Massimiliano Albanese
Massimiliano Albanese
Associate Professor, George Mason University
Email verificata su gmu.edu - Home page
TitoloCitata daAnno
A constrained probabilistic petri net framework for human activity detection in video
M Albanese, R Chellappa, V Moscato, A Picariello, VS Subrahmanian, ...
Multimedia, IEEE Transactions on 10 (6), 982-996, 2008
1212008
Time-efficient and cost-effective network hardening using attack graphs
M Albanese, S Jajodia, S Noel
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN …, 2012
982012
Cauldron: Mission-Centric Cyber Situational Awareness with Defense in Depth
S Jajodia, S Noel, P Kalapa, M Albanese, J Williams
Military Communications Conference (MILCOM 2011), 2011
982011
A multimedia recommender system
M Albanese, A d’Acierno, V Moscato, F Persia, A Picariello
ACM Transactions on Internet Technology (TOIT) 13 (1), 3, 2013
592013
Network diversity: a security metric for evaluating the resilience of networks against zero-day attacks
M Zhang, L Wang, S Jajodia, A Singhal, M Albanese
IEEE Transactions on Information Forensics and Security 11 (5), 1071-1086, 2016
562016
CARA: A cultural-reasoning architecture
VS Subrahmanian, M Albanese, MV Martinez, D Nau, D Reforgiato, ...
IEEE Intelligent Systems, 12-16, 2007
512007
A Multimedia Semantic Recommender System for Cultural Heritage Applications
M Albanese, A d'Acierno, V Moscato, F Persia, A Picariello
Semantic Computing (ICSC), 2011 Fifth IEEE International Conference on, 403-410, 2011
502011
Scalable analysis of attack scenarios
M Albanese, S Jajodia, A Pugliese, V Subrahmanian
Computer Security–ESORICS 2011, 416-433, 2011
482011
Web personalization based on static information and dynamic user behavior
M Albanese, A Picariello, C Sansone, L Sansone
Proceedings of the 6th annual ACM international workshop on Web information …, 2004
442004
A multimedia recommender integrating object features and user behavior
M Albanese, A Chianese, A d’Acierno, V Moscato, A Picariello
Multimedia Tools and Applications 50 (3), 563-585, 2010
402010
A moving target defense approach for protecting resource-constrained distributed devices
V Casola, A De Benedictis, M Albanese
2013 IEEE 14th International Conference on Information Reuse & Integration …, 2013
392013
Detecting stochastically scheduled activities in video
M Albanese, V Moscato, A Picariello, VS Subrahmanian, O Udrea
Proc. of IJCAI 7, 1802-1807, 2007
372007
Pads: A probabilistic activity detection framework for video data
M Albanese, R Chellappa, N Cuntoor, V Moscato, A Picariello, ...
IEEE Transactions on Pattern Analysis and Machine Intelligence 32 (12), 2246 …, 2010
362010
Modeling network diversity for evaluating the robustness of networks against zero-day attacks
L Wang, M Zhang, S Jajodia, A Singhal, M Albanese
European Symposium on Research in Computer Security, 494-511, 2014
352014
Discovering the top-k unexplained sequences in time-stamped observation data
M Albanese, C Molinaro, F Persia, A Picariello, VS Subrahmanian
IEEE Transactions on Knowledge and Data Engineering 26 (3), 577-594, 2013
342013
Fast activity detection: Indexing for temporal stochastic automaton-based activity models
M Albanese, A Pugliese, VS Subrahmanian
IEEE Transactions on Knowledge and Data Engineering 25 (2), 360-373, 2011
332011
Finding “Unexplained” Activities in Video
M Albanese, C Molinaro, F Persia, A Picariello, VS Subrahmanian
Twenty-Second International Joint Conference on Artificial Intelligence, 2011
322011
A web personalization system based on web usage mining techniques
M Albanese, A Picariello, C Sansone, L Sansone
Proceedings of the 13th international World Wide Web conference on Alternate …, 2004
282004
A moving target defense mechanism for manets based on identity virtualization
M Albanese, A De Benedictis, S Jajodia, K Sun
2013 IEEE Conference on Communications and Network Security (CNS), 278-286, 2013
262013
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures
S Venkatesan, M Albanese, K Amin, S Jajodia, M Wright
2016 IEEE Conference on Communications and Network Security (CNS), 198-206, 2016
242016
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20