Home » Tipologia Iris » 01a Articolo Rivista

01a Articolo in rivista

  • The deep integration between the cyber and physical domains in complex systems make very challenging the security evaluation process, as security itself is more of a concept (i.e. a subjective property) than a quantifiable characteristic. Traditional security assessing mostly relies on the personal...
  • In the last few years, with the exponential diffusion of smartphones, services for turn-by-turn navigation have seen a surge in popularity. Current solutions available in the market allow the user to select via an interface the desired transportation mode, for which an optimal route is then...
  • The objective of the present work is to present a Decision Support System (DSS) aimed at suggesting to a Critical Infrastructure (CI) operator the optimal configuration in terms of deployed security functionalities. The optimization framework adopted by the proposed DSS uses a Genetic Algorithm (GA...
  • This paper presents an original discrete-time, distributed, noncooperative load-balancing algorithm, based on mean field game theory, which does not require explicit communications. The algorithm is proven to converge to an arbitrarily small neighborhood of a specific equilibrium among the loads of...
  • This letter addresses the problem of robust output regulation of systems described by linear differential-algebraic equations (DAEs). Taking advantage of some recent relevant results concerned with the development of normal forms for general DAEs, it is shown how an internal model can be designed...
  • This study presents a robust defence strategy in reaction to destabilising cyber-physical attacks launched against linear time invariant systems and its application to power systems. The proposed protection scheme aims at making the dynamics of a selected subsystem decoupled from the dynamics of...
  • Symbolic execution is a program analysis technique that aims to automatically identify interesting inputs for an application, using them to generate program executions covering different parts of the code. It is widely used in the context of vulnerability discovery and reverse engineering. In this...
  • In this article, we study the evolution of the computer science research community over the past 30 years. Analyzing data from the full Scopus database, we investigate how aspects such as the community size, gender composition, and academic seniority of its members changed over time. We also shed...
  • Conferences play a major role in some disciplines such as computer science and are often used in research quality evaluation exercises. Differently from journals and books, for which ISSN and ISBN codes provide unambiguous keys, recognizing the conference series in which a paper was published is a...
  • In the last few years, a large variety of approaches and methodologies have been explored in the context of software testing, ranging from black-box techniques, such as fuzzing, to white-box techniques, such as concolic execution, with a full spectrum of instances in between. Using these techniques...
© Università degli Studi di Roma "La Sapienza" - Piazzale Aldo Moro 5, 00185 Roma