Aurelio La Corte | University of Catania (original) (raw)
Papers by Aurelio La Corte
In recent years, information and communication technology (ICT) has been characterised by several... more In recent years, information and communication technology (ICT) has been characterised by several evolving trends and new challanges. The design and management of each information system must address issues related to planning an ICT infrastructure. Communication technologies are evolving very fast, following the current trend of the time when everything is becoming digitized and the demand for new ubiquitous services is growing. This process has enabled the advent of the Next Generation Network (NGN). With the development of the Next Generation Network, considering the proposed infrastructure, speed, services and amount of connections will increase exponentially. At the same time vulnerability, threats, risk and quality of service (QoS), should be adequately assessed for the continuous evolution of the converged network, which will define roles and relationship in the future information and communication environment. In this paper we propose an overview of the Next Generation netwo...
International Journal of Internet Technology and Secured Transactions, 2012
Spam over Internet Telephony is becoming a large problem of the Voice over IP Architectures. Voic... more Spam over Internet Telephony is becoming a large problem of the Voice over IP Architectures. Voice over IP has become a valid alternative to the Public Switched Telephone Network and it has a new paradigm for providing telephony services at a lower cost and higher flexibility. In the meantime, with Voice over IP the privacy becomes so hard and the benefits introduced are as strong as the security problems, like Spam over Internet Telephony. People have more attention on the spam voice issue, because of the great danger of this threat. Thus, in this paper we want to propose and introduce a new protection model against Spam over Internet Telephony attack, through a user-profile framework. This framework allows to identify the optimal countermeasures to be taken against this threat, according to the user assessment, that receives a certain number of calls during an observation period. We define general profiles based on certain parameters, and with a user-profile matching we can identifies the best security path which must be applied.
Spam over Internet Telephony is becoming a large problem of the Voice over IP Architectures. Voic... more Spam over Internet Telephony is becoming a large problem of the Voice over IP Architectures. Voice over IP has become a valid alternative to the Public Switched Telephone Network and it has a new paradigm for providing telephony services at a lower cost and higher flexibility. In the meantime, with Voice over IP the privacy becomes so hard and the benefits introduced are as strong as the security problems, like Spam over Internet Telephony. People have more attention on the spam voice issue, because of the great danger of this threat. Thus, in this paper we want to propose and introduce a new protection model against Spam over Internet Telephony attack, through a user-profile framework. This framework allows to identify the optimal counter-measures to be taken against this threat, according to the user assessment, that receives a certain number of calls during an observation period. We define general profiles based on certain parameters, and with a user-profile matching we can ident...
One of the future challenges of information and communication technology (ICT) is particularly ta... more One of the future challenges of information and communication technology (ICT) is particularly targeted at public health and clinical interventions management. The aim is to make smart the management and the processes that characterize this context to optimize the procedures and provide technological support. In this paper we propose the starting point of a new approach through architecture to introduce methodologies for fusing, integrating and drawing inference from a plurality of clinical, social and Internet of Things data, extracted from different sources. Health Mining is the central node of the proposed architecture and serves as a knowledge base for bio-inspired systems to support and perform the diagnostic process; this approach is better than the one applied with a plurality of disgregated data.
The paper presents and evalutes one of the most important aspects in an information and communica... more The paper presents and evalutes one of the most important aspects in an information and communication technology system that is to preserve the information from any attacks trying to ensure the protection of data while maintaining quality of service, confidentiality, availability and integrity. In recent years, the process towards convergence has been devoloped to take into account several evolving trends and new challenges. Most of this is about security. New security issues make it necessary to analyse and manage the safety of the information and communication systems. Thus, an economic investment can not ignore the technical evaluation of the system, vulnerabilities analysis, threats taxonomy, and the estimate of expected risk, in order to ensure proper countermeasures to limit the technological and economic damage over time. Risk analysis involves the technical, human and economic aspects, to guide strategy of investment. Following a bio-inspired approach, this analysis requires ...
Local and Metropolitan Area Networks, 1993
ABSTRACT
i iN s = . We use the complex Morlet (1) wavelet ψ , this yields the corresponding wavelet family... more i iN s = . We use the complex Morlet (1) wavelet ψ , this yields the corresponding wavelet family function , us ψ : 2 1 2 , 1 C B tu tu jf fs s us B ee sf π ψ π − −⎛ ⎞ ⎛⎞ − ⎜⎟ ⎜⎟ ⎝⎠ ⎝⎠ =
2010 Fifth International Conference on Systems and Networks Communications, 2010
Information security means protecting information and information systems from unauthorized acces... more Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction, to assure confidentiality, availability and integrity. The new trends of telecommunications of the last year is the move towards the trasmission of voice over traditional packet switched IP network, voice over IP, that has become a valid alternative to traditional public circuit-switched telephone network and then the convergence of the communication systems, through the next generation networks definition. This environment presents many security problems and significant security challenges. The voice over IP system increase these with those normally tie to IP network. Along with a several benefits of voice over IP, there are new security threats for exchanged informations. This paper analyzes the security issues of the communication systems, starting from the traditional public switched telephone network toward the new next generation network. Then, with this paper, we want to introduce a process approach to manage the security, based on epidemiological model. This model is characterized by three steps, Analysis, Assessment and Management, and it can be applied to a general information security system, to identify, assess and classify the information assets, the processes concerning it, vulnerabilities of each level and common threats. Finally we evaluate the risk and the probability of damage that can crash the system or part of this and propose a model of failure time analysis. The target of this analysis is to calculate the extent of the risk function in order to understand the state and the degree of security of our system, by studying the statistics of failure and to ensure highest degree of security optimizing the business strategic decisions and information and communication technology security economic investments. The methodology is designed to be applied in the future to communication systems, more specifically. This does not exclude the application of this methodology in other areas of interest (biomedical or economical areas) to understand, formalize and solve problems of similar nature.
European Transactions on Telecommunications, 1996
ABSTRACT Medium access control protocols based on a dual bus topology, such as the IEEE 802.6 Dis... more ABSTRACT Medium access control protocols based on a dual bus topology, such as the IEEE 802.6 Distributed Queue Dual Bus (DQDB), are usually considered to be highly satisfactory for high speed networks. But the DQDB can only partly support new sophisticated multimedia services, mainly because the increase in the channel bit rate needed to meet the greater bandwidth requirements causes an increase in unfairness in the medium access control of the nodes. In this paper the authors propose a Gigabit/s Metropolitan Area Network (MAN) based on the IEEE 802.6 DQDB protocol and multichannel connectivity on optical fiber, by means of Wavelength Division Multiplexing (WDM). They present a parallel node architecture in which N DQDB subnodes parallelly access N WDM channels. Channel access at each node is regulated by N finite state machines operating independently and sharing a single MAC Convergence Functions (MCF) block for the segmentation and reassembly of user information. On the basis of the MAC architecture proposed, B network management structure is also presented, with particular reference to the Quality of Service monitoring processes. The proposed architecture is more modular than the DQDB standard; it provides greater fairness and better access delay and allows efficient management of service classes with priority.
International Conference on Information Society (i-Society 2014), 2014
Physica B: Condensed Matter, 2014
Mechanical Systems and Signal Processing, 2015
International Journal on AdHoc Networking Systems, 2015
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices... more As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet access networks are not designed to support real-time data traffic because of several drawbacks concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc., which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable for a series of network-centric application such as real-time communications and monitoring, video surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The main idea is to exploit multiple radio access networks in order to enhance the available end-to-end bandwidth and the perceived quality of experience. The scope has been reached by combining multiple radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
This paper micromagnetically studies the magnetization dynamics driven by the spin-Hall effect in... more This paper micromagnetically studies the magnetization dynamics driven by the spin-Hall effect in a Platinum/Permalloy bi-layer. For a certain field and current range, the excitation of a uniform mode, characterized by a power with a spatial distribution in the whole ferromagnetic cross section, is observed. We suggest to use the ferromagnet of the bi-layer as basis for the realization of an array of spin-torque oscillators (STOs): the Permalloy ferromagnet will act as shared free layer, whereas the spacers and the polarizers are built on top of it. Following this strategy, the frequency of the uniform mode will be the same for the whole device, creating an intrinsic synchronization. The synchronization of an array of parallely connected STOs will allow to increase the output power, as necessary for technological applications.
2014 AEIT Annual Conference - From Research to Industry: The Need for a More Effective Technology Transfer (AEIT), 2014
Journal of Applied Physics, 2014
We propose and develop an advanced signal processing technique that, combined with micromagnetic ... more We propose and develop an advanced signal processing technique that, combined with micromagnetic simulations, is able to deeply describe the non-stationary behavior of spin-torque oscillators, both in term of time domain and spatial distribution of the magnetization dynamics.
ABSTRACT Following a bio-inspired approach, applied to multilayer social networks, the idea is to... more ABSTRACT Following a bio-inspired approach, applied to multilayer social networks, the idea is to build a novel paradigm aimed to improve methodologies and analysis in the Information and Communication Technologies. The social network and the multilayer structure allow to carry out an analysis of the complex patterns, in terms of the dynamics involving the main entities, nodes and data. The nodes represent the basic kernel from which generating ties, interactions, flow of information, influences and action strategies that affect the communities. The data, gathered from multiple sources, after their integration, will become complex objects, enclosing different kinds of information. The proposed approach introduces a level of abstraction that originates from the evolution of nodes and data transformed in “social objects”. This new paradigm consists of a multilayer social network, divided into three layers, generating an increasing awareness, from “things” to “knowledge”, extracting as much “knowledge” as possible. This paradigm allows to redesign the ICT in a bio-networks driven approach.
Proceedings of the Ifip Sixth International Conference on High Performance Networking Vi, 1995
International Conference on Information Society, Nov 1, 2014
In recent years, information and communication technology (ICT) has been characterised by several... more In recent years, information and communication technology (ICT) has been characterised by several evolving trends and new challanges. The design and management of each information system must address issues related to planning an ICT infrastructure. Communication technologies are evolving very fast, following the current trend of the time when everything is becoming digitized and the demand for new ubiquitous services is growing. This process has enabled the advent of the Next Generation Network (NGN). With the development of the Next Generation Network, considering the proposed infrastructure, speed, services and amount of connections will increase exponentially. At the same time vulnerability, threats, risk and quality of service (QoS), should be adequately assessed for the continuous evolution of the converged network, which will define roles and relationship in the future information and communication environment. In this paper we propose an overview of the Next Generation netwo...
International Journal of Internet Technology and Secured Transactions, 2012
Spam over Internet Telephony is becoming a large problem of the Voice over IP Architectures. Voic... more Spam over Internet Telephony is becoming a large problem of the Voice over IP Architectures. Voice over IP has become a valid alternative to the Public Switched Telephone Network and it has a new paradigm for providing telephony services at a lower cost and higher flexibility. In the meantime, with Voice over IP the privacy becomes so hard and the benefits introduced are as strong as the security problems, like Spam over Internet Telephony. People have more attention on the spam voice issue, because of the great danger of this threat. Thus, in this paper we want to propose and introduce a new protection model against Spam over Internet Telephony attack, through a user-profile framework. This framework allows to identify the optimal countermeasures to be taken against this threat, according to the user assessment, that receives a certain number of calls during an observation period. We define general profiles based on certain parameters, and with a user-profile matching we can identifies the best security path which must be applied.
Spam over Internet Telephony is becoming a large problem of the Voice over IP Architectures. Voic... more Spam over Internet Telephony is becoming a large problem of the Voice over IP Architectures. Voice over IP has become a valid alternative to the Public Switched Telephone Network and it has a new paradigm for providing telephony services at a lower cost and higher flexibility. In the meantime, with Voice over IP the privacy becomes so hard and the benefits introduced are as strong as the security problems, like Spam over Internet Telephony. People have more attention on the spam voice issue, because of the great danger of this threat. Thus, in this paper we want to propose and introduce a new protection model against Spam over Internet Telephony attack, through a user-profile framework. This framework allows to identify the optimal counter-measures to be taken against this threat, according to the user assessment, that receives a certain number of calls during an observation period. We define general profiles based on certain parameters, and with a user-profile matching we can ident...
One of the future challenges of information and communication technology (ICT) is particularly ta... more One of the future challenges of information and communication technology (ICT) is particularly targeted at public health and clinical interventions management. The aim is to make smart the management and the processes that characterize this context to optimize the procedures and provide technological support. In this paper we propose the starting point of a new approach through architecture to introduce methodologies for fusing, integrating and drawing inference from a plurality of clinical, social and Internet of Things data, extracted from different sources. Health Mining is the central node of the proposed architecture and serves as a knowledge base for bio-inspired systems to support and perform the diagnostic process; this approach is better than the one applied with a plurality of disgregated data.
The paper presents and evalutes one of the most important aspects in an information and communica... more The paper presents and evalutes one of the most important aspects in an information and communication technology system that is to preserve the information from any attacks trying to ensure the protection of data while maintaining quality of service, confidentiality, availability and integrity. In recent years, the process towards convergence has been devoloped to take into account several evolving trends and new challenges. Most of this is about security. New security issues make it necessary to analyse and manage the safety of the information and communication systems. Thus, an economic investment can not ignore the technical evaluation of the system, vulnerabilities analysis, threats taxonomy, and the estimate of expected risk, in order to ensure proper countermeasures to limit the technological and economic damage over time. Risk analysis involves the technical, human and economic aspects, to guide strategy of investment. Following a bio-inspired approach, this analysis requires ...
Local and Metropolitan Area Networks, 1993
ABSTRACT
i iN s = . We use the complex Morlet (1) wavelet ψ , this yields the corresponding wavelet family... more i iN s = . We use the complex Morlet (1) wavelet ψ , this yields the corresponding wavelet family function , us ψ : 2 1 2 , 1 C B tu tu jf fs s us B ee sf π ψ π − −⎛ ⎞ ⎛⎞ − ⎜⎟ ⎜⎟ ⎝⎠ ⎝⎠ =
2010 Fifth International Conference on Systems and Networks Communications, 2010
Information security means protecting information and information systems from unauthorized acces... more Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction, to assure confidentiality, availability and integrity. The new trends of telecommunications of the last year is the move towards the trasmission of voice over traditional packet switched IP network, voice over IP, that has become a valid alternative to traditional public circuit-switched telephone network and then the convergence of the communication systems, through the next generation networks definition. This environment presents many security problems and significant security challenges. The voice over IP system increase these with those normally tie to IP network. Along with a several benefits of voice over IP, there are new security threats for exchanged informations. This paper analyzes the security issues of the communication systems, starting from the traditional public switched telephone network toward the new next generation network. Then, with this paper, we want to introduce a process approach to manage the security, based on epidemiological model. This model is characterized by three steps, Analysis, Assessment and Management, and it can be applied to a general information security system, to identify, assess and classify the information assets, the processes concerning it, vulnerabilities of each level and common threats. Finally we evaluate the risk and the probability of damage that can crash the system or part of this and propose a model of failure time analysis. The target of this analysis is to calculate the extent of the risk function in order to understand the state and the degree of security of our system, by studying the statistics of failure and to ensure highest degree of security optimizing the business strategic decisions and information and communication technology security economic investments. The methodology is designed to be applied in the future to communication systems, more specifically. This does not exclude the application of this methodology in other areas of interest (biomedical or economical areas) to understand, formalize and solve problems of similar nature.
European Transactions on Telecommunications, 1996
ABSTRACT Medium access control protocols based on a dual bus topology, such as the IEEE 802.6 Dis... more ABSTRACT Medium access control protocols based on a dual bus topology, such as the IEEE 802.6 Distributed Queue Dual Bus (DQDB), are usually considered to be highly satisfactory for high speed networks. But the DQDB can only partly support new sophisticated multimedia services, mainly because the increase in the channel bit rate needed to meet the greater bandwidth requirements causes an increase in unfairness in the medium access control of the nodes. In this paper the authors propose a Gigabit/s Metropolitan Area Network (MAN) based on the IEEE 802.6 DQDB protocol and multichannel connectivity on optical fiber, by means of Wavelength Division Multiplexing (WDM). They present a parallel node architecture in which N DQDB subnodes parallelly access N WDM channels. Channel access at each node is regulated by N finite state machines operating independently and sharing a single MAC Convergence Functions (MCF) block for the segmentation and reassembly of user information. On the basis of the MAC architecture proposed, B network management structure is also presented, with particular reference to the Quality of Service monitoring processes. The proposed architecture is more modular than the DQDB standard; it provides greater fairness and better access delay and allows efficient management of service classes with priority.
International Conference on Information Society (i-Society 2014), 2014
Physica B: Condensed Matter, 2014
Mechanical Systems and Signal Processing, 2015
International Journal on AdHoc Networking Systems, 2015
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices... more As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet access networks are not designed to support real-time data traffic because of several drawbacks concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc., which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable for a series of network-centric application such as real-time communications and monitoring, video surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The main idea is to exploit multiple radio access networks in order to enhance the available end-to-end bandwidth and the perceived quality of experience. The scope has been reached by combining multiple radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
This paper micromagnetically studies the magnetization dynamics driven by the spin-Hall effect in... more This paper micromagnetically studies the magnetization dynamics driven by the spin-Hall effect in a Platinum/Permalloy bi-layer. For a certain field and current range, the excitation of a uniform mode, characterized by a power with a spatial distribution in the whole ferromagnetic cross section, is observed. We suggest to use the ferromagnet of the bi-layer as basis for the realization of an array of spin-torque oscillators (STOs): the Permalloy ferromagnet will act as shared free layer, whereas the spacers and the polarizers are built on top of it. Following this strategy, the frequency of the uniform mode will be the same for the whole device, creating an intrinsic synchronization. The synchronization of an array of parallely connected STOs will allow to increase the output power, as necessary for technological applications.
2014 AEIT Annual Conference - From Research to Industry: The Need for a More Effective Technology Transfer (AEIT), 2014
Journal of Applied Physics, 2014
We propose and develop an advanced signal processing technique that, combined with micromagnetic ... more We propose and develop an advanced signal processing technique that, combined with micromagnetic simulations, is able to deeply describe the non-stationary behavior of spin-torque oscillators, both in term of time domain and spatial distribution of the magnetization dynamics.
ABSTRACT Following a bio-inspired approach, applied to multilayer social networks, the idea is to... more ABSTRACT Following a bio-inspired approach, applied to multilayer social networks, the idea is to build a novel paradigm aimed to improve methodologies and analysis in the Information and Communication Technologies. The social network and the multilayer structure allow to carry out an analysis of the complex patterns, in terms of the dynamics involving the main entities, nodes and data. The nodes represent the basic kernel from which generating ties, interactions, flow of information, influences and action strategies that affect the communities. The data, gathered from multiple sources, after their integration, will become complex objects, enclosing different kinds of information. The proposed approach introduces a level of abstraction that originates from the evolution of nodes and data transformed in “social objects”. This new paradigm consists of a multilayer social network, divided into three layers, generating an increasing awareness, from “things” to “knowledge”, extracting as much “knowledge” as possible. This paradigm allows to redesign the ICT in a bio-networks driven approach.
Proceedings of the Ifip Sixth International Conference on High Performance Networking Vi, 1995
International Conference on Information Society, Nov 1, 2014