Architettura dei sistemi di elaborazione e sistemi operativi
Sala Professori - E' consigliabile scrivermi un messaggio di posta elettronica prima di venire al ricevimento studenti. )
Giovedì dalle 15 alle 16
Note: Fino al 3 aprile 2020, stante le attuali disposizioni del Rettore, le lezioni verranno REGOLARMENTE erogate attraverso la piattaforma Google Meet. In particolare giovedì 2 aprile e venerdì 3 aprile, al posto dell'esame di midterm e della lezione del guest speaker, si terranno due lezioni del corso attraverso la piattaforma Google Meet. Gli studenti potranno trovare tutte le informazioni necessarie sul sito di e-learning di Lumsa e verrà notificato loro via e-mail, di volta in volta, il link a cui collegarsi.
Gianluigi Me obtained his Laurea in Computer Engineering at University of Rome “La Sapienza” in 1997; he took a Postgraduate Specialization Diploma, Magister Artis of Business Management, Dipartimento di Informatica, Sistemi e Produzione (DISP), at University of Rome “Tor Vergata” in 2001 and the Ph.D. in Business Management Engineering with a thesis dissertation on “Mobile transactions security” (Advisor:Prof. Giuseppe F. Italiano), DISP, at University of Rome “Tor Vergata” in 2003. He started as a software engineer in a telco manufacturer R&D department; currently is a OF-4 of Carabinieri Law Enforcement at Carabinieri Headquarters. After holding positions in Strategic ICT section and Advanced Mobile Applications program, he has been Director of Carabinieri National Digital Investigations and Cybercrime training and Program manager of Advanced ICT investigative tools and methodologies. Currently he is deputy head of ICT Security Department. He has been Adjunct Professor of ICT security and Cryptography at Faculty of Computer Engineering at University of Rome “Tor Vergata” during 2003-2011 and since 2011 Adjunct Professor of Information Systems at the Faculty of Economics and Business at LUISS Guido Carli University, International Course. He served CEPOL and other National/International Organizations as Expert/Trainer in Master Courses for security specialists. He holds some patents in the area of security software and his current research interests include security economics, digital forensics, game theory and data mining applied to criminal chenomena. He is co-editor of the “Handbook of electronic security and digital forensics”, Worldscience Publisher, and more than 50 scientific publications. He frequently joins Technical/Program Committee of IEEE Conference and is member of the Editorial Board of the International Journal of Electronic Security and Digital Forensics, IJESDF, Inderscience Publishers.
G. Me, L. Pesticcio, P. Spagnoletti, “Discovering hidden relations between Tor Marketplaces users”, in Proceedings of the 15th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2017), Orlando (FL), U.S., 2017.
P. Spagnoletti, G. Me, F. Ceci and A. Prencipe, “Securing national e-ID infrastructures: Tor networks as a source of threats”, in Proceedings of the XIV Conference of the Italian Chapter of AIS (ITAIS), Milano, UK, 2017.
A. Celestini, G. Me et al., “Tor marketplaces exploratory data analysis: the drugs case”, in Proceedings of the 11th International Conference on Global Security, Safety & Sustainability (ICGS3-2017), London, UK, 2017.
G. Bottazzi, G. Me, “Cybercrime-funded terrorism and the threats posed by future technologies:Applealing Economics and targets”, the NATO Advanced Research Workshop on "Terrorists use of Internet", Dublin, 2016.
G. Bottazzi, G. Me, “A Survey on Financial Botnets Threat”, in Proceedings of the 10th International Conference on Global Security, Safety & Sustainability (ICGS3-2015), London, UK, 2015.
L. Laura, G. Me, “Searching the web for illegal content: the anatomy of a semantic search engine”, in Proceedings of the 10th International Conference on Global Security, Safety & Sustainability (ICGS3-2015), London, UK, 2015.
G. Me, Migration to governmental cloud digital forensics community: economics and methodology, Proc. of GECON 2014, The 11th International Conference on Economics of Grids, Clouds, Systems, and Services, ISBN 978-3-319-14609-6, 2014;
L.Laura, G. Me, B. D’Alessio, A. Capone, M. Mignone, “Vertical semantic discovery: the SICH approach on NPS”, Proc. of 6-th International Conference on Intelligent Networking and Collaborative Systems, INCoS-2014;
G. Bottazzi, G. Me, “The Botnet Revenue Model”, Proc. of The 7th International Conference on Security of Information and Networks, 2014;
M. Bernaschi, M. Cianfriglia, A. Di Marco, A. Sabellico, G. Me, G. Carbone, G. Totaro, Forensic Disk Image Indexing and Search in an HPC Environment, in Proc. of The 2014 International Conference on High Performance Computing & Simulation;
G Bottazzi, G Me, P Perrone, GG Rutigliano, Time to Diverge the Botnet Revenues from Criminal Wallet?, Botnets: Architectures, Countermeasures, and Challenges, 387-402, 2019
G. Bottazzi, G. Me, “Cybercrime-funded terrorism and the threats posed by future technologies:Applealing Economics and targets”, in Terrorists’ Use of the Internet: Assessment and Response edited by M. Conway, L. Jarvis, O. Lehane IOS Press, 2017, pp. 109-126.
L. Laura, G. Me, "Searching the Web for illegal content: the anatomy of a semantic search engine", in Soft Computing, Springer, 10.1007/s00500-015-1857-4, 1432-7643, http://dx.doi.org/10.1007/s00500-015-1857-4, 2015
G. S. Manzi, G. Me, “Lo spostamento degli equilibri di convenienza di vittima e autore" in "Stalker,Psicopatologia del molestatore assillante", V. Caretti, G. Craparo, A. Schimmenti, ISBN: 978-88-98991-07-5, pp 67-80, 2015.
G. Bottazzi, G. Me, “Responding to cyber crime and cyber terrorism — botnets an insidious threat”, in “Cyber Crime and Cyber Terrorism Investigator's Handbook”, Elsevier’s Syngress, pp 231-257, 2014.
A. Di Stefano, A. Grillo, A. Lentini, G.Me, D. Tulimiero, Mobile Forensics Data Integrity Assessment by Event Monitoring, Digital Investigation (2010), Volume 4 Number 1, SEPTEMBER 2010, ISSN# 1941-6164, Small Scale Digital Device Forensic Journal , pp. 1-7;
A. Grillo, A. Lentini, G. Me, The B-POS secure mobile payment system, Mobile Computing (Concepts, Methodologies, Tools, and Applications), D. Taniar, 2009, Idea Group Reference, pp.1237-1245;
R. Bertè, F. Dellutri, A. Grillo, A. Lentini, G. Me, V. Ottaviani, Fast smartphones forensic analysis results through MIAT and Forensic Farm, International Journal of Electronic Security and Digital Forensics, IJESDF, Inderscience, 2009;
R. Bertè, F. Dellutri, A. Grillo, A. Lentini, G. Me, V. Ottaviani, A methodology for smartphones internal memory acquisition, decoding and analysis, Handbook of Electronic Security and Digital Forensics, Editors: H. Jahankhani, D. Lilburn Watson, G. Me, Worldscience, 2009,
G. Me, D. Pirro, R. Sarrecchia, Strong authentication for financial services: PTDs as a compromise between security and usability, Mobile and Ubiquitous Commerce: Advanced E-Business Methods, Editors: Milena Head, Eldon Y. Li , Information Science Publishing, 2008;