callback( { "result":{ "query":":facetid:toc:\"db/conf/itasec/itasec2018.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"183.74" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"16", "@dc":"16", "@oc":"16", "@id":"43296625", "text":":facetid:toc:db/conf/itasec/itasec2018.bht" } }, "hits":{ "@total":"16", "@computed":"16", "@sent":"16", "@first":"0", "hit":[{ "@score":"1", "@id":"2601935", "info":{"authors":{"author":[{"@pid":"213/8809","text":"Stefano De Angelis"},{"@pid":"32/10081","text":"Leonardo Aniello"},{"@pid":"b/RBaldoni","text":"Roberto Baldoni"},{"@pid":"20/9130","text":"Federico Lombardi"},{"@pid":"116/6040","text":"Andrea Margheri"},{"@pid":"s/VladimiroSassone","text":"Vladimiro Sassone"}]},"title":"PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain.","venue":"ITASEC","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/AngelisABLMS18","ee":"https://ceur-ws.org/Vol-2058/paper-06.pdf","url":"https://dblp.org/rec/conf/itasec/AngelisABLMS18"}, "url":"URL#2601935" }, { "@score":"1", "@id":"2601936", "info":{"authors":{"author":[{"@pid":"71/1762","text":"Cinzia Bernardeschi"},{"@pid":"96/5404","text":"Paolo Masci 0001"},{"@pid":"98/670","text":"Antonella Santone"}]},"title":"Data Leakage in Java Applets with Exception Mechanism.","venue":"ITASEC","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/BernardeschiMS18","ee":"https://ceur-ws.org/Vol-2058/paper-05.pdf","url":"https://dblp.org/rec/conf/itasec/BernardeschiMS18"}, "url":"URL#2601936" }, { "@score":"1", "@id":"2601937", "info":{"authors":{"author":{"@pid":"59/1430","text":"Andrea Bernardini"}},"title":"Extending Domain Name Monitoring. Identifying Potentially Malicious Domains Using Hash Signatures of DOM Elements.","venue":"ITASEC","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/Bernardini18","ee":"https://ceur-ws.org/Vol-2058/paper-04.pdf","url":"https://dblp.org/rec/conf/itasec/Bernardini18"}, "url":"URL#2601937" }, { "@score":"1", "@id":"2601938", "info":{"authors":{"author":[{"@pid":"53/6380","text":"Stefano Bistarelli"},{"@pid":"213/8803","text":"Matteo Parroccini"},{"@pid":"95/4886","text":"Francesco Santini 0001"}]},"title":"Visualizing Bitcoin Flows of Ransomware: WannaCry One Week Later.","venue":"ITASEC","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/BistarelliP018","ee":"https://ceur-ws.org/Vol-2058/paper-13.pdf","url":"https://dblp.org/rec/conf/itasec/BistarelliP018"}, "url":"URL#2601938" }, { "@score":"1", "@id":"2601939", "info":{"authors":{"author":[{"@pid":"47/6967","text":"Chiara Bodei"},{"@pid":"90/1344","text":"Pierpaolo Degano"},{"@pid":"f/RiccardoFocardi","text":"Riccardo Focardi"},{"@pid":"00/10043","text":"Letterio Galletta"},{"@pid":"154/7915","text":"Mauro Tempesta"},{"@pid":"213/8814","text":"Lorenzo Veronese"}]},"title":"Firewall Management With FireWall Synthesizer.","venue":"ITASEC","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/BodeiDFGTV18","ee":"https://ceur-ws.org/Vol-2058/paper-16.pdf","url":"https://dblp.org/rec/conf/itasec/BodeiDFGTV18"}, "url":"URL#2601939" }, { "@score":"1", "@id":"2601940", "info":{"authors":{"author":[{"@pid":"47/1541","text":"Raffaele Bolla"},{"@pid":"213/8812","text":"Paolo Maria Comi"},{"@pid":"48/6909","text":"Matteo Repetto"}]},"title":"A Distributed Cyber-security Framework for Heterogeneous Environments.","venue":"ITASEC","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/BollaCR18","ee":"https://ceur-ws.org/Vol-2058/paper-11.pdf","url":"https://dblp.org/rec/conf/itasec/BollaCR18"}, "url":"URL#2601940" }, { "@score":"1", "@id":"2601941", "info":{"authors":{"author":[{"@pid":"155/4200","text":"Giovanni Bottazzi"},{"@pid":"i/GiuseppeFItaliano","text":"Giuseppe F. Italiano"},{"@pid":"213/8797","text":"Domenico Spera"}]},"title":"Preventing Ransomware Attacks Through File System Filter Drivers.","venue":"ITASEC","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/BottazziIS18","ee":"https://ceur-ws.org/Vol-2058/paper-08.pdf","url":"https://dblp.org/rec/conf/itasec/BottazziIS18"}, "url":"URL#2601941" }, { "@score":"1", "@id":"2601942", "info":{"authors":{"author":[{"@pid":"89/9526","text":"Stefano Calzavara"},{"@pid":"159/0703","text":"Alvise Rabitti"},{"@pid":"b/MicheleBugliesi","text":"Michele Bugliesi"}]},"title":"Dr Cookie and Mr Token - Web Session Implementations and How to Live with Them.","venue":"ITASEC","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/CalzavaraRB18","ee":"https://ceur-ws.org/Vol-2058/paper-02.pdf","url":"https://dblp.org/rec/conf/itasec/CalzavaraRB18"}, "url":"URL#2601942" }, { "@score":"1", "@id":"2601943", "info":{"authors":{"author":[{"@pid":"45/4134","text":"Luca Deri"},{"@pid":"19/6480","text":"Arianna Del Soldato"}]},"title":"Enforcing Security in IoT and Home Networks.","venue":"ITASEC","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/DeriS18","ee":"https://ceur-ws.org/Vol-2058/paper-15.pdf","url":"https://dblp.org/rec/conf/itasec/DeriS18"}, "url":"URL#2601943" }, { "@score":"1", "@id":"2601944", "info":{"authors":{"author":[{"@pid":"26/3503","text":"Pietro Ferrara 0001"},{"@pid":"21/1969","text":"Fausto Spoto"}]},"title":"Static Analysis for GDPR Compliance.","venue":"ITASEC","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/FerraraS18","ee":"https://ceur-ws.org/Vol-2058/paper-10.pdf","url":"https://dblp.org/rec/conf/itasec/FerraraS18"}, "url":"URL#2601944" }, { "@score":"1", "@id":"2601945", "info":{"authors":{"author":[{"@pid":"213/8816","text":"Ivan Letteri"},{"@pid":"213/8815","text":"Massimo Del Rosso"},{"@pid":"15/5693","text":"Pasquale Caianiello"},{"@pid":"87/2897","text":"Dajana Cassioli"}]},"title":"Performance of Botnet Detection by Neural Networks in Software-Defined Networks.","venue":"ITASEC","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/LetteriRCC18","ee":"https://ceur-ws.org/Vol-2058/paper-03.pdf","url":"https://dblp.org/rec/conf/itasec/LetteriRCC18"}, "url":"URL#2601945" }, { "@score":"1", "@id":"2601946", "info":{"authors":{"author":[{"@pid":"146/0948","text":"Luca Nicoletti"},{"@pid":"116/6040","text":"Andrea Margheri"},{"@pid":"20/9130","text":"Federico Lombardi"},{"@pid":"s/VladimiroSassone","text":"Vladimiro Sassone"},{"@pid":"192/1579","text":"Francesco Paolo Schiavo"}]},"title":"Cross-Cloud Management of Sensitive Data via Blockchain: a Payslip Calculation Use Case.","venue":"ITASEC","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/NicolettiMLSS18","ee":"https://ceur-ws.org/Vol-2058/paper-12.pdf","url":"https://dblp.org/rec/conf/itasec/NicolettiMLSS18"}, "url":"URL#2601946" }, { "@score":"1", "@id":"2601947", "info":{"authors":{"author":[{"@pid":"32/6543","text":"Alessandra De Paola"},{"@pid":"213/8806","text":"Salvatore Favaloro"},{"@pid":"80/3424","text":"Salvatore Gaglio"},{"@pid":"24/6170","text":"Giuseppe Lo Re"},{"@pid":"41/693","text":"Marco Morana"}]},"title":"Malware Detection through Low-level Features and Stacked Denoising Autoencoders.","venue":"ITASEC","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/PaolaFGRM18","ee":"https://ceur-ws.org/Vol-2058/paper-07.pdf","url":"https://dblp.org/rec/conf/itasec/PaolaFGRM18"}, "url":"URL#2601947" }, { "@score":"1", "@id":"2601948", "info":{"authors":{"author":[{"@pid":"119/4827","text":"Michelangelo Puliga"},{"@pid":"50/6478","text":"Guido Caldarelli"},{"@pid":"00/7499","text":"Alessandro Chessa"},{"@pid":"n/RDNicola","text":"Rocco De Nicola"}]},"title":"Understanding the Twitter User Networks of Viruses and Ransomware Attacks.","venue":"ITASEC","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/PuligaCCN18","ee":"https://ceur-ws.org/Vol-2058/paper-09.pdf","url":"https://dblp.org/rec/conf/itasec/PuligaCCN18"}, "url":"URL#2601948" }, { "@score":"1", "@id":"2601949", "info":{"authors":{"author":[{"@pid":"213/8801","text":"Alfonso Solimeo"},{"@pid":"213/8808","text":"Luca Capacci"},{"@pid":"145/2429","text":"Stefano Taino"},{"@pid":"38/5309","text":"Rebecca Montanari"}]},"title":"MAD-IOS: Dynamic App Vulnerability Analysis in Non-jailbroken Devices.","venue":"ITASEC","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/SolimeoCTM18","ee":"https://ceur-ws.org/Vol-2058/paper-14.pdf","url":"https://dblp.org/rec/conf/itasec/SolimeoCTM18"}, "url":"URL#2601949" }, { "@score":"1", "@id":"2661294", "info":{"authors":{"author":[{"@pid":"f/ElenaFerrari","text":"Elena Ferrari"},{"@pid":"26/3594","text":"Marco Baldi"},{"@pid":"b/RBaldoni","text":"Roberto Baldoni"}]},"title":"Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018.","venue":["ITASEC","CEUR Workshop Proceedings"],"volume":"2058","publisher":"CEUR-WS.org","year":"2018","type":"Editorship","access":"open","key":"conf/itasec/2018","ee":"https://ceur-ws.org/Vol-2058","url":"https://dblp.org/rec/conf/itasec/2018"}, "url":"URL#2661294" } ] } } } )