BibTeX records: Luca Invernizzi

download as .bib file

@article{DBLP:journals/tches/BurszteinIKMPZ24,
  author       = {Elie Bursztein and
                  Luca Invernizzi and
                  Karel Kr{\'{a}}l and
                  Daniel Moghimi and
                  Jean{-}Michel Picod and
                  Marina Zhang},
  title        = {Generalized Power Attacks against Crypto Hardware using Long-Range
                  Deep Learning},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {472--499},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.472-499},
  doi          = {10.46586/TCHES.V2024.I3.472-499},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BurszteinIKMPZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2405-09757,
  author       = {Enze Liu and
                  George Kappos and
                  Eric Mugnier and
                  Luca Invernizzi and
                  Stefan Savage and
                  David Tao and
                  Kurt Thomas and
                  Geoffrey M. Voelker and
                  Sarah Meiklejohn},
  title        = {Give and Take: An End-To-End Investigation of Giveaway Scam Conversion
                  Rates},
  journal      = {CoRR},
  volume       = {abs/2405.09757},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2405.09757},
  doi          = {10.48550/ARXIV.2405.09757},
  eprinttype    = {arXiv},
  eprint       = {2405.09757},
  timestamp    = {Wed, 12 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2405-09757.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GhineaKPCKMPIB23,
  author       = {Diana Ghinea and
                  Fabian Kaczmarczyck and
                  Jennifer Pullman and
                  Julien Cretin and
                  Stefan K{\"{o}}lbl and
                  Rafael Misoczki and
                  Jean{-}Michel Picod and
                  Luca Invernizzi and
                  Elie Bursztein},
  editor       = {Jianying Zhou and
                  Lejla Batina and
                  Zengpeng Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Suryadipta Majumdar and
                  Daisuke Mashima and
                  Weizhi Meng and
                  Stjepan Picek and
                  Mohammad Ashiqur Rahman and
                  Jun Shao and
                  Masaki Shimaoka and
                  Ezekiel O. Soremekun and
                  Chunhua Su and
                  Je Sen Teh and
                  Aleksei Udovenko and
                  Cong Wang and
                  Leo Yu Zhang and
                  Yury Zhauniarovich},
  title        = {Hybrid Post-quantum Signatures in Hardware Security Keys},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2023
                  Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
                  SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13907},
  pages        = {480--499},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41181-6\_26},
  doi          = {10.1007/978-3-031-41181-6\_26},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GhineaKPCKMPIB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-07249,
  author       = {Elie Bursztein and
                  Luca Invernizzi and
                  Karel Kr{\'{a}}l and
                  Daniel Moghimi and
                  Jean{-}Michel Picod and
                  Marina Zhang},
  title        = {Generic Attacks against Cryptographic Hardware through Long-Range
                  Deep Learning},
  journal      = {CoRR},
  volume       = {abs/2306.07249},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.07249},
  doi          = {10.48550/ARXIV.2306.07249},
  eprinttype    = {arXiv},
  eprint       = {2306.07249},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-07249.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhineaKPCKMPIB22,
  author       = {Diana Ghinea and
                  Fabian Kaczmarczyck and
                  Jennifer Pullman and
                  Julien Cretin and
                  Stefan K{\"{o}}lbl and
                  Rafael Misoczki and
                  Jean{-}Michel Picod and
                  Luca Invernizzi and
                  Elie Bursztein},
  title        = {Hybrid Post-Quantum Signatures in Hardware Security Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1225},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1225},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhineaKPCKMPIB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KaczmarczyckGIP20,
  author       = {Fabian Kaczmarczyck and
                  Bernhard Grill and
                  Luca Invernizzi and
                  Jennifer Pullman and
                  Cecilia M. Procopiuc and
                  David Tao and
                  Borbala Benko and
                  Elie Bursztein},
  title        = {Spotlight: Malware Lead Generation at Scale},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {17--27},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427273},
  doi          = {10.1145/3427228.3427273},
  timestamp    = {Tue, 15 Dec 2020 12:22:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KaczmarczyckGIP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-10861,
  author       = {Ivan Petrov and
                  Luca Invernizzi and
                  Elie Bursztein},
  title        = {CoinPolice: Detecting Hidden Cryptojacking Attacks with Neural Networks},
  journal      = {CoRR},
  volume       = {abs/2006.10861},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.10861},
  eprinttype    = {arXiv},
  eprint       = {2006.10861},
  timestamp    = {Tue, 23 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-10861.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BertramBCCFFGHH19,
  author       = {Theo Bertram and
                  Elie Bursztein and
                  Stephanie Caro and
                  Hubert Chao and
                  Rutledge Chin Feman and
                  Peter Fleischer and
                  Albin Gustafsson and
                  Jess Hemerly and
                  Chris Hibbert and
                  Luca Invernizzi and
                  Lanah Kammourieh Donnelly and
                  Jason Ketover and
                  Jay Laefer and
                  Paul Nicholas and
                  Yuan Niu and
                  Harjinder Obhi and
                  David Price and
                  Andrew Strait and
                  Kurt Thomas and
                  Al Verney},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Five Years of the Right to be Forgotten},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {959--972},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354208},
  doi          = {10.1145/3319535.3354208},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BertramBCCFFGHH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ThomasPYRKIBPPB19,
  author       = {Kurt Thomas and
                  Jennifer Pullman and
                  Kevin Yeo and
                  Ananth Raghunathan and
                  Patrick Gage Kelley and
                  Luca Invernizzi and
                  Borbala Benko and
                  Tadek Pietraszek and
                  Sarvar Patel and
                  Dan Boneh and
                  Elie Bursztein},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {Protecting accounts from credential stuffing with password breach
                  alerting},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1556--1571},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/thomas},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ThomasPYRKIBPPB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HuangALIBMLLSM18,
  author       = {Danny Yuxing Huang and
                  Maxwell Matthaios Aliapoulios and
                  Vector Guo Li and
                  Luca Invernizzi and
                  Elie Bursztein and
                  Kylie McRoberts and
                  Jonathan Levin and
                  Kirill Levchenko and
                  Alex C. Snoeren and
                  Damon McCoy},
  title        = {Tracking Ransomware End-to-end},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {618--631},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00047},
  doi          = {10.1109/SP.2018.00047},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/HuangALIBMLLSM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HuangHILFKV17,
  author       = {Cheng Huang and
                  Shuang Hao and
                  Luca Invernizzi and
                  Jiayong Liu and
                  Yong Fang and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Gossip: Automatically Identifying Malicious Domains from Mailing List
                  Discussions},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {494--505},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053017},
  doi          = {10.1145/3052973.3053017},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HuangHILFKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ThomasLZBRIMCEM17,
  author       = {Kurt Thomas and
                  Frank Li and
                  Ali Zand and
                  Jacob Barrett and
                  Juri Ranieri and
                  Luca Invernizzi and
                  Yarik Markov and
                  Oxana Comanescu and
                  Vijay Eranti and
                  Angelika Moscicki and
                  Daniel Margolis and
                  Vern Paxson and
                  Elie Bursztein},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen
                  Credentials},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1421--1434},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134067},
  doi          = {10.1145/3133956.3134067},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ThomasLZBRIMCEM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AntonakakisABBB17,
  author       = {Manos Antonakakis and
                  Tim April and
                  Michael D. Bailey and
                  Matt Bernhard and
                  Elie Bursztein and
                  Jaime Cochran and
                  Zakir Durumeric and
                  J. Alex Halderman and
                  Luca Invernizzi and
                  Michalis Kallitsis and
                  Deepak Kumar and
                  Chaz Lever and
                  Zane Ma and
                  Joshua Mason and
                  Damian Menscher and
                  Chad Seaman and
                  Nick Sullivan and
                  Kurt Thomas and
                  Yi Zhou},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {Understanding the Mirai Botnet},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {1093--1110},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/antonakakis},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/AntonakakisABBB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/InvernizziTKCPB16,
  author       = {Luca Invernizzi and
                  Kurt Thomas and
                  Alexandros Kapravelos and
                  Oxana Comanescu and
                  Jean{-}Michel Picod and
                  Elie Bursztein},
  title        = {Cloak of Visibility: Detecting When Machines Browse a Different Web},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {743--758},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.50},
  doi          = {10.1109/SP.2016.50},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/InvernizziTKCPB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MuttiFBICKKV15,
  author       = {Simone Mutti and
                  Yanick Fratantonio and
                  Antonio Bianchi and
                  Luca Invernizzi and
                  Jacopo Corbetta and
                  Dhilung Kirat and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {BareDroid: Large-Scale Analysis of Android Apps on Real Devices},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {71--80},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818036},
  doi          = {10.1145/2818000.2818036},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MuttiFBICKKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BianchiCIFKV15,
  author       = {Antonio Bianchi and
                  Jacopo Corbetta and
                  Luca Invernizzi and
                  Yanick Fratantonio and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {What the App is That? Deception and Countermeasures in the Android
                  User Interface},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {931--948},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.62},
  doi          = {10.1109/SP.2015.62},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BianchiCIFKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/InvernizziMTKSVLM14,
  author       = {Luca Invernizzi and
                  Stanislav Miskovic and
                  Ruben Torres and
                  Christopher Kruegel and
                  Sabyasachi Saha and
                  Giovanni Vigna and
                  Sung{-}Ju Lee and
                  Marco Mellia},
  title        = {Nazca: Detecting Malware Distribution in Large-Scale Networks},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/nazca-detecting-malware-distribution-large-scale-networks},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/InvernizziMTKSVLM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CorbettaIKV14,
  author       = {Jacopo Corbetta and
                  Luca Invernizzi and
                  Christopher Kr{\"{u}}gel and
                  Giovanni Vigna},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Eyes of a Human, Eyes of a Program: Leveraging Different Views of
                  the Web for Analysis and Detection},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {130--149},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_7},
  doi          = {10.1007/978-3-319-11379-1\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CorbettaIKV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ShoshitaishviliIDV14,
  author       = {Yan Shoshitaishvili and
                  Luca Invernizzi and
                  Adam Doup{\'{e}} and
                  Giovanni Vigna},
  editor       = {Yookun Cho and
                  Sung Y. Shin and
                  Sang{-}Wook Kim and
                  Chih{-}Cheng Hung and
                  Jiman Hong},
  title        = {Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs
                  in cyber security},
  booktitle    = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of
                  Korea - March 24 - 28, 2014},
  pages        = {1649--1656},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2554850.2554880},
  doi          = {10.1145/2554850.2554880},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/ShoshitaishviliIDV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/VignaBCDFIKS14,
  author       = {Giovanni Vigna and
                  Kevin Borgolte and
                  Jacopo Corbetta and
                  Adam Doup{\'{e}} and
                  Yanick Fratantonio and
                  Luca Invernizzi and
                  Dhilung Kirat and
                  Yan Shoshitaishvili},
  editor       = {Zachary N. J. Peterson},
  title        = {Ten Years of iCTF: The Good, The Bad, and The Ugly},
  booktitle    = {2014 {USENIX} Summit on Gaming, Games, and Gamification in Security
                  Education, 3GSE '14, San Diego, CA, USA, August 18, 2014},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/3gse14/summit-program/presentation/vigna},
  timestamp    = {Mon, 01 Feb 2021 08:43:14 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/VignaBCDFIKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/InvernizziKV13,
  author       = {Luca Invernizzi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Charles N. Payne Jr.},
  title        = {Message in a bottle: sailing past censorship},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {39--48},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523654},
  doi          = {10.1145/2523649.2523654},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/InvernizziKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NikiforakisIKAJKPV12,
  author       = {Nick Nikiforakis and
                  Luca Invernizzi and
                  Alexandros Kapravelos and
                  Steven {Van Acker} and
                  Wouter Joosen and
                  Christopher Kruegel and
                  Frank Piessens and
                  Giovanni Vigna},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {You are what you include: large-scale evaluation of remote javascript
                  inclusions},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {736--747},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382274},
  doi          = {10.1145/2382196.2382274},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/NikiforakisIKAJKPV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/InvernizziC12,
  author       = {Luca Invernizzi and
                  Paolo Milani Comparetti and
                  Stefano Benvenuti and
                  Christopher Kruegel and
                  Marco Cova and
                  Giovanni Vigna},
  title        = {EvilSeed: {A} Guided Approach to Finding Malicious Web Pages},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
                  San Francisco, California, {USA}},
  pages        = {428--442},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SP.2012.33},
  doi          = {10.1109/SP.2012.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/InvernizziC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/AndonianCICG10,
  author       = {Michael Andonian and
                  Dario Cazzaro and
                  Luca Invernizzi and
                  Monique Chyba and
                  Sergio Grammatico},
  title        = {Geometric control for autonomous underwater vehicles: Overcoming a
                  thruster failure},
  booktitle    = {Proceedings of the 49th {IEEE} Conference on Decision and Control,
                  {CDC} 2010, December 15-17, 2010, Atlanta, Georgia, {USA}},
  pages        = {7051--7056},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/CDC.2010.5718157},
  doi          = {10.1109/CDC.2010.5718157},
  timestamp    = {Fri, 04 Mar 2022 13:28:01 +0100},
  biburl       = {https://dblp.org/rec/conf/cdc/AndonianCICG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}