default search action
Massimiliano Albanese
Person information
- affiliation: George Mason University, Fairfax VA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Sarah Alhozaimy, Daniel A. Menascé, Massimiliano Albanese:
Design and modeling of moving target defense in workflow-based applications. Clust. Comput. 27(1): 945-958 (2024) - [j22]Sarah Alhozaimy, Daniel A. Menascé, Massimiliano Albanese:
Resilience and performance quantification of dynamic reconfiguration. Future Gener. Comput. Syst. 160: 120-130 (2024) - [c64]Elijah Bass, Massimiliano Albanese, Marcos Zampieri:
DISC: A Dataset for Information Security Classification. SECRYPT 2024: 175-185 - [c63]Alphaeus Dmonte, Marcos Zampieri, Kevin Lybarger, Massimiliano Albanese, Genya Coulter:
Classifying Human-Generated and AI-Generated Election Claims in Social Media. SECRYPT 2024: 237-248 - [c62]Massimiliano Albanese, Olutola Adebiyi, Frank Onovae:
CVE2CWE: Automated Mapping of Software Vulnerabilities to Weaknesses Based on CVE Descriptions. SECRYPT 2024: 500-507 - [c61]Arka Ghosh, Massimiliano Albanese, Preetam Mukherjee, Amir Alipour-Fanid:
Improving the Efficiency of Intrusion Detection Systems by Optimizing Rule Deployment Across Multiple IDSs. SECRYPT 2024: 536-543 - [i1]Alphaeus Dmonte, Marcos Zampieri, Kevin Lybarger, Massimiliano Albanese, Genya Coulter:
Classifying Human-Generated and AI-Generated Election Claims in Social Media. CoRR abs/2404.16116 (2024) - 2023
- [j21]Massimiliano Albanese, Ibifubara Iganibo, Olutola Adebiyi:
A framework for designing vulnerability metrics. Comput. Secur. 132: 103382 (2023) - [j20]Emanuela Marasco, Massimiliano Albanese, Venkata Vamsi Ram Patibandla, Anudeep Vurity, Sumanth Sai Sriram:
Biometric multi-factor authentication: On the usability of the FingerPIN scheme. Secur. Priv. 6(1) (2023) - [j19]Ibifubara Iganibo, Massimiliano Albanese, Marc Mosko, Eric Bier, Alejandro E. Brito:
An attack volume metric. Secur. Priv. 6(4) (2023) - [c60]Olutola Adebiyi, Massimiliano Albanese:
Towards Usable Scoring of Common Weaknesses. SECRYPT 2023: 183-191 - [e3]Sokratis K. Katsikas, Frédéric Cuppens, Christos Kalloniatis, John Mylopoulos, Frank Pallas, Jörg Pohle, M. Angela Sasse, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Jorge Maestre Vidal, Marco Antonio Sotelo Monge, Massimiliano Albanese, Basel Katt, Sandeep Pirbhulal, Ankur Shukla:
Computer Security. ESORICS 2022 International Workshops - CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13785, Springer 2023, ISBN 978-3-031-25459-8 [contents] - 2022
- [c59]Massimiliano Albanese, Karin Johnsgard, Vipin Swarup:
A Formal Model for Credential Hopping Attacks. ESORICS (1) 2022: 367-386 - [c58]Ibifubara Iganibo, Massimiliano Albanese, Kaan Turkmen, Thomas R. Campbell, Marc Mosko:
Mason Vulnerability Scoring Framework: A Customizable Framework for Scoring Common Vulnerabilities and Weaknesses. SECRYPT 2022: 215-225 - 2021
- [j18]Warren Connell, Daniel A. Menascé, Massimiliano Albanese:
Performance Modeling of Moving Target Defenses with Reconfiguration Limits. IEEE Trans. Dependable Secur. Comput. 18(1): 205-219 (2021) - [c57]Ibifubara Iganibo, Massimiliano Albanese, Marc Mosko, Eric Bier, Alejandro E. Brito:
Vulnerability Metrics for Graph-based Configuration Security. SECRYPT 2021: 259-270 - 2020
- [j17]Massimiliano Albanese, Alessandra De Benedictis, Douglas D. J. de Macedo, Fabrizio Messina:
Security and trust in cloud application life-cycle management. Future Gener. Comput. Syst. 111: 934-936 (2020) - [c56]Luan Huy Pham, Massimiliano Albanese, Ritu Chadha, Cho-Yu Jason Chiang, Sridhar Venkatesan, Charles A. Kamhoua, Nandi Leslie:
A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses. CNS 2020: 1-9 - [c55]Hamed Soroush, Massimiliano Albanese, Milad Asgari Mehrabadi, Ibifubara Iganibo, Marc Mosko, Jason H. Gao, David J. Fritz, Shantanu Rane, Eric Bier:
SCIBORG: Secure Configurations for the IoT Based on optimization and Reasoning on Graphs. CNS 2020: 1-10 - [c54]Emanuela Marasco, Massimiliano Albanese:
FingerPIN: An Authentication Mechanism Integrating Fingerprints and Personal Identification Numbers. CVIP (1) 2020: 500-511
2010 – 2019
- 2019
- [p12]Massimiliano Albanese, Warren Connell, Sridhar Venkatesan, George Cybenko:
Moving Target Defense Quantification. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 94-111 - [p11]Massimiliano Albanese, Sushil Jajodia, Sridhar Venkatesan, George Cybenko, Thanh Hong Nguyen:
Adaptive Cyber Defenses for Botnet Detection and Mitigation. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 156-205 - [p10]Benjamin W. Priest, George Cybenko, Satinder Singh, Massimiliano Albanese, Peng Liu:
Online and Scalable Adaptive Cyber Defense. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 232-261 - [e2]Massimiliano Albanese, Ross Horne, Christian W. Probst:
Graphical Models for Security - 6th International Workshop, GraMSec@CSF 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers. Lecture Notes in Computer Science 11720, Springer 2019, ISBN 978-3-030-36536-3 [contents] - 2018
- [j16]Massimiliano Albanese, Sushil Jajodia, Sridhar Venkatesan:
Defending from Stealthy Botnets Using Moving Target Defenses. IEEE Secur. Priv. 16(1): 92-97 (2018) - [j15]Sridhar Venkatesan, Massimiliano Albanese, Cho-Yu Jason Chiang, Angelo Sapello, Ritu Chadha:
DeBot: A novel network-based mechanism to detect exfiltration by architectural stealthy botnets. Secur. Priv. 1(6) (2018) - [c53]Massimiliano Albanese:
From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field. From Database to Cyber Security 2018: 1-23 - [c52]Massimiliano Albanese, Dijiang Huang:
MTD 2018: 5th ACM Workshop on Moving Target Defense (MTD). CCS 2018: 2175-2176 - [c51]Luan Huy Pham, Massimiliano Albanese, Benjamin W. Priest:
A Quantitative Framework to Model Advanced Persistent Threats. ICETE (2) 2018: 448-459 - [c50]Shridatt Sugrim, Sridhar Venkatesan, Jason A. Youzwak, Cho-Yu Jason Chiang, Ritu Chadha, Massimiliano Albanese, Hasan Cam:
Measuring the Effectiveness of Network Deception. ISI 2018: 142-147 - [c49]Cho-Yu Jason Chiang, Sridhar Venkatesan, Shridatt Sugrim, Jason A. Youzwak, Ritu Chadha, Edward I. Colbert, Hasan Cam, Massimiliano Albanese:
On Defensive Cyber Deception: A Case Study Using SDN. MILCOM 2018: 110-115 - [e1]Massimiliano Albanese, Dijiang Huang:
Proceedings of the 5th ACM Workshop on Moving Target Defense, CCS 2018, Toronto, ON, Canada, October 15, 2018. ACM 2018, ISBN 978-1-4503-6003-6 [contents] - 2017
- [c48]Warren Connell, Daniel A. Menascé, Massimiliano Albanese:
Performance Modeling of Moving Target Defenses. MTD@CCS 2017: 53-63 - [c47]Sridhar Venkatesan, Massimiliano Albanese, Ankit Shah, Rajesh Ganesan, Sushil Jajodia:
Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning. MTD@CCS 2017: 75-85 - [c46]Warren Connell, Massimiliano Albanese, Sridhar Venkatesan:
A Framework for Moving Target Defense Quantification. SEC 2017: 124-138 - [p9]Massimiliano Albanese, Nancy J. Cooke, González Coty, David Hall, Christopher G. Healey, Sushil Jajodia, Peng Liu, Michael D. McNeese, Peng Ning, Douglas S. Reeves, V. S. Subrahmanian, Cliff Wang, John Yen:
Computer-Aided Human Centric Cyber Situation Awareness. Theory and Models for Cyber Situation Awareness 2017: 3-25 - [p8]Sushil Jajodia, Massimiliano Albanese:
An Integrated Framework for Cyber Situation Awareness. Theory and Models for Cyber Situation Awareness 2017: 29-46 - 2016
- [j14]Mengyuan Zhang, Lingyu Wang, Sushil Jajodia, Anoop Singhal, Massimiliano Albanese:
Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks. IEEE Trans. Inf. Forensics Secur. 11(5): 1071-1086 (2016) - [c45]Sridhar Venkatesan, Massimiliano Albanese, George Cybenko, Sushil Jajodia:
A Moving Target Defense Approach to Disrupting Stealthy Botnets. MTD@CCS 2016: 37-46 - [c44]Mason Wright, Sridhar Venkatesan, Massimiliano Albanese, Michael P. Wellman:
Moving Target Defense against DDoS Attacks: An Empirical Game-Theoretic Analysis. MTD@CCS 2016: 93-104 - [c43]Sridhar Venkatesan, Massimiliano Albanese, Kareem Amin, Sushil Jajodia, Mason Wright:
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures. CNS 2016: 198-206 - [c42]Luan Huy Pham, Massimiliano Albanese, Sridhar Venkatesan:
A quantitative risk assessment framework for adaptive Intrusion Detection in the cloud. CNS 2016: 489-497 - [c41]Massimiliano Albanese, Sushil Jajodia, R. Jhawa, Vincenzo Piuri:
Dependable and Resilient Cloud Computing. SOSE 2016: 3 - [p7]Massimiliano Albanese, Ermanno Battista, Sushil Jajodia:
Deceiving Attackers by Creating a Virtual Attack Surface. Cyber Deception 2016: 169-201 - 2015
- [c40]Sridhar Venkatesan, Massimiliano Albanese, Sushil Jajodia:
Disrupting stealthy botnets through strategic placement of detectors. CNS 2015: 95-103 - [c39]Massimiliano Albanese, Ermanno Battista, Sushil Jajodia:
A deception based approach for defeating OS and service fingerprinting. CNS 2015: 317-325 - [p6]Sepideh Deliri, Massimiliano Albanese:
Security and Privacy Issues in Social Networks. Data Management in Pervasive Systems 2015: 195-209 - 2014
- [b2]Lingyu Wang, Massimiliano Albanese, Sushil Jajodia:
Network Hardening - An Automated Approach to Improving Network Security. Springer Briefs in Computer Science, Springer 2014, ISBN 978-3-319-04611-2, pp. 1-60 - [j13]Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Don J. Torrieri:
A probabilistic framework for jammer identification in MANETs. Ad Hoc Networks 14: 84-94 (2014) - [j12]Massimiliano Albanese, Cristian Molinaro, Fabio Persia, Antonio Picariello, V. S. Subrahmanian:
Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data. IEEE Trans. Knowl. Data Eng. 26(3): 577-594 (2014) - [c38]Massimiliano Albanese, Ermanno Battista, Sushil Jajodia, Valentina Casola:
Manipulating the attacker's view of a system's attack surface. CNS 2014: 472-480 - [c37]Lingyu Wang, Mengyuan Zhang, Sushil Jajodia, Anoop Singhal, Massimiliano Albanese:
Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks. ESORICS (2) 2014: 494-511 - [c36]Paulo Shakarian, Nimish Kulkarni, Massimiliano Albanese, Sushil Jajodia:
Keeping Intruders at Bay: A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions. ICETE (Selected Papers) 2014: 191-211 - [c35]Vittoria Aiello, Parnian Najafi Borazjani, Ermanno Battista, Massimiliano Albanese:
Next-generation technologies for preventing accidental death of children trapped in parked vehicles. IRI 2014: 508-513 - [c34]Paulo Shakarian, Damon Paulo, Massimiliano Albanese, Sushil Jajodia:
Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions. SECRYPT 2014: 19-30 - [p5]Massimiliano Albanese, Sushil Jajodia, Ravi Jhawar, Vincenzo Piuri:
Securing Mission-Centric Operations in the Cloud. Secure Cloud Computing 2014: 239-259 - [p4]Massimiliano Albanese, Robert F. Erbacher, Sushil Jajodia, Cristian Molinaro, Fabio Persia, Antonio Picariello, Giancarlo Sperlì, V. S. Subrahmanian:
Recognizing Unexplained Behavior in Network Traffic. Network Science and Cybersecurity 2014: 39-62 - [p3]Massimiliano Albanese, Hasan Çam, Sushil Jajodia:
Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance. Cybersecurity Systems for Human Cognition Augmentation 2014: 47-60 - [p2]Massimiliano Albanese, Sushil Jajodia:
Formation of Awareness. Cyber Defense and Situational Awareness 2014: 47-62 - 2013
- [j11]Massimiliano Albanese, Andrea Pugliese, V. S. Subrahmanian:
Fast Activity Detection: Indexing for Temporal Stochastic Automaton-Based Activity Models. IEEE Trans. Knowl. Data Eng. 25(2): 360-373 (2013) - [j10]Massimiliano Albanese, Antonio d'Acierno, Vincenzo Moscato, Fabio Persia, Antonio Picariello:
A Multimedia Recommender System. ACM Trans. Internet Techn. 13(1): 3:1-3:32 (2013) - [c33]Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Kun Sun:
A moving target defense mechanism for MANETs based on identity virtualization. CNS 2013: 278-286 - [c32]Massimiliano Albanese, Sushil Jajodia, Ravi Jhawar, Vincenzo Piuri:
Reliable mission deployment in vulnerable distributed systems. DSN Workshops 2013: 1-8 - [c31]Massimiliano Albanese:
Measuring Trust in Big Data. ICA3PP (2) 2013: 241-248 - [c30]Massimiliano Albanese, Sushil Jajodia, Anoop Singhal, Lingyu Wang:
An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities. ICETE (Selected Papers) 2013: 322-340 - [c29]Valentina Casola, Alessandra De Benedictis, Massimiliano Albanese:
A moving target defense approach for protecting resource-constrained distributed devices. IRI 2013: 22-29 - [c28]Valentina Casola, Alessandra De Benedictis, Massimiliano Albanese:
A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices. IRI (best papers) 2013: 299-324 - [c27]Massimiliano Albanese, Sushil Jajodia, Anoop Singhal, Lingyu Wang:
An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities. SECRYPT 2013: 207-218 - [c26]Alessandra De Benedictis, Behzad Koosha, Massimiliano Albanese, Valentina Casola:
A Probabilistic Framework for Distributed Localization of Attackers in MANETs. STM 2013: 49-64 - [c25]Massimiliano Albanese, Sushil Jajodia, Cristian Molinaro:
A Logic Framework for Flexible and Security-Aware Service Composition. UIC/ATC 2013: 337-346 - [c24]Sepideh Deliri, Massimiliano Albanese:
Security-Aware Scheduling of Mission Tasks under Temporal Constraints. UIC/ATC 2013: 452-457 - 2012
- [c23]Massimiliano Albanese, Sushil Jajodia, Steven Noel:
Time-efficient and cost-effective network hardening using attack graphs. DSN 2012: 1-12 - [c22]Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Paulo Shakarian:
A Probabilistic Framework for Localization of Attackers in MANETs. ESORICS 2012: 145-162 - 2011
- [j9]Massimiliano Albanese, Antonio d'Acierno, Vincenzo Moscato, Fabio Persia, Antonio Picariello:
A Novel Strategy for Recommending Multimedia Objects and its Application in the Cultural Heritage Domain. Int. J. Multim. Data Eng. Manag. 2(4): 1-18 (2011) - [c21]Massimiliano Albanese, Matthias Broecheler, John Grant, Maria Vanina Martinez, V. S. Subrahmanian:
PLINI: A Probabilistic Logic Program Framework for Inconsistent News Information. Logic Programming, Knowledge Representation, and Nonmonotonic Reasoning 2011: 347-376 - [c20]Massimiliano Albanese, Sushil Jajodia, Andrea Pugliese, V. S. Subrahmanian:
Scalable Detection of Cyber Attacks. CISIM 2011: 9-18 - [c19]Massimiliano Albanese, Sushil Jajodia, Andrea Pugliese, V. S. Subrahmanian:
Scalable Analysis of Attack Scenarios. ESORICS 2011: 416-433 - [c18]Massimiliano Albanese, Cristian Molinaro, Fabio Persia, Antonio Picariello, V. S. Subrahmanian:
Finding "Unexplained" Activities in Video. IJCAI 2011: 1628-1634 - [c17]Sushil Jajodia, Steven Noel, Pramod Kalapa, Massimiliano Albanese, John Williams:
Cauldron mission-centric cyber situational awareness with defense in depth. MILCOM 2011: 1339-1344 - [c16]Massimiliano Albanese, Antonio d'Acierno, Vincenzo Moscato, Fabio Persia, Antonio Picariello:
A Multimedia Semantic Recommender System for Cultural Heritage Applications. ICSC 2011: 403-410 - 2010
- [j8]Massimiliano Albanese, Angelo Chianese, Antonio d'Acierno, Vincenzo Moscato, Antonio Picariello:
A multimedia recommender integrating object features and user behavior. Multim. Tools Appl. 50(3): 563-585 (2010) - [j7]Massimiliano Albanese, Rama Chellappa, Naresh P. Cuntoor, Vincenzo Moscato, Antonio Picariello, V. S. Subrahmanian, Octavian Udrea:
PADS: A Probabilistic Activity Detection Framework for Video Data. IEEE Trans. Pattern Anal. Mach. Intell. 32(12): 2246-2261 (2010) - [c15]Massimiliano Albanese, Antonio d'Acierno, Vincenzo Moscato, Antonio Picariello:
Capturing user behavior in multimedia recommenders. CBMI 2010: 1-6 - [c14]Massimiliano Albanese, Antonio d'Acierno, Vincenzo Moscato, Fabio Persia, Antonio Picariello:
A ranking method for multimedia recommenders. CIVR 2010: 311-318 - [c13]Massimiliano Albanese, Antonio d'Acierno, Vincenzo Moscato, Fabio Persia, Antonio Picariello:
Modeling recommendation as a social choice problem. RecSys 2010: 329-332 - [p1]Massimiliano Albanese, Pavan K. Turaga, Rama Chellappa, Andrea Pugliese, V. S. Subrahmanian:
Semantic Video Content Analysis. Video Search and Mining 2010: 147-176
2000 – 2009
- 2008
- [j6]Massimiliano Albanese, Rama Chellappa, Naresh P. Cuntoor, Vincenzo Moscato, Antonio Picariello, V. S. Subrahmanian, Octavian Udrea:
A Constrained Probabilistic Petri Net Framework for Human Activity Detection in Video. IEEE Trans. Multim. 10(6): 982-996 (2008) - [j5]Massimiliano Albanese, Rama Chellappa, Naresh P. Cuntoor, Vincenzo Moscato, Antonio Picariello, V. S. Subrahmanian, Octavian Udrea:
A Constrained Probabilistic Petri Net Framework for Human Activity Detection in Video. IEEE Trans. Multim. 10(8): 1429-1443 (2008) - [r2]Massimiliano Albanese, Carmine Cesarano, Marat Fayzullin, Antonio Picariello, V. S. Subrahmanian:
Video Summarization. Encyclopedia of Multimedia 2008: 946-951 - 2007
- [j4]V. S. Subrahmanian, Massimiliano Albanese, Maria Vanina Martinez, Dana S. Nau, Diego Reforgiato Recupero, Gerardo I. Simari, Amy Sliva, Octavian Udrea, Jonathan Wilkenfeld:
CARA: A Cultural-Reasoning Architecture. IEEE Intell. Syst. 22(2): 12-16 (2007) - [j3]Marat Fayzullin, V. S. Subrahmanian, Massimiliano Albanese, Carmine Cesarano, Antonio Picariello:
Story creation from heterogeneous data sources. Multim. Tools Appl. 33(3): 351-377 (2007) - [c12]Massimiliano Albanese, Vincenzo Moscato, Antonio Picariello, V. S. Subrahmanian, Octavian Udrea:
Detecting Stochastically Scheduled Activities in Video. IJCAI 2007: 1802-1807 - [c11]Massimiliano Albanese, Andrea Pugliese, V. S. Subrahmanian, Octavian Udrea:
MAGIC: A Multi-Activity Graph Index for Activity Detection. IRI 2007: 267-272 - 2006
- [b1]Massimiliano Albanese:
Extracting and summarizing information from large data repositories. University of Naples Federico II, Italy, 2006 - [j2]Massimiliano Albanese, Marat Fayzullin, Antonio Picariello, V. S. Subrahmanian:
The priority curve algorithm for video summarization. Inf. Syst. 31(7): 679-695 (2006) - [c10]Massimiliano Albanese, Angelo Chianese, Antonio Penta, Antonio Picariello, L. Passariello:
A Model for User Profiling in an ASP Environment. DEXA Workshops 2006: 15-19 - [c9]Massimiliano Albanese, Angelo Chianese, Vincenzo Moscato, Antonio Picariello:
Experience of Animate Similarity Concepts in Multimedia Database. ICDE Workshops 2006: 11 - [r1]Massimiliano Albanese, Carmine Cesarano, Marat Fayzullin, Antonio Picariello, V. S. Subrahmanian:
Video Summarization. Encyclopedia of Multimedia 2006 - 2005
- [c8]Massimiliano Albanese, Paolo Maresca, Antonio Picariello, Antonio Maria Rinaldi:
Towards a Multimedia Ontology System: an Approach Using TAO_XML. DMS 2005: 52-57 - [c7]Massimiliano Albanese, Pasquale Capasso, Antonio Picariello, Antonio Maria Rinaldi:
Information Retrieval from the Web: An Interactive Paradigm. Multimedia Information Systems 2005: 17-32 - 2004
- [j1]Massimiliano Albanese, Angelo Chianese, Vincenzo Moscato, Lucio Sansone:
A Formal Model for Video Shot Segmentation and its Application via Animate Vision. Multim. Tools Appl. 24(3): 253-272 (2004) - [c6]Massimiliano Albanese, Carmine Cesarano, Antonio Picariello:
A Multimedia Data Base Browsing System. CVDB 2004: 35-42 - [c5]Marat Fayzullin, V. S. Subrahmanian, Massimiliano Albanese, Antonio Picariello:
The priority curve algorithm for video summarization. MMDB 2004: 28-35 - [c4]Massimiliano Albanese, Antonio Picariello, Carlo Sansone, Lucio Sansone:
Web personalization based on static information and dynamic user behavior. WIDM 2004: 80-87 - [c3]Massimiliano Albanese, Antonio Picariello, Carlo Sansone, Lucio Sansone:
A web personalization system based on web usage mining techniques. WWW (Alternate Track Papers & Posters) 2004: 288-289 - 2003
- [c2]Massimiliano Albanese, Angelo Chianese, Vincenzo Moscato, Lucio Sansone:
Dissolve Detection in a Video Sequence Based on Active Vision. Multimedia Information Systems 2003: 115-122 - 2002
- [c1]Giuseppe Boccignone, Antonio Picariello, Vincenzo Moscato, Massimiliano Albanese:
Image Similarity Based on Animate Vision: Information Path Matching. Multimedia Information Systems 2002: 66-75
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint