BibTeX records: Alfonso Iacovazzi

download as .bib file

@inproceedings{DBLP:conf/vnc/ZendenWIVBR23,
  author       = {Ivo Zenden and
                  Han Wang and
                  Alfonso Iacovazzi and
                  Arash Vahidi and
                  Rolf Blom and
                  Shahid Raza},
  editor       = {Sinem Coleri and
                  Onur Altintas and
                  Frank Kargl and
                  Takamasa Higuchi and
                  Michele Segata and
                  Florian Klingler},
  title        = {On the Resilience of Machine Learning-Based {IDS} for Automotive Networks},
  booktitle    = {{IEEE} Vehicular Networking Conference, {VNC} 2023, Istanbul, Turkey,
                  April 26-28, 2023},
  pages        = {239--246},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/VNC57357.2023.10136285},
  doi          = {10.1109/VNC57357.2023.10136285},
  timestamp    = {Fri, 09 Jun 2023 15:18:18 +0200},
  biburl       = {https://dblp.org/rec/conf/vnc/ZendenWIVBR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-14750,
  author       = {Alfonso Iacovazzi and
                  Shahid Raza},
  title        = {Ensemble of Random and Isolation Forests for Graph-Based Intrusion
                  Detection in Containers},
  journal      = {CoRR},
  volume       = {abs/2306.14750},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.14750},
  doi          = {10.48550/ARXIV.2306.14750},
  eprinttype    = {arXiv},
  eprint       = {2306.14750},
  timestamp    = {Tue, 27 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-14750.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-14782,
  author       = {Ivo Zenden and
                  Han Wang and
                  Alfonso Iacovazzi and
                  Arash Vahidi and
                  Rolf Blom and
                  Shahid Raza},
  title        = {On the Resilience of Machine Learning-Based {IDS} for Automotive Networks},
  journal      = {CoRR},
  volume       = {abs/2306.14782},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.14782},
  doi          = {10.48550/ARXIV.2306.14782},
  eprinttype    = {arXiv},
  eprint       = {2306.14782},
  timestamp    = {Tue, 27 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-14782.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr2/IacovazziR22,
  author       = {Alfonso Iacovazzi and
                  Shahid Raza},
  title        = {Ensemble of Random and Isolation Forests for Graph-Based Intrusion
                  Detection in Containers},
  booktitle    = {{IEEE} International Conference on Cyber Security and Resilience,
                  {CSR} 2022, Rhodes, Greece, July 27-29, 2022},
  pages        = {30--37},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSR54599.2022.9850307},
  doi          = {10.1109/CSR54599.2022.9850307},
  timestamp    = {Fri, 19 Aug 2022 14:18:24 +0200},
  biburl       = {https://dblp.org/rec/conf/csr2/IacovazziR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/giots/FigueiredoSIHCC22,
  author       = {S{\'{e}}rgio Figueiredo and
                  Paulo Silva and
                  Alfonso Iacovazzi and
                  Vitalina Holubenko and
                  Jo{\~{a}}o Casal and
                  Jose M. Alcaraz Calero and
                  Qi Wang and
                  Pedro Colarejo and
                  Ross Little Armitt and
                  Giacomo Inches and
                  Shahid Raza},
  editor       = {Aurora Gonz{\'{a}}lez{-}Vidal and
                  Ahmed Mohamed Abdelgawad and
                  Essaid Sabir and
                  S{\'{e}}bastien Ziegler and
                  Latif Ladid},
  title        = {ARCADIAN-IoT - Enabling Autonomous Trust, Security and Privacy Management
                  for IoT},
  booktitle    = {Internet of Things - 5th The Global IoT Summit, GIoTS 2022, Dublin,
                  Ireland, June 20-23, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13533},
  pages        = {348--359},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20936-9\_28},
  doi          = {10.1007/978-3-031-20936-9\_28},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/giots/FigueiredoSIHCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/TanIHEB19,
  author       = {Yi Xiang Marcus Tan and
                  Alfonso Iacovazzi and
                  Ivan Homoliak and
                  Yuval Elovici and
                  Alexander Binder},
  title        = {Adversarial Attacks on Remote User Authentication Using Behavioural
                  Mouse Dynamics},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2019 Budapest,
                  Hungary, July 14-19, 2019},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IJCNN.2019.8852414},
  doi          = {10.1109/IJCNN.2019.8852414},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ijcnn/TanIHEB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/TanICE19,
  author       = {Mengxuan Tan and
                  Alfonso Iacovazzi and
                  Ngai{-}Man Cheung and
                  Yuval Elovici},
  editor       = {Karl Andersson and
                  Hwee{-}Pink Tan and
                  Sharief Oteafy},
  title        = {A Neural Attention Model for Real-Time Network Intrusion Detection},
  booktitle    = {44th {IEEE} Conference on Local Computer Networks, {LCN} 2019, Osnabrueck,
                  Germany, October 14-17, 2019},
  pages        = {291--299},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/LCN44214.2019.8990890},
  doi          = {10.1109/LCN44214.2019.8990890},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/TanICE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/IacovazziFE19,
  author       = {Alfonso Iacovazzi and
                  Daniel Frassinelli and
                  Yuval Elovici},
  title        = {The {DUSTER} Attack: Tor Onion Service Attribution Based on Flow Watermarking
                  with Track Hiding},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {213--225},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/iacovazzi},
  timestamp    = {Wed, 10 Feb 2021 22:02:04 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/IacovazziFE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-11831,
  author       = {Yi Xiang Marcus Tan and
                  Alfonso Iacovazzi and
                  Ivan Homoliak and
                  Yuval Elovici and
                  Alexander Binder},
  title        = {Adversarial Attacks on Remote User Authentication Using Behavioural
                  Mouse Dynamics},
  journal      = {CoRR},
  volume       = {abs/1905.11831},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.11831},
  eprinttype    = {arXiv},
  eprint       = {1905.11831},
  timestamp    = {Mon, 03 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-11831.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/IacovazziSFE18,
  author       = {Alfonso Iacovazzi and
                  Sanat Sarda and
                  Daniel Frassinelli and
                  Yuval Elovici},
  title        = {DropWat: An Invisible Network Flow Watermark for Data Exfiltration
                  Traceback},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1139--1154},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2779113},
  doi          = {10.1109/TIFS.2017.2779113},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/IacovazziSFE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/IacovazziSE18,
  author       = {Alfonso Iacovazzi and
                  Sanat Sarda and
                  Yuval Elovici},
  title        = {Inflow: Inverse Network Flow Watermarking for Detecting Hidden Servers},
  booktitle    = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018,
                  Honolulu, HI, USA, April 16-19, 2018},
  pages        = {747--755},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/INFOCOM.2018.8486375},
  doi          = {10.1109/INFOCOM.2018.8486375},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/IacovazziSE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/IacovazziE17,
  author       = {Alfonso Iacovazzi and
                  Yuval Elovici},
  title        = {Network Flow Watermarking: {A} Survey},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {19},
  number       = {1},
  pages        = {512--530},
  year         = {2017},
  url          = {https://doi.org/10.1109/COMST.2016.2604405},
  doi          = {10.1109/COMST.2016.2604405},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/IacovazziE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nof/IacovazziFE17,
  author       = {Alfonso Iacovazzi and
                  Daniel Frassinelli and
                  Yuval Elovici},
  editor       = {Toktam Mahmoodi and
                  Stefano Secci and
                  Antonio Cianfrani and
                  Filip Idzikowski},
  title        = {On packet loss modeling: An empirical assessment},
  booktitle    = {8th International Conference on the Network of the Future, {NOF} 2017,
                  London, United Kingdom, November 22-24, 2017},
  pages        = {33--39},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/NOF.2017.8251217},
  doi          = {10.1109/NOF.2017.8251217},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nof/IacovazziFE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/IacovazziSFE17,
  author       = {Alfonso Iacovazzi and
                  Sanat Sarda and
                  Daniel Frassinelli and
                  Yuval Elovici},
  title        = {{DROPWAT:} an Invisible Network Flow Watermark for Data Exfiltration
                  Traceback},
  journal      = {CoRR},
  volume       = {abs/1705.09460},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.09460},
  eprinttype    = {arXiv},
  eprint       = {1705.09460},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/IacovazziSFE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/PolveriniBCIL16,
  author       = {Marco Polverini and
                  Andrea Baiocchi and
                  Antonio Cianfrani and
                  Alfonso Iacovazzi and
                  Marco Listanti},
  title        = {The Power of {SDN} to Improve the Estimation of the {ISP} Traffic
                  Matrix Through the Flow Spread Concept},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {34},
  number       = {6},
  pages        = {1904--1913},
  year         = {2016},
  url          = {https://doi.org/10.1109/JSAC.2016.2559178},
  doi          = {10.1109/JSAC.2016.2559178},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/PolveriniBCIL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/IacovazziB15,
  author       = {Alfonso Iacovazzi and
                  Andrea Baiocchi},
  title        = {Protecting traffic privacy for massive aggregated traffic},
  journal      = {Comput. Networks},
  volume       = {77},
  pages        = {1--17},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.comnet.2014.11.019},
  doi          = {10.1016/J.COMNET.2014.11.019},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/IacovazziB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/RizziIBC15,
  author       = {Antonello Rizzi and
                  Alfonso Iacovazzi and
                  Andrea Baiocchi and
                  Silvia Colabrese},
  title        = {A low complexity real-time Internet traffic flows neuro-fuzzy classifier},
  journal      = {Comput. Networks},
  volume       = {91},
  pages        = {752--771},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.comnet.2015.09.011},
  doi          = {10.1016/J.COMNET.2015.09.011},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/RizziIBC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/PolveriniICBL15,
  author       = {Marco Polverini and
                  Alfonso Iacovazzi and
                  Antonio Cianfrani and
                  Andrea Baiocchi and
                  Marco Listanti},
  title        = {Traffic matrix estimation enhanced by SDNs nodes in real network topology},
  booktitle    = {2015 {IEEE} Conference on Computer Communications Workshops, {INFOCOM}
                  Workshops, Hong Kong, China, April 26 - May 1, 2015},
  pages        = {300--305},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFCOMW.2015.7179401},
  doi          = {10.1109/INFCOMW.2015.7179401},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/PolveriniICBL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/IacovazziDRB13,
  author       = {Alfonso Iacovazzi and
                  Alessandro D'Alconzo and
                  Fabio Ricciato and
                  Martin Burkhart},
  title        = {Elementary secure-multiparty computation for massive-scale collaborative
                  network monitoring: {A} quantitative assessment},
  journal      = {Comput. Networks},
  volume       = {57},
  number       = {17},
  pages        = {3728--3742},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.comnet.2013.08.017},
  doi          = {10.1016/J.COMNET.2013.08.017},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/IacovazziDRB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/IacovazziBB13,
  author       = {Alfonso Iacovazzi and
                  Andrea Baiocchi and
                  Ludovico Bettini},
  title        = {What are you Googling? - Inferring search type information through
                  a statistical classifier},
  booktitle    = {2013 {IEEE} Global Communications Conference, {GLOBECOM} 2013, Atlanta,
                  GA, USA, December 9-13, 2013},
  pages        = {747--753},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/GLOCOM.2013.6831162},
  doi          = {10.1109/GLOCOM.2013.6831162},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/IacovazziBB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/IacovazziB13,
  author       = {Alfonso Iacovazzi and
                  Andrea Baiocchi},
  title        = {Investigating the trade-off between overhead and delay for full packet
                  traffic privacy},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2013, Budapest,
                  Hungary, June 9-13, 2013, Workshops Proceedings},
  pages        = {1345--1350},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICCW.2013.6649446},
  doi          = {10.1109/ICCW.2013.6649446},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/IacovazziB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/IacovazziB12,
  author       = {Alfonso Iacovazzi and
                  Andrea Baiocchi},
  title        = {From ideality to practicability in statistical packet features masking},
  booktitle    = {8th International Wireless Communications and Mobile Computing Conference,
                  {IWCMC} 2012, Limassol, Cyprus, August 27-31, 2012},
  pages        = {456--462},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/IWCMC.2012.6314247},
  doi          = {10.1109/IWCMC.2012.6314247},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/IacovazziB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tma/IacovazziB12,
  author       = {Alfonso Iacovazzi and
                  Andrea Baiocchi},
  editor       = {Antonio Pescap{\`{e}} and
                  Luca Salgarelli and
                  Xenofontas A. Dimitropoulos},
  title        = {Padding and Fragmentation for Masking Packet Length Statistics},
  booktitle    = {Traffic Monitoring and Analysis - 4th International Workshop, {TMA}
                  2012, Vienna, Austria, March 12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7189},
  pages        = {85--88},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28534-9\_9},
  doi          = {10.1007/978-3-642-28534-9\_9},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/tma/IacovazziB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/teletraffic/IacovazziB10,
  author       = {Alfonso Iacovazzi and
                  Andrea Baiocchi},
  title        = {Optimum packet length masking},
  booktitle    = {22nd International Teletraffic Congress, {ITC} 2010, Amsterdam, The
                  Netherlands, September 7-9, 2010},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ITC.2010.5608728},
  doi          = {10.1109/ITC.2010.5608728},
  timestamp    = {Sat, 12 Nov 2022 12:58:30 +0100},
  biburl       = {https://dblp.org/rec/conf/teletraffic/IacovazziB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/MaioliniBIR09,
  author       = {Gianluca Maiolini and
                  Andrea Baiocchi and
                  Alfonso Iacovazzi and
                  Antonello Rizzi},
  editor       = {Luigi Fratta and
                  Henning Schulzrinne and
                  Yutaka Takahashi and
                  Otto Spaniol},
  title        = {Real Time Identification of {SSH} Encrypted Application Flows by Using
                  Cluster Analysis Techniques},
  booktitle    = {{NETWORKING} 2009, 8th International {IFIP-TC} 6 Networking Conference,
                  Aachen, Germany, May 11-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5550},
  pages        = {182--194},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01399-7\_15},
  doi          = {10.1007/978-3-642-01399-7\_15},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/MaioliniBIR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics