European Commission logo
italiano italiano
CORDIS - Risultati della ricerca dell’UE
CORDIS

European Network for Cyber-security

Risultati finali

Pubblicazioni

Trust Validation of Cloud IaaS: A Customer-centric Approach

Autori: Salman Manzoor, Ahmed Taha, Neeraj Suri
Pubblicato in: 2016 IEEE Trustcom/BigDataSE/ISPA, 2016, Pagina/e 97-104, ISBN 978-1-5090-3205-1
Editore: IEEE
DOI: 10.1109/TrustCom.2016.0051

A Trust-by-Design Framework for the Internet of Things

Autori: Davide Ferraris, Carmen Fernandez-Gago, Javier Lopez
Pubblicato in: 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2018, Pagina/e 1-4, ISBN 978-1-5386-3662-6
Editore: IEEE
DOI: 10.1109/ntms.2018.8328674

A Segregated Architecture for a Trust-based Network of Internet of Things

Autori: Davide Ferraris, Carmen Fernandez-Gago, Joshua Daniel, Javier Lopez
Pubblicato in: 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), 2019, Pagina/e 1-6, ISBN 978-1-5386-5553-5
Editore: IEEE
DOI: 10.1109/ccnc.2019.8651703

InfoLeak: Scheduling-Based Information Leakage

Autori: Tsvetoslava Vateva-Gurova, Salman Manzoor, Yennun Huang, Neeraj Suri
Pubblicato in: 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), 2018, Pagina/e 44-53, ISBN 978-1-5386-5700-3
Editore: IEEE
DOI: 10.1109/prdc.2018.00015

Threat Modeling and Analysis for the Cloud Ecosystem

Autori: Salman Manzoor, Heng Zhang, Neeraj Suri
Pubblicato in: 2018 IEEE International Conference on Cloud Engineering (IC2E), 2018, Pagina/e 278-281, ISBN 978-1-5386-5008-0
Editore: IEEE
DOI: 10.1109/ic2e.2018.00056

Monitoring Path Discovery for Supporting Indirect Monitoring of Cloud Services

Autori: Heng Zhang, Salman Manzoor, Neeraj Suri
Pubblicato in: 2018 IEEE International Conference on Cloud Engineering (IC2E), 2018, Pagina/e 274-277, ISBN 978-1-5386-5008-0
Editore: IEEE
DOI: 10.1109/ic2e.2018.00055

Enhancing Usage Control for Performance: A Proposal for Systems of Systems (Research Poster)

Autori: Vasileios Gkioulos, Athanasios Rizos, Christina Michailidou, Fabio Martinelli, Paolo Mori
Pubblicato in: 2018 International Conference on High Performance Computing & Simulation (HPCS), 2018, Pagina/e 1061-1062, ISBN 978-1-5386-7879-4
Editore: IEEE
DOI: 10.1109/hpcs.2018.00169

Managing QoS in Smart Buildings Through Software Defined Network and Usage Control

Autori: Fabio Martinelli, Christina Michailidou, Paolo Mori, Andrea Saracino
Pubblicato in: 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 2019, Pagina/e 626-632, ISBN 978-1-5386-9151-9
Editore: IEEE
DOI: 10.1109/percomw.2019.8730751

Cyber Insurance and Security Interdependence: Friends or Foes?

Autori: Ganbayar Uuganbayar, Artsiom Yautsiukhin, Fabio Martinelli
Pubblicato in: 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 2018, Pagina/e 1-4, ISBN 978-1-5386-4565-9
Editore: IEEE
DOI: 10.1109/cybersa.2018.8551447

Cyber Insurance and Time-to-Compromise: An Integrated Approach

Autori: Ganbayar Uuganbayar, Fabio Massacci, Artsiom Yautsiukhin, Fabio Martinelli
Pubblicato in: 2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 2019, Pagina/e 1-8, ISBN 978-1-7281-0232-0
Editore: IEEE
DOI: 10.1109/cybersa.2019.8899442

Too Long, did not Enforce - A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed Environments

Autori: Fabio Martinelli, Christina Michailidou, Paolo Mori, Andrea Saracino
Pubblicato in: Proceedings of the 4th ACM Workshop on Cyber-Physical System Security - CPSS '18, 2018, Pagina/e 27-37, ISBN 9781-450357555
Editore: ACM Press
DOI: 10.1145/3198458.3198463

Phylogenetic Analysis for Ransomware Detection and Classification into Families

Autori: Fabio Martinelli, Francesco Mercaldo, Christina Michailidou, Andrea Saracino
Pubblicato in: 15th International Joint Conference on e-Business and Telecommunications (ICETE), SECRYPT 2018, 2018
Editore: SCITEPRESS

Exploiting Digital DNA for the Analysis of Similarities in Twitter Behaviours

Autori: Stefano Cresci, Roberto di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi
Pubblicato in: 2017 IEEE International Conference on Data Science and Advanced Analytics (DSAA), 2017, Pagina/e 686-695, ISBN 978-1-5090-5004-8
Editore: IEEE
DOI: 10.1109/dsaa.2017.57

Six Things I Hate About You (in Italian) and Six Classification Strategies to More and More Effectively Find Them

Autori: Tiziano Fagni, Leonardo Nizzoli, Marinella Petrocchi, Maurizio Tesconi
Pubblicato in: 2019
Editore: CEUR

From Reaction to Proaction - Unexplored Ways to the Detection of Evolving Spambots

Autori: Stefano Cresci, Marinella Petrocchi, Angelo Spognardi, Stefano Tognazzi
Pubblicato in: Companion of the The Web Conference 2018 on The Web Conference 2018 - WWW '18, 2018, Pagina/e 1469-1470, ISBN 9781-450356404
Editore: ACM Press
DOI: 10.1145/3184558.3191595

Towards automatic translation of social network policies into controlled natural language

Autori: Irfan Khan Tanoli, Marinella Petrocchi, Rocco De Nicola
Pubblicato in: 2018 12th International Conference on Research Challenges in Information Science (RCIS), 2018, Pagina/e 1-12, ISBN 978-1-5386-6517-6
Editore: IEEE
DOI: 10.1109/rcis.2018.8406683

Mining Implicit Data Association from Tripadvisor Hotel Reviews

Autori: Vittoria Cozza, Marinella Petrocchi, Angelo Spognardi
Pubblicato in: 2018
Editore: CEUR

Contrasting Fake Reviews in TripAdvisor

Autori: Francesco Buccafurri, Michela Fazzolari, Gianluca Lax, Marinella Petrocchi
Pubblicato in: SEBD 2018, 2018
Editore: CEUR

Social Network Polluting Contents Detection through Deep Learning Techniques

Autori: Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Pubblicato in: 2019 International Joint Conference on Neural Networks (IJCNN), 2019, Pagina/e 1-10, ISBN 978-1-7281-1985-4
Editore: IEEE
DOI: 10.1109/ijcnn.2019.8852080

Cascade Learning for Mobile Malware Families Detection through Quality and Android Metrics

Autori: Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Pubblicato in: 2019 International Joint Conference on Neural Networks (IJCNN), 2019, Pagina/e 1-10, ISBN 978-1-7281-1985-4
Editore: IEEE
DOI: 10.1109/ijcnn.2019.8852268

Investigating Mobile Applications Quality in Official and Third-party Marketplaces

Autori: Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Pubblicato in: Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering, 2019, Pagina/e 169-178, ISBN 978-989-758-375-9
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0007757601690178

Wearable Devices for Human Activity Recognition and User Detection

Autori: Giovanni Capobianco, Umberto Di Giacomo, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Pubblicato in: 2019 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), 2019, Pagina/e 365-372, ISBN 978-1-7281-1644-0
Editore: IEEE
DOI: 10.1109/empdp.2019.8671636

Measuring Mobile Applications Quality and Security in Higher Education

Autori: Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Pubblicato in: 2018 IEEE International Conference on Big Data (Big Data), 2018, Pagina/e 5319-5321, ISBN 978-1-5386-5035-6
Editore: IEEE
DOI: 10.1109/bigdata.2018.8622339

A Data Life Cycle Modeling Proposal by Means of Formal Methods

Autori: Madalina G. Ciobanu, Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Pubblicato in: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security - Asia CCS '19, 2019, Pagina/e 670-672, ISBN 9781-450367523
Editore: ACM Press
DOI: 10.1145/3321705.3331003

Spyware Detection using Temporal Logic

Autori: Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Pubblicato in: Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019, Pagina/e 690-699, ISBN 978-989-758-359-9
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0007704806900699

Cluster Analysis for Driver Aggressiveness Identification

Autori: Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Albina Orlando, Antonella Santone
Pubblicato in: Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018, Pagina/e 562-569, ISBN 978-989-758-282-0
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006755205620569

Context-Awareness Mobile Devices for Traffic Incident Prevention

Autori: Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Albina Orlando, Antonella Santone
Pubblicato in: 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 2018, Pagina/e 143-148, ISBN 978-1-5386-3227-7
Editore: IEEE
DOI: 10.1109/percomw.2018.8480213

Who’s Driving My Car? A Machine Learning based Approach to Driver Identification

Autori: Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Albina Orlando, Antonella Santone
Pubblicato in: Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018, Pagina/e 367-372, ISBN 978-989-758-282-0
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006633403670372

VizMal: A Visualization Tool for Analyzing the Behavior of Android Malware

Autori: Alessandro Bacci, Fabio Martinelli, Eric Medvet, Francesco Mercaldo
Pubblicato in: Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018, Pagina/e 517-525, ISBN 978-989-758-282-0
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006665005170525

A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware

Autori: Mario Faiella, Antonio La Marra, Fabio Martinelli, Francesco Mercaldo, Andrea Saracino, Mina Sheikhalishahi
Pubblicato in: 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP), 2017, Pagina/e 321-328, ISBN 978-1-5090-6058-0
Editore: IEEE
DOI: 10.1109/pdp.2017.99

Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis

Autori: Alessandro Bacci, Alberto Bartoli, Fabio Martinelli, Eric Medvet, Francesco Mercaldo, Corrado Aaron Visaggio
Pubblicato in: Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018, Pagina/e 379-385, ISBN 978-989-758-282-0
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006642503790385

Improving Vehicle Safety Through a Fog Collaborative Infrastructure

Autori: Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci, Francesco Mercaldo
Pubblicato in: 2018 IEEE International Conference on Smart Computing (SMARTCOMP), 2018, Pagina/e 446-451, ISBN 978-1-5386-4705-9
Editore: IEEE
DOI: 10.1109/smartcomp.2018.00044

Identifying Insecure Features in Android Applications using Model Checking

Autori: Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone
Pubblicato in: Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018, Pagina/e 589-596, ISBN 978-989-758-282-0
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006758105890596

A fuzzy-based process mining approach for dynamic malware detection

Autori: Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Pubblicato in: 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 2017, Pagina/e 1-8, ISBN 978-1-5090-6034-4
Editore: IEEE
DOI: 10.1109/fuzz-ieee.2017.8015490

A time series classification approach to game bot detection

Autori: Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Pubblicato in: Proceedings of the 7th International Conference on Web Intelligence, Mining and Semantics - WIMS '17, 2017, Pagina/e 1-11, ISBN 9781-450352253
Editore: ACM Press
DOI: 10.1145/3102254.3102263

How Discover a Malware using Model Checking

Autori: Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Pubblicato in: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, 2017, Pagina/e 902-904, ISBN 9781-450349444
Editore: ACM Press
DOI: 10.1145/3052973.3055157

Game Bot Detection in Online Role Player Game through Behavioural Features

Autori: Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Pubblicato in: Proceedings of the 12th International Conference on Software Technologies, 2017, Pagina/e 50-60, ISBN 978-989-758-262-2
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006417000500060

Car hacking identification through fuzzy logic algorithms

Autori: Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Pubblicato in: 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 2017, Pagina/e 1-7, ISBN 978-1-5090-6034-4
Editore: IEEE
DOI: 10.1109/fuzz-ieee.2017.8015464

BRIDEMAID - An Hybrid Tool for Accurate Detection of Android Malware

Autori: Fabio Martinelli, Francesco Mercaldo, Andrea Saracino
Pubblicato in: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, 2017, Pagina/e 899-901, ISBN 9781-450349444
Editore: ACM Press
DOI: 10.1145/3052973.3055156

Formal Methods Meet Mobile Code Obfuscation Identification of Code Reordering Technique

Autori: Aniello Cimitile, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Pubblicato in: 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2017, Pagina/e 263-268, ISBN 978-1-5386-1759-5
Editore: IEEE
DOI: 10.1109/wetice.2017.23

Mobile Silent and Continuous Authentication using Apps Sequence

Autori: Gerardo Canfora, Giovanni Cappabianca, Pasquale Carangelo, Fabio Martinelli, Francesco Mercaldo, Ernesto Rosario Russo, Corrado Aaron Visaggio
Pubblicato in: Proceedings of the 14th International Joint Conference on e-Business and Telecommunications, 2017, Pagina/e 79-91, ISBN 978-989-758-259-2
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006424200790091

Model Checking for Mobile Android Malware Evolution

Autori: Aniello Cimitile, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Gigliola Vaglini
Pubblicato in: 2017 IEEE/ACM 5th International FME Workshop on Formal Methods in Software Engineering (FormaliSE), 2017, Pagina/e 24-30, ISBN 978-1-5386-0422-9
Editore: IEEE
DOI: 10.1109/formalise.2017.4

R-PackDroid - API package-based characterization and detection of mobile ransomware

Autori: Davide Maiorca, Francesco Mercaldo, Giorgio Giacinto, Corrado Aaron Visaggio, Fabio Martinelli
Pubblicato in: Proceedings of the Symposium on Applied Computing - SAC '17, 2017, Pagina/e 1718-1723, ISBN 9781-450344869
Editore: ACM Press
DOI: 10.1145/3019612.3019793

Identifying Mobile Repackaged Applications through Formal Methods

Autori: Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio
Pubblicato in: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Pagina/e 673-682, ISBN 978-989-758-209-7
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006287906730682

Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment

Autori: Aniello Cimitile, Fabio Martinelli, Francesco Mercaldo
Pubblicato in: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Pagina/e 487-492, ISBN 978-989-758-209-7
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006217304870492

Tor traffic analysis and detection via machine learning techniques

Autori: Alfredo Cuzzocrea, Fabio Martinelli, Francesco Mercaldo, Gianni Vercelli
Pubblicato in: 2017 IEEE International Conference on Big Data (Big Data), 2017, Pagina/e 4474-4480, ISBN 978-1-5386-2715-0
Editore: IEEE
DOI: 10.1109/bigdata.2017.8258487

Twinkle twinkle little DroidDream, How I wonder what you are?

Autori: Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Pubblicato in: 2017 IEEE International Workshop on Metrology for AeroSpace (MetroAeroSpace), 2017, Pagina/e 21-25, ISBN 978-1-5090-4234-0
Editore: IEEE
DOI: 10.1109/metroaerospace.2017.7999579

An Analysis of Trust in Smart Home Devices

Autori: Davide Ferraris, Daniel Bastos, Carmen Fernandez-Gago, Fadi El-Moussa, Javier Lopez
Pubblicato in: The 20th World Conference on Information Security Applications (WISA Workshop 2019), 2019
Editore: Springer

A Perspective Study Towards Biometric-based Rider Authentication Schemes For Driverless Taxis

Autori: Sandeep Gupta, Bruno Crispo
Pubblicato in: 2019 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), 2019, Pagina/e 1-6, ISBN 978-1-7281-3012-5
Editore: IEEE
DOI: 10.1109/3ict.2019.8910310

An architecture for privacy-preserving sharing of CTI with 3 rd party analysis services

Autori: Fabio Giubilo, Ali Sajjad, Mark Shackleton, David W. Chadwick, Wenjun Fan, Rogerio de Lemos
Pubblicato in: 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), 2017, Pagina/e 293-297, ISBN 978-1-908320-93-3
Editore: IEEE
DOI: 10.23919/icitst.2017.8356404

Building Taxonomies based on Human-Machine Teaming - Cyber Security as an Example

Autori: Mohamad Imad Mahaini, Shujun Li, Rahime Belen Sağlam
Pubblicato in: Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19, 2019, Pagina/e 1-9, ISBN 9781-450371643
Editore: ACM Press
DOI: 10.1145/3339252.3339282

Cloud for IoT - a Survey of Technologies and Security features of Public Cloud IoT solutions

Autori: D. Bastos
Pubblicato in: Living in the Internet of Things (IoT 2019), 2019, Pagina/e 43 (6 pp.)-43 (6 pp.), ISBN 978-1-83953-089-0
Editore: Institution of Engineering and Technology
DOI: 10.1049/cp.2019.0168

Distributed UCON in CoAP and MQTT Protocols

Autori: Athanasios Rizos, Daniel Bastos, Andrea Saracino, Fabio Martinelli
Pubblicato in: 5th Workshop On The Security Of Industrial Control Systems & Of Cyber-Physical Systems (CyberICPS 2019), 2019
Editore: Springer

DIALERAUTH - A Motion-assisted Touch-based Smartphone User Authentication Scheme

Autori: Attaullah Buriro, Bruno Crispo, Sandeep Gupta, Filippo Del Frari
Pubblicato in: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy - CODASPY '18, 2018, Pagina/e 267-276, ISBN 9781-450356329
Editore: ACM Press
DOI: 10.1145/3176258.3176318

Extended Reality in IoT scenarios: Concepts, Applications and Future Trends

Autori: Tiago Andrade, Daniel Bastos
Pubblicato in: 2019 5th Experiment International Conference (exp.at'19), 2019, Pagina/e 107-112, ISBN 978-1-7281-3637-0
Editore: IEEE
DOI: 10.1109/expat.2019.8876559

Enriching Threat Intelligence Platforms Capabilities

Autori: Mario Faiella, Gustavo Gonzalez-Granadillo, Ibéria Medeiros, Rui Azevedo, Susana Gonzalez-Zarzosa
Pubblicato in: Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019, Pagina/e 37-48, ISBN 978-989-758-378-0
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0007830400370048

Enhancing Information Sharing and Visualization Capabilities in Security Data Analytic Platforms

Autori: Gustavo Gonzalez-Granadillo, Mario Faiella, Iberia Medeiros, Rui Azevedo, Susana Gonzalez-Zarzosa
Pubblicato in: 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), 2019, Pagina/e 1-8, ISBN 978-1-7281-3030-9
Editore: IEEE
DOI: 10.1109/dsn-w.2019.00009

GDPR Privacy Implication for the Internet of Things

Autori: Daniel Bastos, Fabio Giubilo, Mark Shackleton, Fadi El-Moussa
Pubblicato in: 4th Annual IoT Security Foundation Conference, 2018
Editore: Conference Proceedings

Risks of Sharing Cyber Incident Information

Autori: Adham Albakri, Eerke Boiten, Rogério De Lemos
Pubblicato in: Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES 2018, 2018, Pagina/e 1-10, ISBN 9781-450364485
Editore: ACM Press
DOI: 10.1145/3230833.3233284

Towards an Enhanced Security Data Analytic Platform

Autori: Gustavo Gonzalez-Granadillo, Susana Gonzalez-Zarzosa, Mario Faiella
Pubblicato in: Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018, Pagina/e 619-624, ISBN 978-989-758-319-3
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006831106190624

SmartHandle - A Novel Behavioral Biometric-based Authentication Scheme for Smart Lock Systems

Autori: Sandeep Gupta, Attaullah Buriro, Bruno Crispo
Pubblicato in: Proceedings of the 2019 3rd International Conference on Biometric Engineering and Applications - ICBEA 2019, 2019, Pagina/e 15-22, ISBN 9781-450363051
Editore: ACM Press
DOI: 10.1145/3345336.3345344

Internet of Things: A Survey of Technologies and Security Risks in Smart Home and City Environments

Autori: D. Bastos, M. Shackleton, F. El-Moussa
Pubblicato in: Living in the Internet of Things: Cybersecurity of the IoT - 2018, 2018, Pagina/e 30 (7 pp.)-30 (7 pp.), ISBN 978-1-78561-843-7
Editore: Institution of Engineering and Technology
DOI: 10.1049/cp.2018.0030

From MinX to MinC: semantics-driven decompilation of recursive datatypes

Autori: Ed Robbins, Andy King, Tom Schrijvers
Pubblicato in: Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages - POPL 2016, 2016, Pagina/e 191-203, ISBN 9781-450335492
Editore: ACM Press
DOI: 10.1145/2837614.2837633

Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication

Autori: Attaullah Buriro, Bruno Crispo, Filippo Delfrari, Konrad Wrona
Pubblicato in: 2016 IEEE Security and Privacy Workshops (SPW), 2016, Pagina/e 276-285, ISBN 978-1-5090-3690-5
Editore: IEEE
DOI: 10.1109/spw.2016.20

Exploiting Vehicles’ Reputation to Mitigate DoS Attack

Autori: Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci
Pubblicato in: Proceedings of the International Workshop on domAin specific Model-based AppRoaches to vErificaTion and validaTiOn, 2016, Pagina/e 75-82, ISBN 978-989-758-166-3
Editore: SCITEPRESS - Science and and Technology Publications
DOI: 10.5220/0005844500750082

Concurrent History-based Usage Control Policies

Autori: Fabio Martinelli, Ilaria Matteucci, Paolo Mori, Andrea Saracino
Pubblicato in: Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017, Pagina/e 657-666, ISBN 978-989-758-210-3
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006232506570666

Security by Insurance for Services

Autori: Fabio Martinelli, Artsiom Yautsiukhin
Pubblicato in: 2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), 2016, Pagina/e 344-351, ISBN 978-1-5090-3713-1
Editore: IEEE
DOI: 10.1109/qrs-c.2016.53

AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces

Autori: Salman Manzoor, Jesus Luna and Neeraj Suri
Pubblicato in: Proc. of IEEE Services Computing (SCC), 2017, 2017, Pagina/e 499-502
Editore: IEEE
DOI: 10.1109/SCC.2017.74

SLA-based Service Selection for Multi-Cloud Environments

Autori: Ahmed Taha, Salman Manzoor and Neeraj Suri
Pubblicato in: Proc. of IEEE EDGE Computing (EGDE), 2017, 2017, Pagina/e 65-72
Editore: IEEE
DOI: 10.1109/IEEE.EDGE.2017.17

Mobile biometrics: Towards a comprehensive evaluation methodology

Autori: Attaullah Buriro, Zahid Akhtar, Bruno Crispo, Sandeep Gupta
Pubblicato in: 2017 International Carnahan Conference on Security Technology (ICCST), 2017, Pagina/e 1-6, ISBN 978-1-5386-1585-0
Editore: IEEE
DOI: 10.1109/ccst.2017.8167859

Evaluation of Motion-based Touch-typing Biometrics in Online Financial Environments

Autori: Attaullah Buriro, Sandeep Gupta, and Bruno Crispo
Pubblicato in: BIOSIG 2017, 2017
Editore: IEEE

A model specification for the design of trust negotiations

Autori: Martin Kolar, Carmen Fernandez-Gago, Javier Lopez
Pubblicato in: Computers & Security, Numero 84, 2019, Pagina/e 288-300, ISSN 0167-4048
Editore: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2019.03.024

TrUStAPIS: a trust requirements elicitation method for IoT

Autori: Davide Ferraris, Carmen Fernandez-Gago
Pubblicato in: International Journal of Information Security, 2019, ISSN 1615-5262
Editore: Springer Verlag
DOI: 10.1007/s10207-019-00438-x

Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges

Autori: Rodrigo Roman, Javier Lopez, Masahiro Mambo
Pubblicato in: Future Generation Computer Systems, Numero 78, 2018, Pagina/e 680-698, ISSN 0167-739X
Editore: Elsevier BV
DOI: 10.1016/j.future.2016.11.009

A Cyber-Physical Systems-Based Checkpoint Model for Structural Controllability

Autori: Cristina Alcaraz, Javier Lopez
Pubblicato in: IEEE Systems Journal, Numero 12/4, 2018, Pagina/e 3543-3554, ISSN 1932-8184
Editore: Institute of Electrical and Electronics Engineers
DOI: 10.1109/jsyst.2017.2740719

Modelling privacy-aware trust negotiations

Autori: Ruben Rios, Carmen Fernandez-Gago, Javier Lopez
Pubblicato in: Computers & Security, Numero 77, 2018, Pagina/e 773-789, ISSN 0167-4048
Editore: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2017.09.015

Resilient interconnection in cyber-physical control systems

Autori: Cristina Alcaraz, Javier Lopez, Kim-Kwang Raymond Choo
Pubblicato in: Computers & Security, Numero 71, 2017, Pagina/e 2-14, ISSN 0167-4048
Editore: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2017.03.004

Resilient industrial control systems based on multiple redundancy

Autori: Cristina Alcaraz
Pubblicato in: International Journal of Critical Infrastructures, Numero 13/2/3, 2017, Pagina/e 278, ISSN 1475-3219
Editore: Inderscience Publishers
DOI: 10.1504/ijcis.2017.10009287

A scheme for the sticky policy representation supporting secure cyber-threat intelligence analysis and sharing

Autori: Oleksii Osliak, Andrea Saracino, Fabio Martinelli
Pubblicato in: Information & Computer Security, Numero 26/5, 2019, Pagina/e 687-710, ISSN 2056-4961
Editore: Emerald Publishing Limited
DOI: 10.1108/ics-01-2019-0011

On the capability of evolved spambots to evade detection via genetic engineering

Autori: Stefano Cresci, Marinella Petrocchi, Angelo Spognardi, Stefano Tognazzi
Pubblicato in: Online Social Networks and Media, Numero 9, 2019, Pagina/e 1-16, ISSN 2468-6964
Editore: ScienceDirect
DOI: 10.1016/j.osnem.2018.10.005

A Study on Text-Score Disagreement in Online Reviews

Autori: Michela Fazzolari, Vittoria Cozza, Marinella Petrocchi, Angelo Spognardi
Pubblicato in: Cognitive Computation, Numero 9/5, 2017, Pagina/e 689-701, ISSN 1866-9956
Editore: Springer Verlag
DOI: 10.1007/s12559-017-9496-y

Social fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling

Autori: Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi
Pubblicato in: IEEE Transactions on Dependable and Secure Computing, 2018, Pagina/e 1-1, ISSN 1545-5971
Editore: IEEE Computer Society
DOI: 10.1109/tdsc.2017.2681672

Risk analysis of Android applications: A user-centric solution

Autori: Gianluca Dini, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Andrea Saracino, Daniele Sgandurra
Pubblicato in: Future Generation Computer Systems, Numero 80, 2018, Pagina/e 505-518, ISSN 0167-739X
Editore: Elsevier BV
DOI: 10.1016/j.future.2016.05.035

On the effectiveness of system API-related information for Android ransomware detection

Autori: Michele Scalas, Davide Maiorca, Francesco Mercaldo, Corrado Aaron Visaggio, Fabio Martinelli, Giorgio Giacinto
Pubblicato in: Computers & Security, Numero 86, 2019, Pagina/e 168-182, ISSN 0167-4048
Editore: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2019.06.004

Dynamic malware detection and phylogeny analysis using process mining

Autori: Mario Luca Bernardi, Marta Cimitile, Damiano Distante, Fabio Martinelli, Francesco Mercaldo
Pubblicato in: International Journal of Information Security, Numero 18/3, 2019, Pagina/e 257-284, ISSN 1615-5262
Editore: Springer Verlag
DOI: 10.1007/s10207-018-0415-3

A “pay-how-you-drive” car insurance approach through cluster analysis

Autori: Maria Francesca Carfora, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Albina Orlando, Antonella Santone, Gigliola Vaglini
Pubblicato in: Soft Computing, Numero May 2019, Volume 23, Numero 9, 2018, Pagina/e 2863–2875, ISSN 1432-7643
Editore: Springer Verlag
DOI: 10.1007/s00500-018-3274-y

An exploratory study on the evolution of Android malware quality

Autori: Francesco Mercaldo, Andrea Di Sorbo, Corrado Aaron Visaggio, Aniello Cimitile, Fabio Martinelli
Pubblicato in: Journal of Software: Evolution and Process, Numero 30/11, 2018, Pagina/e e1978, ISSN 2047-7473
Editore: Wiley Publisher
DOI: 10.1002/smr.1978

Driver and Path Detection through Time-Series Classification

Autori: Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Pubblicato in: Journal of Advanced Transportation, Numero 2018, 2018, Pagina/e 1-20, ISSN 0197-6729
Editore: Institute for Transportation, Inc.
DOI: 10.1155/2018/1758731

LEILA: formaL tool for idEntifying mobIle maLicious behAviour

Autori: Gerardo Canfora, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio
Pubblicato in: IEEE Transactions on Software Engineering, 2018, Pagina/e 1-1, ISSN 0098-5589
Editore: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tse.2018.2834344

Evaluating model checking for cyber threats code obfuscation identification

Autori: Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Arun Kumar Sangaiah, Aniello Cimitile
Pubblicato in: Journal of Parallel and Distributed Computing, Numero 119, 2018, Pagina/e 203-218, ISSN 0743-7315
Editore: Academic Press
DOI: 10.1016/j.jpdc.2018.04.008

Talos: no more ransomware victims with formal methods

Autori: Aniello Cimitile, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio
Pubblicato in: International Journal of Information Security, Numero 17/6, 2018, Pagina/e 719-738, ISSN 1615-5262
Editore: Springer Verlag
DOI: 10.1007/s10207-017-0398-5

Human behavior characterization for driving style recognition in vehicle system

Autori: Fabio Martinelli, Francesco Mercaldo, Albina Orlando, Vittoria Nardone, Antonella Santone, Arun Kumar Sangaiah
Pubblicato in: Computers & Electrical Engineering, 2018, ISSN 0045-7906
Editore: Pergamon Press Ltd.
DOI: 10.1016/j.compeleceng.2017.12.050

Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access

Autori: Sandeep Gupta, Attaullah Buriro, Bruno Crispo
Pubblicato in: Mobile Information Systems, Numero 2018, 2018, Pagina/e 1-16, ISSN 1574-017X
Editore: IOS Press
DOI: 10.1155/2018/2649598

DriverAuth: A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms

Autori: Sandeep Gupta, Attaullah Buriro, Bruno Crispo
Pubblicato in: Computers & Security, Numero 83, 2019, Pagina/e 122-139, ISSN 0167-4048
Editore: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2019.01.007

DriverAuth: Behavioral biometric-based driver authentication mechanism for on-demand ride and ridesharing infrastructure

Autori: Sandeep Gupta, Attaullah Buriro, Bruno Crispo
Pubblicato in: ICT Express, Numero 5/1, 2019, Pagina/e 16-20, ISSN 2405-9595
Editore: ICT Express
DOI: 10.1016/j.icte.2018.01.010

Mac-A-Mal: macOS malware analysis framework resistant to anti evasion techniques

Autori: Duy-Phuc Pham, Duc-Ly Vu, Fabio Massacci
Pubblicato in: Journal of Computer Virology and Hacking Techniques, 2019, ISSN 2263-8733
Editore: Springer
DOI: 10.1007/s11416-019-00335-w

Usage Control on Cloud systems

Autori: Enrico Carniani, Davide D’Arenzo, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori
Pubblicato in: Future Generation Computer Systems, Numero 63, 2016, Pagina/e 37-55, ISSN 0167-739X
Editore: Elsevier BV
DOI: 10.1016/j.future.2016.04.010

Cyber-insurance survey

Autori: Angelica Marotta, Fabio Martinelli, Stefano Nanni, Albina Orlando, Artsiom Yautsiukhin
Pubblicato in: Computer Science Review, Numero 24, 2017, Pagina/e 35-61, ISSN 1574-0137
Editore: Elsevier BV
DOI: 10.1016/j.cosrev.2017.01.001

Stateful Data Usage Control for Android Mobile Devices

Autori: Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori, Andrea Saracino
Pubblicato in: International Journal of Information Security, Numero 16/4, 2017, Pagina/e 345-369, ISSN 1615-5262
Editore: Springer Verlag
DOI: 10.1007/s10207-016-0336-y

Policy Languages and Their Suitability for Trust Negotiation

Autori: Martin Kolar, Carmen Fernandez-Gago, Javier Lopez
Pubblicato in: Data and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16–18, 2018, Proceedings, Numero 10980, 2018, Pagina/e 69-84, ISBN 978-3-319-95728-9
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-95729-6_5

Selecting Privacy Solutions to Prioritise Control in Smart Metering Systems

Autori: Juan E. Rubio, Cristina Alcaraz, Javier Lopez
Pubblicato in: Critical Information Infrastructures Security, Numero 10242, 2017, Pagina/e 176-188, ISBN 978-3-319-71367-0
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-71368-7_15

Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level

Autori: Tsvetoslava Vateva-Gurova, Salman Manzoor, Ruben Trapero, Neeraj Suri
Pubblicato in: Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers, Numero 11398, 2019, Pagina/e 27-38, ISBN 978-3-030-12084-9
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-12085-6_3

Threat Modeling the Cloud: An Ontology Based Approach

Autori: Salman Manzoor, Tsvetoslava Vateva-Gurova, Ruben Trapero, Neeraj Suri
Pubblicato in: Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers, Numero 11398, 2019, Pagina/e 61-72, ISBN 978-3-030-12084-9
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-12085-6_6

Using IFTTT to Express and Enforce UCON Obligations

Autori: Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino
Pubblicato in: Information Security Practice and Experience - 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings, Numero 11879, 2019, Pagina/e 213-231, ISBN 978-3-030-34338-5
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-34339-2_12

Enhancing Usage Control for Performance: An Architecture for Systems of Systems

Autori: Vasileios Gkioulos, Athanasios Rizos, Christina Michailidou, Paolo Mori, Andrea Saracino
Pubblicato in: Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers, Numero 11387, 2019, Pagina/e 69-84, ISBN 978-3-030-12785-5
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-12786-2_5

Optimal Security Configuration for Cyber Insurance

Autori: Fabio Martinelli, Ganbayar Uuganbayar, Artsiom Yautsiukhin
Pubblicato in: ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings, Numero 529, 2018, Pagina/e 187-200, ISBN 978-3-319-99827-5
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-99828-2_14

Improving MQTT by Inclusion of Usage Control

Autori: Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino
Pubblicato in: Security, Privacy, and Anonymity in Computation, Communication, and Storage, Numero 10656, 2017, Pagina/e 545-560, ISBN 978-3-319-72388-4
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-72389-1_43

Towards General Scheme for Data Sharing Agreements Empowering Privacy-Preserving Data Analysis of Structured CTI

Autori: Fabio Martinelli, Oleksii Osliak, Andrea Saracino
Pubblicato in: Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers, Numero 11387, 2019, Pagina/e 192-212, ISBN 978-3-030-12785-5
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-12786-2_12

Mining Worse and Better Opinions

Autori: Michela Fazzolari, Marinella Petrocchi, Alessandro Tommasi, Cesare Zavattari
Pubblicato in: Web Engineering, Numero 10360, 2017, Pagina/e 494-506, ISBN 978-3-319-60130-4
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-60131-1_35

Transparency in Keyword Faceted Search: An Investigation on Google Shopping

Autori: Vittoria Cozza, Van Tien Hoang, Marinella Petrocchi, Rocco De Nicola
Pubblicato in: Digital Libraries: Supporting Open Science - 15th Italian Research Conference on Digital Libraries, IRCDL 2019, Pisa, Italy, January 31 – February 1, 2019, Proceedings, Numero 988, 2019, Pagina/e 29-43, ISBN 978-3-030-11225-7
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-11226-4_3

Cyber Risk Management: A New Challenge for Actuarial Mathematics

Autori: Maria Francesca Carfora, Fabio Martinelli, Francesco Mercaldo, Albina Orlando, Artsiom Yautsiukhin
Pubblicato in: Mathematical and Statistical Methods for Actuarial Sciences and Finance - MAF 2018, 2018, Pagina/e 199-202, ISBN 978-3-319-89823-0
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-89824-7_36

Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection

Autori: Alberto Ferrante, Miroslaw Malek, Fabio Martinelli, Francesco Mercaldo, Jelena Milosevic
Pubblicato in: Foundations and Practice of Security, Numero 10723, 2018, Pagina/e 242-258, ISBN 978-3-319-75649-3
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-75650-9_16

A Risk-Driven Model to Minimize the Effects of Human Factors on Smart Devices

Autori: Sandeep Gupta, Attaullah Buriro, Bruno Crispo
Pubblicato in: Emerging Technologies for Authorization and Authentication - Second International Workshop, ETAA 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings, Numero 11967, 2020, Pagina/e 156-170, ISBN 978-3-030-39748-7
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-39749-4_10

Sharing Cyber Threat Intelligence Under the General Data Protection Regulation

Autori: Adham Albakri, Eerke Boiten, Rogério De Lemos
Pubblicato in: Privacy Technologies and Policy - 7th Annual Privacy Forum, APF 2019, Rome, Italy, June 13–14, 2019, Proceedings, Numero 11498, 2019, Pagina/e 28-41, ISBN 978-3-030-21751-8
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-21752-5_3

SnapAuth: A Gesture-Based Unobtrusive Smartwatch User Authentication Scheme

Autori: Attaullah Buriro, Bruno Crispo, Mojtaba Eskandri, Sandeep Gupta, Athar Mahboob, Rutger Van Acker
Pubblicato in: Emerging Technologies for Authorization and Authentication - First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedings, Numero 11263, 2018, Pagina/e 30-37, ISBN 978-3-030-04371-1
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-04372-8_3

A Formal and Run-Time Framework for the Adaptation of Local Behaviours to Match a Global Property

Autori: Stefano Bistarelli, Fabio Martinelli, Ilaria Matteucci, Francesco Santini
Pubblicato in: Formal Aspects of Component Software - 13th International Conference, FACS 2016, Besançon, France, October 19-21, 2016, Revised Selected Papers, Numero 10231, 2017, Pagina/e 134-152, ISBN 978-3-319-57665-7
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-57666-4_9

Enforcement of U-XACML History-Based Usage Control Policy

Autori: Fabio Martinelli, Ilaria Matteucci, Paolo Mori, Andrea Saracino
Pubblicato in: Security and Trust Management - 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings, Numero 9871, 2016, Pagina/e 64-81, ISBN 978-3-319-46597-5
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-46598-2_5

Preventing the Drop in Security Investments for Non-competitive Cyber-Insurance Market

Autori: Fabio Martinelli, Albina Orlando, Ganbayar Uuganbayar, Artsiom Yautsiukhin
Pubblicato in: Risks and Security of Internet and Systems, Numero 10694, 2018, Pagina/e 159-174, ISBN 978-3-319-76686-7
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-76687-4_11

Introducing Usage Control in MQTT

Autori: Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino
Pubblicato in: Computer Security, Numero 10683, 2018, Pagina/e 35-43, ISBN 978-3-319-72816-2
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-72817-9_3

Estimating the Assessment Difficulty of CVSS Environmental Metrics: An Experiment

Autori: Luca Allodi, Silvio Biagioni, Bruno Crispo, Katsiaryna Labunets, Fabio Massacci, Wagner Santos
Pubblicato in: Future Data and Security Engineering, Numero 10646, 2017, Pagina/e 23-39, ISBN 978-3-319-70003-8
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-70004-5_2

Mal2Image- Hybrid Image Transformation for Malware Detection-paper

Autori: Ly Vu Duc, Trong-Kha Nguyen, Tam. V. Nguyen , Phung. H. Phu, Fabio Massacci
Pubblicato in: International Symposium on Engineering Secure Software and Systems, 2018, 2018
Editore: Springer

Towards Explainable Machine Learning in Intrusion Detection Systems

Autori: Chau D.M. Pham, Duc-Ly Vu, Fabio Massacci, Tran Khanh Dang, Sandro Etalle, Davide Fauri
Pubblicato in: International Symposium on Engineering Secure Software and Systems, 2018, 2018
Editore: Springer

È in corso la ricerca di dati su OpenAIRE...

Si è verificato un errore durante la ricerca dei dati su OpenAIRE

Nessun risultato disponibile