BibTeX records: Stefano Zanero

download as .bib file

@article{DBLP:journals/corr/abs-2402-18516,
  author       = {Raffaele Giuseppe Cestari and
                  Stefano Longari and
                  Stefano Zanero and
                  Simone Formentin},
  title        = {Model Predictive Control with adaptive resilience for Denial-of-Service
                  Attacks mitigation on a Regulated Dam},
  journal      = {CoRR},
  volume       = {abs/2402.18516},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.18516},
  doi          = {10.48550/ARXIV.2402.18516},
  eprinttype    = {arXiv},
  eprint       = {2402.18516},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-18516.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Zanero23,
  author       = {Stefano Zanero},
  title        = {Coming of Age},
  journal      = {Commun. {ACM}},
  volume       = {66},
  number       = {9},
  pages        = {21--23},
  year         = {2023},
  url          = {https://doi.org/10.1145/3608965},
  doi          = {10.1145/3608965},
  timestamp    = {Fri, 20 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/Zanero23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NicheliniPLCZ23,
  author       = {Alessandro Nichelini and
                  Carlo Alberto Pozzoli and
                  Stefano Longari and
                  Michele Carminati and
                  Stefano Zanero},
  title        = {CANova: {A} hybrid intrusion detection framework based on automatic
                  signal classification for {CAN}},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103166},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103166},
  doi          = {10.1016/J.COSE.2023.103166},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NicheliniPLCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BinosiPCZ23,
  author       = {Lorenzo Binosi and
                  Mario Polino and
                  Michele Carminati and
                  Stefano Zanero},
  title        = {{BINO:} Automatic recognition of inline binary functions from template
                  classes},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103312},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103312},
  doi          = {10.1016/J.COSE.2023.103312},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/BinosiPCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PaladiniMPCZ23,
  author       = {Tommaso Paladini and
                  Francesco Monti and
                  Mario Polino and
                  Michele Carminati and
                  Stefano Zanero},
  title        = {Fraud Detection under Siege: Practical Poisoning Attacks and Defense
                  Strategies},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {4},
  pages        = {45:1--45:35},
  year         = {2023},
  url          = {https://doi.org/10.1145/3613244},
  doi          = {10.1145/3613244},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/PaladiniMPCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/DanidouRSHZL23,
  author       = {Yianna Danidou and
                  Sara Ricci and
                  Antonio F. Skarmeta and
                  Jiri Hosek and
                  Stefano Zanero and
                  Imre Lendak},
  title        = {{DJM-CYBER:} {A} Joint Master in Advanced Cybersecurity},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {65:1--65:10},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3605002},
  doi          = {10.1145/3600160.3605002},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/DanidouRSHZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DOnghiaCGCPZ23,
  author       = {Mario D'Onghia and
                  Federico Di Cesare and
                  Luigi Gallo and
                  Michele Carminati and
                  Mario Polino and
                  Stefano Zanero},
  editor       = {Maura Pintor and
                  Xinyun Chen and
                  Florian Tram{\`{e}}r},
  title        = {Lookin' Out My Backdoor! Investigating Backdooring Attacks Against
                  DL-driven Malware Detectors},
  booktitle    = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {209--220},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605764.3623919},
  doi          = {10.1145/3605764.3623919},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DOnghiaCGCPZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/LongariPNCZ23,
  author       = {Stefano Longari and
                  Carlo Alberto Pozzoli and
                  Alessandro Nichelini and
                  Michele Carminati and
                  Stefano Zanero},
  editor       = {Shlomi Dolev and
                  Ehud Gudes and
                  Pascal Paillier},
  title        = {CANdito: Improving Payload-Based Detection of Attacks on Controller
                  Area Networks},
  booktitle    = {Cyber Security, Cryptology, and Machine Learning - 7th International
                  Symposium, {CSCML} 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13914},
  pages        = {135--150},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-34671-2\_10},
  doi          = {10.1007/978-3-031-34671-2\_10},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/LongariPNCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/TatulliPDCZ23,
  author       = {Maria Paola Tatulli and
                  Tommaso Paladini and
                  Mario D'Onghia and
                  Michele Carminati and
                  Stefano Zanero},
  editor       = {Shlomi Dolev and
                  Ehud Gudes and
                  Pascal Paillier},
  title        = {{HAMLET:} {A} Transformer Based Approach for Money Laundering Detection},
  booktitle    = {Cyber Security, Cryptology, and Machine Learning - 7th International
                  Symposium, {CSCML} 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13914},
  pages        = {234--250},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-34671-2\_17},
  doi          = {10.1007/978-3-031-34671-2\_17},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/TatulliPDCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/LongariNCZ23,
  author       = {Stefano Longari and
                  Francesco Noseda and
                  Michele Carminati and
                  Stefano Zanero},
  editor       = {Shlomi Dolev and
                  Ehud Gudes and
                  Pascal Paillier},
  title        = {Evaluating the Robustness of Automotive Intrusion Detection Systems
                  Against Evasion Attacks},
  booktitle    = {Cyber Security, Cryptology, and Machine Learning - 7th International
                  Symposium, {CSCML} 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13914},
  pages        = {337--352},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-34671-2\_24},
  doi          = {10.1007/978-3-031-34671-2\_24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/LongariNCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/BertaniBBCZP23,
  author       = {Alessandro Bertani and
                  Marco Bonelli and
                  Lorenzo Binosi and
                  Michele Carminati and
                  Stefano Zanero and
                  Mario Polino},
  editor       = {Daniel Gruss and
                  Federico Maggi and
                  Mathias Fischer and
                  Michele Carminati},
  title        = {Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary
                  Exploitation},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 20th International Conference, {DIMVA} 2023, Hamburg, Germany, July
                  12-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13959},
  pages        = {256--275},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35504-2\_13},
  doi          = {10.1007/978-3-031-35504-2\_13},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/BertaniBBCZP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpram/BinosiRPCZ23,
  author       = {Lorenzo Binosi and
                  Luca Rullo and
                  Mario Polino and
                  Michele Carminati and
                  Stefano Zanero},
  editor       = {Maria De Marsico and
                  Gabriella Sanniti di Baja and
                  Ana L. N. Fred},
  title        = {Rainfuzz: Reinforcement-Learning Driven Heat-Maps for Boosting Coverage-Guided
                  Fuzzing},
  booktitle    = {Proceedings of the 12th International Conference on Pattern Recognition
                  Applications and Methods, {ICPRAM} 2023, Lisbon, Portugal, February
                  22-24, 2023},
  pages        = {39--50},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011625300003411},
  doi          = {10.5220/0011625300003411},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icpram/BinosiRPCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itasec/AvanziLPCZTZ23,
  author       = {Davide Avanzi and
                  Stefano Longari and
                  Mario Polino and
                  Michele Carminati and
                  Andrea Maria Zanchettin and
                  Mara Tanelli and
                  Stefano Zanero},
  editor       = {Francesco Buccafurri and
                  Elena Ferrari and
                  Gianluca Lax},
  title        = {Task Aware Intrusion Detection for Industrial Robots},
  booktitle    = {Proceedings of the Italian Conference on Cyber Security {(ITASEC}
                  2023), Bari, Italy, May 2-5, 2023},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3488},
  publisher    = {CEUR-WS.org},
  year         = {2023},
  url          = {https://ceur-ws.org/Vol-3488/paper03.pdf},
  timestamp    = {Thu, 21 Sep 2023 17:01:40 +0200},
  biburl       = {https://dblp.org/rec/conf/itasec/AvanziLPCZTZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/RemigioBPCZ23,
  author       = {Riccardo Remigio and
                  Alessandro Bertani and
                  Mario Polino and
                  Michele Carminati and
                  Stefano Zanero},
  editor       = {Junji Shikata and
                  Hiroki Kuzuno},
  title        = {The Good, the Bad, and the Binary: An LSTM-Based Method for Section
                  Boundary Detection in Firmware Analysis},
  booktitle    = {Advances in Information and Computer Security - 18th International
                  Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31,
                  2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14128},
  pages        = {16--35},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41326-1\_2},
  doi          = {10.1007/978-3-031-41326-1\_2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/RemigioBPCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkdd/PaladiniLCPTZ23,
  author       = {Tommaso Paladini and
                  Martino {Bernasconi de Luca} and
                  Michele Carminati and
                  Mario Polino and
                  Francesco Trov{\`{o}} and
                  Stefano Zanero},
  editor       = {Gianmarco De Francisci Morales and
                  Claudia Perlich and
                  Natali Ruchansky and
                  Nicolas Kourtellis and
                  Elena Baralis and
                  Francesco Bonchi},
  title        = {Advancing Fraud Detection Systems Through Online Learning},
  booktitle    = {Machine Learning and Knowledge Discovery in Databases: Applied Data
                  Science and Demo Track - European Conference, {ECML} {PKDD} 2023,
                  Turin, Italy, September 18-22, 2023, Proceedings, Part {VI}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14174},
  pages        = {275--292},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43427-3\_17},
  doi          = {10.1007/978-3-031-43427-3\_17},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkdd/PaladiniLCPTZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qce/BellanteBVZ23,
  author       = {Armando Bellante and
                  William Bonvini and
                  Stefano Vanerio and
                  Stefano Zanero},
  editor       = {Brian La Cour and
                  Lia Yeh and
                  Marek Osinski},
  title        = {Quantum Eigenfaces: Linear Feature Mapping and Nearest Neighbor Classification
                  with Outlier Detection},
  booktitle    = {{IEEE} International Conference on Quantum Computing and Engineering,
                  {QCE} 2023, Bellevue, WA, USA, September 17-22, 2023},
  pages        = {196--207},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/QCE57702.2023.00030},
  doi          = {10.1109/QCE57702.2023.00030},
  timestamp    = {Fri, 15 Dec 2023 20:24:40 +0100},
  biburl       = {https://dblp.org/rec/conf/qce/BellanteBVZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LabancaPMPCZ22,
  author       = {Danilo Labanca and
                  Luca Primerano and
                  Marcus Markland{-}Montgomery and
                  Mario Polino and
                  Michele Carminati and
                  Stefano Zanero},
  title        = {Amaretto: An Active Learning Framework for Money Laundering Detection},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {41720--41739},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3167699},
  doi          = {10.1109/ACCESS.2022.3167699},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LabancaPMPCZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GalloroPCCZ22,
  author       = {Nicola Galloro and
                  Mario Polino and
                  Michele Carminati and
                  Andrea Continella and
                  Stefano Zanero},
  title        = {A Systematical and longitudinal study of evasive behaviors in windows
                  malware},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102550},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102550},
  doi          = {10.1016/J.COSE.2021.102550},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GalloroPCCZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DOnghiaSNCPZ22,
  author       = {Mario D'Onghia and
                  Matteo Salvadore and
                  Benedetto Maria Nespoli and
                  Michele Carminati and
                  Mario Polino and
                  Stefano Zanero},
  title        = {Ap{\'{\i}}cula: Static detection of {API} calls in generic streams
                  of bytes},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102775},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102775},
  doi          = {10.1016/J.COSE.2022.102775},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DOnghiaSNCPZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qmi/BellanteLZ22,
  author       = {Armando Bellante and
                  Alessandro Luongo and
                  Stefano Zanero},
  title        = {Quantum algorithms for SVD-based data representation and analysis},
  journal      = {Quantum Mach. Intell.},
  volume       = {4},
  number       = {2},
  pages        = {1--23},
  year         = {2022},
  url          = {https://doi.org/10.1007/s42484-022-00076-y},
  doi          = {10.1007/S42484-022-00076-Y},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/qmi/BellanteLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/MaffiolaLCTZ22,
  author       = {Davide Maffiola and
                  Stefano Longari and
                  Michele Carminati and
                  Mara Tanelli and
                  Stefano Zanero},
  title        = {{GOLIATH:} {A} Decentralized Framework for Data Collection in Intelligent
                  Transportation Systems},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {23},
  number       = {8},
  pages        = {13372--13385},
  year         = {2022},
  url          = {https://doi.org/10.1109/TITS.2021.3123824},
  doi          = {10.1109/TITS.2021.3123824},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/MaffiolaLCTZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TronLCPZ22,
  author       = {Alvise de Faveri Tron and
                  Stefano Longari and
                  Michele Carminati and
                  Mario Polino and
                  Stefano Zanero},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks
                  on Automotive Networks},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {711--723},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560618},
  doi          = {10.1145/3548606.3560618},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/TronLCPZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itasec/RodriguezPCZ22,
  author       = {Javier Fern{\'{a}}ndez Rodr{\'{\i}}guez and
                  Michele Papale and
                  Michele Carminati and
                  Stefano Zanero},
  editor       = {Camil Demetrescu and
                  Alessandro Mei},
  title        = {A Natural Language Processing Approach for Financial Fraud Detection},
  booktitle    = {Proceedings of the Italian Conference on Cybersecurity {(ITASEC} 2022),
                  Rome, Italy, June 20-23, 2022},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3260},
  pages        = {135--149},
  publisher    = {CEUR-WS.org},
  year         = {2022},
  url          = {https://ceur-ws.org/Vol-3260/paper10.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:11 +0100},
  biburl       = {https://dblp.org/rec/conf/itasec/RodriguezPCZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-06628,
  author       = {Stefano Longari and
                  Alessandro Nichelini and
                  Carlo Alberto Pozzoli and
                  Michele Carminati and
                  Stefano Zanero},
  title        = {CANdito: Improving Payload-based Detection of Attacks on Controller
                  Area Networks},
  journal      = {CoRR},
  volume       = {abs/2208.06628},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.06628},
  doi          = {10.48550/ARXIV.2208.06628},
  eprinttype    = {arXiv},
  eprint       = {2208.06628},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-06628.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-09557,
  author       = {Alvise de Faveri Tron and
                  Stefano Longari and
                  Michele Carminati and
                  Mario Polino and
                  Stefano Zanero},
  title        = {CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks
                  on Automotive Networks},
  journal      = {CoRR},
  volume       = {abs/2209.09557},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.09557},
  doi          = {10.48550/ARXIV.2209.09557},
  eprinttype    = {arXiv},
  eprint       = {2209.09557},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-09557.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/LongariVZCZ21,
  author       = {Stefano Longari and
                  Daniel Humberto Nova Valcarcel and
                  Mattia Zago and
                  Michele Carminati and
                  Stefano Zanero},
  title        = {CANnolo: An Anomaly Detection System Based on {LSTM} Autoencoders
                  for Controller Area Network},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {18},
  number       = {2},
  pages        = {1913--1924},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNSM.2020.3038991},
  doi          = {10.1109/TNSM.2020.3038991},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/LongariVZCZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RuaroZDPBCZKV21,
  author       = {Nicola Ruaro and
                  Kyle Zeng and
                  Lukas Dresel and
                  Mario Polino and
                  Tiffany Bao and
                  Andrea Continella and
                  Stefano Zanero and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {SyML: Guiding Symbolic Execution Toward Vulnerable States Through
                  Pattern Learning},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {456--468},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471865},
  doi          = {10.1145/3471621.3471865},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/RuaroZDPBCZKV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-08987,
  author       = {Armando Bellante and
                  Alessandro Luongo and
                  Stefano Zanero},
  title        = {Quantum Algorithms for Data Representation and Analysis},
  journal      = {CoRR},
  volume       = {abs/2104.08987},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.08987},
  eprinttype    = {arXiv},
  eprint       = {2104.08987},
  timestamp    = {Tue, 27 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-08987.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ErbaTGPCZT20,
  author       = {Alessandro Erba and
                  Riccardo Taormina and
                  Stefano Galelli and
                  Marcello Pogliani and
                  Michele Carminati and
                  Stefano Zanero and
                  Nils Ole Tippenhauer},
  title        = {Constrained Concealment Attacks against Reconstruction-based Anomaly
                  Detectors in Industrial Control Systems},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {480--495},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427660},
  doi          = {10.1145/3427228.3427660},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ErbaTGPCZT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FerrariCPZ20,
  author       = {Dario Ferrari and
                  Michele Carminati and
                  Mario Polino and
                  Stefano Zanero},
  title        = {NoSQL Breakdown: {A} Large-scale Analysis of Misconfigured NoSQL Services},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {567--581},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427260},
  doi          = {10.1145/3427228.3427260},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/FerrariCPZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PoglianiMBQZ20,
  author       = {Marcello Pogliani and
                  Federico Maggi and
                  Marco Balduzzi and
                  Davide Quarta and
                  Stefano Zanero},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {Detecting Insecure Code Patterns in Industrial Robot Programs},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {759--771},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3384735},
  doi          = {10.1145/3320269.3384735},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/PoglianiMBQZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ism2/MaggiBVRQTPQZ20,
  author       = {Federico Maggi and
                  Marco Balduzzi and
                  Rainer Vosseler and
                  Martin R{\"{o}}sler and
                  Walter Quadrini and
                  Giacomo Tavola and
                  Marcello Pogliani and
                  Davide Quarta and
                  Stefano Zanero},
  editor       = {Francesco Longo and
                  Michael Affenzeller and
                  Antonio Padovano},
  title        = {Smart Factory Security: {A} Case Study on a Modular Smart Manufacturing
                  System},
  booktitle    = {Proceedings of the 2nd International Conference on Industry 4.0 and
                  Smart Manufacturing {(ISM} 2020), Virtual Event, Austria, 23-25 November
                  2020},
  series       = {Procedia Computer Science},
  volume       = {180},
  pages        = {666--675},
  publisher    = {Elsevier},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.procs.2021.01.289},
  doi          = {10.1016/J.PROCS.2021.01.289},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ism2/MaggiBVRQTPQZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CarminatiSPZ20,
  author       = {Michele Carminati and
                  Luca Santini and
                  Mario Polino and
                  Stefano Zanero},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {Evasion Attacks against Banking Fraud Detection Systems},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {285--300},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/carminati},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CarminatiSPZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/PoglianiQPVMZ19,
  author       = {Marcello Pogliani and
                  Davide Quarta and
                  Mario Polino and
                  Martino Vittone and
                  Federico Maggi and
                  Stefano Zanero},
  title        = {Security of controlled manufacturing systems in the connected factory:
                  the case of industrial robots},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {15},
  number       = {3},
  pages        = {161--175},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11416-019-00329-8},
  doi          = {10.1007/S11416-019-00329-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/PoglianiQPVMZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LongariPCZ19,
  author       = {Stefano Longari and
                  Matteo Penco and
                  Michele Carminati and
                  Stefano Zanero},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  Thorsten Holz},
  title        = {CopyCAN: An Error-Handling Protocol based Intrusion Detection System
                  for Controller Area Network},
  booktitle    = {Proceedings of the {ACM} Workshop on Cyber-Physical Systems Security
                  {\&} Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019},
  pages        = {39--50},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338499.3357362},
  doi          = {10.1145/3338499.3357362},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LongariPCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FerrettiPZ19,
  author       = {Pietro Ferretti and
                  Marcello Pogliani and
                  Stefano Zanero},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  Thorsten Holz},
  title        = {Characterizing Background Noise in {ICS} Traffic Through a Set of
                  Low Interaction Honeypots},
  booktitle    = {Proceedings of the {ACM} Workshop on Cyber-Physical Systems Security
                  {\&} Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019},
  pages        = {51--61},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338499.3357361},
  doi          = {10.1145/3338499.3357361},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/FerrettiPZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vnc/LongariCCZ19,
  author       = {Stefano Longari and
                  Andrea Cannizzo and
                  Michele Carminati and
                  Stefano Zanero},
  title        = {A Secure-by-Design Framework for Automotive On-board Network Risk
                  Analysis},
  booktitle    = {2019 {IEEE} Vehicular Networking Conference, {VNC} 2019, Los Angeles,
                  CA, USA, December 4-6, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/VNC48660.2019.9062783},
  doi          = {10.1109/VNC48660.2019.9062783},
  timestamp    = {Sun, 19 Apr 2020 11:03:20 +0200},
  biburl       = {https://dblp.org/rec/conf/vnc/LongariCCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-07487,
  author       = {Alessandro Erba and
                  Riccardo Taormina and
                  Stefano Galelli and
                  Marcello Pogliani and
                  Michele Carminati and
                  Stefano Zanero and
                  Nils Ole Tippenhauer},
  title        = {Real-time Evasion Attacks with Physical Constraints on Deep Learning-based
                  Anomaly Detectors in Industrial Control Systems},
  journal      = {CoRR},
  volume       = {abs/1907.07487},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.07487},
  eprinttype    = {arXiv},
  eprint       = {1907.07487},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-07487.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CarminatiPCLMZ18,
  author       = {Michele Carminati and
                  Mario Polino and
                  Andrea Continella and
                  Andrea Lanzi and
                  Federico Maggi and
                  Stefano Zanero},
  title        = {Security Evaluation of a Banking Fraud Analysis System},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {3},
  pages        = {11:1--11:31},
  year         = {2018},
  url          = {https://doi.org/10.1145/3178370},
  doi          = {10.1145/3178370},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CarminatiPCLMZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ViglianisiCPCZ18,
  author       = {Gabriele Viglianisi and
                  Michele Carminati and
                  Mario Polino and
                  Andrea Continella and
                  Stefano Zanero},
  editor       = {Jeffrey Todd McDonald and
                  S{\'{e}}bastien Bardin and
                  Natalia Stakhanova},
  title        = {SysTaint: Assisting Reversing of Malicious Network Communications},
  booktitle    = {Proceedings of the 8th Software Security, Protection, and Reverse
                  Engineering Workshop, San Juan, PR, USA, December 3-4, 2018},
  pages        = {4:1--4:12},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3289239.3289245},
  doi          = {10.1145/3289239.3289245},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ViglianisiCPCZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ContinellaPPZ18,
  author       = {Andrea Continella and
                  Mario Polino and
                  Marcello Pogliani and
                  Stefano Zanero},
  title        = {There's a Hole in that Bucket!: {A} Large-scale Analysis of Misconfigured
                  {S3} Buckets},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {702--711},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274736},
  doi          = {10.1145/3274694.3274736},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ContinellaPPZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/CarminatiBMSZ18,
  author       = {Michele Carminati and
                  Alessandro Baggio and
                  Federico Maggi and
                  Umberto Spagnolini and
                  Stefano Zanero},
  editor       = {Cristiano Giuffrida and
                  S{\'{e}}bastien Bardin and
                  Gregory Blanc},
  title        = {FraudBuster: Temporal Analysis and Detection of Advanced Financial
                  Frauds},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 15th International Conference, {DIMVA} 2018, Saclay, France, June
                  28-29, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10885},
  pages        = {211--233},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93411-2\_10},
  doi          = {10.1007/978-3-319-93411-2\_10},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/CarminatiBMSZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/NicolaoPPCQZ18,
  author       = {Pietro De Nicolao and
                  Marcello Pogliani and
                  Mario Polino and
                  Michele Carminati and
                  Davide Quarta and
                  Stefano Zanero},
  editor       = {Cristiano Giuffrida and
                  S{\'{e}}bastien Bardin and
                  Gregory Blanc},
  title        = {{ELISA:} ELiciting {ISA} of Raw Binaries for Fine-Grained Code and
                  Data Separation},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 15th International Conference, {DIMVA} 2018, Saclay, France, June
                  28-29, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10885},
  pages        = {351--371},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93411-2\_16},
  doi          = {10.1007/978-3-319-93411-2\_16},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/NicolaoPPCQZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/QuartaSCZ18,
  author       = {Davide Quarta and
                  Federico Salvioni and
                  Andrea Continella and
                  Stefano Zanero},
  editor       = {Cristiano Giuffrida and
                  S{\'{e}}bastien Bardin and
                  Gregory Blanc},
  title        = {Extended Abstract: Toward Systematically Exploring Antivirus Engines},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 15th International Conference, {DIMVA} 2018, Saclay, France, June
                  28-29, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10885},
  pages        = {393--403},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93411-2\_18},
  doi          = {10.1007/978-3-319-93411-2\_18},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/QuartaSCZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ieeesensors/Zanero18,
  author       = {Stefano Zanero},
  title        = {When Cyber Got Real: Challenges in Securing Cyber-Physical Systems},
  booktitle    = {2018 {IEEE} SENSORS, New Delhi, India, October 28-31, 2018},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICSENS.2018.8589798},
  doi          = {10.1109/ICSENS.2018.8589798},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ieeesensors/Zanero18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Zanero17,
  author       = {Stefano Zanero},
  title        = {Cyber-Physical Systems},
  journal      = {Computer},
  volume       = {50},
  number       = {4},
  pages        = {14--16},
  year         = {2017},
  url          = {https://doi.org/10.1109/MC.2017.105},
  doi          = {10.1109/MC.2017.105},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Zanero17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ContinellaCPLZM17,
  author       = {Andrea Continella and
                  Michele Carminati and
                  Mario Polino and
                  Andrea Lanzi and
                  Stefano Zanero and
                  Federico Maggi},
  title        = {Prometheus: Analyzing WebInject-based information stealers},
  journal      = {J. Comput. Secur.},
  volume       = {25},
  number       = {2},
  pages        = {117--137},
  year         = {2017},
  url          = {https://doi.org/10.3233/JCS-15773},
  doi          = {10.3233/JCS-15773},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ContinellaCPLZM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/CarminatiVZ17,
  author       = {Michele Carminati and
                  Luca Valentini and
                  Stefano Zanero},
  editor       = {Shlomi Dolev and
                  Sachin Lodha},
  title        = {A Supervised Auto-Tuning Approach for a Banking Fraud Detection System},
  booktitle    = {Cyber Security Cryptography and Machine Learning - First International
                  Conference, {CSCML} 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10332},
  pages        = {215--233},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60080-2\_17},
  doi          = {10.1007/978-3-319-60080-2\_17},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/CarminatiVZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/PolinoCMDFGZ17,
  author       = {Mario Polino and
                  Andrea Continella and
                  Sebastiano Mariani and
                  Stefano D'Alessio and
                  Lorenzo Fontana and
                  Fabio Gritti and
                  Stefano Zanero},
  editor       = {Michalis Polychronakis and
                  Michael Meier},
  title        = {Measuring and Defeating Anti-Instrumentation-Equipped Malware},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 14th International Conference, {DIMVA} 2017, Bonn, Germany, July
                  6-7, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10327},
  pages        = {73--96},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60876-1\_4},
  doi          = {10.1007/978-3-319-60876-1\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/PolinoCMDFGZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/PalancaEMZ17,
  author       = {Andrea Palanca and
                  Eric Evenchick and
                  Federico Maggi and
                  Stefano Zanero},
  editor       = {Michalis Polychronakis and
                  Michael Meier},
  title        = {A Stealth, Selective, Link-Layer Denial-of-Service Attack Against
                  Automotive Networks},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 14th International Conference, {DIMVA} 2017, Bonn, Germany, July
                  6-7, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10327},
  pages        = {185--206},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60876-1\_9},
  doi          = {10.1007/978-3-319-60876-1\_9},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/PalancaEMZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/QuartaPPMZZ17,
  author       = {Davide Quarta and
                  Marcello Pogliani and
                  Mario Polino and
                  Federico Maggi and
                  Andrea Maria Zanchettin and
                  Stefano Zanero},
  title        = {An Experimental Security Analysis of an Industrial Robot Controller},
  booktitle    = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
                  CA, USA, May 22-26, 2017},
  pages        = {268--286},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SP.2017.20},
  doi          = {10.1109/SP.2017.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/QuartaPPMZZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/NataleZ16,
  author       = {Giorgio Di Natale and
                  Stefano Zanero},
  title        = {Editorial},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {4},
  number       = {1},
  pages        = {33--34},
  year         = {2016},
  url          = {https://doi.org/10.1109/TETC.2016.2520798},
  doi          = {10.1109/TETC.2016.2520798},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetc/NataleZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ContinellaGZPBZ16,
  author       = {Andrea Continella and
                  Alessandro Guagnelli and
                  Giovanni Zingaro and
                  Giulio De Pasquale and
                  Alessandro Barenghi and
                  Stefano Zanero and
                  Federico Maggi},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {ShieldFS: a self-healing, ransomware-aware filesystem},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {336--347},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991110},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ContinellaGZPBZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhengPGZM16,
  author       = {Chengyu Zheng and
                  Mila Dalla Preda and
                  Jorge Granjal and
                  Stefano Zanero and
                  Federico Maggi},
  title        = {On-chip system call tracing: {A} feasibility study and open prototype},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {73--81},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860472},
  doi          = {10.1109/CNS.2016.7860472},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhengPGZM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MambrettiOMRKMZ16,
  author       = {Andrea Mambretti and
                  Kaan Onarlioglu and
                  Collin Mulliner and
                  William Robertson and
                  Engin Kirda and
                  Federico Maggi and
                  Stefano Zanero},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Trellis: Privilege Separation for Multi-user Applications Made Easy},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {437--456},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_20},
  doi          = {10.1007/978-3-319-45719-2\_20},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MambrettiOMRKMZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BazzoliCMZ16,
  author       = {Enrico Bazzoli and
                  Claudio Criscione and
                  Federico Maggi and
                  Stefano Zanero},
  editor       = {Jaap{-}Henk Hoepman and
                  Stefan Katzenbeisser},
  title        = {{XSS} {PEEKER:} Dissecting the {XSS} Exploitation Techniques and Fuzzing
                  Mechanisms of Blackbox Web Application Scanners},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 31st {IFIP} {TC} 11
                  International Conference, {SEC} 2016, Ghent, Belgium, May 30 - June
                  1, 2016, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {471},
  pages        = {243--258},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-33630-5\_17},
  doi          = {10.1007/978-3-319-33630-5\_17},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BazzoliCMZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ZhengDAZM16,
  author       = {Chengyu Zheng and
                  Nicola Dellarocca and
                  Niccol{\`{o}} Andronio and
                  Stefano Zanero and
                  Federico Maggi},
  editor       = {Robert H. Deng and
                  Jian Weng and
                  Kui Ren and
                  Vinod Yegneswaran},
  title        = {GreatEatlon: Fast, Static Detection of Mobile Ransomware},
  booktitle    = {Security and Privacy in Communication Networks - 12th International
                  Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016,
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {198},
  pages        = {617--636},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-59608-2\_34},
  doi          = {10.1007/978-3-319-59608-2\_34},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ZhengDAZM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CarminatiCMEZ15,
  author       = {Michele Carminati and
                  Roberto Caron and
                  Federico Maggi and
                  Ilenia Epifani and
                  Stefano Zanero},
  title        = {BankSealer: {A} decision support system for online banking fraud analysis
                  and investigation},
  journal      = {Comput. Secur.},
  volume       = {53},
  pages        = {175--186},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.04.002},
  doi          = {10.1016/J.COSE.2015.04.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CarminatiCMEZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ValdiLBQZM15,
  author       = {Andrea Valdi and
                  Eros Lever and
                  Simone Benefico and
                  Davide Quarta and
                  Stefano Zanero and
                  Federico Maggi},
  title        = {Scalable Testing of Mobile Antivirus Applications},
  journal      = {Computer},
  volume       = {48},
  number       = {11},
  pages        = {60--68},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.320},
  doi          = {10.1109/MC.2015.320},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ValdiLBQZM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FalsinaFZKVM15,
  author       = {Luca Falsina and
                  Yanick Fratantonio and
                  Stefano Zanero and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Federico Maggi},
  title        = {Grab 'n Run: Secure and Practical Dynamic Code Loading for Android
                  Applications},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {201--210},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818042},
  doi          = {10.1145/2818000.2818042},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/FalsinaFZKVM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GallinganiGVZ15,
  author       = {Daniele Gallingani and
                  Rigel Gjomemo and
                  V. N. Venkatakrishnan and
                  Stefano Zanero},
  editor       = {Jaehong Park and
                  Anna Cinzia Squicciarini},
  title        = {Practical Exploit Generation for Intent Message Vulnerabilities in
                  Android},
  booktitle    = {Proceedings of the 5th {ACM} Conference on Data and Application Security
                  and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},
  pages        = {155--157},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699026.2699132},
  doi          = {10.1145/2699026.2699132},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/GallinganiGVZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/PolinoSMZ15,
  author       = {Mario Polino and
                  Andrea Scorti and
                  Federico Maggi and
                  Stefano Zanero},
  editor       = {Magnus Almgren and
                  Vincenzo Gulisano and
                  Federico Maggi},
  title        = {Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of
                  Binaries},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 12th International Conference, {DIMVA} 2015, Milan, Italy, July
                  9-10, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9148},
  pages        = {121--143},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20550-2\_7},
  doi          = {10.1007/978-3-319-20550-2\_7},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/PolinoSMZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AndronioZM15,
  author       = {Nicol{\'{o}} Andronio and
                  Stefano Zanero and
                  Federico Maggi},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {HelDroid: Dissecting and Detecting Mobile Ransomware},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {382--404},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_18},
  doi          = {10.1007/978-3-319-26362-5\_18},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AndronioZM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/MaggiZM15,
  author       = {Federico Maggi and
                  Stefano Zanero and
                  Evangelos P. Markatos},
  title        = {European Cyber-Security Research and Innovation},
  journal      = {{ERCIM} News},
  volume       = {2015},
  number       = {100},
  year         = {2015},
  url          = {http://ercim-news.ercim.eu/en100/r-i/european-cyber-security-research-and-innovation},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/MaggiZM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/BratusALZ14,
  author       = {Sergey Bratus and
                  Iv{\'{a}}n Arce and
                  Michael E. Locasto and
                  Stefano Zanero},
  title        = {Why Offensive Security Needs Engineering Textbooks: Or, How to Avoid
                  a Replay of "Crypto Wars" in Security Research},
  journal      = {login Usenix Mag.},
  volume       = {39},
  number       = {4},
  year         = {2014},
  url          = {https://www.usenix.org/publications/login/august14/bratus},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/BratusALZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/BonettiVFMZ14,
  author       = {Gabriele Bonetti and
                  Marco Viglione and
                  Alessandro Frossi and
                  Federico Maggi and
                  Stefano Zanero},
  title        = {Black-box forensic and antiforensic characteristics of solid-state
                  drives},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {10},
  number       = {4},
  pages        = {255--271},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11416-014-0221-z},
  doi          = {10.1007/S11416-014-0221-Z},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/BonettiVFMZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/badgers/PolakisMZK14,
  author       = {Iasonas Polakis and
                  Federico Maggi and
                  Stefano Zanero and
                  Angelos D. Keromytis},
  title        = {Security and Privacy Measurements in Social Networks: Experiences
                  and Lessons Learned},
  booktitle    = {Third International Workshop on Building Analysis Datasets and Gathering
                  Experience Returns for Security, BADGERS@ESORICS 2014, Wroclaw, Poland,
                  September 11, 2014},
  pages        = {18--29},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/BADGERS.2014.9},
  doi          = {10.1109/BADGERS.2014.9},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/badgers/PolakisMZK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PolakisIMLKZIK14,
  author       = {Iasonas Polakis and
                  Panagiotis Ilia and
                  Federico Maggi and
                  Marco Lancini and
                  Georgios Kontaxis and
                  Stefano Zanero and
                  Sotiris Ioannidis and
                  Angelos D. Keromytis},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {501--512},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660317},
  doi          = {10.1145/2660267.2660317},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/PolakisIMLKZIK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/LindorferVSNAMPZI14,
  author       = {Martina Lindorfer and
                  Stamatis Volanis and
                  Alessandro Sisto and
                  Matthias Neugschwandtner and
                  Elias Athanasopoulos and
                  Federico Maggi and
                  Christian Platzer and
                  Stefano Zanero and
                  Sotiris Ioannidis},
  editor       = {Sven Dietrich},
  title        = {AndRadar: Fast Discovery of Android Applications in Alternative Markets},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  pages        = {51--71},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8\_4},
  doi          = {10.1007/978-3-319-08509-8\_4},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/LindorferVSNAMPZI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/SchiavoniMCZ14,
  author       = {Stefano Schiavoni and
                  Federico Maggi and
                  Lorenzo Cavallaro and
                  Stefano Zanero},
  editor       = {Sven Dietrich},
  title        = {Phoenix: DGA-Based Botnet Tracking and Intelligence},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  pages        = {192--211},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8\_11},
  doi          = {10.1007/978-3-319-08509-8\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/SchiavoniMCZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/SpagnuoloMZ14,
  author       = {Michele Spagnuolo and
                  Federico Maggi and
                  Stefano Zanero},
  editor       = {Nicolas Christin and
                  Reihaneh Safavi{-}Naini},
  title        = {BitIodine: Extracting Intelligence from the Bitcoin Network},
  booktitle    = {Financial Cryptography and Data Security - 18th International Conference,
                  {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {457--468},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45472-5\_29},
  doi          = {10.1007/978-3-662-45472-5\_29},
  timestamp    = {Tue, 21 Mar 2023 20:59:40 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/SpagnuoloMZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/AntoniniMZ14,
  author       = {Alessio Antonini and
                  Federico Maggi and
                  Stefano Zanero},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {A Practical Attack Against a KNX-based Building Automation System},
  booktitle    = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten,
                  Austria},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2014},
  url          = {http://ewic.bcs.org/content/ConWebDoc/53231},
  timestamp    = {Thu, 25 Aug 2016 11:36:27 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/AntoniniMZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/CriscioneBZM14,
  author       = {Claudio Criscione and
                  Fabio Bosatelli and
                  Stefano Zanero and
                  Federico Maggi},
  editor       = {Ali Miri and
                  Urs Hengartner and
                  Nen{-}Fu Huang and
                  Audun J{\o}sang and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {{ZARATHUSTRA:} Extracting Webinject signatures from banking trojans},
  booktitle    = {2014 Twelfth Annual International Conference on Privacy, Security
                  and Trust, Toronto, ON, Canada, July 23-24, 2014},
  pages        = {139--148},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/PST.2014.6890933},
  doi          = {10.1109/PST.2014.6890933},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/CriscioneBZM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/CarminatiCMEZ14,
  author       = {Michele Carminati and
                  Roberto Caron and
                  Federico Maggi and
                  Ilenia Epifani and
                  Stefano Zanero},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {BankSealer: An Online Banking Fraud Analysis and Decision Support
                  System},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {380--394},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_32},
  doi          = {10.1007/978-3-642-55415-5\_32},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/CarminatiCMEZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/NikiforakisMSRJKPVZ14,
  author       = {Nick Nikiforakis and
                  Federico Maggi and
                  Gianluca Stringhini and
                  M. Zubair Rafique and
                  Wouter Joosen and
                  Christopher Kruegel and
                  Frank Piessens and
                  Giovanni Vigna and
                  Stefano Zanero},
  editor       = {Chin{-}Wan Chung and
                  Andrei Z. Broder and
                  Kyuseok Shim and
                  Torsten Suel},
  title        = {Stranger danger: exploring the ecosystem of ad-based {URL} shortening
                  services},
  booktitle    = {23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic
                  of Korea, April 7-11, 2014},
  pages        = {51--62},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2566486.2567983},
  doi          = {10.1145/2566486.2567983},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/NikiforakisMSRJKPVZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GianazzaMFCZ14,
  author       = {Andrea Gianazza and
                  Federico Maggi and
                  Aristide Fattori and
                  Lorenzo Cavallaro and
                  Stefano Zanero},
  title        = {PuppetDroid: {A} User-Centric {UI} Exerciser for Automatic Dynamic
                  Analysis of Similar Android Applications},
  journal      = {CoRR},
  volume       = {abs/1402.4826},
  year         = {2014},
  url          = {http://arxiv.org/abs/1402.4826},
  eprinttype    = {arXiv},
  eprint       = {1402.4826},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GianazzaMFCZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BazzoliCMZ14,
  author       = {Enrico Bazzoli and
                  Claudio Criscione and
                  Federico Maggi and
                  Stefano Zanero},
  title        = {{XSS} Peeker: {A} Systematic Analysis of Cross-site Scripting Vulnerability
                  Scanners},
  journal      = {CoRR},
  volume       = {abs/1410.4207},
  year         = {2014},
  url          = {http://arxiv.org/abs/1410.4207},
  eprinttype    = {arXiv},
  eprint       = {1410.4207},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BazzoliCMZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/esl/DardanelliMTZSKH13,
  author       = {Andrea Dardanelli and
                  Federico Maggi and
                  Mara Tanelli and
                  Stefano Zanero and
                  Sergio M. Savaresi and
                  R. Kochanek and
                  Thorsten Holz},
  title        = {A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth},
  journal      = {{IEEE} Embed. Syst. Lett.},
  volume       = {5},
  number       = {3},
  pages        = {34--37},
  year         = {2013},
  url          = {https://doi.org/10.1109/LES.2013.2264594},
  doi          = {10.1109/LES.2013.2264594},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/esl/DardanelliMTZSKH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BonettiVFMZ13,
  author       = {Gabriele Bonetti and
                  Marco Viglione and
                  Alessandro Frossi and
                  Federico Maggi and
                  Stefano Zanero},
  editor       = {Charles N. Payne Jr.},
  title        = {A comprehensive black-box methodology for testing the forensic characteristics
                  of solid-state drives},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {269--278},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523660},
  doi          = {10.1145/2523649.2523660},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BonettiVFMZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MaggiVZ13,
  author       = {Federico Maggi and
                  Andrea Valdi and
                  Stefano Zanero},
  editor       = {William Enck and
                  Adrienne Porter Felt and
                  N. Asokan},
  title        = {AndroTotal: a flexible, scalable toolbox and service for testing mobile
                  malware detectors},
  booktitle    = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy
                  in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November
                  8, 2013, Berlin, Germany},
  pages        = {49--54},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516760.2516768},
  doi          = {10.1145/2516760.2516768},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MaggiVZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/MaggiFZSSKV13,
  author       = {Federico Maggi and
                  Alessandro Frossi and
                  Stefano Zanero and
                  Gianluca Stringhini and
                  Brett Stone{-}Gross and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Daniel Schwabe and
                  Virg{\'{\i}}lio A. F. Almeida and
                  Hartmut Glaser and
                  Ricardo Baeza{-}Yates and
                  Sue B. Moon},
  title        = {Two years of short URLs internet measurement: security threats and
                  countermeasures},
  booktitle    = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro,
                  Brazil, May 13-17, 2013},
  pages        = {861--872},
  publisher    = {International World Wide Web Conferences Steering Committee / {ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2488388.2488463},
  doi          = {10.1145/2488388.2488463},
  timestamp    = {Sun, 22 Sep 2019 18:15:38 +0200},
  biburl       = {https://dblp.org/rec/conf/www/MaggiFZSSKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SchiavoniMCZ13,
  author       = {Stefano Schiavoni and
                  Federico Maggi and
                  Lorenzo Cavallaro and
                  Stefano Zanero},
  title        = {Tracking and Characterizing Botnets Using Automatically Generated
                  Domains},
  journal      = {CoRR},
  volume       = {abs/1311.5612},
  year         = {2013},
  url          = {http://arxiv.org/abs/1311.5612},
  eprinttype    = {arXiv},
  eprint       = {1311.5612},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SchiavoniMCZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LindorferFMCZ12,
  author       = {Martina Lindorfer and
                  Alessandro Di Federico and
                  Federico Maggi and
                  Paolo Milani Comparetti and
                  Stefano Zanero},
  editor       = {Robert H'obbes' Zakon},
  title        = {Lines of malicious code: insights into the malicious software industry},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {349--358},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421001},
  doi          = {10.1145/2420950.2421001},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LindorferFMCZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PolakisLKMIKZ12,
  author       = {Iasonas Polakis and
                  Marco Lancini and
                  Georgios Kontaxis and
                  Federico Maggi and
                  Sotiris Ioannidis and
                  Angelos D. Keromytis and
                  Stefano Zanero},
  editor       = {Robert H'obbes' Zakon},
  title        = {All your face are belong to us: breaking Facebook's social authentication},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {399--408},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2421008},
  doi          = {10.1145/2420950.2421008},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PolakisLKMIKZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/SportielloZ12,
  author       = {Luigi Sportiello and
                  Stefano Zanero},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {Context-Based File Block Classification},
  booktitle    = {Advances in Digital Forensics {VIII} - 8th {IFIP} {WG} 11.9 International
                  Conference on Digital Forensics, Pretoria, South Africa, January 3-5,
                  2012, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {383},
  pages        = {67--82},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33962-2\_5},
  doi          = {10.1007/978-3-642-33962-2\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/SportielloZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/MaggiZ12,
  author       = {Federico Maggi and
                  Stefano Zanero},
  editor       = {Filip De Turck and
                  Luciano Paschoal Gaspary and
                  Deep Medhi},
  title        = {Integrated detection of anomalous behavior of computer infrastructures},
  booktitle    = {2012 {IEEE} Network Operations and Management Symposium, {NOMS} 2012,
                  Maui, HI, USA, April 16-20, 2012},
  pages        = {866--871},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/NOMS.2012.6212001},
  doi          = {10.1109/NOMS.2012.6212001},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/MaggiZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/ZaneroIM12,
  author       = {Stefano Zanero and
                  Sotiris Ioannidis and
                  Evangelos P. Markatos},
  title        = {i-Code: Real-Time Malicious Code Identification},
  journal      = {{ERCIM} News},
  volume       = {2012},
  number       = {90},
  year         = {2012},
  url          = {http://ercim-news.ercim.eu/en90/special/i-code-real-time-malicious-code-identification},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/ZaneroIM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SportielloZ11,
  author       = {Luigi Sportiello and
                  Stefano Zanero},
  title        = {File Block Classification by Support Vector Machine},
  booktitle    = {Sixth International Conference on Availability, Reliability and Security,
                  {ARES} 2011, Vienna, Austria, August 22-26, 2011},
  pages        = {307--312},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ARES.2011.52},
  doi          = {10.1109/ARES.2011.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SportielloZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/badgers/MaggiSZ11,
  author       = {Federico Maggi and
                  Alessandro Sisto and
                  Stefano Zanero},
  editor       = {Engin Kirda and
                  Thorsten Holz},
  title        = {A social-engineering-centric data collection initiative to study phishing},
  booktitle    = {Proceedings of the First Workshop on Building Analysis Datasets and
                  Gathering Experience Returns for Security, BADGERS@EuroSys 2011, Salzburg,
                  Austria, April 10, 2011},
  pages        = {107--108},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1978672.1978687},
  doi          = {10.1145/1978672.1978687},
  timestamp    = {Thu, 24 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/badgers/MaggiSZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MaggiVGBZ11,
  author       = {Stefano Maggi and
                  Alberto Volpatto and
                  Simone Gasparini and
                  Giacomo Boracchi and
                  Stefano Zanero},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Poster: fast, automatic iPhone shoulder surfing},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {805--808},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://dl.acm.org/citation.cfm?id=2093498},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MaggiVGBZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/MaggiZ11,
  author       = {Federico Maggi and
                  Stefano Zanero},
  title        = {Systems Security Research at Politecnico di Milano},
  booktitle    = {First SysSec Workshop 2011, SysSec@DIMVA 2011, Amsterdam, The Netherlands,
                  July 6, 2011},
  pages        = {127--130},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.ieeecomputersociety.org/10.1109/SysSec.2011.30},
  doi          = {10.1109/SYSSEC.2011.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/MaggiZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MaggiBSZ11,
  author       = {Federico Maggi and
                  Andrea Bellini and
                  Guido Salvaneschi and
                  Stefano Zanero},
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {Finding Non-trivial Malware Naming Inconsistencies},
  booktitle    = {Information Systems Security - 7th International Conference, {ICISS}
                  2011, Kolkata, India, December 15-19, 2011, Procedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {144--159},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25560-1\_10},
  doi          = {10.1007/978-3-642-25560-1\_10},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/MaggiBSZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/RovetaCMZMC11,
  author       = {Francesco Roveta and
                  Giorgio Caviglia and
                  Luca Di Mario and
                  Stefano Zanero and
                  Federico Maggi and
                  Paolo Ciuccarelli},
  title        = {{BURN:} baring unknown rogue networks},
  booktitle    = {8th International Symposium on Visualization for Cyber Security, VizSec
                  2011, Pittsburgh, PA, USA, July 20, 2011},
  pages        = {6},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2016904.2016910},
  doi          = {10.1145/2016904.2016910},
  timestamp    = {Wed, 24 Feb 2021 16:44:20 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/RovetaCMZMC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaggiMZ10,
  author       = {Federico Maggi and
                  Matteo Matteucci and
                  Stefano Zanero},
  title        = {Detecting Intrusions through System Call Sequence and Argument Analysis},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {7},
  number       = {4},
  pages        = {381--395},
  year         = {2010},
  url          = {https://doi.org/10.1109/TDSC.2008.69},
  doi          = {10.1109/TDSC.2008.69},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MaggiMZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/VolpattoMZ10,
  author       = {Alberto Volpatto and
                  Federico Maggi and
                  Stefano Zanero},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Effective Multimodel Anomaly Detection Using Cooperative Negotiation},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {180--191},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_12},
  doi          = {10.1007/978-3-642-17197-0\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/VolpattoMZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ComparettiSKKKZ10,
  author       = {Paolo Milani Comparetti and
                  Guido Salvaneschi and
                  Engin Kirda and
                  Clemens Kolbitsch and
                  Christopher Kruegel and
                  Stefano Zanero},
  title        = {Identifying Dormant Functionality in Malware Programs},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {61--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.12},
  doi          = {10.1109/SP.2010.12},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ComparettiSKKKZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Zanero09,
  author       = {Stefano Zanero},
  title        = {Wireless Malware Propagation: {A} Reality Check},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {7},
  number       = {5},
  pages        = {70--74},
  year         = {2009},
  url          = {https://doi.org/10.1109/MSP.2009.142},
  doi          = {10.1109/MSP.2009.142},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Zanero09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/MaggiMZ09,
  author       = {Federico Maggi and
                  Matteo Matteucci and
                  Stefano Zanero},
  title        = {Reducing false positives in anomaly detectors through fuzzy alert
                  aggregation},
  journal      = {Inf. Fusion},
  volume       = {10},
  number       = {4},
  pages        = {300--311},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.inffus.2009.01.004},
  doi          = {10.1016/J.INFFUS.2009.01.004},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/inffus/MaggiMZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/FrossiMRZ09,
  author       = {Alessandro Frossi and
                  Federico Maggi and
                  Gian Luigi Rizzo and
                  Stefano Zanero},
  editor       = {Ulrich Flegel and
                  Danilo Bruschi},
  title        = {Selecting and Improving System Call Models for Anomaly Detection},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  6th International Conference, {DIMVA} 2009, Como, Italy, July 9-10,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5587},
  pages        = {206--223},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02918-9\_13},
  doi          = {10.1007/978-3-642-02918-9\_13},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/FrossiMRZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/GalanteKZ09,
  author       = {Antonio Galante and
                  Ary Kokos and
                  Stefano Zanero},
  title        = {BlueBat: Towards Practical Bluetooth Honeypots},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2009, Dresden, Germany, 14-18 June 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICC.2009.5198796},
  doi          = {10.1109/ICC.2009.5198796},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/GalanteKZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcritis/ZaneroC08,
  author       = {Stefano Zanero and
                  Giuliano Casale},
  title        = {{GIVS:} integrity validation for grid security},
  journal      = {Int. J. Crit. Infrastructures},
  volume       = {4},
  number       = {3},
  pages        = {319--333},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJCIS.2008.017444},
  doi          = {10.1504/IJCIS.2008.017444},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcritis/ZaneroC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Zanero08,
  author       = {Stefano Zanero},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {ULISSE, a network intrusion detection system},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {20:1--20:4},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413163},
  doi          = {10.1145/1413140.1413163},
  timestamp    = {Wed, 31 Jan 2024 20:36:02 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Zanero08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/AltheideMZ08,
  author       = {Cory Altheide and
                  Claudio Merloni and
                  Stefano Zanero},
  editor       = {Herbert Bos and
                  Evangelos P. Markatos},
  title        = {A methodology for the repeatable forensic analysis of encrypted drives},
  booktitle    = {Proceedings of the First European Workshop on System Security, {EUROSEC}
                  2008, Glasgow, Scotland, UK, March 31, 2008},
  pages        = {22--26},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1355284.1355289},
  doi          = {10.1145/1355284.1355289},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosec/AltheideMZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iat/AmigoniBBZ08,
  author       = {Francesco Amigoni and
                  Fabrizio Basilico and
                  Nicola Basilico and
                  Stefano Zanero},
  title        = {Integrating Partial Models of Network Normality via Cooperative Negotiation:
                  An Approach to Development of Multiagent Intrusion Detection Systems},
  booktitle    = {Proceedings of the 2008 {IEEE/WIC/ACM} International Conference on
                  Intelligent Agent Technology, Sydney, NSW, Australia, December 9-12,
                  2008},
  pages        = {531--537},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/WIIAT.2008.323},
  doi          = {10.1109/WIIAT.2008.323},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iat/AmigoniBBZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/ZaneroS08,
  author       = {Stefano Zanero and
                  Giuseppe Serazzi},
  editor       = {Marcus Brunner and
                  Carlos Becker Westphall and
                  Lisandro Zambenedetti Granville},
  title        = {Unsupervised learning algorithms for intrusion detection},
  booktitle    = {{IEEE/IFIP} Network Operations and Management Symposium: Pervasive
                  Management for Ubioquitous Networks and Services, {NOMS} 2008, 7-11
                  April 2008, Salvador, Bahia, Brazil},
  pages        = {1043--1048},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/NOMS.2008.4575276},
  doi          = {10.1109/NOMS.2008.4575276},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/ZaneroS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CarettoniMZ07,
  author       = {Luca Carettoni and
                  Claudio Merloni and
                  Stefano Zanero},
  title        = {Studying Bluetooth Malware Propagation: The BlueBag Project},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {5},
  number       = {2},
  pages        = {17--25},
  year         = {2007},
  url          = {https://doi.org/10.1109/MSP.2007.43},
  doi          = {10.1109/MSP.2007.43},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CarettoniMZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MaggiZ07,
  author       = {Federico Maggi and
                  Stefano Zanero},
  editor       = {Christopher Kr{\"{u}}gel and
                  Richard Lippmann and
                  Andrew J. Clark},
  title        = {On the Use of Different Statistical Tests for Alert Correlation -
                  Short Paper},
  booktitle    = {Recent Advances in Intrusion Detection, 10th International Symposium,
                  {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4637},
  pages        = {167--177},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74320-0\_9},
  doi          = {10.1007/978-3-540-74320-0\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MaggiZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/it/Zanero06,
  author       = {Stefano Zanero},
  title        = {Unsupervised learning algorithms for intrusion detection},
  school       = {Polytechnic University of Milan, Italy},
  year         = {2006},
  url          = {https://opac.bncf.firenze.sbn.it/bncf-prod/resource?uri=BNI0025922},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/it/Zanero06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/FiliolHZ06,
  author       = {Eric Filiol and
                  Marko Helenius and
                  Stefano Zanero},
  title        = {Open Problems in Computer Virology},
  journal      = {J. Comput. Virol.},
  volume       = {1},
  number       = {3-4},
  pages        = {55--66},
  year         = {2006},
  url          = {https://doi.org/10.1007/s11416-005-0008-3},
  doi          = {10.1007/S11416-005-0008-3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/FiliolHZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/firb-perf/CasaleCSZ05,
  author       = {Giuliano Casale and
                  Paolo Cremonesi and
                  Giuseppe Serazzi and
                  Stefano Zanero},
  title        = {Performance Issues in Video Streaming Environments},
  booktitle    = {FIRB-Perf Workshop on Techniques, Methodologies and Tools for Performance
                  Evaluation of Complex Systems (FIRB-Perf 2005), 19 September 2005,
                  Torino, Italy},
  pages        = {3--14},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/FIRB-PERF.2005.14},
  doi          = {10.1109/FIRB-PERF.2005.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/firb-perf/CasaleCSZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/CasaleZ05,
  author       = {Giuliano Casale and
                  Stefano Zanero},
  editor       = {Vaidy S. Sunderam and
                  G. Dick van Albada and
                  Peter M. A. Sloot and
                  Jack J. Dongarra},
  title        = {{GIVS:} Integrity Validation for Grid Security},
  booktitle    = {Computational Science - {ICCS} 2005, 5th International Conference,
                  Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3516},
  pages        = {147--154},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11428862\_22},
  doi          = {10.1007/11428862\_22},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/CasaleZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciap/Zanero05,
  author       = {Stefano Zanero},
  editor       = {Fabio Roli and
                  Sergio Vitulano},
  title        = {Analyzing {TCP} Traffic Patterns Using Self Organizing Maps},
  booktitle    = {Image Analysis and Processing - {ICIAP} 2005, 13th International Conference,
                  Cagliari, Italy, September 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3617},
  pages        = {83--90},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11553595\_10},
  doi          = {10.1007/11553595\_10},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iciap/Zanero05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itrust/Zanero05,
  author       = {Stefano Zanero},
  editor       = {Peter Herrmann and
                  Val{\'{e}}rie Issarny and
                  Simon Shiu},
  title        = {Security and Trust in the Italian Legal Digital Signature Framework},
  booktitle    = {Trust Management, Third International Conference, iTrust 2005, Paris,
                  France, May 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3477},
  pages        = {34--44},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11429760\_3},
  doi          = {10.1007/11429760\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/itrust/Zanero05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/PerriZ04,
  author       = {Pierluigi Perri and
                  Stefano Zanero},
  title        = {Lessons learned from the Italian law on privacy - Part {I}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {20},
  number       = {4},
  pages        = {310--313},
  year         = {2004},
  url          = {https://doi.org/10.1016/S0267-3649(04)00054-8},
  doi          = {10.1016/S0267-3649(04)00054-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/PerriZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/PerriZ04a,
  author       = {Pierluigi Perri and
                  Stefano Zanero},
  title        = {Lessons learned from the Italian law on privacy - Part {II}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {20},
  number       = {5},
  pages        = {384--389},
  year         = {2004},
  url          = {https://doi.org/10.1016/S0267-3649(04)00069-X},
  doi          = {10.1016/S0267-3649(04)00069-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/PerriZ04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscis/Zanero04,
  author       = {Stefano Zanero},
  editor       = {Cevdet Aykanat and
                  Tugrul Dayar and
                  Ibrahim Korpeoglu},
  title        = {Behavioral Intrusion Detection},
  booktitle    = {Computer and Information Sciences - {ISCIS} 2004, 19th International
                  Symposium, Kemer-Antalya, Turkey, October 27-29, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3280},
  pages        = {657--666},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30182-0\_66},
  doi          = {10.1007/978-3-540-30182-0\_66},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iscis/Zanero04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/MuttoniCGZ04,
  author       = {Lorenzo Muttoni and
                  Giuliano Casale and
                  Federico Granata and
                  Stefano Zanero},
  title        = {Optimal Number of Nodes for Computation in Grid Environments},
  booktitle    = {12th Euromicro Workshop on Parallel, Distributed and Network-Based
                  Processing {(PDP} 2004), 11-13 February 2004, {A} Coruna, Spain},
  pages        = {282--289},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/EMPDP.2004.1271457},
  doi          = {10.1109/EMPDP.2004.1271457},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/MuttoniCGZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ZaneroS04,
  author       = {Stefano Zanero and
                  Sergio M. Savaresi},
  editor       = {Hisham Haddad and
                  Andrea Omicini and
                  Roger L. Wainwright and
                  Lorie M. Liebrock},
  title        = {Unsupervised learning techniques for an intrusion detection system},
  booktitle    = {Proceedings of the 2004 {ACM} Symposium on Applied Computing (SAC),
                  Nicosia, Cyprus, March 14-17, 2004},
  pages        = {412--419},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/967900.967988},
  doi          = {10.1145/967900.967988},
  timestamp    = {Tue, 06 Nov 2018 11:06:44 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/ZaneroS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mascots/SerazziZ03,
  author       = {Giuseppe Serazzi and
                  Stefano Zanero},
  editor       = {Mariacarla Calzarossa and
                  Erol Gelenbe},
  title        = {Computer Virus Propagation Models},
  booktitle    = {Performance Tools and Applications to Networked Systems, Revised Tutorial
                  Lectures [from {MASCOTS} 2003]},
  series       = {Lecture Notes in Computer Science},
  volume       = {2965},
  pages        = {26--50},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24663-3\_2},
  doi          = {10.1007/978-3-540-24663-3\_2},
  timestamp    = {Thu, 14 Oct 2021 10:33:31 +0200},
  biburl       = {https://dblp.org/rec/conf/mascots/SerazziZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics