Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Stefano Zanero
@article{DBLP:journals/corr/abs-2402-18516, author = {Raffaele Giuseppe Cestari and Stefano Longari and Stefano Zanero and Simone Formentin}, title = {Model Predictive Control with adaptive resilience for Denial-of-Service Attacks mitigation on a Regulated Dam}, journal = {CoRR}, volume = {abs/2402.18516}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.18516}, doi = {10.48550/ARXIV.2402.18516}, eprinttype = {arXiv}, eprint = {2402.18516}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-18516.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Zanero23, author = {Stefano Zanero}, title = {Coming of Age}, journal = {Commun. {ACM}}, volume = {66}, number = {9}, pages = {21--23}, year = {2023}, url = {https://doi.org/10.1145/3608965}, doi = {10.1145/3608965}, timestamp = {Fri, 20 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/Zanero23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NicheliniPLCZ23, author = {Alessandro Nichelini and Carlo Alberto Pozzoli and Stefano Longari and Michele Carminati and Stefano Zanero}, title = {CANova: {A} hybrid intrusion detection framework based on automatic signal classification for {CAN}}, journal = {Comput. Secur.}, volume = {128}, pages = {103166}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103166}, doi = {10.1016/J.COSE.2023.103166}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NicheliniPLCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BinosiPCZ23, author = {Lorenzo Binosi and Mario Polino and Michele Carminati and Stefano Zanero}, title = {{BINO:} Automatic recognition of inline binary functions from template classes}, journal = {Comput. Secur.}, volume = {132}, pages = {103312}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103312}, doi = {10.1016/J.COSE.2023.103312}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/BinosiPCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PaladiniMPCZ23, author = {Tommaso Paladini and Francesco Monti and Mario Polino and Michele Carminati and Stefano Zanero}, title = {Fraud Detection under Siege: Practical Poisoning Attacks and Defense Strategies}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {4}, pages = {45:1--45:35}, year = {2023}, url = {https://doi.org/10.1145/3613244}, doi = {10.1145/3613244}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/PaladiniMPCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/DanidouRSHZL23, author = {Yianna Danidou and Sara Ricci and Antonio F. Skarmeta and Jiri Hosek and Stefano Zanero and Imre Lendak}, title = {{DJM-CYBER:} {A} Joint Master in Advanced Cybersecurity}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {65:1--65:10}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3605002}, doi = {10.1145/3600160.3605002}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/DanidouRSHZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DOnghiaCGCPZ23, author = {Mario D'Onghia and Federico Di Cesare and Luigi Gallo and Michele Carminati and Mario Polino and Stefano Zanero}, editor = {Maura Pintor and Xinyun Chen and Florian Tram{\`{e}}r}, title = {Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors}, booktitle = {Proceedings of the 16th {ACM} Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023}, pages = {209--220}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605764.3623919}, doi = {10.1145/3605764.3623919}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DOnghiaCGCPZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/LongariPNCZ23, author = {Stefano Longari and Carlo Alberto Pozzoli and Alessandro Nichelini and Michele Carminati and Stefano Zanero}, editor = {Shlomi Dolev and Ehud Gudes and Pascal Paillier}, title = {CANdito: Improving Payload-Based Detection of Attacks on Controller Area Networks}, booktitle = {Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, {CSCML} 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13914}, pages = {135--150}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-34671-2\_10}, doi = {10.1007/978-3-031-34671-2\_10}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscml/LongariPNCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/TatulliPDCZ23, author = {Maria Paola Tatulli and Tommaso Paladini and Mario D'Onghia and Michele Carminati and Stefano Zanero}, editor = {Shlomi Dolev and Ehud Gudes and Pascal Paillier}, title = {{HAMLET:} {A} Transformer Based Approach for Money Laundering Detection}, booktitle = {Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, {CSCML} 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13914}, pages = {234--250}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-34671-2\_17}, doi = {10.1007/978-3-031-34671-2\_17}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscml/TatulliPDCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/LongariNCZ23, author = {Stefano Longari and Francesco Noseda and Michele Carminati and Stefano Zanero}, editor = {Shlomi Dolev and Ehud Gudes and Pascal Paillier}, title = {Evaluating the Robustness of Automotive Intrusion Detection Systems Against Evasion Attacks}, booktitle = {Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, {CSCML} 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13914}, pages = {337--352}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-34671-2\_24}, doi = {10.1007/978-3-031-34671-2\_24}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscml/LongariNCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/BertaniBBCZP23, author = {Alessandro Bertani and Marco Bonelli and Lorenzo Binosi and Michele Carminati and Stefano Zanero and Mario Polino}, editor = {Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati}, title = {Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 20th International Conference, {DIMVA} 2023, Hamburg, Germany, July 12-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13959}, pages = {256--275}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35504-2\_13}, doi = {10.1007/978-3-031-35504-2\_13}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/BertaniBBCZP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpram/BinosiRPCZ23, author = {Lorenzo Binosi and Luca Rullo and Mario Polino and Michele Carminati and Stefano Zanero}, editor = {Maria De Marsico and Gabriella Sanniti di Baja and Ana L. N. Fred}, title = {Rainfuzz: Reinforcement-Learning Driven Heat-Maps for Boosting Coverage-Guided Fuzzing}, booktitle = {Proceedings of the 12th International Conference on Pattern Recognition Applications and Methods, {ICPRAM} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {39--50}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0011625300003411}, doi = {10.5220/0011625300003411}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icpram/BinosiRPCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/AvanziLPCZTZ23, author = {Davide Avanzi and Stefano Longari and Mario Polino and Michele Carminati and Andrea Maria Zanchettin and Mara Tanelli and Stefano Zanero}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {Task Aware Intrusion Detection for Industrial Robots}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper03.pdf}, timestamp = {Thu, 21 Sep 2023 17:01:40 +0200}, biburl = {https://dblp.org/rec/conf/itasec/AvanziLPCZTZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/RemigioBPCZ23, author = {Riccardo Remigio and Alessandro Bertani and Mario Polino and Michele Carminati and Stefano Zanero}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {16--35}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_2}, doi = {10.1007/978-3-031-41326-1\_2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/RemigioBPCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkdd/PaladiniLCPTZ23, author = {Tommaso Paladini and Martino {Bernasconi de Luca} and Michele Carminati and Mario Polino and Francesco Trov{\`{o}} and Stefano Zanero}, editor = {Gianmarco De Francisci Morales and Claudia Perlich and Natali Ruchansky and Nicolas Kourtellis and Elena Baralis and Francesco Bonchi}, title = {Advancing Fraud Detection Systems Through Online Learning}, booktitle = {Machine Learning and Knowledge Discovery in Databases: Applied Data Science and Demo Track - European Conference, {ECML} {PKDD} 2023, Turin, Italy, September 18-22, 2023, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14174}, pages = {275--292}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43427-3\_17}, doi = {10.1007/978-3-031-43427-3\_17}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkdd/PaladiniLCPTZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qce/BellanteBVZ23, author = {Armando Bellante and William Bonvini and Stefano Vanerio and Stefano Zanero}, editor = {Brian La Cour and Lia Yeh and Marek Osinski}, title = {Quantum Eigenfaces: Linear Feature Mapping and Nearest Neighbor Classification with Outlier Detection}, booktitle = {{IEEE} International Conference on Quantum Computing and Engineering, {QCE} 2023, Bellevue, WA, USA, September 17-22, 2023}, pages = {196--207}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/QCE57702.2023.00030}, doi = {10.1109/QCE57702.2023.00030}, timestamp = {Fri, 15 Dec 2023 20:24:40 +0100}, biburl = {https://dblp.org/rec/conf/qce/BellanteBVZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LabancaPMPCZ22, author = {Danilo Labanca and Luca Primerano and Marcus Markland{-}Montgomery and Mario Polino and Michele Carminati and Stefano Zanero}, title = {Amaretto: An Active Learning Framework for Money Laundering Detection}, journal = {{IEEE} Access}, volume = {10}, pages = {41720--41739}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3167699}, doi = {10.1109/ACCESS.2022.3167699}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LabancaPMPCZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GalloroPCCZ22, author = {Nicola Galloro and Mario Polino and Michele Carminati and Andrea Continella and Stefano Zanero}, title = {A Systematical and longitudinal study of evasive behaviors in windows malware}, journal = {Comput. Secur.}, volume = {113}, pages = {102550}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102550}, doi = {10.1016/J.COSE.2021.102550}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GalloroPCCZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DOnghiaSNCPZ22, author = {Mario D'Onghia and Matteo Salvadore and Benedetto Maria Nespoli and Michele Carminati and Mario Polino and Stefano Zanero}, title = {Ap{\'{\i}}cula: Static detection of {API} calls in generic streams of bytes}, journal = {Comput. Secur.}, volume = {119}, pages = {102775}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102775}, doi = {10.1016/J.COSE.2022.102775}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DOnghiaSNCPZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qmi/BellanteLZ22, author = {Armando Bellante and Alessandro Luongo and Stefano Zanero}, title = {Quantum algorithms for SVD-based data representation and analysis}, journal = {Quantum Mach. Intell.}, volume = {4}, number = {2}, pages = {1--23}, year = {2022}, url = {https://doi.org/10.1007/s42484-022-00076-y}, doi = {10.1007/S42484-022-00076-Y}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/qmi/BellanteLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/MaffiolaLCTZ22, author = {Davide Maffiola and Stefano Longari and Michele Carminati and Mara Tanelli and Stefano Zanero}, title = {{GOLIATH:} {A} Decentralized Framework for Data Collection in Intelligent Transportation Systems}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {23}, number = {8}, pages = {13372--13385}, year = {2022}, url = {https://doi.org/10.1109/TITS.2021.3123824}, doi = {10.1109/TITS.2021.3123824}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/MaffiolaLCTZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TronLCPZ22, author = {Alvise de Faveri Tron and Stefano Longari and Michele Carminati and Mario Polino and Stefano Zanero}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {711--723}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560618}, doi = {10.1145/3548606.3560618}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TronLCPZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/RodriguezPCZ22, author = {Javier Fern{\'{a}}ndez Rodr{\'{\i}}guez and Michele Papale and Michele Carminati and Stefano Zanero}, editor = {Camil Demetrescu and Alessandro Mei}, title = {A Natural Language Processing Approach for Financial Fraud Detection}, booktitle = {Proceedings of the Italian Conference on Cybersecurity {(ITASEC} 2022), Rome, Italy, June 20-23, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3260}, pages = {135--149}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3260/paper10.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:11 +0100}, biburl = {https://dblp.org/rec/conf/itasec/RodriguezPCZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-06628, author = {Stefano Longari and Alessandro Nichelini and Carlo Alberto Pozzoli and Michele Carminati and Stefano Zanero}, title = {CANdito: Improving Payload-based Detection of Attacks on Controller Area Networks}, journal = {CoRR}, volume = {abs/2208.06628}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.06628}, doi = {10.48550/ARXIV.2208.06628}, eprinttype = {arXiv}, eprint = {2208.06628}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-06628.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-09557, author = {Alvise de Faveri Tron and Stefano Longari and Michele Carminati and Mario Polino and Stefano Zanero}, title = {CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks}, journal = {CoRR}, volume = {abs/2209.09557}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.09557}, doi = {10.48550/ARXIV.2209.09557}, eprinttype = {arXiv}, eprint = {2209.09557}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-09557.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/LongariVZCZ21, author = {Stefano Longari and Daniel Humberto Nova Valcarcel and Mattia Zago and Michele Carminati and Stefano Zanero}, title = {CANnolo: An Anomaly Detection System Based on {LSTM} Autoencoders for Controller Area Network}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {18}, number = {2}, pages = {1913--1924}, year = {2021}, url = {https://doi.org/10.1109/TNSM.2020.3038991}, doi = {10.1109/TNSM.2020.3038991}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/LongariVZCZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RuaroZDPBCZKV21, author = {Nicola Ruaro and Kyle Zeng and Lukas Dresel and Mario Polino and Tiffany Bao and Andrea Continella and Stefano Zanero and Christopher Kruegel and Giovanni Vigna}, editor = {Leyla Bilge and Tudor Dumitras}, title = {SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {456--468}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471865}, doi = {10.1145/3471621.3471865}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/RuaroZDPBCZKV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-08987, author = {Armando Bellante and Alessandro Luongo and Stefano Zanero}, title = {Quantum Algorithms for Data Representation and Analysis}, journal = {CoRR}, volume = {abs/2104.08987}, year = {2021}, url = {https://arxiv.org/abs/2104.08987}, eprinttype = {arXiv}, eprint = {2104.08987}, timestamp = {Tue, 27 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-08987.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ErbaTGPCZT20, author = {Alessandro Erba and Riccardo Taormina and Stefano Galelli and Marcello Pogliani and Michele Carminati and Stefano Zanero and Nils Ole Tippenhauer}, title = {Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {480--495}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427660}, doi = {10.1145/3427228.3427660}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ErbaTGPCZT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FerrariCPZ20, author = {Dario Ferrari and Michele Carminati and Mario Polino and Stefano Zanero}, title = {NoSQL Breakdown: {A} Large-scale Analysis of Misconfigured NoSQL Services}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {567--581}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427260}, doi = {10.1145/3427228.3427260}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/FerrariCPZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PoglianiMBQZ20, author = {Marcello Pogliani and Federico Maggi and Marco Balduzzi and Davide Quarta and Stefano Zanero}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {Detecting Insecure Code Patterns in Industrial Robot Programs}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {759--771}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384735}, doi = {10.1145/3320269.3384735}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PoglianiMBQZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ism2/MaggiBVRQTPQZ20, author = {Federico Maggi and Marco Balduzzi and Rainer Vosseler and Martin R{\"{o}}sler and Walter Quadrini and Giacomo Tavola and Marcello Pogliani and Davide Quarta and Stefano Zanero}, editor = {Francesco Longo and Michael Affenzeller and Antonio Padovano}, title = {Smart Factory Security: {A} Case Study on a Modular Smart Manufacturing System}, booktitle = {Proceedings of the 2nd International Conference on Industry 4.0 and Smart Manufacturing {(ISM} 2020), Virtual Event, Austria, 23-25 November 2020}, series = {Procedia Computer Science}, volume = {180}, pages = {666--675}, publisher = {Elsevier}, year = {2020}, url = {https://doi.org/10.1016/j.procs.2021.01.289}, doi = {10.1016/J.PROCS.2021.01.289}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ism2/MaggiBVRQTPQZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CarminatiSPZ20, author = {Michele Carminati and Luca Santini and Mario Polino and Stefano Zanero}, editor = {Manuel Egele and Leyla Bilge}, title = {Evasion Attacks against Banking Fraud Detection Systems}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {285--300}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/carminati}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/raid/CarminatiSPZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/PoglianiQPVMZ19, author = {Marcello Pogliani and Davide Quarta and Mario Polino and Martino Vittone and Federico Maggi and Stefano Zanero}, title = {Security of controlled manufacturing systems in the connected factory: the case of industrial robots}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {15}, number = {3}, pages = {161--175}, year = {2019}, url = {https://doi.org/10.1007/s11416-019-00329-8}, doi = {10.1007/S11416-019-00329-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/PoglianiQPVMZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LongariPCZ19, author = {Stefano Longari and Matteo Penco and Michele Carminati and Stefano Zanero}, editor = {Lorenzo Cavallaro and Johannes Kinder and Thorsten Holz}, title = {CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network}, booktitle = {Proceedings of the {ACM} Workshop on Cyber-Physical Systems Security {\&} Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019}, pages = {39--50}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338499.3357362}, doi = {10.1145/3338499.3357362}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LongariPCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FerrettiPZ19, author = {Pietro Ferretti and Marcello Pogliani and Stefano Zanero}, editor = {Lorenzo Cavallaro and Johannes Kinder and Thorsten Holz}, title = {Characterizing Background Noise in {ICS} Traffic Through a Set of Low Interaction Honeypots}, booktitle = {Proceedings of the {ACM} Workshop on Cyber-Physical Systems Security {\&} Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019}, pages = {51--61}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338499.3357361}, doi = {10.1145/3338499.3357361}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FerrettiPZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vnc/LongariCCZ19, author = {Stefano Longari and Andrea Cannizzo and Michele Carminati and Stefano Zanero}, title = {A Secure-by-Design Framework for Automotive On-board Network Risk Analysis}, booktitle = {2019 {IEEE} Vehicular Networking Conference, {VNC} 2019, Los Angeles, CA, USA, December 4-6, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/VNC48660.2019.9062783}, doi = {10.1109/VNC48660.2019.9062783}, timestamp = {Sun, 19 Apr 2020 11:03:20 +0200}, biburl = {https://dblp.org/rec/conf/vnc/LongariCCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-07487, author = {Alessandro Erba and Riccardo Taormina and Stefano Galelli and Marcello Pogliani and Michele Carminati and Stefano Zanero and Nils Ole Tippenhauer}, title = {Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems}, journal = {CoRR}, volume = {abs/1907.07487}, year = {2019}, url = {http://arxiv.org/abs/1907.07487}, eprinttype = {arXiv}, eprint = {1907.07487}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-07487.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CarminatiPCLMZ18, author = {Michele Carminati and Mario Polino and Andrea Continella and Andrea Lanzi and Federico Maggi and Stefano Zanero}, title = {Security Evaluation of a Banking Fraud Analysis System}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {3}, pages = {11:1--11:31}, year = {2018}, url = {https://doi.org/10.1145/3178370}, doi = {10.1145/3178370}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CarminatiPCLMZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ViglianisiCPCZ18, author = {Gabriele Viglianisi and Michele Carminati and Mario Polino and Andrea Continella and Stefano Zanero}, editor = {Jeffrey Todd McDonald and S{\'{e}}bastien Bardin and Natalia Stakhanova}, title = {SysTaint: Assisting Reversing of Malicious Network Communications}, booktitle = {Proceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop, San Juan, PR, USA, December 3-4, 2018}, pages = {4:1--4:12}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3289239.3289245}, doi = {10.1145/3289239.3289245}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ViglianisiCPCZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ContinellaPPZ18, author = {Andrea Continella and Mario Polino and Marcello Pogliani and Stefano Zanero}, title = {There's a Hole in that Bucket!: {A} Large-scale Analysis of Misconfigured {S3} Buckets}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {702--711}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274736}, doi = {10.1145/3274694.3274736}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ContinellaPPZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/CarminatiBMSZ18, author = {Michele Carminati and Alessandro Baggio and Federico Maggi and Umberto Spagnolini and Stefano Zanero}, editor = {Cristiano Giuffrida and S{\'{e}}bastien Bardin and Gregory Blanc}, title = {FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, {DIMVA} 2018, Saclay, France, June 28-29, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10885}, pages = {211--233}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93411-2\_10}, doi = {10.1007/978-3-319-93411-2\_10}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/CarminatiBMSZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/NicolaoPPCQZ18, author = {Pietro De Nicolao and Marcello Pogliani and Mario Polino and Michele Carminati and Davide Quarta and Stefano Zanero}, editor = {Cristiano Giuffrida and S{\'{e}}bastien Bardin and Gregory Blanc}, title = {{ELISA:} ELiciting {ISA} of Raw Binaries for Fine-Grained Code and Data Separation}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, {DIMVA} 2018, Saclay, France, June 28-29, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10885}, pages = {351--371}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93411-2\_16}, doi = {10.1007/978-3-319-93411-2\_16}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/NicolaoPPCQZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/QuartaSCZ18, author = {Davide Quarta and Federico Salvioni and Andrea Continella and Stefano Zanero}, editor = {Cristiano Giuffrida and S{\'{e}}bastien Bardin and Gregory Blanc}, title = {Extended Abstract: Toward Systematically Exploring Antivirus Engines}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, {DIMVA} 2018, Saclay, France, June 28-29, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10885}, pages = {393--403}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93411-2\_18}, doi = {10.1007/978-3-319-93411-2\_18}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/QuartaSCZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ieeesensors/Zanero18, author = {Stefano Zanero}, title = {When Cyber Got Real: Challenges in Securing Cyber-Physical Systems}, booktitle = {2018 {IEEE} SENSORS, New Delhi, India, October 28-31, 2018}, pages = {1--4}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICSENS.2018.8589798}, doi = {10.1109/ICSENS.2018.8589798}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ieeesensors/Zanero18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Zanero17, author = {Stefano Zanero}, title = {Cyber-Physical Systems}, journal = {Computer}, volume = {50}, number = {4}, pages = {14--16}, year = {2017}, url = {https://doi.org/10.1109/MC.2017.105}, doi = {10.1109/MC.2017.105}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Zanero17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ContinellaCPLZM17, author = {Andrea Continella and Michele Carminati and Mario Polino and Andrea Lanzi and Stefano Zanero and Federico Maggi}, title = {Prometheus: Analyzing WebInject-based information stealers}, journal = {J. Comput. Secur.}, volume = {25}, number = {2}, pages = {117--137}, year = {2017}, url = {https://doi.org/10.3233/JCS-15773}, doi = {10.3233/JCS-15773}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ContinellaCPLZM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/CarminatiVZ17, author = {Michele Carminati and Luca Valentini and Stefano Zanero}, editor = {Shlomi Dolev and Sachin Lodha}, title = {A Supervised Auto-Tuning Approach for a Banking Fraud Detection System}, booktitle = {Cyber Security Cryptography and Machine Learning - First International Conference, {CSCML} 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10332}, pages = {215--233}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60080-2\_17}, doi = {10.1007/978-3-319-60080-2\_17}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscml/CarminatiVZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/PolinoCMDFGZ17, author = {Mario Polino and Andrea Continella and Sebastiano Mariani and Stefano D'Alessio and Lorenzo Fontana and Fabio Gritti and Stefano Zanero}, editor = {Michalis Polychronakis and Michael Meier}, title = {Measuring and Defeating Anti-Instrumentation-Equipped Malware}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, {DIMVA} 2017, Bonn, Germany, July 6-7, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10327}, pages = {73--96}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60876-1\_4}, doi = {10.1007/978-3-319-60876-1\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/PolinoCMDFGZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/PalancaEMZ17, author = {Andrea Palanca and Eric Evenchick and Federico Maggi and Stefano Zanero}, editor = {Michalis Polychronakis and Michael Meier}, title = {A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, {DIMVA} 2017, Bonn, Germany, July 6-7, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10327}, pages = {185--206}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60876-1\_9}, doi = {10.1007/978-3-319-60876-1\_9}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/PalancaEMZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/QuartaPPMZZ17, author = {Davide Quarta and Marcello Pogliani and Mario Polino and Federico Maggi and Andrea Maria Zanchettin and Stefano Zanero}, title = {An Experimental Security Analysis of an Industrial Robot Controller}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {268--286}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.20}, doi = {10.1109/SP.2017.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/QuartaPPMZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/NataleZ16, author = {Giorgio Di Natale and Stefano Zanero}, title = {Editorial}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {4}, number = {1}, pages = {33--34}, year = {2016}, url = {https://doi.org/10.1109/TETC.2016.2520798}, doi = {10.1109/TETC.2016.2520798}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/NataleZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ContinellaGZPBZ16, author = {Andrea Continella and Alessandro Guagnelli and Giovanni Zingaro and Giulio De Pasquale and Alessandro Barenghi and Stefano Zanero and Federico Maggi}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {ShieldFS: a self-healing, ransomware-aware filesystem}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {336--347}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991110}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ContinellaGZPBZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhengPGZM16, author = {Chengyu Zheng and Mila Dalla Preda and Jorge Granjal and Stefano Zanero and Federico Maggi}, title = {On-chip system call tracing: {A} feasibility study and open prototype}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {73--81}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860472}, doi = {10.1109/CNS.2016.7860472}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhengPGZM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MambrettiOMRKMZ16, author = {Andrea Mambretti and Kaan Onarlioglu and Collin Mulliner and William Robertson and Engin Kirda and Federico Maggi and Stefano Zanero}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Trellis: Privilege Separation for Multi-user Applications Made Easy}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {437--456}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_20}, doi = {10.1007/978-3-319-45719-2\_20}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MambrettiOMRKMZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BazzoliCMZ16, author = {Enrico Bazzoli and Claudio Criscione and Federico Maggi and Stefano Zanero}, editor = {Jaap{-}Henk Hoepman and Stefan Katzenbeisser}, title = {{XSS} {PEEKER:} Dissecting the {XSS} Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners}, booktitle = {{ICT} Systems Security and Privacy Protection - 31st {IFIP} {TC} 11 International Conference, {SEC} 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {471}, pages = {243--258}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-33630-5\_17}, doi = {10.1007/978-3-319-33630-5\_17}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BazzoliCMZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ZhengDAZM16, author = {Chengyu Zheng and Nicola Dellarocca and Niccol{\`{o}} Andronio and Stefano Zanero and Federico Maggi}, editor = {Robert H. Deng and Jian Weng and Kui Ren and Vinod Yegneswaran}, title = {GreatEatlon: Fast, Static Detection of Mobile Ransomware}, booktitle = {Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {198}, pages = {617--636}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-59608-2\_34}, doi = {10.1007/978-3-319-59608-2\_34}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ZhengDAZM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CarminatiCMEZ15, author = {Michele Carminati and Roberto Caron and Federico Maggi and Ilenia Epifani and Stefano Zanero}, title = {BankSealer: {A} decision support system for online banking fraud analysis and investigation}, journal = {Comput. Secur.}, volume = {53}, pages = {175--186}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.04.002}, doi = {10.1016/J.COSE.2015.04.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CarminatiCMEZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ValdiLBQZM15, author = {Andrea Valdi and Eros Lever and Simone Benefico and Davide Quarta and Stefano Zanero and Federico Maggi}, title = {Scalable Testing of Mobile Antivirus Applications}, journal = {Computer}, volume = {48}, number = {11}, pages = {60--68}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.320}, doi = {10.1109/MC.2015.320}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ValdiLBQZM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FalsinaFZKVM15, author = {Luca Falsina and Yanick Fratantonio and Stefano Zanero and Christopher Kruegel and Giovanni Vigna and Federico Maggi}, title = {Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {201--210}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818042}, doi = {10.1145/2818000.2818042}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/FalsinaFZKVM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/GallinganiGVZ15, author = {Daniele Gallingani and Rigel Gjomemo and V. N. Venkatakrishnan and Stefano Zanero}, editor = {Jaehong Park and Anna Cinzia Squicciarini}, title = {Practical Exploit Generation for Intent Message Vulnerabilities in Android}, booktitle = {Proceedings of the 5th {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015}, pages = {155--157}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2699026.2699132}, doi = {10.1145/2699026.2699132}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/GallinganiGVZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/PolinoSMZ15, author = {Mario Polino and Andrea Scorti and Federico Maggi and Stefano Zanero}, editor = {Magnus Almgren and Vincenzo Gulisano and Federico Maggi}, title = {Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, {DIMVA} 2015, Milan, Italy, July 9-10, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9148}, pages = {121--143}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20550-2\_7}, doi = {10.1007/978-3-319-20550-2\_7}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/PolinoSMZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AndronioZM15, author = {Nicol{\'{o}} Andronio and Stefano Zanero and Federico Maggi}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {HelDroid: Dissecting and Detecting Mobile Ransomware}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {382--404}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_18}, doi = {10.1007/978-3-319-26362-5\_18}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/AndronioZM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/MaggiZM15, author = {Federico Maggi and Stefano Zanero and Evangelos P. Markatos}, title = {European Cyber-Security Research and Innovation}, journal = {{ERCIM} News}, volume = {2015}, number = {100}, year = {2015}, url = {http://ercim-news.ercim.eu/en100/r-i/european-cyber-security-research-and-innovation}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/MaggiZM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/BratusALZ14, author = {Sergey Bratus and Iv{\'{a}}n Arce and Michael E. Locasto and Stefano Zanero}, title = {Why Offensive Security Needs Engineering Textbooks: Or, How to Avoid a Replay of "Crypto Wars" in Security Research}, journal = {login Usenix Mag.}, volume = {39}, number = {4}, year = {2014}, url = {https://www.usenix.org/publications/login/august14/bratus}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/BratusALZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/BonettiVFMZ14, author = {Gabriele Bonetti and Marco Viglione and Alessandro Frossi and Federico Maggi and Stefano Zanero}, title = {Black-box forensic and antiforensic characteristics of solid-state drives}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {10}, number = {4}, pages = {255--271}, year = {2014}, url = {https://doi.org/10.1007/s11416-014-0221-z}, doi = {10.1007/S11416-014-0221-Z}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/BonettiVFMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/badgers/PolakisMZK14, author = {Iasonas Polakis and Federico Maggi and Stefano Zanero and Angelos D. Keromytis}, title = {Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned}, booktitle = {Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS@ESORICS 2014, Wroclaw, Poland, September 11, 2014}, pages = {18--29}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/BADGERS.2014.9}, doi = {10.1109/BADGERS.2014.9}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/badgers/PolakisMZK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PolakisIMLKZIK14, author = {Iasonas Polakis and Panagiotis Ilia and Federico Maggi and Marco Lancini and Georgios Kontaxis and Stefano Zanero and Sotiris Ioannidis and Angelos D. Keromytis}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {501--512}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660317}, doi = {10.1145/2660267.2660317}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PolakisIMLKZIK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/LindorferVSNAMPZI14, author = {Martina Lindorfer and Stamatis Volanis and Alessandro Sisto and Matthias Neugschwandtner and Elias Athanasopoulos and Federico Maggi and Christian Platzer and Stefano Zanero and Sotiris Ioannidis}, editor = {Sven Dietrich}, title = {AndRadar: Fast Discovery of Android Applications in Alternative Markets}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8550}, pages = {51--71}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08509-8\_4}, doi = {10.1007/978-3-319-08509-8\_4}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/LindorferVSNAMPZI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/SchiavoniMCZ14, author = {Stefano Schiavoni and Federico Maggi and Lorenzo Cavallaro and Stefano Zanero}, editor = {Sven Dietrich}, title = {Phoenix: DGA-Based Botnet Tracking and Intelligence}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8550}, pages = {192--211}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08509-8\_11}, doi = {10.1007/978-3-319-08509-8\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/SchiavoniMCZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/SpagnuoloMZ14, author = {Michele Spagnuolo and Federico Maggi and Stefano Zanero}, editor = {Nicolas Christin and Reihaneh Safavi{-}Naini}, title = {BitIodine: Extracting Intelligence from the Bitcoin Network}, booktitle = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8437}, pages = {457--468}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45472-5\_29}, doi = {10.1007/978-3-662-45472-5\_29}, timestamp = {Tue, 21 Mar 2023 20:59:40 +0100}, biburl = {https://dblp.org/rec/conf/fc/SpagnuoloMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/AntoniniMZ14, author = {Alessio Antonini and Federico Maggi and Stefano Zanero}, editor = {Helge Janicke and Kevin I. Jones}, title = {A Practical Attack Against a KNX-based Building Automation System}, booktitle = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten, Austria}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2014}, url = {http://ewic.bcs.org/content/ConWebDoc/53231}, timestamp = {Thu, 25 Aug 2016 11:36:27 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/AntoniniMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/CriscioneBZM14, author = {Claudio Criscione and Fabio Bosatelli and Stefano Zanero and Federico Maggi}, editor = {Ali Miri and Urs Hengartner and Nen{-}Fu Huang and Audun J{\o}sang and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {{ZARATHUSTRA:} Extracting Webinject signatures from banking trojans}, booktitle = {2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014}, pages = {139--148}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PST.2014.6890933}, doi = {10.1109/PST.2014.6890933}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/CriscioneBZM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/CarminatiCMEZ14, author = {Michele Carminati and Roberto Caron and Federico Maggi and Ilenia Epifani and Stefano Zanero}, editor = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Anas Abou El Kalam and Thierry Sans}, title = {BankSealer: An Online Banking Fraud Analysis and Decision Support System}, booktitle = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11 International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {428}, pages = {380--394}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55415-5\_32}, doi = {10.1007/978-3-642-55415-5\_32}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/CarminatiCMEZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/NikiforakisMSRJKPVZ14, author = {Nick Nikiforakis and Federico Maggi and Gianluca Stringhini and M. Zubair Rafique and Wouter Joosen and Christopher Kruegel and Frank Piessens and Giovanni Vigna and Stefano Zanero}, editor = {Chin{-}Wan Chung and Andrei Z. Broder and Kyuseok Shim and Torsten Suel}, title = {Stranger danger: exploring the ecosystem of ad-based {URL} shortening services}, booktitle = {23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic of Korea, April 7-11, 2014}, pages = {51--62}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2566486.2567983}, doi = {10.1145/2566486.2567983}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/NikiforakisMSRJKPVZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GianazzaMFCZ14, author = {Andrea Gianazza and Federico Maggi and Aristide Fattori and Lorenzo Cavallaro and Stefano Zanero}, title = {PuppetDroid: {A} User-Centric {UI} Exerciser for Automatic Dynamic Analysis of Similar Android Applications}, journal = {CoRR}, volume = {abs/1402.4826}, year = {2014}, url = {http://arxiv.org/abs/1402.4826}, eprinttype = {arXiv}, eprint = {1402.4826}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GianazzaMFCZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BazzoliCMZ14, author = {Enrico Bazzoli and Claudio Criscione and Federico Maggi and Stefano Zanero}, title = {{XSS} Peeker: {A} Systematic Analysis of Cross-site Scripting Vulnerability Scanners}, journal = {CoRR}, volume = {abs/1410.4207}, year = {2014}, url = {http://arxiv.org/abs/1410.4207}, eprinttype = {arXiv}, eprint = {1410.4207}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BazzoliCMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/esl/DardanelliMTZSKH13, author = {Andrea Dardanelli and Federico Maggi and Mara Tanelli and Stefano Zanero and Sergio M. Savaresi and R. Kochanek and Thorsten Holz}, title = {A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth}, journal = {{IEEE} Embed. Syst. Lett.}, volume = {5}, number = {3}, pages = {34--37}, year = {2013}, url = {https://doi.org/10.1109/LES.2013.2264594}, doi = {10.1109/LES.2013.2264594}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/esl/DardanelliMTZSKH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BonettiVFMZ13, author = {Gabriele Bonetti and Marco Viglione and Alessandro Frossi and Federico Maggi and Stefano Zanero}, editor = {Charles N. Payne Jr.}, title = {A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {269--278}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523660}, doi = {10.1145/2523649.2523660}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BonettiVFMZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MaggiVZ13, author = {Federico Maggi and Andrea Valdi and Stefano Zanero}, editor = {William Enck and Adrienne Porter Felt and N. Asokan}, title = {AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors}, booktitle = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany}, pages = {49--54}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2516760.2516768}, doi = {10.1145/2516760.2516768}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MaggiVZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/MaggiFZSSKV13, author = {Federico Maggi and Alessandro Frossi and Stefano Zanero and Gianluca Stringhini and Brett Stone{-}Gross and Christopher Kruegel and Giovanni Vigna}, editor = {Daniel Schwabe and Virg{\'{\i}}lio A. F. Almeida and Hartmut Glaser and Ricardo Baeza{-}Yates and Sue B. Moon}, title = {Two years of short URLs internet measurement: security threats and countermeasures}, booktitle = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro, Brazil, May 13-17, 2013}, pages = {861--872}, publisher = {International World Wide Web Conferences Steering Committee / {ACM}}, year = {2013}, url = {https://doi.org/10.1145/2488388.2488463}, doi = {10.1145/2488388.2488463}, timestamp = {Sun, 22 Sep 2019 18:15:38 +0200}, biburl = {https://dblp.org/rec/conf/www/MaggiFZSSKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SchiavoniMCZ13, author = {Stefano Schiavoni and Federico Maggi and Lorenzo Cavallaro and Stefano Zanero}, title = {Tracking and Characterizing Botnets Using Automatically Generated Domains}, journal = {CoRR}, volume = {abs/1311.5612}, year = {2013}, url = {http://arxiv.org/abs/1311.5612}, eprinttype = {arXiv}, eprint = {1311.5612}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SchiavoniMCZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LindorferFMCZ12, author = {Martina Lindorfer and Alessandro Di Federico and Federico Maggi and Paolo Milani Comparetti and Stefano Zanero}, editor = {Robert H'obbes' Zakon}, title = {Lines of malicious code: insights into the malicious software industry}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {349--358}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421001}, doi = {10.1145/2420950.2421001}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LindorferFMCZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PolakisLKMIKZ12, author = {Iasonas Polakis and Marco Lancini and Georgios Kontaxis and Federico Maggi and Sotiris Ioannidis and Angelos D. Keromytis and Stefano Zanero}, editor = {Robert H'obbes' Zakon}, title = {All your face are belong to us: breaking Facebook's social authentication}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {399--408}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2421008}, doi = {10.1145/2420950.2421008}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PolakisLKMIKZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/SportielloZ12, author = {Luigi Sportiello and Stefano Zanero}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Context-Based File Block Classification}, booktitle = {Advances in Digital Forensics {VIII} - 8th {IFIP} {WG} 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {383}, pages = {67--82}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33962-2\_5}, doi = {10.1007/978-3-642-33962-2\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/SportielloZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/MaggiZ12, author = {Federico Maggi and Stefano Zanero}, editor = {Filip De Turck and Luciano Paschoal Gaspary and Deep Medhi}, title = {Integrated detection of anomalous behavior of computer infrastructures}, booktitle = {2012 {IEEE} Network Operations and Management Symposium, {NOMS} 2012, Maui, HI, USA, April 16-20, 2012}, pages = {866--871}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/NOMS.2012.6212001}, doi = {10.1109/NOMS.2012.6212001}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/MaggiZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/ZaneroIM12, author = {Stefano Zanero and Sotiris Ioannidis and Evangelos P. Markatos}, title = {i-Code: Real-Time Malicious Code Identification}, journal = {{ERCIM} News}, volume = {2012}, number = {90}, year = {2012}, url = {http://ercim-news.ercim.eu/en90/special/i-code-real-time-malicious-code-identification}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/ZaneroIM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SportielloZ11, author = {Luigi Sportiello and Stefano Zanero}, title = {File Block Classification by Support Vector Machine}, booktitle = {Sixth International Conference on Availability, Reliability and Security, {ARES} 2011, Vienna, Austria, August 22-26, 2011}, pages = {307--312}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ARES.2011.52}, doi = {10.1109/ARES.2011.52}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/SportielloZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/badgers/MaggiSZ11, author = {Federico Maggi and Alessandro Sisto and Stefano Zanero}, editor = {Engin Kirda and Thorsten Holz}, title = {A social-engineering-centric data collection initiative to study phishing}, booktitle = {Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS@EuroSys 2011, Salzburg, Austria, April 10, 2011}, pages = {107--108}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1978672.1978687}, doi = {10.1145/1978672.1978687}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/badgers/MaggiSZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MaggiVGBZ11, author = {Stefano Maggi and Alberto Volpatto and Simone Gasparini and Giacomo Boracchi and Stefano Zanero}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Poster: fast, automatic iPhone shoulder surfing}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {805--808}, publisher = {{ACM}}, year = {2011}, url = {https://dl.acm.org/citation.cfm?id=2093498}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MaggiVGBZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/MaggiZ11, author = {Federico Maggi and Stefano Zanero}, title = {Systems Security Research at Politecnico di Milano}, booktitle = {First SysSec Workshop 2011, SysSec@DIMVA 2011, Amsterdam, The Netherlands, July 6, 2011}, pages = {127--130}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.ieeecomputersociety.org/10.1109/SysSec.2011.30}, doi = {10.1109/SYSSEC.2011.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dimva/MaggiZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/MaggiBSZ11, author = {Federico Maggi and Andrea Bellini and Guido Salvaneschi and Stefano Zanero}, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {Finding Non-trivial Malware Naming Inconsistencies}, booktitle = {Information Systems Security - 7th International Conference, {ICISS} 2011, Kolkata, India, December 15-19, 2011, Procedings}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {144--159}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25560-1\_10}, doi = {10.1007/978-3-642-25560-1\_10}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/MaggiBSZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/RovetaCMZMC11, author = {Francesco Roveta and Giorgio Caviglia and Luca Di Mario and Stefano Zanero and Federico Maggi and Paolo Ciuccarelli}, title = {{BURN:} baring unknown rogue networks}, booktitle = {8th International Symposium on Visualization for Cyber Security, VizSec 2011, Pittsburgh, PA, USA, July 20, 2011}, pages = {6}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2016904.2016910}, doi = {10.1145/2016904.2016910}, timestamp = {Wed, 24 Feb 2021 16:44:20 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/RovetaCMZMC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaggiMZ10, author = {Federico Maggi and Matteo Matteucci and Stefano Zanero}, title = {Detecting Intrusions through System Call Sequence and Argument Analysis}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {4}, pages = {381--395}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.69}, doi = {10.1109/TDSC.2008.69}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MaggiMZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/VolpattoMZ10, author = {Alberto Volpatto and Federico Maggi and Stefano Zanero}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Effective Multimodel Anomaly Detection Using Cooperative Negotiation}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {180--191}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_12}, doi = {10.1007/978-3-642-17197-0\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/VolpattoMZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ComparettiSKKKZ10, author = {Paolo Milani Comparetti and Guido Salvaneschi and Engin Kirda and Clemens Kolbitsch and Christopher Kruegel and Stefano Zanero}, title = {Identifying Dormant Functionality in Malware Programs}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {61--76}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.12}, doi = {10.1109/SP.2010.12}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/ComparettiSKKKZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Zanero09, author = {Stefano Zanero}, title = {Wireless Malware Propagation: {A} Reality Check}, journal = {{IEEE} Secur. Priv.}, volume = {7}, number = {5}, pages = {70--74}, year = {2009}, url = {https://doi.org/10.1109/MSP.2009.142}, doi = {10.1109/MSP.2009.142}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Zanero09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inffus/MaggiMZ09, author = {Federico Maggi and Matteo Matteucci and Stefano Zanero}, title = {Reducing false positives in anomaly detectors through fuzzy alert aggregation}, journal = {Inf. Fusion}, volume = {10}, number = {4}, pages = {300--311}, year = {2009}, url = {https://doi.org/10.1016/j.inffus.2009.01.004}, doi = {10.1016/J.INFFUS.2009.01.004}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/inffus/MaggiMZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/FrossiMRZ09, author = {Alessandro Frossi and Federico Maggi and Gian Luigi Rizzo and Stefano Zanero}, editor = {Ulrich Flegel and Danilo Bruschi}, title = {Selecting and Improving System Call Models for Anomaly Detection}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, {DIMVA} 2009, Como, Italy, July 9-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5587}, pages = {206--223}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02918-9\_13}, doi = {10.1007/978-3-642-02918-9\_13}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/FrossiMRZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/GalanteKZ09, author = {Antonio Galante and Ary Kokos and Stefano Zanero}, title = {BlueBat: Towards Practical Bluetooth Honeypots}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2009, Dresden, Germany, 14-18 June 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICC.2009.5198796}, doi = {10.1109/ICC.2009.5198796}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/GalanteKZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcritis/ZaneroC08, author = {Stefano Zanero and Giuliano Casale}, title = {{GIVS:} integrity validation for grid security}, journal = {Int. J. Crit. Infrastructures}, volume = {4}, number = {3}, pages = {319--333}, year = {2008}, url = {https://doi.org/10.1504/IJCIS.2008.017444}, doi = {10.1504/IJCIS.2008.017444}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcritis/ZaneroC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Zanero08, author = {Stefano Zanero}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {ULISSE, a network intrusion detection system}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {20:1--20:4}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413163}, doi = {10.1145/1413140.1413163}, timestamp = {Wed, 31 Jan 2024 20:36:02 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Zanero08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/AltheideMZ08, author = {Cory Altheide and Claudio Merloni and Stefano Zanero}, editor = {Herbert Bos and Evangelos P. Markatos}, title = {A methodology for the repeatable forensic analysis of encrypted drives}, booktitle = {Proceedings of the First European Workshop on System Security, {EUROSEC} 2008, Glasgow, Scotland, UK, March 31, 2008}, pages = {22--26}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1355284.1355289}, doi = {10.1145/1355284.1355289}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosec/AltheideMZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iat/AmigoniBBZ08, author = {Francesco Amigoni and Fabrizio Basilico and Nicola Basilico and Stefano Zanero}, title = {Integrating Partial Models of Network Normality via Cooperative Negotiation: An Approach to Development of Multiagent Intrusion Detection Systems}, booktitle = {Proceedings of the 2008 {IEEE/WIC/ACM} International Conference on Intelligent Agent Technology, Sydney, NSW, Australia, December 9-12, 2008}, pages = {531--537}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/WIIAT.2008.323}, doi = {10.1109/WIIAT.2008.323}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iat/AmigoniBBZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/ZaneroS08, author = {Stefano Zanero and Giuseppe Serazzi}, editor = {Marcus Brunner and Carlos Becker Westphall and Lisandro Zambenedetti Granville}, title = {Unsupervised learning algorithms for intrusion detection}, booktitle = {{IEEE/IFIP} Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, {NOMS} 2008, 7-11 April 2008, Salvador, Bahia, Brazil}, pages = {1043--1048}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/NOMS.2008.4575276}, doi = {10.1109/NOMS.2008.4575276}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/ZaneroS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CarettoniMZ07, author = {Luca Carettoni and Claudio Merloni and Stefano Zanero}, title = {Studying Bluetooth Malware Propagation: The BlueBag Project}, journal = {{IEEE} Secur. Priv.}, volume = {5}, number = {2}, pages = {17--25}, year = {2007}, url = {https://doi.org/10.1109/MSP.2007.43}, doi = {10.1109/MSP.2007.43}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/CarettoniMZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MaggiZ07, author = {Federico Maggi and Stefano Zanero}, editor = {Christopher Kr{\"{u}}gel and Richard Lippmann and Andrew J. Clark}, title = {On the Use of Different Statistical Tests for Alert Correlation - Short Paper}, booktitle = {Recent Advances in Intrusion Detection, 10th International Symposium, {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4637}, pages = {167--177}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74320-0\_9}, doi = {10.1007/978-3-540-74320-0\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/MaggiZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/it/Zanero06, author = {Stefano Zanero}, title = {Unsupervised learning algorithms for intrusion detection}, school = {Polytechnic University of Milan, Italy}, year = {2006}, url = {https://opac.bncf.firenze.sbn.it/bncf-prod/resource?uri=BNI0025922}, timestamp = {Wed, 10 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/it/Zanero06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/FiliolHZ06, author = {Eric Filiol and Marko Helenius and Stefano Zanero}, title = {Open Problems in Computer Virology}, journal = {J. Comput. Virol.}, volume = {1}, number = {3-4}, pages = {55--66}, year = {2006}, url = {https://doi.org/10.1007/s11416-005-0008-3}, doi = {10.1007/S11416-005-0008-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/FiliolHZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/firb-perf/CasaleCSZ05, author = {Giuliano Casale and Paolo Cremonesi and Giuseppe Serazzi and Stefano Zanero}, title = {Performance Issues in Video Streaming Environments}, booktitle = {FIRB-Perf Workshop on Techniques, Methodologies and Tools for Performance Evaluation of Complex Systems (FIRB-Perf 2005), 19 September 2005, Torino, Italy}, pages = {3--14}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/FIRB-PERF.2005.14}, doi = {10.1109/FIRB-PERF.2005.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/firb-perf/CasaleCSZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/CasaleZ05, author = {Giuliano Casale and Stefano Zanero}, editor = {Vaidy S. Sunderam and G. Dick van Albada and Peter M. A. Sloot and Jack J. Dongarra}, title = {{GIVS:} Integrity Validation for Grid Security}, booktitle = {Computational Science - {ICCS} 2005, 5th International Conference, Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3516}, pages = {147--154}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11428862\_22}, doi = {10.1007/11428862\_22}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccS/CasaleZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciap/Zanero05, author = {Stefano Zanero}, editor = {Fabio Roli and Sergio Vitulano}, title = {Analyzing {TCP} Traffic Patterns Using Self Organizing Maps}, booktitle = {Image Analysis and Processing - {ICIAP} 2005, 13th International Conference, Cagliari, Italy, September 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3617}, pages = {83--90}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11553595\_10}, doi = {10.1007/11553595\_10}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/iciap/Zanero05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itrust/Zanero05, author = {Stefano Zanero}, editor = {Peter Herrmann and Val{\'{e}}rie Issarny and Simon Shiu}, title = {Security and Trust in the Italian Legal Digital Signature Framework}, booktitle = {Trust Management, Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3477}, pages = {34--44}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11429760\_3}, doi = {10.1007/11429760\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/itrust/Zanero05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/PerriZ04, author = {Pierluigi Perri and Stefano Zanero}, title = {Lessons learned from the Italian law on privacy - Part {I}}, journal = {Comput. Law Secur. Rev.}, volume = {20}, number = {4}, pages = {310--313}, year = {2004}, url = {https://doi.org/10.1016/S0267-3649(04)00054-8}, doi = {10.1016/S0267-3649(04)00054-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/PerriZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/PerriZ04a, author = {Pierluigi Perri and Stefano Zanero}, title = {Lessons learned from the Italian law on privacy - Part {II}}, journal = {Comput. Law Secur. Rev.}, volume = {20}, number = {5}, pages = {384--389}, year = {2004}, url = {https://doi.org/10.1016/S0267-3649(04)00069-X}, doi = {10.1016/S0267-3649(04)00069-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/PerriZ04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscis/Zanero04, author = {Stefano Zanero}, editor = {Cevdet Aykanat and Tugrul Dayar and Ibrahim Korpeoglu}, title = {Behavioral Intrusion Detection}, booktitle = {Computer and Information Sciences - {ISCIS} 2004, 19th International Symposium, Kemer-Antalya, Turkey, October 27-29, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3280}, pages = {657--666}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30182-0\_66}, doi = {10.1007/978-3-540-30182-0\_66}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/iscis/Zanero04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/MuttoniCGZ04, author = {Lorenzo Muttoni and Giuliano Casale and Federico Granata and Stefano Zanero}, title = {Optimal Number of Nodes for Computation in Grid Environments}, booktitle = {12th Euromicro Workshop on Parallel, Distributed and Network-Based Processing {(PDP} 2004), 11-13 February 2004, {A} Coruna, Spain}, pages = {282--289}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/EMPDP.2004.1271457}, doi = {10.1109/EMPDP.2004.1271457}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/MuttoniCGZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ZaneroS04, author = {Stefano Zanero and Sergio M. Savaresi}, editor = {Hisham Haddad and Andrea Omicini and Roger L. Wainwright and Lorie M. Liebrock}, title = {Unsupervised learning techniques for an intrusion detection system}, booktitle = {Proceedings of the 2004 {ACM} Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004}, pages = {412--419}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/967900.967988}, doi = {10.1145/967900.967988}, timestamp = {Tue, 06 Nov 2018 11:06:44 +0100}, biburl = {https://dblp.org/rec/conf/sac/ZaneroS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mascots/SerazziZ03, author = {Giuseppe Serazzi and Stefano Zanero}, editor = {Mariacarla Calzarossa and Erol Gelenbe}, title = {Computer Virus Propagation Models}, booktitle = {Performance Tools and Applications to Networked Systems, Revised Tutorial Lectures [from {MASCOTS} 2003]}, series = {Lecture Notes in Computer Science}, volume = {2965}, pages = {26--50}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24663-3\_2}, doi = {10.1007/978-3-540-24663-3\_2}, timestamp = {Thu, 14 Oct 2021 10:33:31 +0200}, biburl = {https://dblp.org/rec/conf/mascots/SerazziZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.