175 results on '"Spognardi, A."'
Search Results
2. A Investigação e a escrita: Publicar sem Perecer
- Author
-
Sequeiros, Paula, Carvalho, Maria José Paiva Fernandes, Capinha, Graça, Miguéis, Ana Eva, Campos, Margarida de Cássia, Veronese, Marília Veríssimo, Souza, Fátima Valéria Ferreira de, Figueiredo, Otto Vinicius Agra, Silva, Fernando Laércio, Guerra, Roberta, Rachel, Carvalho, Miguéis, Ana Eva, Freitas, Francisco, Nunes, João Arriscado, Spognardi, Andrés, Matos, Ana Raquel, Silva, Patrícia, Torkington, Kate, Alcaire, Rita, Grácio, Rita, Pereira, Marco, Santos, Joana Vieira, Sequeiros, Paula, Carvalho, Maria José, Capinha, Graça, Sequeiros, Paula, Carvalho, Maria José Paiva Fernandes, Capinha, Graça, Miguéis, Ana Eva, Campos, Margarida de Cássia, Veronese, Marília Veríssimo, Souza, Fátima Valéria Ferreira de, Figueiredo, Otto Vinicius Agra, Silva, Fernando Laércio, Guerra, Roberta, Rachel, Carvalho, Miguéis, Ana Eva, Freitas, Francisco, Nunes, João Arriscado, Spognardi, Andrés, Matos, Ana Raquel, Silva, Patrícia, Torkington, Kate, Alcaire, Rita, Grácio, Rita, Pereira, Marco, and Santos, Joana Vieira
- Subjects
CD. User training, promotion, activities, education. ,CE. Literacy. ,DD. Academic libraries. ,E. Publishing and legal issues. - Abstract
Research and Writing: Publish do not Perish is a collection of texts published in Portuguese, based on the problematization of a five-year experience of advanced extracurricular training in information literacy, writing and scientific publication (i.e., Publish do not Perish: Survive the Stampede). It is a questioning of the role of science in a context that appears to reproduce neoliberalism and the commodification of academia. This work results from the collaboration of national and international authors who consider a diversity of theoretical and empirical fields that deal with that phenomenon. This book aims to identify and question the subsequent problems, trying to point out solutions to the growing malaise in the academic world.
- Published
- 2021
3. Impact of organic and “protected designation of origin” labels in the perception of olive oil sensory quality
- Author
-
Spognardi, Sara, Vistocco, Domenico, Cappelli, Lucio, and Papetti, Patrizia
- Published
- 2021
- Full Text
- View/download PDF
4. Balloon-based drug coating delivery to the artery wall is dictated by coating micro-morphology and angioplasty pressure gradients
- Author
-
Tzafriri, Abraham R., Muraj, Benny, Garcia-Polite, Fernando, Salazar-Martín, Antonio G., Markham, Peter, Zani, Brett, Spognardi, Anna, Albaghdadi, Mazen, Alston, Steve, and Edelman, Elazer R.
- Published
- 2020
- Full Text
- View/download PDF
5. Emergent properties, models, and laws of behavioral similarities within groups of twitter users
- Author
-
Cresci, Stefano, Di Pietro, Roberto, Petrocchi, Marinella, Spognardi, Angelo, and Tesconi, Maurizio
- Published
- 2020
- Full Text
- View/download PDF
6. Splenic artery denervation: target micro-anatomy, feasibility, and early preclinical experience
- Author
-
Albaghdadi, Mazen, Garcia-Polite, Fernando, Zani, Brett, Keating, John, Melidone, Raffaele, Spognardi, Anna, Markham, Peter, and Tzafriri, Abraham
- Published
- 2019
- Full Text
- View/download PDF
7. On the capability of evolved spambots to evade detection via genetic engineering
- Author
-
Cresci, Stefano, Petrocchi, Marinella, Spognardi, Angelo, and Tognazzi, Stefano
- Published
- 2019
- Full Text
- View/download PDF
8. Reducing the False Negative Rate in Deep Learning Based Network Intrusion Detection Systems
- Author
-
Jovana Mijalkovic and Angelo Spognardi
- Subjects
NIDS ,deep learning ,false negative rate ,machine learning ,artificial neural network ,Industrial engineering. Management engineering ,T55.4-60.8 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Network Intrusion Detection Systems (NIDS) represent a crucial component in the security of a system, and their role is to continuously monitor the network and alert the user of any suspicious activity or event. In recent years, the complexity of networks has been rapidly increasing and network intrusions have become more frequent and less detectable. The increase in complexity pushed researchers to boost NIDS effectiveness by introducing machine learning (ML) and deep learning (DL) techniques. However, even with the addition of ML and DL, some issues still need to be addressed: high false negative rates and low attack predictability for minority classes. Aim of the study was to address these problems that have not been adequately addressed in the literature. Firstly, we have built a deep learning model for network intrusion detection that would be able to perform both binary and multiclass classification of network traffic. The goal of this base model was to achieve at least the same, if not better, performance than the models observed in the state-of-the-art research. Then, we proposed an effective refinement strategy and generated several models for lowering the FNR and increasing the predictability for the minority classes. The obtained results proved that using the proper parameters is possible to achieve a satisfying trade-off between FNR, accuracy, and detection of the minority classes.
- Published
- 2022
- Full Text
- View/download PDF
9. Arsenic accumulation in edible vegetables and health risk reduction by groundwater treatment using an adsorption process
- Author
-
Spognardi, Sara, Bravo, Ilenia, Beni, Claudio, Menegoni, Patrizia, Pietrelli, Loris, and Papetti, Patrizia
- Published
- 2019
- Full Text
- View/download PDF
10. Genetic effects in Helix aspersa near a coal plant revealed by the micronucleus test
- Author
-
Filippi, Silvia, Meschini, Roberta, Spognardi, Sara, Papetti, Patrizia, and Angeletti, Dario
- Published
- 2018
- Full Text
- View/download PDF
11. Demystifying Misconceptions in Social Bots Research
- Author
-
Cresci, Stefano, Di Pietro, Roberto, Spognardi, Angelo, Tesconi, Maurizio, and Petrocchi, Marinella
- Subjects
Social and Information Networks (cs.SI) ,FOS: Computer and information sciences ,Computer Science - Computers and Society ,Computer Science - Machine Learning ,Artificial Intelligence (cs.AI) ,Computer Science - Artificial Intelligence ,Computers and Society (cs.CY) ,Computer Science - Social and Information Networks ,Machine Learning (cs.LG) - Abstract
The science of social bots seeks knowledge and solutions to one of the most debated forms of online misinformation. Yet, social bots research is plagued by widespread biases, hyped results, and misconceptions that set the stage for ambiguities, unrealistic expectations, and seemingly irreconcilable findings. Overcoming such issues is instrumental towards ensuring reliable solutions and reaffirming the validity of the scientific method. In this contribution we revise some recent results in social bots research, highlighting and correcting factual errors as well as methodological and conceptual issues. More importantly, we demystify common misconceptions, addressing fundamental points on how social bots research is discussed. Our analysis surfaces the need to discuss misinformation research in a rigorous, unbiased, and responsible way. This article bolsters such effort by identifying and refuting common fallacious arguments used by both proponents and opponents of social bots research as well as providing indications on the correct methodologies and sound directions for future research in the field.
- Published
- 2023
12. Improved Automatic Maturity Assessment of Wikipedia Medical Articles : (Short Paper)
- Author
-
Marzini, Emanuel, Spognardi, Angelo, Matteucci, Ilaria, Mori, Paolo, Petrocchi, Marinella, Conti, Riccardo, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Kobsa, Alfred, Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Meersman, Robert, editor, Panetto, Hervé, editor, Dillon, Tharam, editor, Missikoff, Michele, editor, Liu, Lin, editor, Pastor, Oscar, editor, Cuzzocrea, Alfredo, editor, and Sellis, Timos, editor
- Published
- 2014
- Full Text
- View/download PDF
13. Fame for sale: Efficient detection of fake Twitter followers
- Author
-
Cresci, Stefano, Di Pietro, Roberto, Petrocchi, Marinella, Spognardi, Angelo, and Tesconi, Maurizio
- Published
- 2015
- Full Text
- View/download PDF
14. Procedural and Anatomical Determinants of Multielectrode Renal Denervation Efficacy: Insights From Preclinical Models
- Author
-
Tzafriri, Abraham R., Mahfoud, Felix, Keating, John H., Spognardi, Anna-Maria, Markham, Peter M., Wong, Gee, Highsmith, Debby, O’Fallon, Patrick, Fuimaono, Kristine, and Edelman, Elazer R.
- Published
- 2019
- Full Text
- View/download PDF
15. A Study on Text-Score Disagreement in Online Reviews
- Author
-
Fazzolari, Michela, Cozza, Vittoria, Petrocchi, Marinella, and Spognardi, Angelo
- Published
- 2017
- Full Text
- View/download PDF
16. Domain-specific queries and Web search personalization: some investigations
- Author
-
Van Tien Hoang, Angelo Spognardi, Francesco Tiezzi, Marinella Petrocchi, and Rocco De Nicola
- Subjects
Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Major search engines deploy personalized Web results to enhance users' experience, by showing them data supposed to be relevant to their interests. Even if this process may bring benefits to users while browsing, it also raises concerns on the selection of the search results. In particular, users may be unknowingly trapped by search engines in protective information bubbles, called "filter bubbles", which can have the undesired effect of separating users from information that does not fit their preferences. This paper moves from early results on quantification of personalization over Google search query results. Inspired by previous works, we have carried out some experiments consisting of search queries performed by a battery of Google accounts with differently prepared profiles. Matching query results, we quantify the level of personalization, according to topics of the queries and the profile of the accounts. This work reports initial results and it is a first step a for more extensive investigation to measure Web search personalization.
- Published
- 2015
- Full Text
- View/download PDF
17. Los orígenes del cooperativismo de crédito en Argentina, 1887-1926
- Author
-
Andres Spognardi
- Subjects
cooperativas ,crédito ,legislación ,Argentina ,Latin America. Spanish America ,F1201-3799 ,Regional economics. Space in economics ,HT388 - Abstract
Las cooperativas de crédito argentinas dieron sus primeros pasos entre 1887 y 1926, al amparo de un marco legal impreciso. La pobre caracterización de la sociedad cooperativa en el código de comercio de 1889, y la falta de una legislación y regulación adecuada en el sistema financiero, dieron lugar a la aparición de una variedad de iniciativas, no siempre inspiradas por el espíritu de solidaridad y ayuda recíproca. El presente artículo ofrece un panorama general de aquellas experiencias pioneras. Combinando fuentes primarias y secundarias, se identifican y describen los rasgos esenciales de las entidades fundadas antes de la sanción de la primera Ley de Cooperativas, a finales de 1926. El estudio también discute los principales cambios introducidos por esa norma, examinando sus efectos inmediatos sobre la estructura del sector.
- Published
- 2017
- Full Text
- View/download PDF
18. Bioinspired Security Analysis of Wireless Protocols
- Author
-
Petrocchi, Marinella, Spognardi, Angelo, and Santi, Paolo
- Published
- 2016
- Full Text
- View/download PDF
19. Intrusion-resilient integrity in data-centric unattended WSNs
- Author
-
Di Pietro, Roberto, Soriente, Claudio, Spognardi, Angelo, and Tsudik, Gene
- Published
- 2011
- Full Text
- View/download PDF
20. Adversarial machine learning for protecting against online manipulation
- Author
-
Marinella Petrocchi, Angelo Spognardi, Stefano Cresci, and Stefano Tognazzi
- Subjects
Social and Information Networks (cs.SI) ,FOS: Computer and information sciences ,Computer Science - Machine Learning ,Computer Networks and Communications ,Computer science ,adversarial ,Computer Science - Social and Information Networks ,Learning models ,Stop signal ,Adversarial machine learning ,Computer security ,computer.software_genre ,Field (computer science) ,Machine Learning (cs.LG) ,Adversarial system ,machine learning ,Task analysis ,Data mining ,Social science methods or tools ,Fake news ,computer - Abstract
Adversarial examples are inputs to a machine learning system that result in an incorrect output from that system. Attacks launched through this type of input can cause severe consequences: for example, in the field of image recognition, a stop signal can be misclassified as a speed limit indication.However, adversarial examples also represent the fuel for a flurry of research directions in different domains and applications. Here, we give an overview of how they can be profitably exploited as powerful tools to build stronger learning models, capable of better-withstanding attacks, for two crucial tasks: fake news and social bot detection., To appear on IEEE Internet Computing. `Accepted manuscript' version
- Published
- 2021
21. Security assessment of common open source MQTT brokers and clients
- Author
-
EDOARDO DI PAOLO, Angelo Spognardi, and Enrico Bassetti
- Subjects
MQTT client ,IoT ,Internet-of-Things ,Message Queuing Telemetry Transport ,cybersecurity ,MQTT ,MQTT broker - Published
- 2021
22. TCT-432 Imaging-Based Evaluation and Differentiation of Vessel Preparation Technologies in a Porcine Model of Peripheral Artery Stenosis
- Author
-
Tzafriri, Abraham, Budrewicz, Jay, Spognardi, Anna, and Secemsky, Eric
- Published
- 2023
- Full Text
- View/download PDF
23. "Who Counterfeited My Viagra?" Probabilistic Item Removal Detection via RFID Tag Cooperation
- Author
-
Conti, Mauro, Di Pietro, Roberto, and Spognardi, Angelo
- Published
- 2011
- Full Text
- View/download PDF
24. Data security in unattended wireless sensor networks
- Author
-
Di Pietro, R., Mancini, L.V., Soriente, C., Spognardi, A., and Tsudik, G.
- Subjects
Data security issue ,Electronic data processing -- Analysis ,Data security -- Evaluation ,Wireless sensor networks -- Evaluation - Published
- 2009
25. Arsenic accumulation in edible vegetables and health risk reduction by groundwater treatment using an adsorption process
- Author
-
Loris Pietrelli, Ilenia Bravo, Patrizia Menegoni, Patrizia Papetti, Claudio Beni, Sara Spognardi, Spognardi, S., Bravo, I., Beni, C., Menegoni, P., Pietrelli, L., and Papetti, P.
- Subjects
Irrigation ,Adolescent ,Health, Toxicology and Mutagenesis ,Raphanus ,chemistry.chemical_element ,Lactuca ,Food Contamination ,010501 environmental sciences ,Vegetable ,01 natural sciences ,Arsenic .Irrigationwater .Contamination .Vegetables .Redmud ,Arsenic ,Toxicology ,chemistry.chemical_compound ,Food chain ,Soil ,Contamination ,Metals, Heavy ,Vegetables ,Environmental Chemistry ,Ecotoxicology ,Humans ,Irrigation water ,Red mud ,Adsorption ,Aged ,Arsenates ,Groundwater ,Italy ,Lettuce ,Risk Reduction Behavior ,0105 earth and related environmental sciences ,biology ,food and beverages ,General Medicine ,Raphanu ,Heavy ,biology.organism_classification ,Pollution ,chemistry ,Arsenate ,Metals ,Environmental science ,Sodium arsenate ,Human - Abstract
The heavy metals transfer from the soil, where they accumulate, to the edible parts of the plants, and then, their entrance in the food chain can represent a source of concern for human health. Among heavy metals, arsenic is one of the most widespread in the soil of Lazio (central region of Italy), where the phytoavailable geogenic arsenic enters the food chain, with a dangerous exposition of the local population. In the first part of this work, plants of radish (Raphanus sativus L.) and lettuce (Lactuca sativa L.) were grown in protected culture in the experimental farm of CREA-AA, where they were daily treated with different concentrations of sodium arsenate dibasic heptahydrate in order to investigate differences in their arsenic accumulation capacities. In order to confirm the results achieved, in the second part of this study, the arsenic concentration was determined in commercial products obtained from contaminated areas of Lazio, and the potential exposition risk for human health through consumption of these widely consumed vegetables was estimated. The highest arsenic concentrations were found in the samples of lettuce. To evaluate the potential health risk from consumption of L. sativa and R. sativus, the estimated daily intake (EDI) for adults, adolescents, and elderly was calculated, finding that HRI (health risk index) index value for arsenic was low (< 1) in the case of chronic consumptions for all samples of radishes, and for the lettuces grown in the area of Viterbo. On the contrary, the lettuces obtained from Tuscania and Tarquinia presented very high concentrations of arsenic and a worrying HRI value. In order to reduce the risk of As toxicity in the people through consumption of the vegetables, the irrigation water should contain less than 0.1 mg As L−1. For this reason, the authors tested the application of red mud (RM) to remove As from groundwater before using it for the irrigation of radish and lettuce in greenhouse production.
- Published
- 2019
26. Reducing the False Negative Rate in Deep Learning Based Network Intrusion Detection Systems.
- Author
-
Mijalkovic, Jovana and Spognardi, Angelo
- Subjects
- *
INTEREST rates , *INTRUSION detection systems (Computer security) , *DEEP learning , *MACHINE learning , *ARTIFICIAL neural networks - Abstract
Network Intrusion Detection Systems (NIDS) represent a crucial component in the security of a system, and their role is to continuously monitor the network and alert the user of any suspicious activity or event. In recent years, the complexity of networks has been rapidly increasing and network intrusions have become more frequent and less detectable. The increase in complexity pushed researchers to boost NIDS effectiveness by introducing machine learning (ML) and deep learning (DL) techniques. However, even with the addition of ML and DL, some issues still need to be addressed: high false negative rates and low attack predictability for minority classes. Aim of the study was to address these problems that have not been adequately addressed in the literature. Firstly, we have built a deep learning model for network intrusion detection that would be able to perform both binary and multiclass classification of network traffic. The goal of this base model was to achieve at least the same, if not better, performance than the models observed in the state-of-the-art research. Then, we proposed an effective refinement strategy and generated several models for lowering the FNR and increasing the predictability for the minority classes. The obtained results proved that using the proper parameters is possible to achieve a satisfying trade-off between FNR, accuracy, and detection of the minority classes. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
27. Balloon-based drug coating delivery to the artery wall is dictated by coating micro-morphology and angioplasty pressure gradients
- Author
-
Peter Markham, Steve Alston, Benny Muraj, Abraham R. Tzafriri, Brett G. Zani, Fernando Garcia-Polite, Antonio G. Salazar-Martín, Anna Spognardi, Elazer R. Edelman, and Mazen Albaghdadi
- Subjects
Materials science ,Paclitaxel ,Scanning electron microscope ,Swine ,medicine.medical_treatment ,Biophysics ,Bioengineering ,02 engineering and technology ,engineering.material ,Balloon ,Article ,Biomaterials ,Excipients ,03 medical and health sciences ,chemistry.chemical_compound ,Coating ,Restenosis ,Coated Materials, Biocompatible ,In vivo ,Angioplasty ,medicine ,Animals ,Humans ,030304 developmental biology ,0303 health sciences ,Drug-Eluting Stents ,021001 nanoscience & nanotechnology ,medicine.disease ,Femoral Artery ,Treatment Outcome ,chemistry ,Mechanics of Materials ,Drug delivery ,Ceramics and Composites ,engineering ,0210 nano-technology ,Biomedical engineering - Abstract
Paclitaxel coated balloon catheters (PCB) were developed as a polymer-free non-implantable alternative to drug eluting stents, delivering similar drug payloads in a matter of minutes. While PCB have shown efficacy in treating peripheral arterial disease in certain patient groups, restenosis rates remain high and there is no class effect. To help further optimize these devices, we developed a scanning electron microscopy (SEM) imaging technique and computational modeling approach that provide insights into the coating micromorphology dependence of in vivo drug transfer and retention. PCBs coated with amorphous/flaky or microneedle coatings were inflated for 60 sec in porcine femoral arteries. Animals were euthanized at 0.5, 24 and 72 h and treated arteries processed for SEM to image endoluminal coating distribution followed by paclitaxel quantification by mass spectrometry (MS). Endoluminal surfaces exhibited sparse coating patches at 0.5 h, predominantly protruding (13.71 vs 0.59%, P 0.001), with similar micro-morphologies to nominal PCB surfaces. Microneedle coating covered a 1.5-fold endoluminal area (16.1 vs 10.7%, P = 0.0035) owing to higher proximal and distal delivery, and achieved 1.5-fold tissue concentrations by MS (1933 vs 1298 μg/g, P = 0.1745) compared to amorphous/flaky coating. Acute longitudinal coating distribution tracked computationally predicted microindentation pressure gradients (r = 0.9, P 0.001), with superior transfer of the microneedle coatings attributed to their amplification of angioplasty contact pressures. By 24 h, paclitaxel concentration and coated tissue areas both declined by93% even as nonprotruding coating levels were stable between 0.5 and 72 h, and 2.7-fold higher for microneedle vs flaky coating (0.64 vs 0.24%, P = 0.0195). Tissue retained paclitaxel concentrations at 24-72 h trended 1.7-fold higher post treatment with microneedle coating compared to the amorphous/flaky coating (69.9 vs 39.9 μg/g, P = 0.066). Thus, balloon based drug delivery is critically dependent on coating micromorphologies, with superior performance exhibited by micromorphologies that amplify angioplasty pressures.
- Published
- 2020
28. A perspective on the potential health risks from PCBs and heavy metals contamination of M. merluccius from Mediterranean Sea
- Author
-
L Cappelli, Patrizia Papetti, Ilenia Bravo, Riccardo Rea, and Sara Spognardi
- Subjects
polychlorinated biphenyls ,chemistry.chemical_element ,Merluccius ,Mediterranean sea ,Hake ,Merluccius merluccius ,Mediterranean Sea ,PCBs ,heavy metals ,European hake ,Nutrition and Dietetics ,biology ,Public Health, Environmental and Occupational Health ,Metal contaminants ,Contamination ,biology.organism_classification ,Mercury (element) ,bioaccumulation ,chemistry ,Environmental chemistry ,Bioaccumulation ,Environmental science ,Safety Research ,Food Science - Abstract
In this study, we determined the concentration of six marker PCBS congeners and four trace elements, all having a maximum tolerable level of intake set by EU regulation, in samples of European hake taken from the Mediterranean Sea. The results showed that the contaminant levels were below the recommended international limits in all samples, although with higher PCBs concentrations in samples from Ligurian and Adriatic Sea. The relationships between the contaminants and the sampling sites were investigated using analysis of variance (ANOVA) and Tukey's HSD post-hoc tests. Statistical analysis revealed significant interactions especially between the PCBs, the sum of PCBs and the sites. To evaluate the potential health risk from consumption, we calculated the estimated daily intake (EDI) for adults, finding that total health risk index (HRI) value was low (< 1) in the case of chronic consumptions, despite the non-negligible mercury concentration.
- Published
- 2020
29. 'Who Counterfeited My Viagra?' Probabilistic Item Removal Detection via RFID Tag Cooperation
- Author
-
Mauro Conti, Roberto Di Pietro, and Angelo Spognardi
- Subjects
Telecommunication ,TK5101-6720 ,Electronics ,TK7800-8360 - Published
- 2011
- Full Text
- View/download PDF
30. Determining the authenticity of PDO buffalo mozzarella: an approach based on Fourier transform infrared (MIR-FTIR) spectroscopy and on chemometric tools
- Author
-
Spognardi, Sara, Passaretti, Davide, Vistocco, Domenico, Cappelli, Lucio, Papetti, Patrizia, Spognardi, Sara, Passaretti, Davide, Vistocco, Domenico, Cappelli, Lucio, and Papetti, Patrizia
- Subjects
cheese-making processes ,Attenuated total reflectance infrared spectroscopy, PDO Buffalo mozzarella, Italian cheese, food authenticity, cheese-making processes ,food authenticity ,PDO Buffalo mozzarella ,Attenuated total reflectance infrared spectroscopy ,Italian cheese - Abstract
The potential of Mid-infrared spectroscopy coupled with chemometric tools was evaluated for the authentication and discrimination of PDO (Protected Denomination of Origin) buffalo mozzarella produced by traditional and industrial cheese-making processes. Samples of mozzarella provided by local producers and supermarkets were analysed through both official destructive methods and Attenuated Total Reflectance-Fourier transform infrared spectroscopy (FTIR/ATR). In particular, destructive methods allowed to determine the content of fatty substances, proteins, moisture and total nitrogen. The results show that only the conjunction of MID-infrared spectroscopy with chemometric analysis can provide a satisfying solution to discriminate between the different types of mozzarella.
- Published
- 2018
31. The rise and fall of industrial self‐management in Portugal: A historical institutionalist perspective
- Author
-
Andrés Spognardi
- Subjects
Self-management ,Political science ,Perspective (graphical) ,Positive economics - Published
- 2019
32. Natural urban farming as a mean to connect community to sustainable food: the case of demonstration garden in Tor Mancina
- Author
-
Ilenia Bravo, Patrizia Papetti, Claudio Beni, Enrica Iannucci, and Sara Spognardi
- Subjects
demonstration garden ,sustainable production ,community garden ,urban agriculture ,business.industry ,Applied Mathematics ,media_common.quotation_subject ,Biodiversity and food ,Biodiversity ,Livelihood ,Agriculture ,Sustainability ,Sustainable agriculture ,Quality (business) ,business ,Urban agriculture ,Environmental planning ,media_common - Abstract
Urban agriculture plays an important role to provide an innovative and different connection to food. Visitors, scholars, and generally participants of community gardens activities become 'food citizens', shift from being passive food consumers to becoming co-producers. To achieve this goal, the demonstration garden of Tor Mancina with the involvement of schools and of local communities tests innovative and more sustainable agricultural practices and carries out experiments to test the phytostimulant and pest repellent effects of aromatic and officinalis plants extracts used as basic substances in plant protection management. These experiments aim at inculcating positive values on food, agriculture and environment in growing youth, providing effective solutions to increase crop performance, to enhance the tolerance of plants against stressors, to safeguard the nature, biodiversity and food quality. These activities teach sustainable agriculture practices which form basis for stable livelihood and informed consumption habits. For this reason more initiatives should be in place, nationwide, aimed at encouraging the visit of the community gardens and participation in their activities, in order to learn more about the provenance of food, agricultural processes, nutrition, safety and security, biodiversity and sustainability, and develop new skills.
- Published
- 2019
33. DNA-inspired characterization and detection of novel social Twitter spambots
- Author
-
Marinella Petrocchi, Stefano Cresci, Angelo Spognardi, Roberto Di Pietro, and Maurizio Tesconi
- Subjects
Computer science ,business.industry ,Unsolicited e-mail ,Novelty ,Security of data ,Social networking (online) ,Dna ,Pattern classification ,Machine learning ,computer.software_genre ,Behavioral modeling ,Information sensitivity ,Spambot ,Artificial intelligence ,Cyberspace ,business ,computer - Abstract
Spambot detection is a must for the protection of cyberspace, in terms of both threats to sensitive information of users and trolls that may want to cheat and influence the public opinion. Unfortunately, new waves of malicious accounts are characterized by advanced features, making their detection extremely challenging. In contrast with the supervised spambot detectors largely used in recent years and inspired by biological DNA, we propose an alternative, unsupervised detection approach. Its novelty is based on the idea of modeling online user behaviors with strings of characters representing the sequence of the user's online actions. Exploiting this nature-inspired behavioral model, the proposed technique lets groups of spambots emerge from the crowd, by comparing the accounts' behaviors. Results show that the proposal outperforms the best-of-breed algorithms commonly employed for spambot detection.
- Published
- 2019
34. Emergent properties, models, and laws of behavioral similarities within groups of twitter users
- Author
-
Angelo Spognardi, Marinella Petrocchi, Roberto Di Pietro, Maurizio Tesconi, and Stefano Cresci
- Subjects
Behavioral modeling ,Behavioral similarities ,Group analyses ,Suspicious behavior detection ,Digital DNA ,Twitter ,Computer Networks and Communications ,Computer science ,020206 networking & telecommunications ,02 engineering and technology ,Human behavior ,Law ,0202 electrical engineering, electronic engineering, information engineering ,Benchmark (computing) ,Leverage (statistics) ,020201 artificial intelligence & image processing - Abstract
DNA-inspired online behavioral modeling techniques have been proposed and successfully applied to a broad range of tasks. In this paper, we investigate the fundamental laws that drive the occurrence of behavioral similarities among Twitter users, employing a DNA-inspired technique. Our findings are multifold. First, we demonstrate that, despite apparently featuring little to no similarities, the online behaviors of Twitter users are far from being uniformly random. Secondly, we benchmark different behavioral models through a number of simulations. We characterize the main properties of such models and we identify those models that better resemble human behaviors in Twitter. Then, we demonstrate that the number and the extent of behavioral similarities within a group of Twitter users obey a log-normal law, and we leverage this characterization to propose a novel bot detection system. In a nutshell, the results shed light on the fundamental properties that drive the online behaviors of groups of Twitter users, through the lenses of DNA-inspired behavioral modeling techniques. This study is based on a wealth of data gathered over several months that, for the sake of reproducibility, are publicly available for research purposes.
- Published
- 2019
35. Having your waffle and eating it too: the EEOC's right to circumvent arbitration agreements.
- Author
-
Spognardi, Mark A. and Ketay, Staci L.
- Subjects
Employment discrimination -- Laws, regulations and rules ,Labor arbitration -- Laws, regulations and rules ,United States. Equal Employment Opportunity Commission -- Powers and duties ,Government regulation - Abstract
During the last three decades, employers have recognized that discrimination in the workplace will not be tolerated by either the courts or the court of public opinion. As the employment [...]
- Published
- 2002
36. Contributions from ADBIS 2018 workshops
- Author
-
Angelo Spognardi, Massimo Ruffolo, Ermelinda Oro, Eduardo Fermé, Bernhard Thalheim, Udo Bub, Marinella Petrocchi, Fabio Fassetti, Bálint Molnár, Jérôme Darmont, Claudia Diamantini, Domenico Ursino, Ilaria Matteucci, Ajantha Dahanayake, Simona E. Rombo, Sham Navathe, and Nadia Kabachi
- Subjects
Information privacy ,Information sharing ,Computer science ,business.industry ,Research areas ,media_common.quotation_subject ,Big data ,Data science ,Presentation ,Thematic map ,Analytics ,Information system ,Database theory ,business ,media_common - Abstract
The ADBIS conferences provide an international forum for the presentation of research on database theory, development of advanced DBMS technologies, and their applications. The 22nd edition of ADBIS, held on September 2–5, 2018, in Budapest, Hungary, includes six thematic workshops collecting contributions from various domains representing new trends in the broad research areas of databases and information systems.
- Published
- 2018
37. DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation
- Author
-
De Donno, Michele, Dragoni, Nicola, Giaretta, Alberto, and Spognardi, Angelo
- Subjects
ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Article Subject - Abstract
The Internet of Things (IoT) revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable objects. Not surprisingly, this sudden flooding of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS) attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware seen so far.
- Published
- 2018
- Full Text
- View/download PDF
38. DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation
- Author
-
Angelo Spognardi, Michele De Donno, Nicola Dragoni, and Alberto Giaretta
- Subjects
business.industry ,Computer science ,Computer Networks and Communications ,Information Systems ,020206 networking & telecommunications ,020207 software engineering ,Denial-of-service attack ,02 engineering and technology ,computer.software_genre ,Computer security ,Popularity ,Flooding (computer networking) ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,lcsh:Technology (General) ,0202 electrical engineering, electronic engineering, information engineering ,Malware ,lcsh:T1-995 ,The Internet ,Internet of Things ,business ,lcsh:Science (General) ,computer ,lcsh:Q1-390 - Abstract
The Internet of Things (IoT) revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable objects. Not surprisingly, this sudden flooding of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS) attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware seen so far.
- Published
- 2018
39. A PERSPECTIVE ON THE POTENTIAL HEALTH RISK OF ARSENIC VIA DIETARY INTAKE OF RADISH AND LETTUCE FROM LATIUM
- Author
-
Spognardi, S., Bravo, I., Carelli, A., Papetti, P., and Beni, C.
- Subjects
vegetables ,contamination ,arsenic ,arsenic, irrigation water, contamination, vegetables, accumulation ,accumulation ,irrigation water - Published
- 2018
40. Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications
- Author
-
Angelo Spognardi, Nicola Dragoni, and Marios Argyriou
- Subjects
Article Subject ,business.industry ,Computer science ,Computer Networks and Communications ,Information Systems ,020206 networking & telecommunications ,02 engineering and technology ,computer.software_genre ,Machine learning ,Android security ,lcsh:Technology (General) ,0202 electrical engineering, electronic engineering, information engineering ,Malware ,lcsh:T1-995 ,020201 artificial intelligence & image processing ,Android application ,Artificial intelligence ,Android (operating system) ,business ,lcsh:Science (General) ,computer ,Daily routine ,lcsh:Q1-390 - Abstract
Android smartphones have become a vital component of the daily routine of millions of people, running a plethora of applications available in the official and alternative marketplaces. Although there are many security mechanisms to scan and filter malicious applications, malware is still able to reach the devices of many end-users. In this paper, we introduce the SafeDroid v2.0 framework, that is a flexible, robust, and versatile open-source solution for statically analysing Android applications, based on machine learning techniques. The main goal of our work, besides the automated production of fully sufficient prediction and classification models in terms of maximum accuracy scores and minimum negative errors, is to offer an out-of-the-box framework that can be employed by the Android security researchers to efficiently experiment to find effective solutions: the SafeDroid v2.0 framework makes it possible to test many different combinations of machine learning classifiers, with a high degree of freedom and flexibility in the choice of features to consider, such as dataset balance and dataset selection. The framework also provides a server, for generating experiment reports, and an Android application, for the verification of the produced models in real-life scenarios. An extensive campaign of experiments is also presented to show how it is possible to efficiently find competitive solutions: the results of our experiments confirm that SafeDroid v2.0 can reach very good performances, even with highly unbalanced dataset inputs and always with a very limited overhead.
- Published
- 2018
- Full Text
- View/download PDF
41. Mining implicit data association from Tripadvisor hotel reviews
- Author
-
Vittoria Cozza, Petrocchi, M., and Spognardi, A.
- Subjects
association rule mining ,Data association ,Gain insight ,Large dataset ,online reviews ,Recommender system ,ComputingMilieux_MISCELLANEOUS ,association data analysis - Abstract
In this paper, we analyse a dataset of hotel reviews. In details, we enrich the review dataset, by extracting additional features, consisting of information on the reviewers' profiles and the reviewed hotels. We argue that the enriched data can gain insights on the factors that most influence consumers when composing reviews (e.g., if the appreciation for a certain kind of hotel is tied to specific users' profiles). Thus, we apply statistical analyses to reveal if there are specific characteristics of reviewers (almost) always related to specific characteristics of hotels. Our experiments are carried out on a very large dataset, consisting of around 190k hotel reviews, collected from the Tripadvisor website.
- Published
- 2018
42. Contamination from heavy metals in the erboristic preparations of malva sylvestris
- Author
-
Bravo, Ilenia, Papetti, Patrizia, Spognardi, Sara, Carelli, Angela, and Pelagalli, Ester
- Subjects
Health risk assessment ,Malvasylvestris ,Herbal tea ,Heavy Metals contamination ,Malvasylvestris, Heavy Metals contamination, Herbal tea,Health risk assessment, Food safety ,Food safety - Published
- 2018
43. From Reaction to Proaction: Unexplored Ways to the Detection of Evolving Spambots
- Author
-
Angelo Spognardi, Stefano Tognazzi, Stefano Cresci, and Marinella Petrocchi
- Subjects
021110 strategic, defence & security studies ,Computer science ,proactive spam and bot detection ,0211 other engineering and technologies ,• Networks → Online social networks ,• Computing method- ologies → Genetic algorithms ,• Information systems → Spam detection ,Social tagging ,02 engineering and technology ,data mining ,online social networks security ,Computer security ,computer.software_genre ,digital dna ,genetic algorithms ,Spambot ,020204 information systems ,twitter ,0202 electrical engineering, electronic engineering, information engineering ,Revolutionary change ,social media analysis ,computer - Abstract
We envisage a revolutionary change in the approach to spambot detection: instead of taking countermeasures only after having collected evidence of new spambot mischiefs, in a near future techniques will be able to anticipate the ever-evolving spammers.
- Published
- 2018
44. Genetic effects in Helix aspersa near a coal plant revealed by the micronucleus test
- Author
-
Silvia Filippi, Dario Angeletti, Patrizia Papetti, Sara Spognardi, and Roberta Meschini
- Subjects
0301 basic medicine ,Pollution ,Veterinary medicine ,Health, Toxicology and Mutagenesis ,media_common.quotation_subject ,chemistry.chemical_element ,Snail ,010501 environmental sciences ,Management, Monitoring, Policy and Law ,Biology ,Toxicology ,01 natural sciences ,03 medical and health sciences ,biology.animal ,parasitic diseases ,Biomonitoring ,Animals ,Soil Pollutants ,Ecotoxicology ,DNA damage Mutagenicity Clastogenic effect Eco-genotoxicology Trace elements Coal power plant ,0105 earth and related environmental sciences ,media_common ,Pollutant ,Cadmium ,Micronucleus Tests ,Helix, Snails ,Helix (gastropod) ,fungi ,food and beverages ,General Medicine ,biology.organism_classification ,Coal ,030104 developmental biology ,chemistry ,Micronucleus test ,DNA Damage ,Environmental Monitoring ,Power Plants - Abstract
Coal plants can be a major source of mutagenic pollutants. In this study we used the common land snail Helix aspersa, to detect the mutagenic effect of pollution from a coal plant in central Italy applying the micronucleus test (MN) on snail's haemocytes and evaluating trace elements concentration (As Cd, Pb, Hg, and Zn) in soil and snails. Snails from a biological farm were exposed for 13 days in five locations at different distances from the plant. Wild snails collected in the same locations were also analysed. MN frequency in exposed snails was significantly higher in four locations within 10 km from to the plant, with respect to the control and the farthest location. Comparing the MN frequency between farmed and wild snails, a significantly higher frequency emerged for the exposed snails in all locations except the farthest, likely indicating adaptation or selection of the wild organisms due to chronic exposure to pollutants. In natural snails significantly higher MN frequencies with near the plant emerged as well. Trace elements analysis showed significant correlations between MN frequencies and both Zn and As concentrations in soil, for both exposed and wild snails, and Zn and Pb concentrations in exposed snails. Our results were consistent with those previously obtained when evaluating primary DNA damage in natural snails from the same area and show that the snails near the plant were affected by a permanent cytogenetic damage. Moreover, they confirm the suitability of snails for biomonitoring the presence of pollutants with mutagenic effect.
- Published
- 2018
45. 'Who Counterfeited My Viagra?' Probabilistic Item Removal Detection via RFID Tag Cooperation
- Author
-
Di Pietro Roberto, Spognardi Angelo, and Conti Mauro
- Subjects
Telecommunication ,TK5101-6720 ,Electronics ,TK7800-8360 - Abstract
We leverage RFID tag cooperation to enforce tampering detection. That is, we provide a set of probabilistic protocols that detect the absence of a tag from a system composed of a set of tags and a reader. Our proposals are able to detect which tag and for how long it has been taken away from the system. The grain of the detection can be tuned with respect to the resources available on the tags. Another merit of our solutions is to provide a proof-of-concept that a small level of cooperation among tags can further extend the range of applications RFID can support, possibly opening new veins of research. The proposed protocols fit the resource constraints of the several classes of RFID available on the market. In particular, the memory requirement ranges from few memory slots to a number of memory slots that is proportional to the number of rounds the presence of a tag is going to be checked. Computation is just one hash per round. This fully fledged set of protocols is thought to trade off the detection grain with the resources on the tag: the finer the item removal detection grain, the more resources a protocol requires. A thorough analysis for the removal detection probability is provided. Finally, extensive simulations support the analytical results, showing the viability of the proposed solutions.
- Published
- 2011
46. Defending against the corporate campaign: selected legal responses to common union tactics.
- Author
-
Jenero, Kenneth A. and Spognardi, Mark A.
- Subjects
Labor unions -- Practice -- United States ,Collective bargaining -- Methods -- Analysis ,Labor relations -- Analysis -- Methods - Abstract
Corporate campaigns are an increasingly favored means by unions to attempt to achieve their representational or collective bargaining objectives. Because of the consequences of the permanent replacement of economic strikers, [...]
- Published
- 1996
47. Temporary employment relationships: review of the joint employer doctrine under the NLRA.
- Author
-
Jenero, Kenneth A. and Spognardi, Mark A.
- Subjects
Labor relations -- Laws, regulations and rules ,Employer liability -- Laws, regulations and rules ,Temporary employment -- Laws, regulations and rules ,Government regulation ,National Labor Relations Act - Abstract
The face of the American workforce has changed, with employers of all sizes increasingly relying on temporary employment relationships to fulfill their staffing needs. During the past decade, the number [...]
- Published
- 1995
48. Exploiting digital DNA for the analysis of similarities in Twitter behaviours
- Author
-
Marinella Petrocchi, Maurizio Tesconi, Angelo Spognardi, Stefano Cresci, and Roberto Di Pietro
- Subjects
Information Systems and Management ,Computer Networks and Communications ,business.industry ,Computer science ,Statistics ,Signal Processing ,Statistics, Probability and Uncertainty ,big social data ,02 engineering and technology ,Human behavior ,Data science ,Behavioral modeling ,social media mining ,Analytics ,big data ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Benchmark (computing) ,Probability and Uncertainty ,020201 artificial intelligence & image processing ,Set (psychology) ,business - Abstract
Recently, DNA-inspired online behavioral modeling and analysis techniques have been proposed and successfully applied to a broad range of tasks. In this paper, we employ a DNA-inspired technique to investigate the fundamental laws that drive the occurrence of similarities among Twitter users. The achieved results are multifold. First, we demonstrate that, despite apparently showing little to no similarities, the online behaviors of Twitter users are far from being uniformly random. Then, we perform a set of simulations to benchmark different behavioral models and to identify the models that better resemble human behaviors in Twitter. Finally, we demonstrate that the number and the extent of behavioral similarities within a group of Twitter users obey a log-normal distribution. Our results shed light on the fundamental properties that drive behaviors of groups of Twitter users, through the lenses of DNA-inspired behavioral modeling techniques. Our datasets are publicly available to the scientific community to further explore analytics of online behaviors.
- Published
- 2017
49. A language-based approach to modelling and analysis of Twitter interactions
- Author
-
Marinella Petrocchi, Francesco Tiezzi, Alessandro Maggi, and Angelo Spognardi
- Subjects
Cultural Studies ,Model checking ,Sociology and Political Science ,Logic ,Computer science ,Microblogging ,Formal semantics (linguistics) ,Formal semantics ,Twitter interactions and communications ,Verification ,Political Science and International Relations ,02 engineering and technology ,computer.software_genre ,Operational semantics ,Theoretical Computer Science ,World Wide Web ,0202 electrical engineering, electronic engineering, information engineering ,Social media ,Everyday life ,020207 software engineering ,computer.file_format ,Term (time) ,Computational Theory and Mathematics ,020201 artificial intelligence & image processing ,Executable ,computer ,Software ,Interpreter - Abstract
More than a personal microblogging site, Twitter has been transformed by common use to an information publishing venue, which public characters, media channels and common people daily rely on for, e.g., news reporting and consumption, marketing, and social messaging. The use of Twitter in a cooperative and interactive setting calls for the precise awareness of the dynamics regulating message spreading. In this paper, we describe Twitlang, a language for modelling the interactions among Twitter accounts. The associated operational semantics allows users to precisely determine the effects of their actions on Twitter, such as post, reply-to or delete tweets. The language is implemented in the form of a Maude interpreter, Twitlanger, which takes a language term as an input and explores the computations arising from the term. By combining the strength of Twitlanger and the Maude model checker, it is possible to automatically verify communication properties of Twitter accounts. We illustrate the benefits of our executable formalisation by means of an application scenario inspired from real life. While the scenario highlights the benefits of adopting Twitter for a cooperative use in the everyday life, our analysis shows that appropriate settings are essential for a proper usage of the platform, in respect of fulfilling those communication properties expected within collaborative and interactive contexts.
- Published
- 2017
50. Social fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling
- Author
-
Roberto Di Pietro, Marinella Petrocchi, Stefano Cresci, Angelo Spognardi, and Maurizio Tesconi
- Subjects
FOS: Computer and information sciences ,Computer Science - Machine Learning ,Computer Science - Cryptography and Security ,Computer science ,02 engineering and technology ,Similarity measure ,Machine learning ,computer.software_genre ,Machine Learning (cs.LG) ,chemistry.chemical_compound ,behavioral modeling ,digital DNA ,online social networks ,social bots ,Spambot detection ,Twitter ,Spambot ,big data ,020204 information systems ,Similarity (psychology) ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,Representation (mathematics) ,spambot detection ,Social Media Analysis ,Social and Information Networks (cs.SI) ,Sequence ,prediction ,stream ,twitter ,Social network ,business.industry ,Computer Science - Social and Information Networks ,Behavioral modeling ,chemistry ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,Cryptography and Security (cs.CR) ,computer ,DNA - Abstract
Spambot detection in online social networks is a long-lasting challenge involving the study and design of detection techniques capable of efficiently identifying ever-evolving spammers. Recently, a new wave of social spambots has emerged, with advanced human-like characteristics that allow them to go undetected even by current state-of-the-art algorithms. In this paper, we show that efficient spambots detection can be achieved via an in-depth analysis of their collective behaviors exploiting the digital DNA technique for modeling the behaviors of social network users. Inspired by its biological counterpart, in the digital DNA representation the behavioral lifetime of a digital account is encoded in a sequence of characters. Then, we define a similarity measure for such digital DNA sequences. We build upon digital DNA and the similarity between groups of users to characterize both genuine accounts and spambots. Leveraging such characterization, we design the Social Fingerprinting technique, which is able to discriminate among spambots and genuine accounts in both a supervised and an unsupervised fashion. We finally evaluate the effectiveness of Social Fingerprinting and we compare it with three state-of-the-art detection algorithms. Among the peculiarities of our approach is the possibility to apply off-the-shelf DNA analysis techniques to study online users behaviors and to efficiently rely on a limited number of lightweight account characteristics.
- Published
- 2017
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.