Christian Esposito

Christian Esposito
Università degli Studi di Salerno | UNISA · Department of Computer Science DI

PhD

About

154
Publications
28,708
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,392
Citations
Citations since 2016
105 Research Items
3102 Citations
20162017201820192020202120220200400600
20162017201820192020202120220200400600
20162017201820192020202120220200400600
20162017201820192020202120220200400600
Introduction
Christian Esposito is a Assistant Professor (RTD.A) at the University of Naples "Federico II". He graduated in Computer Engineering in 2006 and got his PhD in 2009 both at the University of Naples Federico II. His interests include positioning systems, reliable and secure communications. He regularly serves as a reviewer in journals and conferences in the field of Distributed and Dependable Systems.
Additional affiliations
February 2016 - December 2017
Università degli Studi di Salerno
Position
  • PostDoc Position
January 2014 - April 2015
Italian National Research Council
Position
  • Fixed-Term Researcher
December 2011 - December 2013
Italian National Research Council
Position
  • Research Grant Holder
Education
November 2006 - December 2009
University of Naples Federico II
Field of study
  • Computer Engineering and Automation
September 2000 - July 2006
University of Naples Federico II
Field of study
  • Computer Engineering

Publications

Publications (154)
Article
Future mobile communication networks need Unmanned Aerial Vehicles as Base Stations (UAVasBSs) with the fast-moving and long-term hovering capabilities to guarantee consistent network performance. UAVasBSs help 5G/B5G mobile communication systems to rapidly recover from emergency situations and handle the instant traffic of the flash crowd. In this...
Article
Full-text available
Blockchain technology plays a pivotal role in the undergoing fourth industrial revolution or Industry 4.0. It is considered a tremendous boost to company digitalization; thus, considerable investments in blockchain are being made. However, there is no single blockchain technology, but various solutions exist, and they cannot interoperate with one e...
Conference Paper
Full-text available
The increasing importance of Veterinary Informatics is driving the implementation of integrated veterinary information management systems (VIMS) for the capture, storage, analysis and retrieval of animal data. In this paper, a decision tree algorithm was implemented, starting from the database of the University Veterinary Hospital at Federico II Un...
Article
Nowadays, the proper management of data is a key business enabler and booster for companies, so as to increase their competitiveness. Typically, companies hold massive amounts of data within their servers, which might include previously offered services, proposals, bids, and so on. They rely on their expert managers to manually analyse them in orde...
Article
By now people’s opinions and actions are more and more strongly influenced by what is posted and shared on the various social networks. Thus, malicious users can purposely manipulate other users posting fake news/reviews. In order to face this challenge, modern online social networks are beginning to adopt tool for user trustworthiness assessment....
Article
Full-text available
Due to the exponential growth of the Internet of Things networks and the massive amount of time series data collected from these networks, it is essential to apply efficient methods for Big Data analysis in order to extract meaningful information and statistics. Anomaly detection is an important part of time series analysis, improving the quality o...
Article
Images and videos in multimedia data are typical representation methods that include various types of information, such as color, shape, texture, pattern, and other characteristics. Besides, in video data, information such as object movement is included. Objects may move with time, and spatial features can change, which is incorporated in spatio-te...
Article
The platforms supporting the smart city applications are rarely implemented from scratch by a municipality and/or totally owned by a single company, but are more typically realized by integrating some existing ICT infrastructures thanks to a supporting platform, such as the well known FIWARE platform. Such a multi-tenant deployment model is require...
Article
Social Networks represent a cornerstone of our daily life, where the so-called social reviewing systems (SRSs) play a key role in our daily lives and are used to access data typically in the form of reviews. Due to their importance, social networks must be trustworthy and secure, so that their shared information can be used by the people without an...
Article
Current Online Social Networks represent a means for the continuous generation and distribution of information, which is slightly changed when moving from a user to another during the traversing of the network. Such an amount of information can overcome the capacity of a single user to manage it, so it would be useful to reduce it so that the user...
Article
The automated conveyor system, as the core component in the modern manufacturing world, has gained lots of attention from researchers. To optimize the operation of the conveyor system, range-inspection control (RIC) has been considered an efficient strategy to bring this conventional technology to an intelligent level. Various algorithms have been...
Chapter
During this new world pandemic, a lot of technical issues have come to life, forcing all industries to reinvent themselves and how the day to day operations are performed. Remote working has become not only a trend but a necessity. Starting from online lecturing to online meetings on a need to know basis, people are concerned about their privacy an...
Conference Paper
Full-text available
This paper proposes the application of three key methods to multimodal neuroimaging data fusion. The first step is to classify neurodegenerative brain diseases in the considered scans from the available neuroimaging techniques. We propose to classify scans by selecting relevant disease detection features utilizing a game-theoretic approach and evid...
Article
Internet of Vehicles (IoV) requires trust management to implement effective authentication and authorization of nodes, as it is not possible to establish trusted connections to the roadside components that eventually a vehicle will meet during its journey, ahead of time. To cope with this issue, dynamic access control is required, where authorizati...
Chapter
Current networks should provide disaster-resilience by coping with the possible failures and misbehaviours caused by massive natural or man-made disasters. This is necessary to keep a suitable level of Quality of Service after a disaster and to support the possible evacuation, rescue, assessment, and rescue operations within the affected area. Mult...
Chapter
The focus of this chapter is on communication (and partially, computing) solutions which allow satisfying demands from the immediate aftermath of a disaster until full restoration of pre-disaster communication infrastructure and services. As traffic demand might differ substantially from the one in the pre-disaster scenario, due to the specific nee...
Chapter
This chapter discusses vital techniques to enhance the resilience of 5G systems. It starts with dependability assessment of 5G networks. Next, it describes (a) the frequency fallback technique to improve availability and survivability of 5G services, (b) segment interleaving scheme to enhance communications resilience between base stations and the...
Article
The purpose of this paper is to show how the knowledge of Process Mining techniques can provide a robust premise to build a Discrete Event Simulation (DES) model of a healthcare process. In order to analyze some specific processes of an ophthalmology ward of a large Italian hospital, ProM6 framework was implemented, which supports process mining te...
Article
Full-text available
Due to the large scale of the typical deployments and the involvement of moving objects to the Internet of Things, participating nodes opportunistically establish data exchanging connections, spanning across multiple organizations and security domains. This opportunistic behavior causes the impossibility of defining valid security policies to rule...
Article
Full-text available
Large scale wildfire events that occurred around the world involved a massive loss of animal lives, with a consequent economic impact on agricultural holdings and damages to ecosystems. Preparing animals for a wildfire evacuation requires an extra level of planning, preparedness and coordination, which is missing in the current practice. This paper...
Article
Full-text available
The majority of communication solutions for post-disaster areas rely on cellular infrastructure support. But disasters such as fires, floods, earthquakes, can disrupt communication network making its services unavailable. New portable antenna towers, as point-to-point radio communications , are a way to mitigate the communication when cellular infr...
Article
Full-text available
During and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caus...
Article
Full-text available
Localization plays an important role in the field of Wireless Sensor Networks (WSNs) and robotics. Currently, localization is a very vibrant scientific research field with many potential applications. Localization offers a variety of services for the customers, for example, in the field of WSN, its importance is unlimited, in the field of logistics...
Article
Full-text available
With the change from the pre-internet era to online society, user authentication technology is required, and for that, password-based authentication technology is generally used. However, the technology has vulnerabilities and security threats that cannot ensure security and reliability, due to the exposure of the keyboard data that comprises a pas...
Chapter
Wireless sensor networks demands proper means in order to obtain an accurate location of their nodes for a twofold reason: on the one hand, the exchanged data must be spatially meaningful since their content may be unusual if the location of where they have been produced is not associated to them, on the other hand, such networks need efficient rou...
Article
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and administrators rely on a variety of data sources to develop security situation awareness at runtime. In spite of the advances in Security Information and Event Management products and services for handling heterogeneous data sources, analysis of propri...
Chapter
In the immediate aftermath of nature-based disasters such as earthquakes, fires, or floods, have a clear vision of the situation and the population involved is of main priority for rescue operations—it is a matter of life and death. But these disaster events may cause malfunctions in communication services making the exchange information impossible...
Chapter
Full-text available
The availability of effective communications in post-disaster scenarios is key to implement emergency networks that enable the sharing of critical information and support the coordination of the emergency response. To deliver those levels of QoS suitable to these applications, it is vital to exploit the multiple communication opportunities made ava...
Chapter
Cloud computing can enable the unraveling of new scientific breakthroughs. We will eventually arrive to compute overwhelmingly large sizes of information, larger than we ever thought about it. Better scheduling algorithms are the key to process Big Data. This paper presents a load balancing scheduling algorithm for Many Task Computing using the com...
Article
Ethereum is one of the currently popular trading platform, where any one can exchange, buy, or sell cryptocurrencies. Smart contract, a computer program, can help Ethereum to encode rules or scripts for processing transactions. Because the smart contract usually handles large number of cryptocurrencies worth billions of dollars apiece, its security...
Conference Paper
Full-text available
During the practice of a public administration or a company, a large volume of documents are typically produced. The recent dematerialization efforts have been pushing the way for a digital form of these documents, so as to make their management more efficient. But, traditional document management systems entail many non-value adding activities suc...
Conference Paper
Full-text available
The progressive dematerialization of paper-based documents in favour of digital ones held within servers, and processed/exchanged by means of the ICT technologies have massively revolutionized several aspects of our daily lives and industrial practice. The large volume of data handled by the companies has an undeniable value for their business and...
Article
Full-text available
Underwater localization is used as a key element in most applications of underwater communications. Despite Global Positioning System (GPS) receivers are usually employed in Terrestrial Wireless Sensor Networks, they cannot be exploited for underwater localization. In fact, GPS signals are highly attenuated by the water, and higher than a couple of...
Article
Recommender Systems are increasingly playing an important role in our life, enabling users to find “what they need” within large data collections and supporting a variety of applications, from e-commerce to e-tourism. In this paper, we present a Big Data architecture supporting typical Cultural Heritage applications. On the top of querying, browsin...
Article
Existing antivirus programs detect malicious code based on fixed signatures; therefore, they have limitations in detecting metamorphic malicious code that lacks signature information or possesses circumventing code inserted into it. Research on the methods for detecting this type of metamorphic malicious code primarily focuses on techniques that ca...
Book
This book constitutes the refereed proceedings of the 16th International Symposium on Pervasive Systems, Algorithms and Networks, I-SPAN 2019, held in Naples, Italy, in September 2019. The 32 full papers and 8 short papers were carefully reviewed and selected from 89 submissions. The papers focus on all aspects of: big data analytics & machine lear...
Article
Full-text available
Serviceability is the ability of a network to serve user equipments (UEs) within desired requirements (e.g., throughput, delay, and packet loss). High serviceability is considered as one of the key foundational criteria towards a successful fog radio access infrastructure satisfying the Internet of Things paradigm in the 5G era. In the article by D...
Article
Smart city applications are increasingly popular due to their potential to improve quality of life in an urbanized society, and such applications typically leverage on cloud computing for data and computation offloading from the sensing infrastructure. Despite the capability of achieving scalability and flexibility, the use of cloud computing impos...
Article
Several industries in many different domains are looking at deep learning as a way to take advantage of the insights in their data, to improve their competitiveness, to open up novel business possibilities, or to resolve problem thought to be impossible to tackle. The large scale of the systems where deep learning is applied and the need of preserv...
Article
Smart cities are systematically promoting the transition to sustainable and effective energy systems by promoting policies for energy efficiency, regionalized/distributed renewable energy generation, and intelligent energy management. In particular, this transition toward a more integrated and intelligent energy supply has created a plethora of ene...
Article
Full-text available
Network communications and the Internet pervade our daily activities so deeply that we strongly depend on the availability and quality of the services they provide. For this reason, natural and technological disasters, by affecting network and service availability, have a potentially huge impact on our daily lives. Ensuring adequate levels of resil...
Article
Publish/subscribe services represent the key choice to glue together the huge amount of heterogeneous devices available within the Internet of Things, by making them interoperable at a large scale through mediation systems and facilities available in the cloud. In such a scenario, several optimizations have been introduced in the architectural layo...
Article
Cloud computing is a key supporting technology driving the fourth industrial revolution, spanning from the Internet of Things (IoT) and Cloud for Telecoms (C4T) to Industry 4.0 to Smart Cities, and so on. This pervasiveness of cloud technology is due to the ability to easily share and obtain resources on a pay-per-use and elastic provisioning model...
Article
One particular trend observed in healthcare is the progressive shift of data and services to the cloud, partly due to convenience (e.g. availability of complete patient medical history in real-time) and savings (e.g. economics of healthcare data management). There are, however, limitations to using conventional cryptographic primitives and access c...
Article
The current mobile app development practice, like other large-scale network-centric software projects, is characterized by the use of event notification facilities supporting the exchange of effective and efficient data flows between the applications front-end, usually located on customers terminal equipment and the back-end services available with...
Article
Cloud computing is extensively used as an integration means in varies application domains, spanning from the healthcare to the manufacturing, aiming at achieving an easy-to-access and elastic data storage and exchange among heterogeneous and geographically sparse organizations. This cloud-based integration poses crucial security issues related to t...
Article
Many hybrid and multimodal biometric recognition techniques have been presented to provide secure and authentic systems, incorporating both soft and hard biometric schemes. This article proposes a new hybrid technique which ensures the authenticity of the user to the system, as well as monitors whether the user has passed the biometric system as a...
Article
Internet of Things (IoT) is a promising technology for improving our lives and society by integrating smart devices in our environment and paving the way for novel ICT application spanning from smart cities to energy efficiency and home automation. However, such a vision encompasses the availability of thousands of smart devices, or even more, that...
Article
There is an increasing involvement of the Internet of Things (IoT) in many of our daily activities, with the aim of improving their efficiency and effectiveness. We are witnessing the advent of smart cities, in which IoT is exploited to improve the management of a city's assets, as well as smart factories, where IoT is paving the way for the forth...
Article
In the last years, academic research has been focused also on the security requirements, threat models, and attack taxonomies from the perspective of the application of Internet of Things in critical applications. Since such systems are strongly data-intensive, it is of pivotal importance to provide integrity for the messages moving throughout the...
Chapter
Large-scale distributed systems are often conceived as a federation of multiple heterogeneous system islands, called to interoperate for a common objective. In this context, reliability and security are commonly recognized as nontrivial key technical concerns to be guaranteed, considering the obstacles imposed by the heterogeneity of components and...
Article
Full-text available
Internet of Things (IoT) is one of the key technologies paving the way for the next industrial revolution named as Industry 4.0, since it promises to realize smarter factories by optimizing costs and productivity. Traditionally, the adopted communication protocols among the sensors are required to manage the large scale of the infrastructure in ter...
Article
Lately, the technology has been developed quickly causing the appearance of smart software products in many domains such as agriculture which are designed to ease people's work. Due to bad weather phenomena and growing demand for agricultural products, have started to appear a lot of greenhouses, where there is a strict control around each paramete...