Vita Santa Barletta

Vita Santa Barletta
Verified
Vita verified their affiliation via an institutional email.
Verified
Vita verified their affiliation via an institutional email.
  • Ph.D in Computer Science and Mathematics
  • Professor (Assistant) at University of Bari Aldo Moro

About

65
Publications
10,663
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
642
Citations
Introduction
Current institution
University of Bari Aldo Moro
Current position
  • Professor (Assistant)
Additional affiliations
February 2021 - present
University of Bari Aldo Moro
Position
  • PhD

Publications

Publications (65)
Article
Full-text available
In our modern digital landscape, web browsers play a crucial role as gateways to large amounts of information and services. However, recent developments have demonstrated that the very features that make browsing convenient and seamless can be exploited by malicious actors through a potent threat vector known as the “Browser-in-the-Middle” (BitM) a...
Article
Full-text available
With the advent of Quantum Computing and its exponential research endeavors in the past couple of decades, we are looking at a Golden Era of Quantum Computing. We are transitioning into an age of Hybrid Classical‐Quantum Computers, where the quantum computational resources are selectively harnessed for resource‐intensive tasks. On the one hand, Qua...
Article
Full-text available
Computer architecture is considered one of the dry and hard-to-learn courses for students in the computer science discipline. Therefore, educational institutions experiment with different pedagogical approaches to enhance students’ performance and interest in courses. This study introduces a Simplified Approach to Teach a Processor (SAtTaP), a refo...
Article
Full-text available
Currently and in the near future, Smart Cities are vital to enhance urban living, address resource challenges, optimize infrastructure, and harness technology for sustainability, efficiency, and improved quality of life in rapidly urbanizing environments. Owing to the high usage of networks, sensors, and connected devices, Smart Cities generate a m...
Conference Paper
Full-text available
Violence perpetrated to their own partner is a social issue that can take place in different forms and in different settings (i.e., in person, online). These different forms of violence can be circumscribed into two broad categories known as Intimate Partner Violence (IPV) and Cyber Intimate Partner Violence (C-IPV). Social Media and technologies c...
Research Proposal
Full-text available
The overall goal of this interdisciplinary workshop is to raise the level of engagement and discussion about SE and AI communities to identify opportunities to improve the quality of scientific results and improvements on software product development. A further goal of the workshop is to identify opportunities to improve the quality of scientific...
Chapter
Smart Cities are becoming a reality now with ample interest and investment from both government and private entities. As the number of Smart Cities increases, so does the sheer size and variety of data, the major part of which comes from Internet of Things (IoT) sensors embedded in devices. Millions of intelligent devices may be vulnerable to cyber...
Chapter
Speech disorders and impairments are multiple dysfunctions that affect an individual’s linguistic abilities, frequently occurring during childhood. More specifically, speech therapy involves the administration of treatments to patients that are defined based on the diverse causes and severity of language impairments; they consist of sets of exercis...
Article
Full-text available
The use of serious games for the treatment of people with autism is currently considered a promising approach due to its positive effects on promoting learning through playful and motivating experiences. In recent years, increased research has focused on serious games utilizing Immersive Virtual Reality (IVR) technologies, such as large-scale proje...
Preprint
Full-text available
In the last years, the raise of Artificial Intelligence (AI), and its pervasiveness in our lives, has sparked a flourishing debate about the ethical principles that should lead its implementation and use in society. Driven by these concerns, we conduct a rapid review of several frameworks providing principles, guidelines, and/or tools to help pract...
Article
Full-text available
Companies and organizations involved in software development are stimulated and often obliged to consider procedures and technical solutions to guarantee data privacy and protection from the early phases of the software lifecycle. In addition, by default, personal data might be processed with the highest privacy protection level. These two requirem...
Article
Full-text available
The Information Security Management Systems (ISMS) are global and risk-driven processes that allow companies to develop their cybersecurity strategy by defining security policies, valuable assets, controls, and technologies for protecting their systems and information from threats and vulnerabilities. Despite the implementation of such management i...
Research Proposal
Full-text available
This special issue is intended to explore the assumption (and to provide at least partial evidence) that the most successful Artificial Intelligence (AI) systems out there today are dependent on teams of humans, just as humans depend on these systems to gain access to information, provide insights and perform tasks beyond their own capabilities. An...
Research Proposal
Full-text available
We propose the first edition of the workshop on Cyber Security Education for Industry and Academia (CSE4IA) to be co-located with the next edition of IS-EUD 2023. Cybersecurity education has become increasingly important in recent years due to the shortage of cybersecurity professionals in the international job market. To address this challenge, it...
Conference Paper
The new breed of vehicles comes stashed with cutting-edge technologies. The in-vehicle communication system (CAN Bus) smartly connects to all such Electronic Control Units (ECU) to enhance the safety, security, and stability of the vehicle, driver, and passengers. We need efficient and real-time Intrusion Detection Systems (IDS) to prevent threats...
Conference Paper
In the last years, the raise of Artificial Intelligence (AI), and its pervasiveness in our lives, has sparked a flourishing debate about the ethical principles that should lead its implementation and use in society. Driven by these concerns, we conduct a rapid review of several frameworks providing principles, guidelines, and/or tools to help pract...
Conference Paper
Full-text available
Software quality is crucial in software development: if not addressed in early phases of the software development life cycle, it may even lead to technical bankruptcy, i.e., a situation in which modifications cost more than redeveloping the application from scratch. In addition, code security must also be addressed to reduce software vulnerabilitie...
Article
Full-text available
Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other using various protocols that, if not properly designed, may be vulnerable to local or remote attacks....
Chapter
Full-text available
The digital transformation and innovation of today’s environment requires a focus on the security of systems to preserve their confidentiality, integrity, and availability. Considering these needs, in this work an efficient and high-performance intrusion detection system based on Quantum Annealing is presented. The goal is to identify attacks in an...
Article
Full-text available
The use of serious games for the treatment of people with autism is currently considered a promising approach due to its positive effects on promoting learning through playful and motivating experiences. In recent years, increased research has focused on serious games utilizing Immersive Virtual Reality (IVR) technologies, such as large-scale proje...
Article
Background Conversational agents are currently a valid alternative to humans in first-level interviews with users who need information, even in-depth, about services or products. In application domains such as health care, this technology can become pervasive only if the perceived ”quality in use” is appropriate. How to measure chatbot quality is a...
Chapter
The use of Serious Games in the treatment of people with Autism Spectrum Disorders is nowadays considered promising, given the positive effects in promoting the acquisition of learning through motivating and engaging experiences. In particular, recent years have seen increased research attention toward serious games based on Immersive Virtual Reali...
Article
Full-text available
CRISPR/Cas9 technology has greatly accelerated genome engineering research. The CRISPR/Cas9 complex, a bacterial immune response system, is widely adopted for RNA-driven targeted genome editing. The systematic mapping study presented in this paper examines the literature on machine learning (ML) techniques employed in the prediction of CRISPR/Cas9...
Article
Full-text available
The COVID-19 pandemic marked an important breakthrough in human progress: from working habits to social life, the world population’s behaviours changed according to the new lifestyle requirements. In this changing environment, university courses and learning methods evolved along with other “remote” working activities. For this quasi-experimental s...
Conference Paper
The digital transformation and innovation of today’s environment requires a focus on the security of systems to preserve their confidentiality, integrity, and availability. Considering these needs, in this work an efficient and high-performance intrusion detection system based on Quantum Annealing is presented. The goal is to identify attacks in an...
Conference Paper
Full-text available
Artificial Intelligence (AI) and Human-Computer Interaction are getting closer and closer in modern systems, leading to a slow but constant increasing synergy between the two topics. Text prediction and voice recognition are the most know application for AI techniques. Common examples are virtual keyboards, that suggests the next word to be used in...
Conference Paper
Privacy by Design and Security by Design are two fundamental as- pects in the current technological and regulatory context. Therefore, software development must integrate these aspects and consider software security on one hand, and user-centricity from the de- sign phase on the other. It is necessary to support the team in all stages of the softwa...
Chapter
Full-text available
Integrating security and privacy requirements at every stage of the software development cycle is critical to guarantee the confidentiality, integrity and availability of the system and consequently of the data. Developers need to be supported in this challenge, as many different skills are required to respond effectively to the growing number of c...
Article
Full-text available
Background . Conversational agents are currently a valid alternative to humans in first-level interviews with users who need information, even in-depth, about services or products. In application domains such as health care, this technology can become pervasive only if the perceived “quality in use” is appropriate. How to measure chatbot quality is...
Conference Paper
Privacy is becoming an increasingly important factor in software production. Indeed, besides increasing software quality, privacy is a mandatory aspect of national and supranational regulations like GDPR. However, several aspects like lack of knowledge on privacy and data protection regulations ambiguities limit the adoption of proper privacy imple...
Conference Paper
Full-text available
The use of technology to make a city smart provides opportunities and threats. Cities can be analyzed from different perspectives and dimensions. This paper addresses the level of security of Smart Cities derived by the observation of their technological level, according to a model that also considers several application domains. As a case study, t...
Conference Paper
Full-text available
Nowadays, software development must face the challenge of integrating security and privacy elements from the earliest stages of any software development process. A correct and complete implementation starting from the requirements definition allows to significantly increase the security level of each single phase/iteration and consequently of the f...
Conference Paper
Nowadays, the dimension and complexity of software development projects increase the possibility of cyber-attacks, information exfiltration and data breaches. In this context, developers play a primary role in addressing privacy requirements and, consequently security, in software applications. Currently, only general guidelines exist that are diff...
Article
Full-text available
As a consequence to factors such as progress made by the attackers, release of new technologies and use of increasingly complex systems, and threats to applications security have been continuously evolving. Security of code and privacy of data must be implemented in both design and programming practice to face such scenarios. In such a context, thi...
Article
Full-text available
The diffusion of connected devices in modern vehicles involves a lack in security of the in-vehicle communication networks such as the controller area network (CAN) bus. The CAN bus protocol does not provide security systems to counter cyber and physical attacks. Thus, an intrusion-detection system to identify attacks and anomalies on the CAN bus i...
Article
Full-text available
The diffusion of embedded and portable communication devices on modern vehicles entails new security risks since in-vehicle communication protocols are still insecure and vulnerable to attacks. Increasing interest is being given to the implementation of automotive cybersecurity systems. In this work we propose an efficient and high-performing intru...
Article
Full-text available
Context. A Smart city is intended as a city able to offer advanced integrated services, based on information and communication technology (ICT) technologies and intelligent (smart) use of urban infrastructures for improving the quality of life of its citizens. This goal is pursued by numerous cities worldwide, through smart projects that should con...
Chapter
Threats to applications security are continuously evolving thanks to factors such as progress made by the attackers, release of new technologies, use of increasingly complex systems. In this scenario, it is necessary to implement both design and programming practices that guarantee the security of the code on one hand, and the privacy of the data,...
Conference Paper
Full-text available
Nowadays cyber security is becoming an ever more stringent requirement and warned by organizations and companies all over the world. Furthermore, the educational offer on the topic is still modest and universities are struggling to design training courses capable of producing professionals directly employable. In this work, this need is addressed w...
Article
Full-text available
The Internet of Things becomes Internet of Everything when in the process of communication machine-to-machine also intelligent forms of communication between human and machine are involved. Cities can be viewed as a microcosm of this interconnected system where ICT and emerging technologies can be enabling factors to transform cities in Smart Citie...

Network

Cited By