Gabriele D’Angelo
YOU?
Author Swipe
View article: Special issue on “Fintech and decentralized finance”
Special issue on “Fintech and decentralized finance” Open
View article: An Auditable Confidentiality Protocol for Blockchain Transactions
An Auditable Confidentiality Protocol for Blockchain Transactions Open
View article: Simulation in Cybersecurity: Understanding Techniques, Applications, and Goals
Simulation in Cybersecurity: Understanding Techniques, Applications, and Goals Open
Modeling and simulation are widely used in cybersecurity research to assess cyber threats, evaluate defense mechanisms, and analyze vulnerabilities. However, the diversity of application areas, the variety of cyberattacks scenarios, and th…
View article: Incentivizing Crowdsensing in IoT through Micropayments: A Simulation Study
Incentivizing Crowdsensing in IoT through Micropayments: A Simulation Study Open
Many IoT applications rely on the timely collection and processing of data. Although the technology that allows data collection is readily available, its deployment on a large scale raises many practical issues, the main one probably being…
View article: Enhancing Anti-Money Laundering Frameworks: An Application of Graph Neural Networks in Cryptocurrency Transaction Classification
Enhancing Anti-Money Laundering Frameworks: An Application of Graph Neural Networks in Cryptocurrency Transaction Classification Open
Cryptocurrency money laundering is a pressing issue, as it not only facilitates and hides criminal activities but also disrupts markets and the overall financial system. To respond this challenge, researchers are trying to develop robust A…
View article: On the Use of Heterogeneous Graph Neural Networks for Detecting Malicious Activities: a Case Study with Cryptocurrencies
On the Use of Heterogeneous Graph Neural Networks for Detecting Malicious Activities: a Case Study with Cryptocurrencies Open
This paper presents a study on the application of Heterogeneous Graph Neural Networks (HGNNs) for enhancing the security of complex social systems by identifying illicit and malicious behaviors. We focus on digital asset tokenization, a ke…
View article: Parallel intersection counting on shared-memory multiprocessors and GPUs
Parallel intersection counting on shared-memory multiprocessors and GPUs Open
View article: Design Patterns for Multilevel Modeling and Simulation
Design Patterns for Multilevel Modeling and Simulation Open
Multilevel modeling and simulation (M&S) is becoming increasingly relevant\ndue to the benefits that this methodology offers. Multilevel models allow users\nto describe a system at multiple levels of detail. From one side, this can make\nb…
View article: Keyword-Based Multimedia Data Lookup in Decentralized Systems
Keyword-Based Multimedia Data Lookup in Decentralized Systems Open
The use of decentralized systems has the potential to offer secure and efficient collaboration without intermediaries, and in the absence or fault of a central server. However, searching for content in a decentralized system is still an is…
View article: Proof of Location through a Blockchain Agnostic Smart Contract Language
Proof of Location through a Blockchain Agnostic Smart Contract Language Open
Location-based services are at the heart of many applications that individuals use every day. However, there is often no guarantee of the truthfulness of users' location data, since this information can be easily spoofed without a proof me…
View article: Implementation and preliminary evaluation of an auditable confidentiality mechanism for DeFi
Implementation and preliminary evaluation of an auditable confidentiality mechanism for DeFi Open
A well-known use of the blockchain technology is Decentralized Finance (DeFi). DeFi makes financial information accessible to the public but raises potential privacy and security issues. In this study, we implemented a DeFi protocol that p…
View article: A review of multilevel modeling and simulation for human mobility and behavior
A review of multilevel modeling and simulation for human mobility and behavior Open
View article: InDaMul: Incentivized Data Mules for Opportunistic Networking Through Smart Contracts and Decentralized Systems
InDaMul: Incentivized Data Mules for Opportunistic Networking Through Smart Contracts and Decentralized Systems Open
The rise of Internet-of-Things enables the development of smart applications devoted to improving the quality of life in urban and rural areas, thus fostering the creation of smart territories. However, some dislocated areas are underprivi…
View article: On the Decentralization of Health Systems for Data Availability: a DLT-based Architecture
On the Decentralization of Health Systems for Data Availability: a DLT-based Architecture Open
Mobile devices entered people's lives by leaps and bounds, offering various applications relying on private third-party entities to manage their users' data. Centralized control of personal health data endangers the privacy of the users di…
View article: An Auditable Confidentiality Protocol for Blockchain Transactions
An Auditable Confidentiality Protocol for Blockchain Transactions Open
View article: Modelling of the Internet Computer Protocol Architecture: The Next Generation Blockchain
Modelling of the Internet Computer Protocol Architecture: The Next Generation Blockchain Open
View article: Accountable Clouds Through Blockchain
Accountable Clouds Through Blockchain Open
We present a solution for accountability in Cloud infrastructures based on blockchain. We show that, through smart contracts, it is possible to create an unforgeable log that can be used for auditing and automatic Service Level Agreement (…
View article: The Data Exchange Protocol over Multi-chain Blockchain Using Zero-Knowledge Proof
The Data Exchange Protocol over Multi-chain Blockchain Using Zero-Knowledge Proof Open
View article: Simulation of the Internet Computer Protocol: the Next Generation Multi-Blockchain Architecture
Simulation of the Internet Computer Protocol: the Next Generation Multi-Blockchain Architecture Open
The Internet Computer Protocol is a new generation blockchain that aims to provide better security and scalability than the traditional blockchain solutions. In this paper, this innovative distributed computing architecture is introduced, …
View article: Multilevel Modeling as a Methodology for the Simulation of Human Mobility
Multilevel Modeling as a Methodology for the Simulation of Human Mobility Open
Multilevel modeling is increasingly relevant in the context of modelling and simulation since it leads to several potential benefits, such as software reuse and integration, the split of semantically separated levels into sub-models, the p…
View article: Data governance through a multi-DLT architecture in view of the GDPR
Data governance through a multi-DLT architecture in view of the GDPR Open
View article: Decentralized Health Data Distribution: A DLT-based Architecture for Data Protection
Decentralized Health Data Distribution: A DLT-based Architecture for Data Protection Open
The management, protection and sharing of sensitive data such as those associated with the health domain are crucial in enabling personal care and contributing to worldwide medical advancements. Distributed Ledger Technologies (DLTs) allow…
View article: DLT-based Data Mules for Smart Territories
DLT-based Data Mules for Smart Territories Open
Many services that are taken for granted in smart cities are not even remotely available in dislocated areas yet, due to the lack of or too costly wide area network connectivity. With the aim to offer a practical and secure way to transpor…
View article: Complex queries over decentralised systems for geodata retrieval
Complex queries over decentralised systems for geodata retrieval Open
Decentralised systems have been proved to be quite effective to allow for trusted and accountable data sharing, without the need to resort to a centralised party that collects all the information. While complete decentralisation provides i…
View article: Adaptive parallel and distributed simulation of complex networks
Adaptive parallel and distributed simulation of complex networks Open
View article: Blockchain-Based Data Management for Smart Transportation
Blockchain-Based Data Management for Smart Transportation Open
View article: Simulation of Hybrid Edge Computing Architectures
Simulation of Hybrid Edge Computing Architectures Open
Dealing with a growing amount of data is a crucial challenge for the future of information and communication technologies. More and more devices are expected to transfer data through the Internet, therefore new solutions have to be designe…
View article: Security analysis of distributed ledgers and blockchains through agent-based simulation
Security analysis of distributed ledgers and blockchains through agent-based simulation Open
View article: Security Analysis of Distributed Ledgers and Blockchains through\n Agent-based Simulation
Security Analysis of Distributed Ledgers and Blockchains through\n Agent-based Simulation Open
In this paper we describe LUNES-Blockchain, an agent-based simulator of\nblockchains that relies on Parallel and Distributed Simulation (PADS)\ntechniques to obtain high scalability. The software is organized as a\nmulti-level simulator th…
View article: Security Analysis of Distributed Ledgers and Blockchains through Agent-based Simulation
Security Analysis of Distributed Ledgers and Blockchains through Agent-based Simulation Open
In this paper we describe LUNES-Blockchain, an agent-based simulator of blockchains that relies on Parallel and Distributed Simulation (PADS) techniques to obtain high scalability. The software is organized as a multi-level simulator that …