<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>Informatica ed Ingegneria dell'Informazione</title>
<link href="http://elea.unisa.it/xmlui/handle/10556/3000" rel="alternate"/>
<subtitle/>
<id>http://elea.unisa.it/xmlui/handle/10556/3000</id>
<updated>2026-04-20T08:27:27Z</updated>
<dc:date>2026-04-20T08:27:27Z</dc:date>
<entry>
<title>Enhancing the Sharing and the Management of Personal Data in the Big Data Era</title>
<link href="http://elea.unisa.it/xmlui/handle/10556/7190" rel="alternate"/>
<author>
<name>Desiato, Domenico</name>
</author>
<id>http://elea.unisa.it/xmlui/handle/10556/7190</id>
<updated>2025-04-30T17:29:24Z</updated>
<published>2022-02-22T00:00:00Z</published>
<summary type="text">Enhancing the Sharing and the Management of Personal Data in the Big Data Era
Desiato, Domenico
Nowadays, thanks to the digitalization of business processes and public
administrations, many significant Big data collections are available. Users are direct
suppliers of data when publishing contents on social networks. However, when using
a service on the web, users must often provide their data, which will become property
of the company running the service. To this end, users need to be aware of the privacy
issues related to the management of their data, whereas companies need to ensure
the protection of users' personal data, also according to new laws and regulations
issued by governments. On the other hand, there exists the necessity not to limit the
processing of data by companies and other public institutions. Thus, it is necessary to
devise methods devoted to the identification of possible privacy threats during
users' online activities, and to develop privatization strategies that possibly do not
downgrade the significance of data.
This dissertation provides experimental evidence of several threats for users when
providing their personal data for accessing online services, aiming to increase their
awareness, and it describes new methodologies and tools to support companies
when processing personal data of their users. In particular, the proposed
methodologies exploit data correlations expressed in terms of relaxed functional
dependencies (RFDs) to define privatization strategies, aiming to safeguard
user's privacy, and to detect malicious accounts in social networks. Finally, two
automatic tools have been designed and implemented to help users better
understand privacy threats during their online activities. [edited by Author]
2020 - 2021
</summary>
<dc:date>2022-02-22T00:00:00Z</dc:date>
</entry>
<entry>
<title>Statistical Techniques for Mitigation and Prevention of Distributed Attacks over Communication Networks</title>
<link href="http://elea.unisa.it/xmlui/handle/10556/6608" rel="alternate"/>
<author>
<name>Tambasco, Marco</name>
</author>
<id>http://elea.unisa.it/xmlui/handle/10556/6608</id>
<updated>2025-04-30T17:02:05Z</updated>
<published>2021-04-09T00:00:00Z</published>
<summary type="text">Statistical Techniques for Mitigation and Prevention of Distributed Attacks over Communication Networks
Tambasco, Marco
The thesis is focused on statistical methods to characterize, mitigate, and counteract distributed network
attacks. When coping with distributed network attacks such as Distributed Denial of Service (DDoS) attacks,
two main stages/issues emerge manifestly. The first issue pertains to the design of suitable strategies
aimed at revealing and tracking the distributed threats that typically act sneakily to compromise the
resources of a network target. The second issue concerns the precautionary countermeasures that a
network manager can put in field to mitigate the damages that a distributed threat can provoke.
Accordingly, the contributions offered in this thesis move along the two aforementioned lines as detailed in
the following. .. [edited by Author]; La tesi è incentrata su metodi statistici per caratterizzare, mitigare e contrastare attacchi di rete distribuiti.
Quando si considerano attacchi di rete distribuiti come gli attacchi Distributed Denial of Service (DDoS),
emergono chiaramente due principali fasi/problemi. La prima fase riguarda la progettazione di adeguate
strategie utili a rivelare e tracciare le minacce distribuite che tipicamente agiscono in modo subdolo per
compromettere le risorse di un target di rete. La seconda fase riguarda le contromisure precauzionali che
un network manager può mettere in campo per mitigare i danni che una minaccia distribuita può
provocare. Di conseguenza, i contributi offerti in questa tesi seguono le due linee sopra menzionate come
dettagliato di seguito. .. [a cura dell'Autore]
2019 - 2020
</summary>
<dc:date>2021-04-09T00:00:00Z</dc:date>
</entry>
<entry>
<title>Coverage in Wireless Sensor Networks with additional operating time constraints: efficient algorithms</title>
<link href="http://elea.unisa.it/xmlui/handle/10556/6513" rel="alternate"/>
<author>
<name>Iossa, Antonio</name>
</author>
<id>http://elea.unisa.it/xmlui/handle/10556/6513</id>
<updated>2025-04-30T16:45:18Z</updated>
<published>2021-06-11T00:00:00Z</published>
<summary type="text">Coverage in Wireless Sensor Networks with additional operating time constraints: efficient algorithms
Iossa, Antonio
Nowadays there is a growing interest in wireless sensor networks, one of the most
significant technologies of the 21&#119904;&#119905; century. A wireless sensor network (WSN) is
essentially composed by a large number of electronic devices, defined sensors, whose
aim is to detect physical phenomena such as heat, light, humidity, air pollution,
pressure, etc. Compared to wired networks, WSNs offer simpler deployment and
great flexibility of devices. In the context of the Internet of Things, WSNs
are the enabling technology that allows to collect information about the environment
in which people live. The numerous application areas in environmental monitoring, automation, healthcare, oil and gas, transportation, infrastructure, insurance services
and smart home, among others, have driven the market of WSNs to a staggering scale.
Indeed the WSNs market was valued at USD 46.76 billion in 2019 and it is expected
to reach USD 123.93 billion by 2025. In addition to the heterogeneity of the
WSN applications, the market growth has been driven by the increasing adoption of
wireless technologies and, also, by the reduced cost and the great availability of the
sensor nodes. Indeed nowadays we are practically surrounded by sensors, ranging
from those aboard a simple smartphone to the most specialized sensors such as those
that detect air quality, vehicles position, persons heartbeat. .. [edited by Author]; Le reti di sensori wireless, o wireless sensor networks, hanno beneficiato, negli ultimi
anni, di un interesse considerevole da parte della ricerca scientifica e rappresentano una delle più importanti tecnologie del 21&#119904;&#119905; secolo. Una wireless sensor
network (WSN) è essenzialmente una rete costituita da un gran numero di dispositivi elettronici, definiti sensori, il cui scopo è rilevare fenomeni fisici come calore,
luce, umidità, inquinamento atmosferico, pressione, etc. Rispetto alle reti cablate,
le WSN consentono una più semplice installazione ed inoltre, i dispositivi sensore
di cui esse sono costituite, offrono una grande eterogeneità di funzioni e flessibilità d’uso. Nell’ambito dell’Internet of Things, le WSN costituiscono la tecnologia abilitante che consente di raccogliere informazioni sull’ambiente in cui le
persone vivono. Le numerose aree di applicazione in contesti quali il monitoraggio
ambientale, l’automazione, la sanità, i trasporti, le infrastrutture, i servizi assicurativi
e la domotica, per citarne alcune, hanno spinto il mercato delle WSN verso livelli
considerevoli. Tale mercato è infatti stato valutato, per l’anno 2019, in 46,76 miliardi
di dollari statunitensi e si prevede che raggiungerà i 123,93 miliardi di dollari entro il
2025. Oltre all’eterogeneità delle applicazioni delle WSN, l’incremento del
mercato è stato determinato dalla crescente adozione di tecnologie wireless, nonché
dal minor costo e maggiore disponibilità dei sensori. Infatti, al giorno d’oggi si è
praticamente circondati da sensori, il cui costo è in continua discesa, che vanno
da sensori più semplici come quelli a bordo di uno smartphone, fino a sensori più
specializzati come quelli che rilevano la qualità dell’aria, la posizione dei veicoli, il
battito cardiaco delle persone, etc. .. [a cura dell'Autore]
2019 - 2020
</summary>
<dc:date>2021-06-11T00:00:00Z</dc:date>
</entry>
<entry>
<title>Intelligent privacy safeguards for the digital society</title>
<link href="http://elea.unisa.it/xmlui/handle/10556/6509" rel="alternate"/>
<author>
<name>Guarino, Alfonso</name>
</author>
<id>http://elea.unisa.it/xmlui/handle/10556/6509</id>
<updated>2025-04-30T16:49:40Z</updated>
<published>2021-05-24T00:00:00Z</published>
<summary type="text">Intelligent privacy safeguards for the digital society
Guarino, Alfonso
The growth of the Internet and the pervasiveness of Information and Communication Technology (ICT) have led to a radical
change in our society, a deep economical, commercial and social
impact on our lives. To date, most of our lives takes place online
where algorithms shape and guide our behaviour and the governance of our societies.
One of the drawbacks of this change is an increased risk for Internet users about their personal information privacy. Indeed an
enormous amount of data is being generated and disseminated by
people at high pace, often without knowing who is recording what
about them. Online browsing, banking, shopping, social network
interactions, and any type of online economic, social, personal
collaboration and communication could undermine the individuals’ privacy due to a variety of factors that include not only the
frightening increase of information leakage. Indeed, specific private information can be also inferred/extracted via computational
heuristics applied on data (apparently unrelated to such information) users voluntarily disclose on the Internet. .. [edited by Author]; La crescita di Internet e la pervasività delle tecnologie
dell’informazione e della comunicazione (TIC) hanno portato a
un cambiamento radicale nella nostra societ`a, un profondo impatto economico, commerciale e sociale sulle nostre vite. Ad oggi,
la maggior parte della nostra vita si svolge online dove gli algoritmi modellano e guidano il nostro comportamento e governano
le nostre società.
Uno degli svantaggi di questo cambiamento è un aumento del
rischio per gli utenti di Internet per la privacy delle loro informazioni personali. In effetti, un’enorme quantità di dati viene
generata e diffusa da persone a ritmi elevati, spesso senza sapere
chi sta registrando e cosa su di loro. La navigazione online, le operazioni bancarie, gli acquisti, le interazioni con i social network e
qualsiasi tipo di collaborazione e comunicazione economica, sociale
e personale online potrebbero minare la privacy degli individui a
causa di una varietà di fattori che includono non solo lo spaventoso aumento della fuga di informazioni. In effetti, informazioni
private specifiche possono anche essere dedotte/estratte tramite
euristiche computazionali applicate ai dati (apparentemente non
correlati a tali informazioni) che gli utenti divulgano volontariamente su Internet. .. [a cura dell'Autore]
2019 - 2020
</summary>
<dc:date>2021-05-24T00:00:00Z</dc:date>
</entry>
</feed>
