Federico Lombardi
Federico Lombardi
University of Southampton
Verified email at
Cited by
Cited by
PBFT vs proof-of-authority: Applying the CAP theorem to permissioned blockchain
S De Angelis, L Aniello, R Baldoni, F Lombardi, A Margheri, V Sassone
CEUR workshop proceedings 2058, 2018
Blockchain-based database to ensure data integrity in cloud computing environments
E Gaetani, L Aniello, R Baldoni, F Lombardi, A Margheri, V Sassone
A blockchain-based infrastructure for reliable and cost-effective IoT-aided smart grids
F Lombardi, L Aniello, S De Angelis, A Margheri, V Sassone
IET Digital Library, 2018
A prototype evaluation of a tamper-resistant high performance blockchain-based transaction log for a distributed database
L Aniello, R Baldoni, E Gaetani, F Lombardi, A Margheri, V Sassone
2017 13th European Dependable Computing Conference (EDCC), 151-154, 2017
Elastic symbiotic scaling of operators and resources in stream processing systems
F Lombardi, L Aniello, S Bonomi, L Querzoni
IEEE Transactions on Parallel and Distributed Systems 29 (3), 572-585, 2017
Pascal: An architecture for proactive auto-scaling of distributed services
F Lombardi, A Muti, L Aniello, R Baldoni, S Bonomi, L Querzoni
Future Generation Computer Systems 98, 342-361, 2019
An architecture for automatic scaling of replicated services
L Aniello, S Bonomi, F Lombardi, A Zelli, R Baldoni
Networked Systems: Second International Conference, NETYS 2014, Marrakech …, 2014
Cloud2edge elastic AI framework for prototyping and deployment of AI inference engines in autonomous vehicles
S Grigorescu, T Cocias, B Trasnea, A Margheri, F Lombardi, L Aniello
Sensors 20 (19), 5450, 2020
Pbft vs proof-of-authority: applying the cap theorem to permissioned blockchain. 2018
S De Angelis, L Aniello, R Baldoni, F Lombardi, A Margheri, V Sassone
Limitations of Proof of Stake Algorithm in Blockchain, 2018
A blockchain-based solution for enabling log-based resolution of disputes in multi-party transactions
L Aniello, R Baldoni, F Lombardi
Proceedings of 5th International Conference in Software Engineering for …, 2018
Towards a semantic modelling for threat analysis of IoT applications: A case study on transactive energy
N Fadhel, F Lombardi, L Aniello, A Margheri, V Sassone
IET Digital Library, 2019
Towards a non-intrusive recognition of anomalous system behavior in data centers
R Baldoni, A Cerocchi, C Ciccotelli, A Donno, F Lombardi, L Montanari
Computer Safety, Reliability, and Security: SAFECOMP 2014 Workshops: ASCoMS …, 2014
Nirvana: A non-intrusive black-box monitoring framework for rack-level fault detection
C Ciccotelli, L Aniello, F Lombardi, L Montanari, L Querzoni, R Baldoni
2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing …, 2015
Blockchain and cybersecurity: a taxonomic approach
S De Angelis, G Zanfino, L Aniello, F Lombardi, V Sassone
EU Blockchain Observatory, October, 2019
Cross-cloud management of sensitive data via Blockchain: A payslip calculation use case
L Nicoletti, A Margheri, F Lombardi, V Sassone, FP Schiavo
CEUR-WS. org, 2018
Privacy and security evaluation of Amazon Echo voice assistant
N AlOtaibi, F Lombardi
2021 International Conference of Women in Data Science at Taif University …, 2021
From DevOps to DevSecOps is not enough. CyberDevOps: an extreme shifting-left architecture to bring cybersecurity within software security lifecycle pipeline
F Lombardi, A Fanton
Software Quality Journal 31 (2), 619-654, 2023
Evaluating Blockchain Systems: A Comprehensive Study of Security and Dependability Attributes
S De Angelis, G Zanfino, L Aniello, F Lombardi, V Sassone
Proceedings http://ceur-ws. org ISSN 1613, 0073, 2022
A proactive q-learning approach for autoscaling heterogeneous cloud servers
F Lombardi
2018 14th European Dependable Computing Conference (EDCC), 166-172, 2018
Security and dependability analysis of blockchain systems in partially synchronous networks with Byzantine faults
S De Angelis, F Lombardi, G Zanfino, L Aniello, V Sassone
International Journal of Parallel, Emergent and Distributed Systems, 1-21, 2023
The system can't perform the operation now. Try again later.
Articles 1–20