
Francesco PascaleAccenture · Industry X
Francesco Pascale
Ph.D. & M.Eng. Computer Science
Digital Business Integration Consultant
About
40
Publications
14,414
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
651
Citations
Citations since 2017
Introduction
Ph.D. in Industrial Engineering and Master’s Degree in Computer Engineering. His interests relate to the following areas: Embedded Systems, IoT, Knowledge Management, Recommender Systems and Bayesian Network. He is the author of more than 30 papers in the field of Computer Science (Orcid Number:0000-0002-4498-5425). He also collaborates with some research laboratory. IEEE & ACM Member.
Additional affiliations
August 2020 - April 2022
Almaviva
Position
- Solution Lead Embedded Devices
Description
- Solution Lead Embedded Devices for Industrial IoT & Device Management Solution Centre. Technical Team Leader, Task Manager, Functional Analyst and Senior Software Engineering for Embedded Projects, IoT Projects and Industrial Projects
Education
November 2016 - July 2020
September 2010 - October 2014
September 2005 - December 2009
Publications
Publications (40)
Increasing populations and rapid large‐scale urbanization has created a demand to increase the quality of life through economic development, social stability, and better quality environments. These issues are addressed in the field of Smart Cities where, through the Internet of Things, efforts are being made to support added‐value services for the...
In the Cultural Heritage domain, the introduction of intelligent systems for planning of cultural visit was very appealing. Indeed when people decide to visit museums or archaeological sites, they usually would like to organize and schedule their time in order to fulfill some requirements and to match, as far as possible, their preferences and need...
In recent years, the growing number of devices connected to the internet has increased significantly. These devices can interact with the external environment and with human beings through a wide range of sensors that, perceiving reality through the digitization of some parameters of interest, can provide an enormous amount of data. All this data i...
Modern vehicles are connected to the network and between each other through smart sensors and smart objects commonly present on board. This situation has allowed manufacturers to send over-the-air updates, receive diagnostic information, and offer various multimedia services. More generally, at present, all this is indicated by the term 'Vehicle to...
The experiments were conducted using CARLA simulation software and real datasets with various types of attack. By comparing these, we want to test the effectiveness and efficiency of the "two-step" algorithm described in the project.
Today’s modern vehicles are connected to a network and are considered smart objects of IoT, thanks to the capability to send and receive data from the network. One of the greatest challenges in the automotive sector is to make the vehicle secure and reliable. In fact, there are more connected instruments on a vehicle, such as the infotainment syste...
In recent years, a great number of applications in Internet of Things (IoT) have been developed. In this context, many methodologies and technologies are used for several frameworks, including indoor localization. In this field, as highlighted in recent years, one of the most important aims of modern indoor applications in IoT is to identify how to...
Nowadays, with the rapidly increasing of connected vehicles more and more cyber-attacks, which could compromise the driving experience, are possible. Indeed, connected vehicles are not able to guarantee the information security and shown their vulnerabilities in terms of Confidentiality, Integrity and Availability (CIA). These vulnerabilities advis...
Internet of Things (IoT) is a paradigm where the virtual world of
information and communication technology is tightly integrated with the real
world of things. The explosion of this paradigm in recent years has had a very
strong impact on the world of research and industry. Today is possible to see
a real technological and cultural revolution where...
«You take delight not in a city’s seven or seventy wonders, but in the answer it gives to a question of yours». Those are the words used by Italo Calvino in his book “Invisible Cities” to give us a key aspect of a city, and it is from this consideration that this research work starts. In particular, the aim is to study and develop innovative soluti...
Our society is oriented towards data production. The increasingly massive spread of mobile devices and the Internet of Things is transforming our society into a data factory. Data, however, does not immediately lead to knowledge and, in fact we can become overwhelmed with a mass of information that is difficult to understand: often the desire to pr...
The spread of generic (as Twitter, Facebook or Google+) or specialized (as LinkedIn or Viadeo) social networks allows to millions of users to share opinions on different aspects of life every day. Therefore this information is a rich source of data for opinion mining and sentiment analysis. This paper presents a novel approach to the sentiment anal...
This work investigates the major cyber-risks in connected cars and the possibility to avoid them.
Nowadays the use of Chatbots is very popular in a large scale of applications especially in systems that provide an intelligence support to the user. In fact, to speed up the assistance, in many cases, these systems are equipped with Chatbots that can interpret the user questions and provide the right answers, in a fast and correct way. This paper...
E-Learning is one of the most widely used training
approaches in recent years. Numerous universities and training
institutions adopt this approach to deliver courses or support the
students in their training process. In particular, the blended ELearning
is a useful approach for supporting students and better
understanding their learning issues. The...
E-Learning is becoming one of the most effective training approaches. In particular, the blended learning is considered a useful methodology for supporting and understanding students and their learning issues. Thanks to e-Learning platforms and their collaborative tools, students can interact with other students and share doubts on certain topics....
In the touristic field, the trip is defined as the set of goods and services used by the traveler; Is organized by a manufacturer (tour operator) who designs and builds a reference path consistent with customer demand. Designing an itinerary is, therefore, a complex task because many variables need to be considered. It should be emphasized that eac...
Technological progress seems unstoppable: large companies are ready to implement more and more
sophisticate solution to improve their productivity. The near future may be represented by so-called Chatbot,
already present in the instant messaging platforms and destined to become more and more popular. This paper
presents the realization of a prototy...
The Italian towns have a cultural heritage that often do not succeed in being completely enhanced. The natural, artistic and cultural resources present in the Italian towns, above all the smallest ones, many times remain hidden and are not enjoyed by the tourists. The experience of a touristic visit is a learning process very fascinating and intere...
This paper introduces a Context Aware App for the tourism. This app is based on a graphical formalism for the context representation: the Context Dimension Tree. The aim is to propose a Context Aware approach that acts as dynamic support for the tourists, equipped of a mobile device which reacts to a change of context adapting user interface, accor...
The experience of a touristic visit is a learning process very fascinating and interesting: the emotions can change according to the interests of the individuals, as well as of the physical, personal and social-cultural context. Applications for a mobile environment should take advantage of contextual information, such as position, to offer greater...
Storytelling has evolved over the years: its ability to enchant, transform and persuade makes it a formidable mean, malleable and customizable, but not easy to use. The use of new technologies allowing it to reach a far greater level of effectiveness: the audience can join in the storytelling process, thus impacting positively on engagement and fac...
Projects
Projects (2)
Dear Colleagues,
Security aspects are becoming of crucial importance across the hyperconnected technological world. In this context, 5G (and its evolution, 6G) represents a key network enabler for a plethora of paradigms, including Internet of Things (IoT), cyber-physical systems (CPSs), multi-access edge computing (MEC), network function virtualization (NFV), software-defined networking (SDN), and many others.
Due to the growing interest both of academia and industry in the broad field of security, for this Special Issue we encourage high-quality research contributions—both theoretical and experimental—and timely survey papers that pinpoint future research directions in this field.
Topics of interest include, but are not limited to, the following:
Security protocols in 5G/6G architectures;
Privacy issues in 5G/6G architectures;
Security aspects in cloud/edge/fog computing;
Security aspects in multi-access edge computing (MEC);
Security aspects in the Internet of Things and/or cyber-physical systems;
Security management in modern virtualized networks (NFV, SDN, network slicing);
Access control mechanisms in modern networks;
Machine learning/artificial intelligence for 5G/6G network security;
Intrusion detection systems in 5G/6G networks;
Traffic analysis applied to 5G/6G networks;
Analytics and big data for network security;
Optimization techniques to improve 5G/6G network security;
Resilience strategies to improve 5G/6G network security;
Security aspects in 5G/6G vehicular communications;
Security aspects in millimeter-wave communications;
Security aspects in radio access networks (RANs);
Security aspects in 5G-oriented hardware (e.g., FPGA);
Security aspects in smart environments and industrial systems.
Finally, I would like to thank Dr. Giovanni Galatro and his valuable work for assisting me with this Special Issue.
Dr. Mario Di Mauro
Dr. Marco Tambasco
Dr. Francesco Pascale
Guest Editors
https://www.mdpi.com/journal/futureinternet/special_issues/5G_Security
The increasing number of connected cars introduced new cyber-attacks strategies that give life to potentially devastating scenarios on everyday life. In fact, the connected cars show many vulnerabilities and are not conform to the policies defined in the AIC Model (availability, integrity and confidentiality). On the other hand, the advantages related to cars connected are very useful for implementing new innovative scenarios providing, for example, context and situation awareness in some operative scenarios. The main problem relies in the introduction of effective techniques that works in well-known framework (PC, Smartphone, ...) in a real challenging environment as the automotive. In this scenario, the main parameter to consider is that of the quick ability to identify and react a possible attack. So the idea is to create and develop an embedded Intrusion Detection System for Automotive. This work adopting a Bayesian Network approach for the quick identification of malicious messages on the controller Area Network (CAN-Bus).