Computer Networks and Communications
Analysis and evaluation of SafeDroid v2.0, a framework for detecting malicious Android applications
Android smartphones have become a vital component of the daily routine of millions of people, running a plethora of applications available in the official and alternative marketplaces. Although there are many security mechanisms to scan and filter malicious applications, malware is still able to reach the devices of many end-users. In this paper, we introduce the SafeDroid v2.0 framework, that is a flexible, robust, and versatile open-source solution for statically analysing Android applications, based on machine learning techniques.
DDoS-Capable IoT Malwares: comparative analysis and Mirai Investigation
The Internet of Things (IoT) revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable objects. Not surprisingly, this sudden flooding of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS) attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks.
Mobile cloud performance evaluation using stochastic models
Mobile Cloud Computing (MCC) helps increasing performance of intensive mobile applications by offloading heavy tasks to cloud computing infrastructures. The first step in this procedure is partitioning the application into small tasks and identifying those that are better suited for offloading. The method call partitioning strategy splits the code into a set of method calls that are offloaded to remote servers. Quite often, many applications need to make use of multiple servers for parallel processing of intensive computational operations.
Life cycle assessment of photovoltaic implementation: an Italian case study
The energy efficiency is the possibility and ability to carry out a production process consume with the involves of less energy and minor environmental impact. Life Cycle Assessment is one of the major tools involved in the economic, social and environmental evaluation. The aim of this work is the LCA application to an Italian company that provides to install a photovoltaic plant for the energy self-maintenance, in order to break down costs and environmental impacts. The photovoltaic business can be an interesting solution especially for companies which consume more energy during the day.
Visual analysis of sensor logs in smart spaces: Activities vs. situations
Models of human habits in smart spaces can be expressed by using a multitude of representations whose readability influences the possibility of being validated by human experts. Our research is focused on developing a visual analysis pipeline (service) that allows, starting from the sensor log of a smart space, to graphically visualize human habits. The basic assumption is to apply techniques borrowed from the area of business process automation and mining on a version of the sensor log preprocessed in order to translate raw sensor measurements into human actions.
Leveraging Blockchain to Enable Smart-Health Applications
Smart health (s-health) is an emerging paradigm that brings together a whole new range of digital data, both personal and non-personal, in order to deliver a holistic approach to health that overcomes the boundaries of the traditional patient caring system. By including non-personal smart city data, mobile s-health applications can improve prediction, prevention, and prescriptive care, while generating feedback that make cities smarter when accounting for and adapting to individual needs.
Uncertainty Management for Wearable IoT Wristband Sensors Using Laplacian-Based Matrix Completion
Contemporary sensing devices provide reliable mechanisms for continuous process monitoring, accommodating use cases related to mHealth and smart mobility, by generating real-time data streams of numerous physiological and vital parameters. Such data streams can be later utilized by machine learning algorithms and decision support systems to predict critical clinical states and motivate users to adopt behaviours that improve the quality of their life and the society as a whole.
PerCom Workshops 2018 Committees
Welcome to PerCom Workshops 2018 Committees
Design and analysis of adaptive hierarchical low-power long-range networks
A new phase of evolution of Machine-to-Machine (M2M) communication has started where vertical Internet of Things (IoT) deployments dedicated to a single application domain gradually change to multi-purpose IoT infrastructures that service different applications across multiple industries. New networking technologies are being deployed operating over sub-GHz frequency bands that enable multi-tenant connectivity over long distances and increase network capacity by enforcing low transmission rates to increase network capacity.