:facetid:toc:\"db/conf/itasec/itasec2018.bht\"OK:facetid:toc:db/conf/itasec/itasec2018.bhtStefano De AngelisLeonardo AnielloRoberto BaldoniFederico LombardiAndrea MargheriVladimiro SassonePBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain.ITASEC2018Conference and Workshop Papersopenconf/itasec/AngelisABLMS18https://ceur-ws.org/Vol-2058/paper-06.pdfhttps://dblp.org/rec/conf/itasec/AngelisABLMS18URL#2604117Cinzia BernardeschiPaolo Masci 0001Antonella SantoneData Leakage in Java Applets with Exception Mechanism.ITASEC2018Conference and Workshop Papersopenconf/itasec/BernardeschiMS18https://ceur-ws.org/Vol-2058/paper-05.pdfhttps://dblp.org/rec/conf/itasec/BernardeschiMS18URL#2604118Andrea BernardiniExtending Domain Name Monitoring. Identifying Potentially Malicious Domains Using Hash Signatures of DOM Elements.ITASEC2018Conference and Workshop Papersopenconf/itasec/Bernardini18https://ceur-ws.org/Vol-2058/paper-04.pdfhttps://dblp.org/rec/conf/itasec/Bernardini18URL#2604119Stefano BistarelliMatteo ParrocciniFrancesco Santini 0001Visualizing Bitcoin Flows of Ransomware: WannaCry One Week Later.ITASEC2018Conference and Workshop Papersopenconf/itasec/BistarelliP018https://ceur-ws.org/Vol-2058/paper-13.pdfhttps://dblp.org/rec/conf/itasec/BistarelliP018URL#2604120Chiara BodeiPierpaolo DeganoRiccardo FocardiLetterio GallettaMauro TempestaLorenzo VeroneseFirewall Management With FireWall Synthesizer.ITASEC2018Conference and Workshop Papersopenconf/itasec/BodeiDFGTV18https://ceur-ws.org/Vol-2058/paper-16.pdfhttps://dblp.org/rec/conf/itasec/BodeiDFGTV18URL#2604121Raffaele BollaPaolo Maria ComiMatteo RepettoA Distributed Cyber-security Framework for Heterogeneous Environments.ITASEC2018Conference and Workshop Papersopenconf/itasec/BollaCR18https://ceur-ws.org/Vol-2058/paper-11.pdfhttps://dblp.org/rec/conf/itasec/BollaCR18URL#2604122Giovanni BottazziGiuseppe F. ItalianoDomenico SperaPreventing Ransomware Attacks Through File System Filter Drivers.ITASEC2018Conference and Workshop Papersopenconf/itasec/BottazziIS18https://ceur-ws.org/Vol-2058/paper-08.pdfhttps://dblp.org/rec/conf/itasec/BottazziIS18URL#2604123Stefano CalzavaraAlvise RabittiMichele BugliesiDr Cookie and Mr Token - Web Session Implementations and How to Live with Them.ITASEC2018Conference and Workshop Papersopenconf/itasec/CalzavaraRB18https://ceur-ws.org/Vol-2058/paper-02.pdfhttps://dblp.org/rec/conf/itasec/CalzavaraRB18URL#2604124Luca DeriArianna Del SoldatoEnforcing Security in IoT and Home Networks.ITASEC2018Conference and Workshop Papersopenconf/itasec/DeriS18https://ceur-ws.org/Vol-2058/paper-15.pdfhttps://dblp.org/rec/conf/itasec/DeriS18URL#2604125Pietro Ferrara 0001Fausto SpotoStatic Analysis for GDPR Compliance.ITASEC2018Conference and Workshop Papersopenconf/itasec/FerraraS18https://ceur-ws.org/Vol-2058/paper-10.pdfhttps://dblp.org/rec/conf/itasec/FerraraS18URL#2604126Ivan LetteriMassimo Del RossoPasquale CaianielloDajana CassioliPerformance of Botnet Detection by Neural Networks in Software-Defined Networks.ITASEC2018Conference and Workshop Papersopenconf/itasec/LetteriRCC18https://ceur-ws.org/Vol-2058/paper-03.pdfhttps://dblp.org/rec/conf/itasec/LetteriRCC18URL#2604127Luca NicolettiAndrea MargheriFederico LombardiVladimiro SassoneFrancesco Paolo SchiavoCross-Cloud Management of Sensitive Data via Blockchain: a Payslip Calculation Use Case.ITASEC2018Conference and Workshop Papersopenconf/itasec/NicolettiMLSS18https://ceur-ws.org/Vol-2058/paper-12.pdfhttps://dblp.org/rec/conf/itasec/NicolettiMLSS18URL#2604128Alessandra De PaolaSalvatore FavaloroSalvatore GaglioGiuseppe Lo ReMarco MoranaMalware Detection through Low-level Features and Stacked Denoising Autoencoders.ITASEC2018Conference and Workshop Papersopenconf/itasec/PaolaFGRM18https://ceur-ws.org/Vol-2058/paper-07.pdfhttps://dblp.org/rec/conf/itasec/PaolaFGRM18URL#2604129Michelangelo PuligaGuido CaldarelliAlessandro ChessaRocco De NicolaUnderstanding the Twitter User Networks of Viruses and Ransomware Attacks.ITASEC2018Conference and Workshop Papersopenconf/itasec/PuligaCCN18https://ceur-ws.org/Vol-2058/paper-09.pdfhttps://dblp.org/rec/conf/itasec/PuligaCCN18URL#2604130Alfonso SolimeoLuca CapacciStefano TainoRebecca MontanariMAD-IOS: Dynamic App Vulnerability Analysis in Non-jailbroken Devices.ITASEC2018Conference and Workshop Papersopenconf/itasec/SolimeoCTM18https://ceur-ws.org/Vol-2058/paper-14.pdfhttps://dblp.org/rec/conf/itasec/SolimeoCTM18URL#2604131Elena FerrariMarco BaldiRoberto BaldoniProceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018.ITASECCEUR Workshop Proceedings2058CEUR-WS.org2018Editorshipopenconf/itasec/2018https://ceur-ws.org/Vol-2058https://dblp.org/rec/conf/itasec/2018URL#2663476