Titolo | Pubblicato in | Anno |
---|---|---|
OliVaR: Improving olive variety recognition using deep neural networks | COMPUTERS AND ELECTRONICS IN AGRICULTURE | 2024 |
Have You Poisoned My Data? Defending Neural Networks Against Data Poisoning | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2024 |
DOLOS: A Novel Architecture for Moving Target Defense | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | 2023 |
Evading behavioral classifiers: a comprehensive analysis on evading ransomware detection techniques | NEURAL COMPUTING & APPLICATIONS | 2022 |
Reliable detection of compressed and encrypted data | NEURAL COMPUTING & APPLICATIONS | 2022 |
PassFlow: Guessing Passwords with Generative Flows | 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) | 2022 |
MalPhase: Fine-Grained Malware Detection Using Network Flow Data | ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security | 2021 |
A Novel Stealthy Attack to Gather SDN Configuration-Information | IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING | 2020 |
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes | ACNS 2020 | 2020 |
EnCoD: Distinguishing Compressed and Encrypted File Fragments | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2020 |
Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems | Adaptive Autonomous Secure Cyber Systems | 2020 |
Towards Intelligent Cyber Deception Systems | Autonomous Cyber Deception | 2019 |
IaaS-Aided Access Control for Information-Centric IoT | Proceedings of the 43rd IEEE Conference on Local Computer Network | 2018 |
LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking | IEEE-ACM TRANSACTIONS ON NETWORKING | 2017 |
Know your enemy: Stealth configuration-information gathering in SDN | Green, Pervasive, and Cloud Computing | 2017 |
AHEAD: A new architecture for active defense | SafeConfig 2016 - Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, co-located with CCS 2016 | 2016 |
Amplified distributed denial of service attack in software defined networking | 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS) | 2016 |
Anonymity in an electronic society: A survey | Cyber Deception: Building the Scientific Foundation | 2016 |
LineSwitch: efficiently managing switch flow in software-defined networking while effectively tackling DoS attacks | ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security | 2015 |
© Università degli Studi di Roma "La Sapienza" - Piazzale Aldo Moro 5, 00185 Roma