Di Pietro, L. V. Mancini.
    In 4th IEEE International Workshop on Pervasive Computing and Communication Security (IEEE PerSec '07 - PerCom '07), March 2007 New York USA.
    star
  • C03. A Formal Framework for the performance analysis of P2P networks protocols with R. Di Pietro.
    In 3rd International Workshop On Hot Topics in Peer-to-Peer Systems (IEEE Hot-P2P '06), April 2006 Rhodes Greek.
    star
  • C02. A methodology for P2P file-sharing traffic detection with A. Lucarelli, R. Di Pietro.
    In 2nd International Workshop on Hot Topics in Peer-to-Peer Systems (IEEE Hot-P2P '05), July 2005 San Diego California USA.
    star
  • C01. BaRT, Balanced Randomized Tree: A scalable and distributed protocol for lookup in peer-to- peer networks with R. Di Pietro, L. V. Mancini.
    In 1st International Workshop on Hot Topics in Peer-to-Peer Systems (IEEE Hot-P2P '04), October 2004 Volendam Holland.
    star

Book chapters

  • B01. Advanced Multimodal Frameworks to Support Human-Computer Interaction on Social Computing Environments with D. Avola, A. Del Buono.
    In IGI Global Handbook of Research on Social Computing Theory And Practice: Interdisciplinary Approaches, 2011.
    star

Thesis

  • T01. Secure protocols for resource-constrained devices with ,
    In VDM Verlag Dr Müller Aktiengesellschaft & Co. KG., 2010
    star
Conference speaker:
  • TELERISE 2017, 3nd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, 12 September 2017, Trento Italy. Talk title: "Security Flaws in OAuth 2.0 Framework: A Case Study"
  • IEEE SOCA 2016, 9th IEEE International Conference on Service-Oriented Computing and Applications, 04-06 November 2016, Macau China. Talk title: "SafeDroid: A Distributed Malware Detection Service for Android"
  • TELERISE 2016, 2nd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, 06 June 2016, Lugano, Swiss. Talk title: "Evaluation of Professional Cloud Password Management Tools"
  • Invited spaker at Computer World IoT Conference. 07 June 2016, Århus, Denmark. Talk title: "Energy harvesting sensors: security challenges"
  • WWV 2015, 11th Workshop on Automated Specification and Verification of Web Systems, 23 June 2015, Oslo, Norway. Talk title: "Domain-specific queries and Web search personalization: some investigations"
  • ACM SAC 2015, 30th ACM/SIGAPP Symposium On Applied Computing, 13-17 April 2015, Salamanca, Spain. Talk title: "Visual Detection of Singularities in Review Platforms"
  • ODBASE 2014, 13th International Conference on Ontologies, DataBases, and Applications of Semantics, 27-31 October 2014, Amantea Italy. Talk title: "Improved Automatic Maturity Assessment of Wikipedia Medical Articles"
  • WISE 2014, 15th International Conference on Web Information System Engineering, 12-14 October 2014 Thessaloniki, Greece. Talk title: "A Lot of Slots: outliers confinement in review-based systems"
  • ICDCS 2014, 34nd International Conference on Distributed Computing Systems, 30 June-03 July 2014, Madrid, Spain. Talk title: "No NAT'd User left Behind: Fingerprinting Users behind NAT from NetFlow Records alone"
  • "Conferenza del progetto Europeo ExTrABIRE" - Exchanged Traffic Analysis for a Better Internet Resiliency in Europe, 18 June 2012, Rome, Italy. Talk title: "Internet routing issues and possible mitigation"
  • ICDCN 2012, 13th international conference on Distributed Computing and Networking, 03-06 Jenuary 2012, Hong Kong, Cina. Talk title: "Wireless sensor replica detection in mobile environment".
  • IEEE DNCMS 2011, 4th International Workshop on Dependable Network Computing and Mobile Systems, 07 October 2011 Madrid, Spain. Talk title: "MhRep: Multi-hop Replication Scheme for Data Survival in Unattended Wireless Sensor Networks"
  • "Security of Internet and critical infrastructures: European experiences", 13 June 2011, Rome, Italy. Talk title: "ExTrABIRE Project: Network Simulator Design and Attack Modeler"
  • IFIP NTMS 2011, 4th New Technology, Mobility and Security, 07-10 February 2011, Paris France. Talk title: "Replication schemes in Unattended Sensor Networks"
  • IEEE Hot-P2P '05, 2nd International Workshop on Hot Topics in Peer-to-Peer Systems, 21 June 2005 San Diego California USA. Talk title: "A methodology for P2P file-sharing traffic detection"
  • IEEE Hot-P2P '04, 1st International Workshop on Hot Topics in Peer-to-Peer Systems, 08 October 2004 Volendam Olanda. Talk title: "BaRT, Balanced Randomized Tree: A scalable and distributed protocol for lookup in peer-to-peer networks".
Technical Program Committee memberhip:
  • CYBER 2017, Second International Conference on Cyber-Technologies and Cyber-Systems. November 2017, Barcelona, Spain.
  • UBICOMM 2017, 11th International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies. November 2017, Barcelona, Spain.
  • DSAA 2017, 4th IEEE International Conference on Data Science and Advanced Analytics, October 2017, Tokyo, Japan.
  • IEEE CNS 2017 - SPA, Security and Privacy in digital advertisement (CNS workshop), October 2017, Las Vegas, Nevada, USA.
  • MSE (“Microservices: Science and Engineering”) Workshop of SEFM 2017. September 2017, Trento, Italy.
  • WiSec 2017, 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, July 2017, Boston, Massachusetts, USA.
  • ANT-2017, 8th International Conference on Ambient Systems, Networks and Technologies, May 2017, Madeira, Portugal.
  • ICISSP 2017, 3rd International Conference on Information Systems Security and Privacy, February 2017, Porto, Portugal.
  • CCNC 2017, 14th Annual IEEE Consumer Communications & Networking Conference. Jenuary 2017, Las Vegas, Nevada, USA.
  • ODBASE 2016, On the Move to Meaningful Internet Systems: OTM 2016 Conferences. October 2016, Rhodes, Greece.
  • EUSPN 2016, 7th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, September 2016, London, United Kingdom.
  • ANT-2016, 7th International Conference on Ambient Systems, Networks and Technologies, May 2016, Madrid Spain.
  • ICISSP 2016, 2nd International Conference on Information Systems Security and Privacy, February 2016, Rome, Italy.
  • ODBASE 2015, On the Move to Meaningful Internet Systems: OTM 2015 Conferences. October 2015, Rhodes, Greece.
  • ANT-2014, 5th International Conference on Ambient Systems, Networks and Technologies, June 2014, Hasselt, Belgium.
  • Securecomm 2013, 9th International Conference on Security and Privacy in Communication Networks. September 2013, Sydney, Australia.
  • ANT-2013, 4th International Conference on Ambient Systems, Networks and Technologies, June 2013, Halifax, Nova Scotia, Canada.
  • Securecomm 2012, 8th International Conference on Security and Privacy in Communication Networks. September 2012, Padua, Italy.
  • WiSec 2012, ACM Conference on Security and Privacy in Wireless and Mobile Networks, April 2012, Tucson, Arizona, USA.

Teaching activity

Assistant professor, Dipartimento Informatica, Sapienza

Academic year 2017-18

Assistant professor, DTU Compute (Denmark)

Academic year 2016-17

Academic year 2015-16

Past teaching activity

Adjunct professor, IMT Lucca (Italy)
  • Principles of Network Security, a.y. 2014-15
Assistant professor and lecturer at Sapienza, Università degli studi di Roma, Rome (Italy)
  • Lecturer on the postgraduate diploma class (Master universitario) on Data and network Security (a.y. 2010-11, 2011-12, 2012-13), Computer science Dept.
  • Associate professor for Operating Systems (a.y. 2008-09), Computer science Dept.
  • Assistant professor for Programming Languages 1 and 2 (a.y. 2005-06, 2006-07) and for Operating Systems (a.y. 2008-09, 2009-10, 2010-11, 2011-12), Computer science Dept.
  • Assistant professor for Informatica Generale (a.y. 2010-11), Mathematics Dept.
Lecturer Matematichs Dept., Università di Roma Tre, Rome (Italy)
  • Lecturer for Tecniche Informatiche Avanzate (a.y. 2006-07, 2009-10)
Assistant professor and Lecturer, Università degli studi del Molise, Campobasso (Italy)
  • Lecturer on the postgraduate diploma class (Master universitario) on Computer Science Security and Digital Forensics (a.y. 2009-10)
  • Assistant professor on the C.A.D.R.I. laboratory (a.y. 2009-10, 2010-11, 2011-12)