Andrea Visconti

Learn More
The roles of plasmacytoid dendritic cells (pDCs) and their response to interferon (IFN)-beta therapy in multiple sclerosis (MS) patients are poorly understood. We identified pDC accumulation in white matter lesions and leptomeninges of MS brains and abundant expression of the Type I IFN-induced protein MxA, mainly in perivascular CD3+ lymphocytes in(More)
The role of some chemical elements in neurodegeneration was suggested by various authors. To obtain a profile of chemical elements and oxidative status in complex neurological diseases, an unbiased "omics" approach, i.e., quantification of 26 elements and oxidative stress parameters (serum oxidative status (SOS) and serum anti-oxidant capacity (SAC)),(More)
In this paper, we discuss the design and engineering of a biologically-inspired, host-based intrusion detection system to protect computer networks. To this end, we have implemented an Artificial Immune System (AIS) that mimics the behavior of the biological adaptive immune system. The proposed AIS, consists of a number of running artificial white blood(More)
Implementation of routing protocols in mobile ad-hoc networks relies on efficient node cooperation. However, node misbehavior is a common phenomenon, thus, ad-hoc networks are subject to packet dropping, packet modification, packet misrouting, selfish node behavior, and so on. In this paper, a biologically-inspired type-2 fuzzy set recognition algorithm for(More)
Mobile devices, laptops, and USB memory usually store large amounts of sensitive information frequently unprotected. Unauthorized access to or release of such information could reveal business secrets, users habits, non-public data or anything else. Full Disk Encryption (FDE) solutions might help users to protect sensitive data in the event that devices are(More)
Password-based key derivation functions are of particular interest in cryptography because they (a) input a password/passphrase (which usually is short and lacks enough entropy) and derive a cryptographic key; (b) slow down brute force and dictionary attacks as much as possible. In PKCS#5 [19], RSA Laboratories described a password based key derivation(More)