Skip to main content

previous disabled Page of 2
and
  1. Article

    Open Access

    The G Protein Estrogen Receptor (GPER) is involved in the resistance to the CDK4/6 inhibitor palbociclib in breast cancer

    The cyclin D1-cyclin dependent kinases (CDK)4/6 inhibitor palbociclib in combination with endocrine therapy shows remarkable efficacy in the management of estrogen receptor (ER)-positive and HER2-negative adva...

    Marianna Talia, Francesca Cirillo in Journal of Experimental & Clinical Cancer … (2024)

  2. No Access

    Chapter

    Firmware Dynamic Analysis Through Rewriting

    The proliferation of IoT devices and their increasing integration into daily life has led to significant security concerns. Due to the presence of a multitude of easily exploitable security vulnerabilities, th...

    Claudia Greco, Michele Ianni, Antonella Guzzo in Device-Edge-Cloud Continuum (2024)

  3. No Access

    Chapter and Conference Paper

    SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language

    The Internet of Things (IoT) has brought about significant advancements in connectivity but has also introduced security challenges due to the diverse range of IoT devices. Traditional security solutions strug...

    Giancarlo Fortino, Claudia Greco in Computer Security. ESORICS 2023 Internatio… (2024)

  4. No Access

    Article

    Transfer learning-based quantized deep learning models for nail melanoma classification

    Skin cancer, particularly melanoma, has remained a severe issue for many years due to its increasing incidences. The rising mortality rate associated with melanoma demands immediate attention at early stages t...

    Mujahid Hussain, Makhmoor Fiza, Aiman Khalil in Neural Computing and Applications (2023)

  5. Article

    Open Access

    Identification and prediction of attacks to industrial control systems using temporal point processes

    The task of identifying malicious activities in logs and predicting threats is crucial nowadays in industrial sector. In this paper, we focus on the identification of past malicious activities and in the predi...

    Giancarlo Fortino, Claudia Greco in Journal of Ambient Intelligence and Humani… (2023)

  6. No Access

    Chapter and Conference Paper

    FD-VAE: A Feature Driven VAE Architecture for Flexible Synthetic Data Generation

    Variational autoencoders (VAEs) are artificial neural networks used to learn effective data encodings in an unsupervised manner. Each input x provided to a VAE is indeed mapped to an internal representation, say

    Gianluigi Greco, Antonella Guzzo in Database and Expert Systems Applications (2020)

  7. No Access

    Chapter and Conference Paper

    A Framework for the Multi-modal Analysis of Novel Behavior in Business Processes

    Novelty detection refers to the task of finding observations that are new or unusual when compared to the ‘known’ behavior. Its practical and challenging nature has been proven in many application domains whil...

    Antonino Rullo, Antonella Guzzo in Intelligent Data Engineering and Automated… (2020)

  8. No Access

    Chapter and Conference Paper

    Coalition Formation with Logic-Based Agents

    Coalition formation is studied in a setting where agents take part to a group decision-making scenario and where their preferences are expressed via weighted propositional logic, in particular by considering f...

    Gianluigi Greco, Antonella Guzzo in Multi-Agent Systems and Agreement Technologies (2017)

  9. No Access

    Chapter and Conference Paper

    Intrusion Detection with Hypergraph-Based Attack Models

    In numerous security scenarios, given a sequence of logged activities, it is necessary to look for all subsequences that represent an intrusion, which can be meant as any “improper” use of a system, an attempt...

    Antonella Guzzo, Andrea Pugliese in Graph Structures for Knowledge Representat… (2014)

  10. No Access

    Chapter and Conference Paper

    Count Constraints and the Inverse OLAP Problem: Definition, Complexity and a Step toward Aggregate Data Exchange

    A typical problem in database theory is to verify whether there exists a relation (or database) instance satisfying a number of given dependency constraints. This problem has recently received a renewed deal o...

    Domenico Saccà, Edoardo Serra in Foundations of Information and Knowledge S… (2012)

  11. Chapter and Conference Paper

    Process Mining Manifesto

    Process mining techniques are able to extract knowledge from event logs commonly available in today’s information systems. These techniques provide new means to discover, monitor, and improve processes in a varie...

    Wil van der Aalst, Arya Adriansyah in Business Process Management Workshops (2012)

  12. No Access

    Chapter and Conference Paper

    Discovering Multi-perspective Process Models: The Case of Loosely-Structured Processes

    Process Mining techniques exploit the information stored in the execution log of a process to extract some high-level process model, useful for analysis or design tasks. Most of these techniques focus on “stru...

    Francesco Folino, Gianluigi Greco, Antonella Guzzo in Enterprise Information Systems (2009)

  13. No Access

    Chapter and Conference Paper

    Outlier Detection Techniques for Process Mining Applications

    Classical outlier detection approaches may hardly fit process mining applications, since in these settings anomalies emerge not only as deviations from the sequence of events most often registered in the log, ...

    Lucantonio Ghionna, Gianluigi Greco, Antonella Guzzo in Foundations of Intelligent Systems (2008)

  14. No Access

    Chapter and Conference Paper

    Process Mining Based on Clustering: A Quest for Precision

    Process mining techniques attempt to extract non-trivial and useful information from event logs recorded by information systems. For example, there are many process mining techniques to automatically discover ...

    Ana Karla Alves de Medeiros, Antonella Guzzo in Business Process Management Workshops (2008)

  15. No Access

    Article

    AZD3409 inhibits the growth of breast cancer cells with intrinsic resistance to the EGFR tyrosine kinase inhibitor gefitinib

    AKT and MAPK signaling are involved in the resistance of breast cancer cells to the EGFR tyrosine kinase inhibitor gefitinib. RAS proteins are upstream mediators that transfer messages from surface receptors t...

    Monica R. Maiello, Amelia D’Alessio in Breast Cancer Research and Treatment (2007)

  16. Chapter and Conference Paper

    An Information-Theoretic Framework for High-Order Co-clustering of Heterogeneous Objects

    The high-order co-clustering problem, i.e., the problem of simultaneously clustering several heterogeneous types of domains, is usually faced by minimizing a linear combination of some optimization functions eval...

    Antonio D. Chiaravalloti, Gianluigi Greco, Antonella Guzzo in Machine Learning: ECML 2006 (2006)

  17. No Access

    Chapter and Conference Paper

    An Information-Theoretic Framework for Process Structure and Data Mining

    Process-oriented systems have been increasingly attracting data mining community, due to the opportunities the application of inductive process mining techniques to log data can open to both the analysis of compl...

    Antonio D. Chiaravalloti, Gianluigi Greco in Data Warehousing and Knowledge Discovery (2006)

  18. No Access

    Chapter and Conference Paper

    Mining Constrained Graphs: The Case of Workflow Systems

    Constrained graphs are directed graphs describing the control flow of processes models. In such graphs, nodes represent activities involved in the process, and edges the precedence relationship among such acti...

    Gianluigi Greco, Antonella Guzzo in Constraint-Based Mining and Inductive Data… (2006)

  19. No Access

    Chapter and Conference Paper

    Modelling a Protein Structure Comparison Application on the Grid Using PROTEUS

    Bioinformatics applications manage complex biological data stored into distributed and often heterogeneous databases and require large computing power. Among these, protein structure comparison applications ex...

    Mario Cannataro, Matteo Comin, Carlo Ferrari in Scientific Applications of Grid Computing (2005)

  20. No Access

    Chapter and Conference Paper

    Mining Hierarchies of Models: From Abstract Views to Concrete Specifications

    Process mining techniques have been receiving great attention in the literature for their ability to automatically support process (re)design. The output of these techniques is a concrete workflow schema that ...

    Gianluigi Greco, Antonella Guzzo, Luigi Pontieri in Business Process Management (2005)

previous disabled Page of 2