Stefano Galantucci | Cybersecurity | Best Researcher Award

Dr. Stefano Galantucci | Cybersecurity | Best Researcher Award

Adjunct Professor (Lecturer) at University of Bari Aldo Moro, Italy

Dr. Stefano Galantucci is a cybersecurity researcher and academic affiliated with the University of Bari Aldo Moro, Italy. Born on October 28, 1996, he holds a Ph.D. in Computer Science and specializes in network security, cryptography, malware detection, and firewall optimization. With extensive experience in teaching, research, and publication, Dr. Galantucci is an active contributor to both academic and applied cybersecurity communities.

Publication Profile 

Scopus

Orcid

Educational Background 🎓

  • 2024 – Ph.D. in Computer Science,
    University of Bari Aldo Moro
    – XXXVIth cycle, focus on cybersecurity and computer science research.

  • 2020 – Master’s Degree (MSc) in Cybersecurity,
    University of Bari “Aldo Moro”
    – Graduated cum laude with honors and special mention by the commission.

  • 2018 – Bachelor’s Degree (BSc) in Computer Science,
    University of Bari “Aldo Moro”
    – Graduated cum laude.

Professional Experience 💼

  • 2024–Present – Research Fellow,
    University of Bari Aldo Moro
    – Working on the FAIR project.

  • 2023–Present – Examination Board Member,
    University of Bari Aldo Moro
    – Courses: Biometric Systems, Application Security, Computer Architecture & OS.

  • 2023 – Adjunct Professor (CyberChallenge Course),
    University of Bari Aldo Moro
    – Taught Cryptography and Hardware Security (24 hours, 2 ECTS).

  • 2022–Present – Adjunct Professor of Cryptography,
    MSc in Cybersecurity, University of Bari Aldo Moro
    – 6 ECTS (62 hours).

  • 2021–Present – Member, ISLab Research Group,
    University of Bari Aldo Moro
    – Cybersecurity contact person.

Research Interests 🔬

  • Cryptography and hardware security

  • Malware detection and classification

  • Network intrusion detection (NIDS)

  • Firewall policy optimization

  • Anomaly detection and AI-driven threat detection

  • DevSecOps and secure software development practices

  • Blockchain analysis

  • Adversarial neural networks in security (e.g., GANs)

Awards and Honors🏆✨

  • Special mention by the MSc degree commission (2020)

  • Full marks and honors in both MSc and BSc degrees

Conclusion🌟

Dr. Stefano Galantucci is a dynamic and accomplished researcher in the field of cybersecurity, with a strong academic background, diverse teaching experience, and a rich portfolio of high-impact publications. His work bridges theoretical foundations and real-world applications, particularly in cryptography, malware detection, and network defense systems. A respected member of the research community, Dr. Galantucci actively contributes to scientific progress through both his scholarly output and his involvement in peer review for top-tier journals. With his growing influence and commitment to innovation, he stands out as a promising leader in the evolving landscape of cybersecurity research.

Publications 📚

  • 🔐 CARIOCA: Prioritizing the Use of IoC by Threats Assessment Shared on the MISP Platform
    📘 International Journal of Information Security, 2025-04
    [DOI: 10.1007/s10207-025-01006-2]
    👥 Piero Delvecchio, Stefano Galantucci, Andrea Iannacone, Giuseppe Pirlo


  • 🧮 FOBICS: Assessing Project Security Level through a Metrics Framework that Evaluates DevSecOps Performance
    📘 Information and Software Technology, 2025-02
    [DOI: 10.1016/j.infsof.2024.107605]
    👥 Alessandro Caniglia, Vincenzo Dentamaro, Stefano Galantucci, Donato Impedovo


  • 🛡️ PROGESI: A PROxy Grammar to Enhance Web Application Firewall for SQL Injection Prevention
    📘 IEEE Access, 2024
    [DOI: 10.1109/ACCESS.2024.3438092]
    👥 Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo


  • 🌐 Automatic Decision Tree-Based NIDPS Ruleset Generation for DoS/DDoS Attacks
    📘 Journal of Information Security and Applications, 2024-05
    [DOI: 10.1016/j.jisa.2024.103736]
    👥 Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo


  • 🧬 YAMME: A YAra-byte-signatures Metamorphic Mutation Engine
    📘 IEEE Transactions on Information Forensics and Security, 2023
    [DOI: 10.1109/TIFS.2023.3294059]
    👥 Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo


  • 🧠 Comparing Deep Learning and Shallow Learning Techniques for API Calls Malware Prediction
    📘 Applied Sciences, 2022-02
    [DOI: 10.3390/app12031645]
    👥 Angelo Cannarile, Vincenzo Dentamaro, Stefano Galantucci, Andrea Iannacone, Donato Impedovo, Giuseppe Pirlo


  • 💰 BACH: A Tool for Analyzing Blockchain Transactions Using Address Clustering Heuristics
    📘 Information, 2024-09-26
    [DOI: 10.3390/info15100589]
    👥 Michele Caringella, Francesco Violante, Francesco De Lucci, Stefano Galantucci, Matteo Costantini


  • 🔑 One Time User Key: A User-Based Secret Sharing XOR-ed Model for Multiple User Cryptography
    📘 IEEE Access, 2021
    [DOI: 10.1109/ACCESS.2021.3124637]
    👥 Stefano Galantucci, Donato Impedovo, Giuseppe Pirlo


  • 📉 Combining Unsupervised Approaches for Near Real-Time Network Traffic Anomaly Detection
    📘 Applied Sciences, 2022-02
    [DOI: 10.3390/app12031759]
    👥 Francesco Carrera, Vincenzo Dentamaro, Stefano Galantucci, Andrea Iannacone, Donato Impedovo, Giuseppe Pirlo


  • 📈 Ensemble Consensus: An Unsupervised Algorithm for Anomaly Detection in Network Security Data
    📄 CEUR Workshop Proceedings, 2021
    👥 Vincenzo Dentamaro, V.N. Convertini, Stefano Galantucci, P. Giglio, T. Palmisano, Giuseppe Pirlo


  • 🧭 A Case Study of Navigation System Assistance with Safety Purposes in the Context of Covid-19
    📘 Lecture Notes in Computer Science, 2021
    [DOI: 10.1007/978-3-030-85607-6_35]
    👥 Galantucci, S.; Giglio, P.; Dentamaro, V.; Pirlo, G.


  • 🔥 Firewall Optimization: An Innovative Two-Stage Algorithm to Optimize Firewall Rule Ordering
    📘 Computers & Security, 2023-11
    [DOI: 10.1016/j.cose.2023.103423]
    👥 Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo


Negalign Wake Hundera | Cybersecurity | Best Researcher Award

Assist. Prof. Dr. Negalign Wake Hundera | Cybersecurity | Best Researcher Award

Postdoctoral Researcher of Zhejiang Normal University, China

Dr. Negalign Wake Hundera is a seasoned researcher and educator with a Ph.D. in Software Engineering and extensive experience in network security and IoT technologies. His career reflects a strong commitment to advancing research and teaching in technology-driven fields. With a proven track record in publishing, guiding students, and leading technical teams, he is now seeking opportunities to further his research and contribute to innovative projects in academia or industry. 🌍🔐💻📚

Publication Profile : 

Scopus

🎓 Educational Background :

Negalign Wake Hundera completed his Ph.D. in Software Engineering at the University of Electronic Science and Technology of China (UESTC), Chengdu, in June 2021, under the guidance of Prof. Hu Xiong. Prior to this, he earned an M.Sc. in Computer Science and Technology from UESTC in 2016 and a Bachelor’s degree in Information Technology from Jimma University, Ethiopia, in 2009.

💼 Professional Experience :

Negalign’s professional journey spans roles in academia and industry. He has served as a Postdoctoral Research Fellow at Zhejiang Normal University, Jinhua, China, from August 2022 to August 2024, contributing to high-impact journals and guiding students through their research projects. Before this, he was an Assistant Professor and Lecturer at Wolkite University, Ethiopia, where he not only taught but also led significant projects related to ICT infrastructure and network security. He has also held a leadership position as the Information Communication and Network Infrastructure Team Leader at Wolkite University, overseeing the development and management of the institution’s network infrastructure.

📚 Research Interests : 

Negalign’s research focuses on several cutting-edge areas including network security, public key cryptography, information security, IoT, wireless sensor networks, cloud computing, deep learning, real-time object detection, vehicular networks, and UAV networks. His work aims to apply these technologies in practical fields such as healthcare, intelligent transportation systems, smart agriculture, and cybersecurity.

📝 Publication Top Notes :

  1. Hundera, N. W., Aftab, M. U., Mesfin, D., Xu, H., & Zhu, X. (2024). An efficient heterogeneous online/offline anonymous certificateless signcryption with proxy re-encryption for Internet of Vehicles. Vehicular Communications, 49, 100811. [Open Access]
  2. Hundera, N. W., Shumeng, W., Mesfin, D., Xu, H., & Zhu, X. (2024). An efficient online/offline heterogeneous proxy signcryption for secure communication in UAV networks. Journal of King Saud University – Computer and Information Sciences, 36(5), 102044. [Open Access]
  3. Leka, H. L., Fengli, Z., Kenea, A. T., Tohye, T. G., Tegene, A. T., & Hundera, N. W. (2023). PSO-Based Ensemble Meta-Learning Approach for Cloud Virtual Machine Resource Usage Prediction. Symmetry, 15(3), 613. [Open Access]
  4. Tohye, T. G., Qin, Z., Leka, H. L., & Hundera, N. W. (2023). Glaucoma Detection Using Convolutional Neural Network (CNN). In Proceedings of the 20th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP 2023).
  5. Assefa, A. A., Tian, W., Hundera, N. W., & Aftab, M. U. (2022). Crowd Density Estimation in Spatial and Temporal Distortion Environment Using Parallel Multi-Size Receptive Fields and Stack Ensemble Meta-Learning. Symmetry, 14(10), 2159. [Open Access]
  6. Hundera, N. W., Jin, C., Geressu, D. M., Olanrewaju, O. A., & Xiong, H. (2022). Proxy-based public-key cryptosystem for secure and efficient IoT-based cloud data sharing in the smart city. Multimedia Tools and Applications, 81(21), 29673–29697.
  7. Hundera, N. W., Jin, C., Aftab, M. U., Mesfin, D., & Kumar, S. (2021). Secure outsourced attribute-based signcryption for cloud-based Internet of Vehicles in a smart city. Annales des Telecommunications/Annals of Telecommunications, 76(9-10), 605–616.
  8. Leka, H. L., Fengli, Z., Kenea, A. T., Atandoh, P., & Hundera, N. W. (2021). A Hybrid CNN-LSTM Model for Virtual Machine Workload Forecasting in Cloud Data Center. In Proceedings of the 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP 2021), 474–478.
  9. Hundera, N. W., Mei, Q., Xiong, H., & Geressu, D. M. (2020). A secure and efficient identity-based proxy signcryption in cloud data sharing. KSII Transactions on Internet and Information Systems, 14(1), 455–472.
  10. Oluwasanmi, A., Akeem, S., Jehoaida, J., Baagere, E., Qin, Z., & Hundera, N. W. (2019). Sequential multi-kernel convolutional recurrent network for sentiment classification. In Proceedings of the IEEE International Conference on Software Engineering and Service Sciences (ICSESS), 129–133.