• 2384 Citations
  • 27 h-Index
20032020
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Dive into the research topics where Anna Squicciarini is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 11 Similar Profiles
Access control Engineering & Materials Science
Web services Engineering & Materials Science
Grid computing Engineering & Materials Science
Data privacy Engineering & Materials Science
Authentication Engineering & Materials Science
Cloud computing Engineering & Materials Science
Vehicular ad hoc networks Engineering & Materials Science
Internet Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2003 2020

REMIND: Risk Estimation Mechanism for Images in Network Distribution

Lin, D., Steiert, D., Morris, J., Squicciarini, A. & Fan, J., Jan 1 2020, In : IEEE Transactions on Information Forensics and Security. 15, p. 539-552 14 p., 8744560.

Research output: Contribution to journalArticle

Electric power distribution
4 Citations (Scopus)

A Cloud Brokerage Architecture for Efficient Cloud Service Selection

Lin, D., Squicciarini, A., Dondapati, V. N. & Sundareswaran, S., Jan 1 2019, In : IEEE Transactions on Services Computing. 12, 1, p. 144-157 14 p., 7516685.

Research output: Contribution to journalArticle

Cloud computing
Costs
Service selection
Brokerage
Service provider
Imitation
Dynamic Networks
Network Topology
Cascade
Topology

Detection and analysis of self-disclosure in online news commentaries

Umar, P., Squicciarini, A. & Rajtmajer, S., May 13 2019, The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019. Association for Computing Machinery, Inc, p. 3272-3278 7 p. (The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Syntactics
Linguistics
Websites
Semantics
Costs

Discovering reliable evidence of data misuse by exploiting rule redundancy

Genga, L., Zannone, N. & Squicciarini, A., Nov 1 2019, In : Computers and Security. 87, 101577.

Research output: Contribution to journalArticle

Association rules
redundancy
Transparency
Redundancy
Decision making