Aurelio La Corte | University of Catania (original) (raw)

Papers by Aurelio La Corte

Research paper thumbnail of Security and QoS analysis for Next Generation Networks

In recent years, information and communication technology (ICT) has been characterised by several... more In recent years, information and communication technology (ICT) has been characterised by several evolving trends and new challanges. The design and management of each information system must address issues related to planning an ICT infrastructure. Communication technologies are evolving very fast, following the current trend of the time when everything is becoming digitized and the demand for new ubiquitous services is growing. This process has enabled the advent of the Next Generation Network (NGN). With the development of the Next Generation Network, considering the proposed infrastructure, speed, services and amount of connections will increase exponentially. At the same time vulnerability, threats, risk and quality of service (QoS), should be adequately assessed for the continuous evolution of the converged network, which will define roles and relationship in the future information and communication environment. In this paper we propose an overview of the Next Generation netwo...

Research paper thumbnail of Convergence, security and quality in the NGN

International Journal of Internet Technology and Secured Transactions, 2012

Research paper thumbnail of User-Profile Framework against a Spit Attack on VoIP Systems

Spam over Internet Telephony is becoming a large problem of the Voice over IP Architectures. Voic... more Spam over Internet Telephony is becoming a large problem of the Voice over IP Architectures. Voice over IP has become a valid alternative to the Public Switched Telephone Network and it has a new paradigm for providing telephony services at a lower cost and higher flexibility. In the meantime, with Voice over IP the privacy becomes so hard and the benefits introduced are as strong as the security problems, like Spam over Internet Telephony. People have more attention on the spam voice issue, because of the great danger of this threat. Thus, in this paper we want to propose and introduce a new protection model against Spam over Internet Telephony attack, through a user-profile framework. This framework allows to identify the optimal countermeasures to be taken against this threat, according to the user assessment, that receives a certain number of calls during an observation period. We define general profiles based on certain parameters, and with a user-profile matching we can identifies the best security path which must be applied.

Research paper thumbnail of Security analysis and countermeasures assessment against spit attacks on VoIP systems

Spam over Internet Telephony is becoming a large problem of the Voice over IP Architectures. Voic... more Spam over Internet Telephony is becoming a large problem of the Voice over IP Architectures. Voice over IP has become a valid alternative to the Public Switched Telephone Network and it has a new paradigm for providing telephony services at a lower cost and higher flexibility. In the meantime, with Voice over IP the privacy becomes so hard and the benefits introduced are as strong as the security problems, like Spam over Internet Telephony. People have more attention on the spam voice issue, because of the great danger of this threat. Thus, in this paper we want to propose and introduce a new protection model against Spam over Internet Telephony attack, through a user-profile framework. This framework allows to identify the optimal counter-measures to be taken against this threat, according to the user assessment, that receives a certain number of calls during an observation period. We define general profiles based on certain parameters, and with a user-profile matching we can ident...

Research paper thumbnail of Health Mining: A new data fusion and integration paradigm

One of the future challenges of information and communication technology (ICT) is particularly ta... more One of the future challenges of information and communication technology (ICT) is particularly targeted at public health and clinical interventions management. The aim is to make smart the management and the processes that characterize this context to optimize the procedures and provide technological support. In this paper we propose the starting point of a new approach through architecture to introduce methodologies for fusing, integrating and drawing inference from a plurality of clinical, social and Internet of Things data, extracted from different sources. Health Mining is the central node of the proposed architecture and serves as a knowledge base for bio-inspired systems to support and perform the diagnostic process; this approach is better than the one applied with a plurality of disgregated data.

Research paper thumbnail of Failure Time Analysis and Threats Statistic to Assess Risk and Security Strategy in a communication System

The paper presents and evalutes one of the most important aspects in an information and communica... more The paper presents and evalutes one of the most important aspects in an information and communication technology system that is to preserve the information from any attacks trying to ensure the protection of data while maintaining quality of service, confidentiality, availability and integrity. In recent years, the process towards convergence has been devoloped to take into account several evolving trends and new challenges. Most of this is about security. New security issues make it necessary to analyse and manage the safety of the information and communication systems. Thus, an economic investment can not ignore the technical evaluation of the system, vulnerabilities analysis, threats taxonomy, and the estimate of expected risk, in order to ensure proper countermeasures to limit the technological and economic damage over time. Risk analysis involves the technical, human and economic aspects, to guide strategy of investment. Following a bio-inspired approach, this analysis requires ...

Research paper thumbnail of <title>WDM metropolitan area network based on a parallel IEEE 802.6 architecture</title>

Local and Metropolitan Area Networks, 1993

ABSTRACT

Research paper thumbnail of Time-frequency characterization of magnetization dynamics in spin-torque

i iN s = . We use the complex Morlet (1) wavelet ψ , this yields the corresponding wavelet family... more i iN s = . We use the complex Morlet (1) wavelet ψ , this yields the corresponding wavelet family function , us ψ : 2 1 2 , 1 C B tu tu jf fs s us B ee sf π ψ π − −⎛ ⎞ ⎛⎞ − ⎜⎟ ⎜⎟ ⎝⎠ ⎝⎠ =

Research paper thumbnail of A Process Approach to Manage the Security of the Communication Systems with Risk Analysis Based on Epidemiological Model

2010 Fifth International Conference on Systems and Networks Communications, 2010

Information security means protecting information and information systems from unauthorized acces... more Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction, to assure confidentiality, availability and integrity. The new trends of telecommunications of the last year is the move towards the trasmission of voice over traditional packet switched IP network, voice over IP, that has become a valid alternative to traditional public circuit-switched telephone network and then the convergence of the communication systems, through the next generation networks definition. This environment presents many security problems and significant security challenges. The voice over IP system increase these with those normally tie to IP network. Along with a several benefits of voice over IP, there are new security threats for exchanged informations. This paper analyzes the security issues of the communication systems, starting from the traditional public switched telephone network toward the new next generation network. Then, with this paper, we want to introduce a process approach to manage the security, based on epidemiological model. This model is characterized by three steps, Analysis, Assessment and Management, and it can be applied to a general information security system, to identify, assess and classify the information assets, the processes concerning it, vulnerabilities of each level and common threats. Finally we evaluate the risk and the probability of damage that can crash the system or part of this and propose a model of failure time analysis. The target of this analysis is to calculate the extent of the risk function in order to understand the state and the degree of security of our system, by studying the statistics of failure and to ensure highest degree of security optimizing the business strategic decisions and information and communication technology security economic investments. The methodology is designed to be applied in the future to communication systems, more specifically. This does not exclude the application of this methodology in other areas of interest (biomedical or economical areas) to understand, formalize and solve problems of similar nature.

Research paper thumbnail of A parallel MAC architecture for a Gigabit/s DQDB MAN suitable for multimedia applications

European Transactions on Telecommunications, 1996

ABSTRACT Medium access control protocols based on a dual bus topology, such as the IEEE 802.6 Dis... more ABSTRACT Medium access control protocols based on a dual bus topology, such as the IEEE 802.6 Distributed Queue Dual Bus (DQDB), are usually considered to be highly satisfactory for high speed networks. But the DQDB can only partly support new sophisticated multimedia services, mainly because the increase in the channel bit rate needed to meet the greater bandwidth requirements causes an increase in unfairness in the medium access control of the nodes. In this paper the authors propose a Gigabit/s Metropolitan Area Network (MAN) based on the IEEE 802.6 DQDB protocol and multichannel connectivity on optical fiber, by means of Wavelength Division Multiplexing (WDM). They present a parallel node architecture in which N DQDB subnodes parallelly access N WDM channels. Channel access at each node is regulated by N finite state machines operating independently and sharing a single MAC Convergence Functions (MCF) block for the segmentation and reassembly of user information. On the basis of the MAC architecture proposed, B network management structure is also presented, with particular reference to the Quality of Service monitoring processes. The proposed architecture is more modular than the DQDB standard; it provides greater fairness and better access delay and allows efficient management of service classes with priority.

Research paper thumbnail of A dynamic context-aware multiple criteria decision making model in social networks

International Conference on Information Society (i-Society 2014), 2014

Research paper thumbnail of A comparison between advanced time–frequency analyses of non-stationary magnetization dynamics in spin-torque oscillators

Physica B: Condensed Matter, 2014

Research paper thumbnail of A framework for the damage evaluation of acoustic emission signals through Hilbert–Huang transform

Mechanical Systems and Signal Processing, 2015

Research paper thumbnail of A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mobile Ad Hoc and Sensor Networks

International Journal on AdHoc Networking Systems, 2015

As it is well known, the QoS(quality of service) provided by mobile Internet access point devices... more As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet access networks are not designed to support real-time data traffic because of several drawbacks concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc., which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable for a series of network-centric application such as real-time communications and monitoring, video surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The main idea is to exploit multiple radio access networks in order to enhance the available end-to-end bandwidth and the perceived quality of experience. The scope has been reached by combining multiple radio access with dynamic load balancing and the VPN (virtual private network) bond technique.

Research paper thumbnail of Intrinsic synchronization of an array of spin-torque oscillators driven by the spin-Hall effect

This paper micromagnetically studies the magnetization dynamics driven by the spin-Hall effect in... more This paper micromagnetically studies the magnetization dynamics driven by the spin-Hall effect in a Platinum/Permalloy bi-layer. For a certain field and current range, the excitation of a uniform mode, characterized by a power with a spatial distribution in the whole ferromagnetic cross section, is observed. We suggest to use the ferromagnet of the bi-layer as basis for the realization of an array of spin-torque oscillators (STOs): the Permalloy ferromagnet will act as shared free layer, whereas the spacers and the polarizers are built on top of it. Following this strategy, the frequency of the uniform mode will be the same for the whole device, creating an intrinsic synchronization. The synchronization of an array of parallely connected STOs will allow to increase the output power, as necessary for technological applications.

Research paper thumbnail of Time-frequency study of spintronic oscillators based on Hilbert-Huang Transform

2014 AEIT Annual Conference - From Research to Industry: The Need for a More Effective Technology Transfer (AEIT), 2014

Research paper thumbnail of A generalized tool for accurate time-domain separation of excited modes in spin-torque oscillators

Journal of Applied Physics, 2014

We propose and develop an advanced signal processing technique that, combined with micromagnetic ... more We propose and develop an advanced signal processing technique that, combined with micromagnetic simulations, is able to deeply describe the non-stationary behavior of spin-torque oscillators, both in term of time domain and spatial distribution of the magnetization dynamics.

Research paper thumbnail of The Bio-Inspired and Social Evolution of Node and Data in a Multilayer Network

ABSTRACT Following a bio-inspired approach, applied to multilayer social networks, the idea is to... more ABSTRACT Following a bio-inspired approach, applied to multilayer social networks, the idea is to build a novel paradigm aimed to improve methodologies and analysis in the Information and Communication Technologies. The social network and the multilayer structure allow to carry out an analysis of the complex patterns, in terms of the dynamics involving the main entities, nodes and data. The nodes represent the basic kernel from which generating ties, interactions, flow of information, influences and action strategies that affect the communities. The data, gathered from multiple sources, after their integration, will become complex objects, enclosing different kinds of information. The proposed approach introduces a level of abstraction that originates from the evolution of nodes and data transformed in “social objects”. This new paradigm consists of a multilayer social network, divided into three layers, generating an increasing awareness, from “things” to “knowledge”, extracting as much “knowledge” as possible. This paradigm allows to redesign the ICT in a bio-networks driven approach.

Research paper thumbnail of An end-to-end mechanism for jitter control in multimedia services

Proceedings of the Ifip Sixth International Conference on High Performance Networking Vi, 1995

Research paper thumbnail of A dynamic context-aware multiple criteria decision making model in social networks

International Conference on Information Society, Nov 1, 2014

Research paper thumbnail of Security and QoS analysis for Next Generation Networks

In recent years, information and communication technology (ICT) has been characterised by several... more In recent years, information and communication technology (ICT) has been characterised by several evolving trends and new challanges. The design and management of each information system must address issues related to planning an ICT infrastructure. Communication technologies are evolving very fast, following the current trend of the time when everything is becoming digitized and the demand for new ubiquitous services is growing. This process has enabled the advent of the Next Generation Network (NGN). With the development of the Next Generation Network, considering the proposed infrastructure, speed, services and amount of connections will increase exponentially. At the same time vulnerability, threats, risk and quality of service (QoS), should be adequately assessed for the continuous evolution of the converged network, which will define roles and relationship in the future information and communication environment. In this paper we propose an overview of the Next Generation netwo...

Research paper thumbnail of Convergence, security and quality in the NGN

International Journal of Internet Technology and Secured Transactions, 2012

Research paper thumbnail of User-Profile Framework against a Spit Attack on VoIP Systems

Spam over Internet Telephony is becoming a large problem of the Voice over IP Architectures. Voic... more Spam over Internet Telephony is becoming a large problem of the Voice over IP Architectures. Voice over IP has become a valid alternative to the Public Switched Telephone Network and it has a new paradigm for providing telephony services at a lower cost and higher flexibility. In the meantime, with Voice over IP the privacy becomes so hard and the benefits introduced are as strong as the security problems, like Spam over Internet Telephony. People have more attention on the spam voice issue, because of the great danger of this threat. Thus, in this paper we want to propose and introduce a new protection model against Spam over Internet Telephony attack, through a user-profile framework. This framework allows to identify the optimal countermeasures to be taken against this threat, according to the user assessment, that receives a certain number of calls during an observation period. We define general profiles based on certain parameters, and with a user-profile matching we can identifies the best security path which must be applied.

Research paper thumbnail of Security analysis and countermeasures assessment against spit attacks on VoIP systems

Spam over Internet Telephony is becoming a large problem of the Voice over IP Architectures. Voic... more Spam over Internet Telephony is becoming a large problem of the Voice over IP Architectures. Voice over IP has become a valid alternative to the Public Switched Telephone Network and it has a new paradigm for providing telephony services at a lower cost and higher flexibility. In the meantime, with Voice over IP the privacy becomes so hard and the benefits introduced are as strong as the security problems, like Spam over Internet Telephony. People have more attention on the spam voice issue, because of the great danger of this threat. Thus, in this paper we want to propose and introduce a new protection model against Spam over Internet Telephony attack, through a user-profile framework. This framework allows to identify the optimal counter-measures to be taken against this threat, according to the user assessment, that receives a certain number of calls during an observation period. We define general profiles based on certain parameters, and with a user-profile matching we can ident...

Research paper thumbnail of Health Mining: A new data fusion and integration paradigm

One of the future challenges of information and communication technology (ICT) is particularly ta... more One of the future challenges of information and communication technology (ICT) is particularly targeted at public health and clinical interventions management. The aim is to make smart the management and the processes that characterize this context to optimize the procedures and provide technological support. In this paper we propose the starting point of a new approach through architecture to introduce methodologies for fusing, integrating and drawing inference from a plurality of clinical, social and Internet of Things data, extracted from different sources. Health Mining is the central node of the proposed architecture and serves as a knowledge base for bio-inspired systems to support and perform the diagnostic process; this approach is better than the one applied with a plurality of disgregated data.

Research paper thumbnail of Failure Time Analysis and Threats Statistic to Assess Risk and Security Strategy in a communication System

The paper presents and evalutes one of the most important aspects in an information and communica... more The paper presents and evalutes one of the most important aspects in an information and communication technology system that is to preserve the information from any attacks trying to ensure the protection of data while maintaining quality of service, confidentiality, availability and integrity. In recent years, the process towards convergence has been devoloped to take into account several evolving trends and new challenges. Most of this is about security. New security issues make it necessary to analyse and manage the safety of the information and communication systems. Thus, an economic investment can not ignore the technical evaluation of the system, vulnerabilities analysis, threats taxonomy, and the estimate of expected risk, in order to ensure proper countermeasures to limit the technological and economic damage over time. Risk analysis involves the technical, human and economic aspects, to guide strategy of investment. Following a bio-inspired approach, this analysis requires ...

Research paper thumbnail of <title>WDM metropolitan area network based on a parallel IEEE 802.6 architecture</title>

Local and Metropolitan Area Networks, 1993

ABSTRACT

Research paper thumbnail of Time-frequency characterization of magnetization dynamics in spin-torque

i iN s = . We use the complex Morlet (1) wavelet ψ , this yields the corresponding wavelet family... more i iN s = . We use the complex Morlet (1) wavelet ψ , this yields the corresponding wavelet family function , us ψ : 2 1 2 , 1 C B tu tu jf fs s us B ee sf π ψ π − −⎛ ⎞ ⎛⎞ − ⎜⎟ ⎜⎟ ⎝⎠ ⎝⎠ =

Research paper thumbnail of A Process Approach to Manage the Security of the Communication Systems with Risk Analysis Based on Epidemiological Model

2010 Fifth International Conference on Systems and Networks Communications, 2010

Information security means protecting information and information systems from unauthorized acces... more Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction, to assure confidentiality, availability and integrity. The new trends of telecommunications of the last year is the move towards the trasmission of voice over traditional packet switched IP network, voice over IP, that has become a valid alternative to traditional public circuit-switched telephone network and then the convergence of the communication systems, through the next generation networks definition. This environment presents many security problems and significant security challenges. The voice over IP system increase these with those normally tie to IP network. Along with a several benefits of voice over IP, there are new security threats for exchanged informations. This paper analyzes the security issues of the communication systems, starting from the traditional public switched telephone network toward the new next generation network. Then, with this paper, we want to introduce a process approach to manage the security, based on epidemiological model. This model is characterized by three steps, Analysis, Assessment and Management, and it can be applied to a general information security system, to identify, assess and classify the information assets, the processes concerning it, vulnerabilities of each level and common threats. Finally we evaluate the risk and the probability of damage that can crash the system or part of this and propose a model of failure time analysis. The target of this analysis is to calculate the extent of the risk function in order to understand the state and the degree of security of our system, by studying the statistics of failure and to ensure highest degree of security optimizing the business strategic decisions and information and communication technology security economic investments. The methodology is designed to be applied in the future to communication systems, more specifically. This does not exclude the application of this methodology in other areas of interest (biomedical or economical areas) to understand, formalize and solve problems of similar nature.

Research paper thumbnail of A parallel MAC architecture for a Gigabit/s DQDB MAN suitable for multimedia applications

European Transactions on Telecommunications, 1996

ABSTRACT Medium access control protocols based on a dual bus topology, such as the IEEE 802.6 Dis... more ABSTRACT Medium access control protocols based on a dual bus topology, such as the IEEE 802.6 Distributed Queue Dual Bus (DQDB), are usually considered to be highly satisfactory for high speed networks. But the DQDB can only partly support new sophisticated multimedia services, mainly because the increase in the channel bit rate needed to meet the greater bandwidth requirements causes an increase in unfairness in the medium access control of the nodes. In this paper the authors propose a Gigabit/s Metropolitan Area Network (MAN) based on the IEEE 802.6 DQDB protocol and multichannel connectivity on optical fiber, by means of Wavelength Division Multiplexing (WDM). They present a parallel node architecture in which N DQDB subnodes parallelly access N WDM channels. Channel access at each node is regulated by N finite state machines operating independently and sharing a single MAC Convergence Functions (MCF) block for the segmentation and reassembly of user information. On the basis of the MAC architecture proposed, B network management structure is also presented, with particular reference to the Quality of Service monitoring processes. The proposed architecture is more modular than the DQDB standard; it provides greater fairness and better access delay and allows efficient management of service classes with priority.

Research paper thumbnail of A dynamic context-aware multiple criteria decision making model in social networks

International Conference on Information Society (i-Society 2014), 2014

Research paper thumbnail of A comparison between advanced time–frequency analyses of non-stationary magnetization dynamics in spin-torque oscillators

Physica B: Condensed Matter, 2014

Research paper thumbnail of A framework for the damage evaluation of acoustic emission signals through Hilbert–Huang transform

Mechanical Systems and Signal Processing, 2015

Research paper thumbnail of A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mobile Ad Hoc and Sensor Networks

International Journal on AdHoc Networking Systems, 2015

As it is well known, the QoS(quality of service) provided by mobile Internet access point devices... more As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet access networks are not designed to support real-time data traffic because of several drawbacks concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc., which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable for a series of network-centric application such as real-time communications and monitoring, video surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The main idea is to exploit multiple radio access networks in order to enhance the available end-to-end bandwidth and the perceived quality of experience. The scope has been reached by combining multiple radio access with dynamic load balancing and the VPN (virtual private network) bond technique.

Research paper thumbnail of Intrinsic synchronization of an array of spin-torque oscillators driven by the spin-Hall effect

This paper micromagnetically studies the magnetization dynamics driven by the spin-Hall effect in... more This paper micromagnetically studies the magnetization dynamics driven by the spin-Hall effect in a Platinum/Permalloy bi-layer. For a certain field and current range, the excitation of a uniform mode, characterized by a power with a spatial distribution in the whole ferromagnetic cross section, is observed. We suggest to use the ferromagnet of the bi-layer as basis for the realization of an array of spin-torque oscillators (STOs): the Permalloy ferromagnet will act as shared free layer, whereas the spacers and the polarizers are built on top of it. Following this strategy, the frequency of the uniform mode will be the same for the whole device, creating an intrinsic synchronization. The synchronization of an array of parallely connected STOs will allow to increase the output power, as necessary for technological applications.

Research paper thumbnail of Time-frequency study of spintronic oscillators based on Hilbert-Huang Transform

2014 AEIT Annual Conference - From Research to Industry: The Need for a More Effective Technology Transfer (AEIT), 2014

Research paper thumbnail of A generalized tool for accurate time-domain separation of excited modes in spin-torque oscillators

Journal of Applied Physics, 2014

We propose and develop an advanced signal processing technique that, combined with micromagnetic ... more We propose and develop an advanced signal processing technique that, combined with micromagnetic simulations, is able to deeply describe the non-stationary behavior of spin-torque oscillators, both in term of time domain and spatial distribution of the magnetization dynamics.

Research paper thumbnail of The Bio-Inspired and Social Evolution of Node and Data in a Multilayer Network

ABSTRACT Following a bio-inspired approach, applied to multilayer social networks, the idea is to... more ABSTRACT Following a bio-inspired approach, applied to multilayer social networks, the idea is to build a novel paradigm aimed to improve methodologies and analysis in the Information and Communication Technologies. The social network and the multilayer structure allow to carry out an analysis of the complex patterns, in terms of the dynamics involving the main entities, nodes and data. The nodes represent the basic kernel from which generating ties, interactions, flow of information, influences and action strategies that affect the communities. The data, gathered from multiple sources, after their integration, will become complex objects, enclosing different kinds of information. The proposed approach introduces a level of abstraction that originates from the evolution of nodes and data transformed in “social objects”. This new paradigm consists of a multilayer social network, divided into three layers, generating an increasing awareness, from “things” to “knowledge”, extracting as much “knowledge” as possible. This paradigm allows to redesign the ICT in a bio-networks driven approach.

Research paper thumbnail of An end-to-end mechanism for jitter control in multimedia services

Proceedings of the Ifip Sixth International Conference on High Performance Networking Vi, 1995

Research paper thumbnail of A dynamic context-aware multiple criteria decision making model in social networks

International Conference on Information Society, Nov 1, 2014