Stefano Galantucci | Cybersecurity | Best Researcher Award

Dr. Stefano Galantucci | Cybersecurity | Best Researcher Award

Adjunct Professor (Lecturer) at University of Bari Aldo Moro, Italy

Dr. Stefano Galantucci is a cybersecurity researcher and academic affiliated with the University of Bari Aldo Moro, Italy. Born on October 28, 1996, he holds a Ph.D. in Computer Science and specializes in network security, cryptography, malware detection, and firewall optimization. With extensive experience in teaching, research, and publication, Dr. Galantucci is an active contributor to both academic and applied cybersecurity communities.

Publication Profileย 

Scopus

Orcid

Educational Background ๐ŸŽ“

  • 2024 โ€“ Ph.D. in Computer Science,
    University of Bari Aldo Moro
    โ€“ XXXVIth cycle, focus on cybersecurity and computer science research.

  • 2020 โ€“ Masterโ€™s Degree (MSc) in Cybersecurity,
    University of Bari “Aldo Moro”
    โ€“ Graduated cum laude with honors and special mention by the commission.

  • 2018 โ€“ Bachelorโ€™s Degree (BSc) in Computer Science,
    University of Bari “Aldo Moro”
    โ€“ Graduated cum laude.

Professional Experience ๐Ÿ’ผ

  • 2024โ€“Present โ€“ Research Fellow,
    University of Bari Aldo Moro
    โ€“ Working on the FAIR project.

  • 2023โ€“Present โ€“ Examination Board Member,
    University of Bari Aldo Moro
    โ€“ Courses: Biometric Systems, Application Security, Computer Architecture & OS.

  • 2023 โ€“ Adjunct Professor (CyberChallenge Course),
    University of Bari Aldo Moro
    โ€“ Taught Cryptography and Hardware Security (24 hours, 2 ECTS).

  • 2022โ€“Present โ€“ Adjunct Professor of Cryptography,
    MSc in Cybersecurity, University of Bari Aldo Moro
    โ€“ 6 ECTS (62 hours).

  • 2021โ€“Present โ€“ Member, ISLab Research Group,
    University of Bari Aldo Moro
    โ€“ Cybersecurity contact person.

Research Interests ๐Ÿ”ฌ

  • Cryptography and hardware security

  • Malware detection and classification

  • Network intrusion detection (NIDS)

  • Firewall policy optimization

  • Anomaly detection and AI-driven threat detection

  • DevSecOps and secure software development practices

  • Blockchain analysis

  • Adversarial neural networks in security (e.g., GANs)

Awards and Honors๐Ÿ†โœจ

  • Special mention by the MSc degree commission (2020)

  • Full marks and honors in both MSc and BSc degrees

Conclusion๐ŸŒŸ

Dr. Stefano Galantucci is a dynamic and accomplished researcher in the field of cybersecurity, with a strong academic background, diverse teaching experience, and a rich portfolio of high-impact publications. His work bridges theoretical foundations and real-world applications, particularly in cryptography, malware detection, and network defense systems. A respected member of the research community, Dr. Galantucci actively contributes to scientific progress through both his scholarly output and his involvement in peer review for top-tier journals. With his growing influence and commitment to innovation, he stands out as a promising leader in the evolving landscape of cybersecurity research.

Publications ๐Ÿ“š

  • ๐Ÿ” CARIOCA: Prioritizing the Use of IoC by Threats Assessment Shared on the MISP Platform
    ๐Ÿ“˜ International Journal of Information Security, 2025-04
    [DOI: 10.1007/s10207-025-01006-2]
    ๐Ÿ‘ฅ Piero Delvecchio, Stefano Galantucci, Andrea Iannacone, Giuseppe Pirlo


  • ๐Ÿงฎ FOBICS: Assessing Project Security Level through a Metrics Framework that Evaluates DevSecOps Performance
    ๐Ÿ“˜ Information and Software Technology, 2025-02
    [DOI: 10.1016/j.infsof.2024.107605]
    ๐Ÿ‘ฅ Alessandro Caniglia, Vincenzo Dentamaro, Stefano Galantucci, Donato Impedovo


  • ๐Ÿ›ก๏ธ PROGESI: A PROxy Grammar to Enhance Web Application Firewall for SQL Injection Prevention
    ๐Ÿ“˜ IEEE Access, 2024
    [DOI: 10.1109/ACCESS.2024.3438092]
    ๐Ÿ‘ฅ Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo


  • ๐ŸŒ Automatic Decision Tree-Based NIDPS Ruleset Generation for DoS/DDoS Attacks
    ๐Ÿ“˜ Journal of Information Security and Applications, 2024-05
    [DOI: 10.1016/j.jisa.2024.103736]
    ๐Ÿ‘ฅ Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo


  • ๐Ÿงฌ YAMME: A YAra-byte-signatures Metamorphic Mutation Engine
    ๐Ÿ“˜ IEEE Transactions on Information Forensics and Security, 2023
    [DOI: 10.1109/TIFS.2023.3294059]
    ๐Ÿ‘ฅ Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo


  • ๐Ÿง  Comparing Deep Learning and Shallow Learning Techniques for API Calls Malware Prediction
    ๐Ÿ“˜ Applied Sciences, 2022-02
    [DOI: 10.3390/app12031645]
    ๐Ÿ‘ฅ Angelo Cannarile, Vincenzo Dentamaro, Stefano Galantucci, Andrea Iannacone, Donato Impedovo, Giuseppe Pirlo


  • ๐Ÿ’ฐ BACH: A Tool for Analyzing Blockchain Transactions Using Address Clustering Heuristics
    ๐Ÿ“˜ Information, 2024-09-26
    [DOI: 10.3390/info15100589]
    ๐Ÿ‘ฅ Michele Caringella, Francesco Violante, Francesco De Lucci, Stefano Galantucci, Matteo Costantini


  • ๐Ÿ”‘ One Time User Key: A User-Based Secret Sharing XOR-ed Model for Multiple User Cryptography
    ๐Ÿ“˜ IEEE Access, 2021
    [DOI: 10.1109/ACCESS.2021.3124637]
    ๐Ÿ‘ฅ Stefano Galantucci, Donato Impedovo, Giuseppe Pirlo


  • ๐Ÿ“‰ Combining Unsupervised Approaches for Near Real-Time Network Traffic Anomaly Detection
    ๐Ÿ“˜ Applied Sciences, 2022-02
    [DOI: 10.3390/app12031759]
    ๐Ÿ‘ฅ Francesco Carrera, Vincenzo Dentamaro, Stefano Galantucci, Andrea Iannacone, Donato Impedovo, Giuseppe Pirlo


  • ๐Ÿ“ˆ Ensemble Consensus: An Unsupervised Algorithm for Anomaly Detection in Network Security Data
    ๐Ÿ“„ CEUR Workshop Proceedings, 2021
    ๐Ÿ‘ฅ Vincenzo Dentamaro, V.N. Convertini, Stefano Galantucci, P. Giglio, T. Palmisano, Giuseppe Pirlo


  • ๐Ÿงญ A Case Study of Navigation System Assistance with Safety Purposes in the Context of Covid-19
    ๐Ÿ“˜ Lecture Notes in Computer Science, 2021
    [DOI: 10.1007/978-3-030-85607-6_35]
    ๐Ÿ‘ฅ Galantucci, S.; Giglio, P.; Dentamaro, V.; Pirlo, G.


  • ๐Ÿ”ฅ Firewall Optimization: An Innovative Two-Stage Algorithm to Optimize Firewall Rule Ordering
    ๐Ÿ“˜ Computers & Security, 2023-11
    [DOI: 10.1016/j.cose.2023.103423]
    ๐Ÿ‘ฅ Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo


Touhid Bhuiyan | Cybersecurity | Outstanding Scientist Award

Prof. Dr. Touhid Bhuiyan | Cybersecurity | Outstanding Scientist Award

Professor at Washington University of Science and Technology, United States

Dr. T. Bhuiyan is a distinguished academic and consultant in Cyber Security, with extensive experience in teaching, research, and industry. His contributions span several continents and include a wealth of publications and keynotes, focusing on the transformative role of technology in education and security. ๐ŸŒ๐Ÿ”๐Ÿ“–

Publication Profile :ย 

Orcid

 

๐ŸŽ“ Educational Background :

Dr. T. Bhuiyan is a seasoned professional in Cyber Security, Software Engineering, and Databases, with over 27 years of experience in teaching and research across the USA, Australia, and Bangladesh. He holds a PhD in Computer Science from Queensland University of Technology, Australia, along with an MSc from The American University in London and a BSc (Hons) in Computing & Information Systems from the University of London. His education is complemented by numerous certifications, including Certified Information System Auditor (CISA) and Certified Ethical Hacker (CEH).

๐Ÿ’ผ Professional Experience :

In his professional journey, Dr. Bhuiyan has served as a Professor of Cyber Security at Washington University of Science and Technology, and previously held leadership roles at Daffodil International University and Polytechnic Institute Australia. His consulting experience includes a significant role as a National Consultant for Cyber Security with the UNDP and the Government of Bangladesh, where he led initiatives to enhance cyber security measures for government portals. Dr. Bhuiyan has delivered keynote speeches at international conferences and has authored multiple influential publications, including books on intelligent recommendation systems and cyber security. His research interests lie at the intersection of information security, trust management, and e-Learning, exploring how technology can enhance educational practices and health informatics.

๐Ÿ“š Research Interests :ย 

๐Ÿ” Information Security
๐ŸŒ Social Networks
๐Ÿ”’ Trust Management
๐Ÿ’ป Database Management
๐Ÿฅ e-Health
๐Ÿ“š e-Learning

๐Ÿ“ Publication Top Notes :

  1. Hossain, M.A., Rahman, M.Z., Bhuiyan, T., Moni, M.A. (2024). Identification of Biomarkers and Molecular Pathways Implicated in Smoking and COVID-19 Associated Lung Cancer Using Bioinformatics and Machine Learning Approaches. International Journal of Environmental Research and Public Health, 21(11), 1392.
  2. Hanip, A., Sarower, A.H., Bhuiyan, T. (2024). The Transformative Role of Generative AI in Education: Challenges and Opportunities for Enhancing Student Learning and Assessment Through Mass Integration. International Journal of Advanced Research in Engineering and Technology, 15(5), 161-175.
  3. Mahmud, A., Sarower, A.H., Sohel, A., Assaduzzaman, M., Bhuiyan, T. (2024). Adoption of ChatGPT by university students for academic purposes: Partial least square, artificial neural network, deep neural network and classification algorithms approach. Array, 21, 100339.
  4. Zannah, T.B., Abdulla-Hil-Kafi, M., Sheakh, M.A., Hasan, M.Z., Shuva, T.F., Bhuiyan, T., Rahman, M.T., Khan, R.T., Kaiser, M.S., Whaiduzzaman, M. (2024). Bayesian Optimized Machine Learning Model for Automated Eye Disease Classification from Fundus Images. Computation, 12(190).
  5. Bishshash, P., Nirob, M.A.S., Shikder, M.H., Sarower, M.A.H., Bhuiyan, T., Noori, S.R.H. (2024). A Comprehensive Cotton Leaf Disease Dataset for Enhanced Detection and Classification. Data in Brief, 57, 110913.
  6. Tamal, M.A., Islam, M.K., Bhuiyan, T., Sattar, A., Prince, N.U. (2024). Unveiling suspicious phishing attacks: enhancing detection with an optimal feature vectorization algorithm and supervised machine learning. Frontiers in Computer Science, 6, 1428013.
  7. Tamal, M.A., Islam, M.K., Bhuiyan, T., Sattar, A. (2024). Dataset of suspicious phishing URL detection. Frontiers in Computer Science, 6, 1308634.
  8. Sholi, R.T., Sarker, …, Bhuiyan, T., Shakil, S.M.K.A., Ahmed, M.F. (2024). Application of Computer Vision and Mobile Systems in Education: A Systematic Review. International Journal of Interactive Mobile Technologies, 18(1), 168-187.
  9. Ahad, M.T., Li, Y., Song, B., Bhuiyan, T. (2023). Comparison of CNN-based deep learning architectures for rice diseases classification. Artificial Intelligence in Agriculture, 9(1), 22-35.
  10. Basar, M.A., Hosen, M.F., Paul, B.K., …, Bhuiyan, T. (2023). Identification of drug and protein-protein interaction network among stress and depression: A bioinformatics approach. Informatics in Medicine Unlocked, 37, 101174.
  11. Paul, S.G., Saha, A., Arefin, M.S., Bhuiyan, T., …, Moni, M.A. (2023). A Comprehensive Review of Green Computing: Past, Present, and Future Research. IEEE Access, 11, 87445-87494.
  12. Sarker, S., Arefin, M.S., Kowsher, M., Bhuiyan, T., Dhar, P.K., Kwon, O.J. (2022). A Comprehensive Review on Big Data for Industries: Challenges and Opportunities. IEEE Access, 11, 744-769.
  13. Asaduzzaman, S., Rehana, H., Bhuiyan, T., Eid, M.M.A., Rashed, A.N.Z. (2022). Extremely high birefringent slotted core umbrella-shaped photonic crystal fiber in terahertz regime. Applied Physics B, 128(148).
  14. Bhuiyan, T. (2022). Transitioning from education to work during the 4th Industrial Revolution. AIB Review, 7, Adelaide, Australia.
  15. Ali, M.N.B., Saudi, M.M., Bhuiyan, T., Ahmad, A.B., Islam, M.N. (2021). NIPSA Intrusion Classification. Journal of Engineering Science and Technology, 16(4), 3534-3547.