Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

pLatform for Analysis of Resilient and secUre Software

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Initial end-user requirements (opens in new window)

Collection of initial functional and nonfunctional requirements

State of the art in information sharing mechanisms in the context of ICTs (opens in new window)

A report of the current techniques standards and mechanisms to realise information sharing in the context of LAZARUS

AI techniques performance, reliability, security (opens in new window)

A detailed report of the research results that will allow choosing the best evaluation methods attack and defense to be integrated into LAZARUS

Initial Dissemination & Communication Plan (opens in new window)

This deliverable will describe the detailed plan for the project dissemination strategy to be adopted throughout the projects lifetime it will define the plan with which the different stakeholder communities will be targeted and the social media that will be used

AI and vulnerability prediction report (opens in new window)

A public report which provides the state of the art and most relevant techniques in the context of vulnerability prediction suitable for LAZARUS.

Use-case scenarios (opens in new window)

The Use-Case Scenarios report will detail the use case scenarios that will be addressed in the project.

New algorithms for software model-checking (opens in new window)

A report that describes the new software model-checking techniques that will be proposed in the project.

Reference architecture (opens in new window)

Reference Architecture of the LAZARUS platform.

System requirements (opens in new window)

Initial system requirements will be presented

Analysis in novel strategies for improved software resilience and security (opens in new window)

We will identify the latest developments related to software self-healing and vulnerability classification and recovery and analyse what paths offer more promise for maximising both research and commercial/industrial impact.

Publications

Cloud continuum testbeds and next-generation ICTs: Trends, challenges, and perspectives (opens in new window)

Author(s): Fran Casino, Peio Lopez-Iturri, Constantinos Patsakis
Published in: Computer Science Review, Issue 56, 2025, ISSN 1574-0137
Publisher: Elsevier BV
DOI: 10.1016/J.COSREV.2024.100696

Variable Renaming-Based Adversarial Test Generation for Code Model: Benchmark and Enhancement (opens in new window)

Author(s): Jin Wen, Qiang Hu, Yuejun Guo, Maxime Cordy, Yves Le Traon
Published in: ACM Transactions on Software Engineering and Methodology, 2025, ISSN 1049-331X
Publisher: Association for Computing Machinery (ACM)
DOI: 10.1145/3723353

Beyond the sandbox: Leveraging symbolic execution for evasive malware classification (opens in new window)

Author(s): Vasilis Vouvoutsis; Fran Casino; Constantinos Patsakis
Published in: Computers & Security, 2025, ISSN 1872-6208
Publisher: Elsevier
DOI: 10.1016/J.COSE.2024.104193

PIGNUS: A Deep Learning model for IDS in industrial internet-of-things (opens in new window)

Author(s): Jayalaxmi P. L. S.; Saha R.; Kumar G.; Alazab M.; Conti M.; Cheng X.
Published in: Computers & Security, 2023, ISSN 1872-6208
Publisher: Elsevier
DOI: 10.1016/j.cose.2023.103315

Assessing the impact of packing on static machine learning-based malware detection and classification systems (opens in new window)

Author(s): Daniel Gibert; Nikolaos Totosis; Constantinos Patsakis; Quan Le; Giulio Zizzo
Published in: Computers & Security, 2024, ISSN 1872-6208
Publisher: Elsevier
DOI: 10.2139/SSRN.4973174

Assessing LLMs in malicious code deobfuscation of real-world malware campaigns (opens in new window)

Author(s): Constantinos Patsakis, Fran Casino, Nikolaos Lykousas
Published in: Expert Systems with Applications, Issue 256, 2024, ISSN 0957-4174
Publisher: Elsevier BV
DOI: 10.1016/J.ESWA.2024.124912

Hello me, meet the real me: Voice synthesis attacks on voice assistants (opens in new window)

Author(s): Domna Bilika; Nikoletta Michopoulou; Efthimios Alepis; Constantinos Patsakis
Published in: Computers & Security, 2024, ISSN 1872-6208
Publisher: Elsevier
DOI: 10.1016/j.cose.2023.103617

Assessing the Robustness of Test Selection Methods for Deep Neural Networks (opens in new window)

Author(s): Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Wei Ma, Mike Papadakis, Lei Ma, Yves Le Traon
Published in: ACM Transactions on Software Engineering and Methodology, 2025, ISSN 1049-331X
Publisher: Association for Computing Machinery (ACM)
DOI: 10.1145/3715693

Sensors (opens in new window)

Author(s): Pablo López-Aguilar, Edgar Batista, Antoni Martínez-Ballesté and Agusti Solanas
Published in: Sensors, 2022, ISSN 1424-8220
Publisher: MDPI
DOI: 10.3390/s22207698

AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition (opens in new window)

Author(s): Alexandros Zacharis and Constantinos Patsakis
Published in: International Journal of Information Security, 2023, ISSN 1615-5270
Publisher: Elsevier
DOI: 10.1007/s10207-023-00693-z

A comprehensive analysis on software vulnerability detection datasets: trends, challenges, and road ahead (opens in new window)

Author(s): Yuejun Guo; Seifeddine Bettaieb; Fran Casino
Published in: International Journal of Information Security, 2024, ISSN 1615-5270
Publisher: Springer
DOI: 10.1007/s10207-024-00888-y

Boosting source code learning with text-oriented data augmentation: an empirical study (opens in new window)

Author(s): Zeming Dong; Qiang Hu; Yuejun Guo; Zhenya Zhang; Maxime Cordy; Mike Papadakis; Yves Le Traon; Jianjun Zhao
Published in: Empirical Software Engineering, 2025, ISSN 1573-7616
Publisher: Springer
DOI: 10.48550/arxiv.2303.06808

Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle (opens in new window)

Author(s): Alexandros Zacharis; Vasilios Katos; Constantinos Patsakis
Published in: International Journal of Information Security, 2024, ISSN 1615-5270
Publisher: Springer
DOI: 10.1007/S10207-024-00860-W

Cybersecurity Analysis of Wearable Devices: Smartwatches Passive Attack (opens in new window)

Author(s): Alejandra Guadalupe Silva-Trujillo, Mauricio Jacobo González González, Luis Pablo Rocha Pérez, and Luis Javier García Villalba
Published in: Sensors, Issue 23 (12), 2023, ISSN 1424-8220
Publisher: MDPI
DOI: 10.3390/s23125438

Scientific Reports (opens in new window)

Author(s): Patsakis, Constantinos; Lykousas, Nikolaos
Published in: Scientific Reports, Vol 13, Iss 1, Pp 1-16 (2023), 2023, ISSN 2045-2322
Publisher: Nature Publishing Group
DOI: 10.48550/arxiv.2303.12429

Exploring Shifting Patterns in Recent IoT Malware (opens in new window)

Author(s): Javier Carrillo-Mondejar, Guillermo Suarez-Tangil, Andrei Costin, Ricardo J. Rodríguez
Published in: European Conference on Cyber Warfare and Security, Issue 23, 2024, ISSN 2048-8610
Publisher: Academic Conferences International Ltd
DOI: 10.34190/ECCWS.23.1.2280

Decoding developer password patterns: A comparative analysis of password extraction and selection practices (opens in new window)

Author(s): Nikolaos Lykousas, Constantinos Patsakis
Published in: Computers & Security, Issue 145, 2024, ISSN 0167-4048
Publisher: Elsevier BV
DOI: 10.1016/J.COSE.2024.103974

ReinforSec: An Automatic Generator of Synthetic Malware Samples and Denial-of-Service Attacks through Reinforcement Learning (opens in new window)

Author(s): Aldo Hernandez-Suarez,Gabriel Sanchez-Perez,Linda K. Toscano-Medina,Hector Perez-Meana ,Jesus Olivares-Mercado, Jose Portillo-Portillo, Gibran Benitez-Garcia, Ana Lucila Sandoval Orozco and Luis Javier García Villalba
Published in: Sensors, Issue 23(3), 2023, ISSN 1424-8220
Publisher: MDPI
DOI: 10.3390/s23031231

Test Optimization in DNN Testing: A Survey (opens in new window)

Author(s): Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Lei Ma, Mike Papadakis, Yves Le Traon
Published in: ACM Transactions on Software Engineering and Methodology, Issue 33, 2025, ISSN 1049-331X
Publisher: Association for Computing Machinery (ACM)
DOI: 10.1145/3643678

IFIP Advances in Information and Communication Technology (opens in new window)

Author(s): Karapapas, Christos; Polyzos, George C.; Patsakis, Constantinos
Published in: ICT Systems Security and Privacy Protection, 2023, ISSN 1868-4238
Publisher: Springer
DOI: 10.48550/arxiv.2306.05541

Optimising AI models for intelligence extraction in the life cycle of Cybersecurity Threat Landscape generation (opens in new window)

Author(s): Alexandros Zacharis, Razvan Gavrila, Constantinos Patsakis, Christos Douligeris
Published in: Journal of Information Security and Applications, Issue 90, 2025, ISSN 2214-2126
Publisher: Elsevier BV
DOI: 10.1016/J.JISA.2025.104037

Applied Mathematics and Computation (opens in new window)

Author(s): Elena Almaraz Luengo; Bittor Alaña Olivares; Luis Javier García Villalba; Julio Hernandez-Castro
Published in: Applied Mathematics and Computation, 2023, ISSN 0096-3003
Publisher: Elsevier BV
DOI: 10.1016/J.AMC.2023.128222

IEEE Access (opens in new window)

Author(s): Amandeep Verma; Rahul Saha; Gulshan Kumar; Alessandro Brighente; Mauro Conti; Tai-Hoon Kim
Published in: IEEE Access, 2025, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/ACCESS.2025.3538108

Active Code Learning: Benchmarking Sample-Efficient Training of Code Models (opens in new window)

Author(s): Qiang Hu; Yuejun Guo; Xiaofei Xie; Maxime Cordy; Lei Ma; Mike Papadakis; Yves Le Traon
Published in: IEEE Transactions on Software Engineering, 2024, ISSN 1939-3520
Publisher: IEEE
DOI: 10.48550/arxiv.2306.01250

BENIGREEN: Blockchain-Based Energy-Efficient Privacy-Preserving Scheme for Green IoT (opens in new window)

Author(s): Rekha Goyat, Gulshan Kumar, Mauro Conti, Tannishtha Devgun, Rahul Saha, Reji Thomas
Published in: IEEE Internet of Things Journal, Issue 10, 2023, ISSN 2327-4662
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/JIOT.2023.3268325

Mapping of data breaches in companies listed on the NYSE and NASDAQ: Insights and implications (opens in new window)

Author(s): Gabriel Arquelau Pimenta Rodrigues; André Luiz Marques Serrano; Robson de Oliveira Albuquerque; Gabriela Mayumi Saiki; Sara Santedicola Ribeiro; Ana Lucila Sandoval Orozco; Luis Javier García Villalba
Published in: Results in Engineering, Vol 21, Iss , Pp 101893- (2024), 2024, ISSN 2590-1230
Publisher: Elsevier
DOI: 10.1016/j.rineng.2024.101893

Not on my watch: ransomware detection through classification of high-entropy file segments (opens in new window)

Author(s): Fran Casino, Darren Hurley-Smith, Julio Hernandez-Castro, Constantinos Patsakis
Published in: Journal of Cybersecurity, Issue 11, 2025, ISSN 2057-2085
Publisher: Oxford University Press (OUP)
DOI: 10.1093/CYBSEC/TYAF009

Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning (opens in new window)

Author(s): Pablo Corona-Fraga; Aldo Hernandez-Suarez; Gabriel Sanchez-Perez; Linda Karina Toscano-Medina; Hector Perez-Meana; Jose Portillo-Portillo; Jesus Olivares-Mercado; Luis Javier García Villalba
Published in: Future Internet, 2025, ISSN 1999-5903
Publisher: MDPI
DOI: 10.3390/FI17010033

The anatomy of deception: Measuring technical and human factors of a large-scale phishing campaign (opens in new window)

Author(s): Anargyros Chrysanthou; Yorgos Pantis; Constantinos Patsakis
Published in: Computers & Security, 2024, ISSN 1872-6208
Publisher: Elsevier
DOI: 10.1016/j.cose.2024.103780

Unveiling the multifaceted concept of cognitive security: Trends, perspectives, and future challenges (opens in new window)

Author(s): Fran Casino
Published in: Technology in Society, 2025, ISSN 1879-3274
Publisher: Elsevier
DOI: 10.1016/J.TECHSOC.2025.102956

Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review (opens in new window)

Author(s): Gabriel Arquelau Pimenta Rodrigues; André Luiz Marques Serrano; Amanda Nunes Lopes Espiñeira Lemos; Edna Dias Canedo; Fábio Lúcio Lopes de Mendonça; Robson de Oliveira Albuquerque; Ana Lucila Sandoval Orozco; Luis Javier García Villalba
Published in: Data, 2024, ISSN 2306-5729
Publisher: MDPI
DOI: 10.3390/DATA9020027

Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors Using Machine Learning (opens in new window)

Author(s): Ying Yuan; Giovanni Apruzzese; Mauro Conti
Published in: Digital Threats: Research and Practice, 2024, ISSN 2576-5337
Publisher: ACM
DOI: 10.48550/arxiv.2210.13660

Sensors (opens in new window)

Author(s): Pablo López-Aguilar; Edgar Batista; Antoni Martínez-Ballesté; Agusti Solanas
Published in: Sensors, 2022, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/S22207698

Sensors (opens in new window)

Author(s): Ariadna Claudia Moreno; Aldo Hernandez-Suarez; Gabriel Sanchez-Perez; Linda Karina Toscano-Medina; Hector Perez-Meana; Jose Portillo-Portillo; Jesus Olivares-Mercado; Luis Javier García Villalba
Published in: Sensors, 2025, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/S25010211

Tales from the Git: Automating the detection of secrets on code and assessing developers’ passwords choices (opens in new window)

Author(s): Lykousas, Nikolaos; Patsakis, Constantinos
Published in: IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2023, ISSN 2768-0657
Publisher: IEEE
DOI: 10.48550/arxiv.2307.00892

CodeLens: An Interactive Tool for Visualizing Code Representations (opens in new window)

Author(s): Guo, Yuejun; Bettaieb, Seifeddine; Hu, Qiang; Traon, Yves Le; Tang, Qiang
Published in: 2023
DOI: 10.48550/arxiv.2307.14902

From NEA and NIA to NESAS and SCAS: Demystifying the 5G Security Ecosystem (opens in new window)

Author(s): Michalas, Angelos; Patsakis, Constantinos; Vergados, Dimitrios D.; Vergados, Dimitrios J
Published in: 2022
DOI: 10.48550/arxiv.2212.09149

CBDC-AquaSphere: Interoperable Central Bank Digital Currency Built on Trusted Computing and Blockchain (opens in new window)

Author(s): Homoliak, Ivan; Perešíni, Martin; Holop, Patrik; Handzuš, Jakub; Casino, Fran
Published in: 2023
DOI: 10.48550/arxiv.2305.16893

ReinforSec: An Automatic Generator of Synthetic Malware Samples and Denial-of-Service Attacks through Reinforcement Learning (opens in new window)

Author(s): Aldo Hernandez-Suarez; Gabriel Sanchez-Perez; Linda K. Toscano-Medina; Hector Perez-Meana; Jesus Olivares-Mercado; Jose Portillo-Portillo; Gibran Benitez-Garcia; Ana Lucila Sandoval Orozco; Luis Javier García Villalba
Published in: Pages: 1231, 2023
DOI: 10.3390/s23031231

MUTEN: Mutant-Based Ensembles for Boosting Gradient-Based Adversarial Attack (opens in new window)

Author(s): Qiang Hu, Yuejun Guo, Maxime Cordy, Mike Papadakis, Yves Le Traon
Published in: 2023 38th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2024
Publisher: IEEE
DOI: 10.1109/ASE56229.2023.00042

Exploring Shifting Patterns in Recent IoT Malware (opens in new window)

Author(s): Javier Carrillo-Mondejar; Guillermo Suarez-Tangil; Andrei Costin; Ricardo J. Rodríguez
Published in: European Conference on Cyber Warfare and Security, 2024
DOI: 10.34190/ECCWS.23.1.2280

MICODE: A Minimal Code Design for Secret Sharing Scheme (opens in new window)

Author(s): Belkacem Imine, Rahul Saha, Mauro Conti
Published in: Proceedings of the 22nd International Conference on Security and Cryptography, 2025
Publisher: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0013517300003979

An Investigation of Quality Issues in Vulnerability Detection Datasets (opens in new window)

Author(s): Yuejun Guo, Seifeddine Bettaieb
Published in: 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2023
Publisher: IEEE
DOI: 10.1109/EUROSPW59978.2023.00008

QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer (opens in new window)

Author(s): Bianchi, Tommaso; Asokraj, Surudhi; Brighente, Alessandro; Conti, Mauro; Poovendran, Radha
Published in: IEEE Conference on Vehicular Technology (VTC), 2023
Publisher: IEEE
DOI: 10.48550/arxiv.2205.10292

Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of Language Models (opens in new window)

Author(s): Alberto Castagnaro, Mauro Conti, Luca Pajola
Published in: Proceedings of the 2024 Workshop on Artificial Intelligence and Security, 2025
Publisher: ACM
DOI: 10.1145/3689932.3694770

Outside the Comfort Zone: Analysing LLM Capabilities in Software Vulnerability Detection (opens in new window)

Author(s): Yuejun Guo, Constantinos Patsakis, Qiang Hu, Qiang Tang, Fran Casino
Published in: Lecture Notes in Computer Science, Computer Security – ESORICS 2024, 2024
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-70879-4_14

BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks (opens in new window)

Author(s): Alessandro Lotto; Vaibhav Singh; Bhaskar Ramasubramanian; Alessandro Brighente; Mauro Conti; Radha Poovendran
Published in: Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '23), 2023
Publisher: ACM
DOI: 10.1145/3558482.3590187

The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces (opens in new window)

Author(s): Nikolaos Lykousas, Vasilios Koutsokostas, Fran Casino, Constantinos Patsakis
Published in: 2023 IEEE International Conference on Service-Oriented System Engineering (SOSE), 2024
Publisher: IEEE
DOI: 10.1109/SOSE58276.2023.00027

Evaluating Zero-Shot Chatgpt Performance on Predicting CVE Data From Vulnerability Descriptions (opens in new window)

Author(s): Andrei Costin; Hannu Turtiainen; Narges Yousefnezhad; Vadim Bogulean; Timo Hämäläinen
Published in: European Conference on Cyber Warfare and Security, 2024
DOI: 10.34190/ECCWS.23.1.2285

PITCOR: Privacy-assured Time-controlled Revocation in Blockchain Transactions (opens in new window)

Author(s): Archana Chhabra, Rahul Saha, Mauro Conti
Published in: 2024 6th International Conference on Blockchain Computing and Applications (BCCA), 2025
Publisher: IEEE
DOI: 10.1109/BCCA62388.2024.10844418

BISCUID: On the Feasibility of Identifying Scouting Drones Based on their Flying Behavior (opens in new window)

Author(s): Menno Bezema, Alessandro Brighente, Mauro Conti, Luca Cosuti
Published in: Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing, 2025
Publisher: ACM
DOI: 10.1145/3672608.3707757

DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles (opens in new window)

Author(s): Bianchi, Tommaso; Brighente, Alessandro; Conti, Mauro
Published in: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024
DOI: 10.48550/ARXIV.2312.12879

FASALKA: Offloaded Privacy Classification for Blockchain Smart Contracts (opens in new window)

Author(s): Tannishtha Devgun, Gulshan Kumar, Mauro Conti
Published in: 2024 6th International Conference on Blockchain Computing and Applications (BCCA), 2025
Publisher: IEEE
DOI: 10.1109/BCCA62388.2024.10844467

The Potential of LLM-Generated Reports in DevSecOps

Author(s): Nikolaos Lykousas, Vasileios Argyropoulos & Fran Casino
Published in: Artificial Intelligence-Empowered Software Engineering, 2025
Publisher: Springer Nature Switzerland

QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer (opens in new window)

Author(s): Tommaso Bianchi, Surudhi Asokraj, Alessandro Brighente, Mauro Conti, Radha Poovendran
Published in: 2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring), 2023
Publisher: IEEE
DOI: 10.1109/VTC2023-SPRING57618.2023.10199651

The Impact of SBOM Generators on Vulnerability Assessment in Python: A Comparison and a Novel Approach (opens in new window)

Author(s): Giacomo Benedetti, Serena Cofano, Alessandro Brighente, Mauro Conti
Published in: Lecture Notes in Computer Science, Applied Cryptography and Network Security, 2025
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-95764-2_19

The Role of Extraversion in Phishing Victimisation: A Systematic Literature Review (opens in new window)

Author(s): Pablo López-Aguilar, Constantinos Patsakis, Agusti Solanas
Published in: 2022 APWG Symposium on Electronic Crime Research (eCrime), 2024
Publisher: IEEE
DOI: 10.1109/ECRIME57793.2022.10142078

VulnBERTa: On Automating CWE Weakness Assignment and Improving the Quality of Cybersecurity CVE Vulnerabilities Through ML/NLP (opens in new window)

Author(s): Hannu Turtiainen, Andrei Costin
Published in: 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2024
Publisher: IEEE
DOI: 10.1109/EUROSPW61312.2024.00075

GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks (opens in new window)

Author(s): Andrea Agiollo; Enkeleda Bardhi; Mauro Conti; Riccardo Lazzeretti; Eleonora Losiouk; Andrea Omicini
Published in: 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 2023
DOI: 10.1109/eurosp57164.2023.00043

AI-assisted Cyber Security Exercise Content Generation: Modeling a Cyber Conflict (opens in new window)

Author(s): Alexandros Zacharis, Razvan Gavrila, Constantinos Patsakis, Demosthenes Ikonomou
Published in: 2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon), 2023, ISSN 2325-5374
Publisher: IEEE
DOI: 10.23919/CYCON58705.2023.10181930

CANLP: NLP-Based Intrusion Detection System for CAN (opens in new window)

Author(s): Kavya Balasubramanian, Adithya Gowda Baragur, Denis Donadel, Dinuka Sahabandu, Alessandro Brighente, Bhaskar Ramasubramanian, Mauro Conti, Radha Poovendran
Published in: Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2025
Publisher: ACM
DOI: 10.1145/3605098.3636083

Strangers Sets: Preserving Drones' Location Privacy while Avoiding Violations of Critical Infrastructures (opens in new window)

Author(s): Alessandro Brighente, Mauro Conti, Savio Sciancalepore, Harshul Vaishnav
Published in: Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing, 2025
Publisher: ACM
DOI: 10.1145/3672608.3707724

Método para Automatizar Clasificación de Malware PE32 mediante Técnicas de Procesamiento de Lenguaje Natural

Author(s): Bruce W. Percílio Azevedo, Luis Alberto Martínez Hernández, Robson de Oliveira Albuquerque, Luis Javier García Villalba
Published in: IX Jornadas Nacionales de Investigación En Ciberseguridad, 2024
Publisher: N/A

Poster: Automated Dependency Mapping for Web API Security Testing Using Large Language Models (opens in new window)

Author(s): Wanpeng Li, Yuejun Guo
Published in: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2025
Publisher: ACM
DOI: 10.1145/3658644.3691377

"""Are Adversarial Phishing Webpages a Threat in Reality?"" Understanding the Users' Perception of Adversarial Webpages" (opens in new window)

Author(s): Ying Yuan; Qingying Hao; Giovanni Apruzzese; Mauro Conti; Gang Wang
Published in: Proceedings of the ACM Web Conference 2024, 2024
DOI: 10.48550/ARXIV.2404.02832

GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks (opens in new window)

Author(s): Andrea Agiollo, Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk, Andrea Omicini
Published in: 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 2024
Publisher: IEEE
DOI: 10.1109/EUROSP57164.2023.00043

What’s Inside a Node? Malicious IPFS Nodes Under the Magnifying Glass (opens in new window)

Author(s): Christos Karapapas, George C. Polyzos, Constantinos Patsakis
Published in: IFIP Advances in Information and Communication Technology, ICT Systems Security and Privacy Protection, 2024
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-56326-3_11

Reproducibility of Firmware Analysis: An Empirical Study (opens in new window)

Author(s): Narges Yousefnezhad, Andrei Costin
Published in: Lecture Notes in Business Information Processing, Business Modeling and Software Design, 2024
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-64073-5_13

Risks and Challenges Associated with the Chain of Custody of Cryptographic Assets in Law Enforcement Operations (opens in new window)

Author(s): Jesús Martín Abad, David Arroyo Guardeño, Fran Casino
Published in: Lecture Notes in Networks and Systems, Blockchain and Applications, 6th International Congress, 2025
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-81928-5_21

An Empirical Study of the Imbalance Issue in Software Vulnerability Detection (opens in new window)

Author(s): Yuejun Guo, Qiang Hu, Qiang Tang, Yves Le Traon
Published in: Lecture Notes in Computer Science, Computer Security – ESORICS 2023, 2024
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-51482-1_19

A Review on Privacy and Monetization Aspects Within BCI and XR-BCI Ecosystems (opens in new window)

Author(s): Tuomo Lahtinen, Andrei Costin, Guillermo Suarez-Tangil, Narges Yousefnezhad
Published in: Lecture Notes in Business Information Processing, Business Modeling and Software Design, 2024
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-64073-5_11

Understanding SBOMs in Real-World Systems – A Practical DevOps/SecOps Perspective (opens in new window)

Author(s): Narges Yousefnezhad, Andrei Costin
Published in: Lecture Notes in Business Information Processing, Business Modeling and Software Design, 2024
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-64073-5_20

CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN Bus Monitoring ECU Activations (opens in new window)

Author(s): Denis Donadel, Kavya Balasubramanian, Alessandro Brighente, Bhaskar Ramasubramanian, Mauro Conti, Radha Poovendran
Published in: Lecture Notes in Computer Science, Applied Cryptography and Network Security, 2025
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-95764-2_17

The Potential of LLM-Generated Reports in DevSecOps (opens in new window)

Author(s): Nikolaos Lykousas, Vasileios Argyropoulos, Fran Casino
Published in: Learning and Analytics in Intelligent Systems, Artificial Intelligence-Empowered Software Engineering 2024, 2025
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-98410-5_27

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0