OntoLogX: Ontology-Guided Knowledge Graph Extraction From Cybersecurity Logs With Large Language Models
Published Wiley version of OntoLogX, which turns raw logs into ontology-grounded knowledge graphs for actionable cyber threat intelligence.
Published Wiley version of OntoLogX, which turns raw logs into ontology-grounded knowledge graphs for actionable cyber threat intelligence.
Paper on a hybrid system that combines AI analysis and physical coherence checks to detect anomalous behaviour in vehicular networks and improve cooperative driving safety.
Technical report on ontology-guided knowledge-graph extraction from cybersecurity logs using LLMs.
Technical report on transparent CTI that combines LLMs and domain ontologies to improve structure, traceability, and explainability.
Preliminary technical report on classifying attack stages while explicitly modelling uncertainty.
Project on interpretable and trustworthy situational understanding for multivariate time series, combining spatio-temporal learning, argumentation-based causal inference, and uncertainty-aware risk assessment.
Technical report on using foundation models for online complex event detection in CPS-IoT environments.
Technical report on a Mamba-based neural algorithmic reasoning framework for online complex event detection.
Survey-oriented article on security and privacy threats introduced by physical-layer sensing in IoT systems, with countermeasures and architectural trade-offs.
Technical report on cyber resilience against APTs, centred on intelligence, causal analysis, and adaptive defence mechanisms.
Paper on causal, neuro-symbolic complex event processing under resource constraints, relevant to edge systems and distributed operational environments.
Early contribution on combining LLMs and argumentation to produce more structured and explainable causal evaluation.
Paper on risk-aware classification in which uncertainty quantification becomes part of the decision process rather than a secondary score.
Matteo Frau book on AI, military autonomy, and universal legal limits, included here as a governance-oriented contribution on autonomous systems, security, and accountability.
Study of how roaming partnerships can be abused to intercept traffic and inject messages more stealthily than many users and operators assume.
Peer-reviewed extension of the sound-squatting line, with measurements over TLS certificates and PyPI packages to show how much of the phenomenon already exists on the live Internet.
Project on innovative security paradigms for beyond-5G networks, spanning physical-layer protection, infrastructure security, and monitoring for heterogeneous mobile networks.
Privacy-enhanced security framework for cooperative driving, focused on cross-technology protection of availability, trustworthiness, and sensitive data.
Project on energy-efficient communication methods for challenging environments, with a local UniBS contribution on PHY/MAC protection and privacy in adversarial networks.
Paper on learning robust reward machines from noisy labels, relevant to agents operating under imperfect or adversarial supervision.
Paper on neuro-symbolic fusion of Wi-Fi sensing data for passive radar, with transfer of knowledge across sensing modalities.
Framework for modelling collaborative teams across perception, cognition, communication, and action in distributed and mission-critical settings.
Comprehensive study of physical-layer privacy against adversarial Wi-Fi sensing, including analysis, implementation, and experimental evaluation.
Book chapter by Giorgio Pedrazzi on the legal instruments that make international data transfers possible with GDPR-grade safeguards, relevant to cloud, incident response, and cross-border cyber governance.
Project led by Federico Cerutti on neurosymbolic active cyber defence, aimed at extracting actionable intelligence from logs, TECHINT, and heterogeneous evidence streams.
Project on joint communication and sensing through Channel State Information, with emphasis on interpretability, operational protocols, and privacy/security safeguards.
Technical report on the robustness of intelligence-driven reinforcement learning approaches under dynamic and noisy conditions.
Technical report on a multilingual AI system that generates sound-squatting candidates to proactively defend against phishing on domains and software packages.
Project on AI, causality, and reasoning to improve the resilience of deceptive cyber-defence assets against advanced persistent threats.
Workshop paper on cross-language sound-squatting, using AI to expose phishing risks that move across languages.
Journal extension of the neuro-symbolic complex-event-processing line, explicitly aimed at adversarial environments.
Expert evaluation of human-machine systems for intelligence analysis, useful for designing effective interaction and calibrated trust.
Project on effective collaboration between humans and AI agents, with learning across perception, cognition, communication, and action loops.
Project on uncertainty-aware neuro-symbolic AI architectures for signal intelligence, insight generation, and foresight on complex events in contested environments.
Paper on integrating CSI sensing into wireless networks without opening new avenues for unauthorised localisation and inference, with focus on privacy and countermeasures.
Workshop paper showing how AI can make sound-squatting attacks practical, anticipating the later multilingual phishing line.
Paper on representing and separating different forms of uncertainty in compact probabilistic models, with implications for reliability and risk evaluation.
Technical report on a neuro-symbolic architecture that uses audio, neural networks, and probabilistic rules to detect complex events even with noisy data.
Project on protecting location privacy against unauthorised localisation based on 802.11 signal analysis and CSI.
Methodological contribution on using Bayesian argumentation to support AI systems that are more transparent, auditable, and suitable for trust-sensitive settings.
Interdisciplinary paper on identifying and responding to viral cyber threats, with emphasis on systems that understand their own state and react adaptively.
Paper on applying question answering to sensor data, enabling more intelligible querying of complex streams in IoT and CPS settings.
Preliminary study on using GANs to expand the detection of domains and resources associated with phishing and squatting campaigns.
Work on a wireless fuzzing framework that revives closed-source firmware in emulation to uncover real vulnerabilities in Bluetooth stacks and their interaction with host systems.
A contribution on making AI systems more readable and more honest about their limits, so they can support cyber decisions without inviting blind trust.
A method for training deep classifiers that better separate known cases, ambiguous cases, and out-of-distribution inputs, reducing overconfidence in unsafe predictions.
No results match the current filters.