Titolo |
Pubblicato in |
Anno |
Remote attestation as a service for IoT |
2019 6th International Conference on Internet of Things: Systems, Management and Security, IOTSMS 2019 |
2019 |
Towards Intelligent Cyber Deception Systems |
Autonomous Cyber Deception |
2019 |
Il Futuro della Cybersecurity in Italia: Ambiti Progettuali Strategici |
|
2018 |
The future of Cybersecurity in Italy: Strategic focus area |
|
2018 |
Distributed services attestation in IoT |
From Database to Cyber Security. Lecture Notes in Computer Science. Volume 11170 |
2018 |
OSSINT - Open Source Social Network Intelligence: An efficient and effective way to uncover “private” information in OSN profiles |
ONLINE SOCIAL NETWORKS AND MEDIA |
2018 |
Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecture |
2018 International Conference on Military Communications and Information Systems, ICMCIS 2018 |
2018 |
Know your enemy: Stealth configuration-information gathering in SDN |
Green, Pervasive, and Cloud Computing |
2017 |
SOF on trial. the technical and legal value of battlefield digital forensics in court |
Lecture Notes in Computer Science |
2017 |
Analyzing Android Encrypted Network Traffic to Identify User Actions |
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY |
2016 |
AHEAD: A new architecture for active defense |
SafeConfig 2016 - Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, co-located with CCS 2016 |
2016 |
FedUp! cloud federation as a service |
European Conference on Service-Oriented and Cloud Computing |
2016 |
Anonymity in an electronic society: A survey |
Cyber Deception: Building the Scientific Foundation |
2016 |
Obfuscation of Sensitive Data for Incremental Release of Network Flows |
IEEE-ACM TRANSACTIONS ON NETWORKING |
2015 |
Violating consumer anonymity: geo-locating nodes in Named Data Networking |
Lecture Notes in Computer Science |
2015 |
No place to hide that bytes won’t reveal: sniffing location-based encrypted traffic to track a user’s position |
Lecture Notes in Computer Science |
2015 |
Can't you hear me knocking: Identification of user actions on android apps via traffic analysis |
CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy |
2015 |
Boten ELISA: A novel approach for botnet CandC in Online Social Networks |
2015 IEEE Conference on Communications and Network Security (CNS) |
2015 |
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers |
INTERNATIONAL JOURNAL OF SECURITY AND NETWORKS |
2015 |