Name
Affiliation
Papers
ALBERTO FERRANTE
Univ Lugano, Fac Informat, ALaRI, Via Buffi 13, CH-6904 Lugano, Switzerland
34
Collaborators
Citations 
PageRank 
44
78
13.68
Referers 
Referees 
References 
160
520
286
Search Limit
100520
Title
Citations
PageRank
Year
Precise Agriculture: Effective Deep Learning Strategies to Detect Pest Insects00.342022
Time, accuracy and power consumption tradeoff in mobile malware detection systems.00.342019
Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection.10.392017
A Friend or a Foe? Detecting Malware using Memory and CPU Features.50.462016
MalAware: Effective and Efficient Run-Time Mobile Malware Detector20.382016
Runtime Classification of Mobile Malware for Resource-Constrained Devices.00.342016
What Does The Memory Say? Towards The Most Indicative Features For Efficient Malware Detection20.392016
Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features20.382016
A general practitioner or a specialist for your infected smartphone?00.342015
Modeling Requirements for Security-enhanced Design of Embedded Systems.00.342014
Risk assessment of Atrial Fibrillation: A failure prediction approach30.412014
A Resource-Optimized Approach to Efficient Early Detection of Mobile Malware20.352014
An Algorithm for Extended Dynamic Range Video in Embedded Systems.00.342013
A Framework for Dynamic Optimization of Security and Performances00.342011
System policies for gradual tuning of security and workload in wireless sensor networks00.342011
A Framework for Security and Workload Gradual Adaptation.00.342011
Gradual adaptation of security for sensor networks60.482010
A security service protocol for MANETs10.342010
QoS and Security in Energy-harvesting Wireless Sensor Networks80.542010
Hardware-assisted security enhanced Linux in embedded systems: a proposal10.412010
Dynamic Adaptation of Security and QoS in Energy-Harvesting Sensors Nodes00.342010
Run-time selection of security algorithms for networked devices.50.462009
Coordinated management of hardware and software self-adaptivity60.552009
Enabling self-adaptivity in component-based streaming applications20.392009
Negotiation of security services: a multi-criteria decision approach30.412009
Network Interface Sharing Techniques for Area Optimized NoC Architectures60.432008
A Protocol for Pervasive Distributed Computing Reliability10.372008
Scheduling Small Packets in IPSec Multi-accelerator Based Systems10.372007
IPSec Database Query Acceleration10.372007
Self-adaptive Security at Application Level: a Proposal30.472007
A Query Unit for The IPSec Databases10.362007
A QoS-enabled packet scheduling algorithm for IPSec multi-accelerator based systems60.522005
Application-Driven Optimization of VLIW Architectures: A Hardware-Software Approach50.512005
A packet scheduling algorithm for IPSec multi-accelerator based systems50.572004