callback( { "result":{ "query":":facetid:toc:\"db/conf/itasec/itasec2020.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"238.48" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"23", "@dc":"23", "@oc":"23", "@id":"43397427", "text":":facetid:toc:db/conf/itasec/itasec2020.bht" } }, "hits":{ "@total":"23", "@computed":"23", "@sent":"23", "@first":"0", "hit":[{ "@score":"1", "@id":"1806768", "info":{"authors":{"author":[{"@pid":"180/3784","text":"Vincenzo Agate"},{"@pid":"263/6422","text":"Marco Curaba"},{"@pid":"157/6820","text":"Pierluca Ferraro"},{"@pid":"24/6170","text":"Giuseppe Lo Re"},{"@pid":"41/693","text":"Marco Morana"}]},"title":"Secure e-Voting in Smart Communities.","venue":"ITASEC","pages":"1-11","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/AgateCFRM20","ee":"https://ceur-ws.org/Vol-2597/paper-01.pdf","url":"https://dblp.org/rec/conf/itasec/AgateCFRM20"}, "url":"URL#1806768" }, { "@score":"1", "@id":"1806769", "info":{"authors":{"author":[{"@pid":"263/6436","text":"Shabeer Ahmad"},{"@pid":"252/6180","text":"Nicolò Maunero"},{"@pid":"60/3110","text":"Paolo Prinetto"}]},"title":"EVA: A Hybrid Cyber Range.","venue":"ITASEC","pages":"12-23","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/AhmadMP20","ee":"https://ceur-ws.org/Vol-2597/paper-02.pdf","url":"https://dblp.org/rec/conf/itasec/AhmadMP20"}, "url":"URL#1806769" }, { "@score":"1", "@id":"1806770", "info":{"authors":{"author":[{"@pid":"41/6214","text":"Alessandro Aldini"},{"@pid":"40/1377","text":"Alessandro Bogliolo"},{"@pid":"89/7857","text":"Saverio Delpriori"},{"@pid":"18/1035","text":"Lorenz Cuno Klopfenstein"},{"@pid":"263/6239","text":"Giorgia Remedi"}]},"title":"Modeling and Verification of the Worth-One-Minute Security Protocols.","venue":"ITASEC","pages":"24-35","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/AldiniBDKR20","ee":"https://ceur-ws.org/Vol-2597/paper-03.pdf","url":"https://dblp.org/rec/conf/itasec/AldiniBDKR20"}, "url":"URL#1806770" }, { "@score":"1", "@id":"1806773", "info":{"authors":{"author":[{"@pid":"169/4209","text":"Fabrizio Balducci"},{"@pid":"204/1691","text":"Gabriella Calvano"},{"@pid":"18/2866","text":"Donato Impedovo"},{"@pid":"04/5001","text":"Giuseppe Pirlo"}]},"title":"An Unsupervised Behavioral Analysis of Highway Traffic Flow for Security Applications.","venue":"ITASEC","pages":"36-46","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/BalducciCIP20","ee":"https://ceur-ws.org/Vol-2597/paper-04.pdf","url":"https://dblp.org/rec/conf/itasec/BalducciCIP20"}, "url":"URL#1806773" }, { "@score":"1", "@id":"1806774", "info":{"authors":{"author":{"@pid":"148/2763","text":"Alessandro Balestrucci"}},"title":"How many bots are you following?","venue":"ITASEC","pages":"47-59","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/Balestrucci20","ee":"https://ceur-ws.org/Vol-2597/paper-05.pdf","url":"https://dblp.org/rec/conf/itasec/Balestrucci20"}, "url":"URL#1806774" }, { "@score":"1", "@id":"1806775", "info":{"authors":{"author":[{"@pid":"53/6380","text":"Stefano Bistarelli"},{"@pid":"263/6435","text":"Emanuele Bosimini"},{"@pid":"95/4886","text":"Francesco Santini 0001"}]},"title":"A Report on the Security of Home Connections with IoT and Docker Honeypots.","venue":"ITASEC","pages":"60-70","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/BistarelliB020","ee":"https://ceur-ws.org/Vol-2597/paper-06.pdf","url":"https://dblp.org/rec/conf/itasec/BistarelliB020"}, "url":"URL#1806775" }, { "@score":"1", "@id":"1806776", "info":{"authors":{"author":[{"@pid":"247/7608","text":"Bernardo Breve"},{"@pid":"149/9262","text":"Loredana Caruccio"},{"@pid":"231/4634","text":"Stefano Cirillo"},{"@pid":"225/1936","text":"Domenico Desiato"},{"@pid":"28/1520","text":"Vincenzo Deufemia"},{"@pid":"97/3702","text":"Giuseppe Polese"}]},"title":"Enhancing user awareness during internet browsing.","venue":"ITASEC","pages":"71-81","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/BreveCCDDP20","ee":"https://ceur-ws.org/Vol-2597/paper-07.pdf","url":"https://dblp.org/rec/conf/itasec/BreveCCDDP20"}, "url":"URL#1806776" }, { "@score":"1", "@id":"1806779", "info":{"authors":{"author":[{"@pid":"191/7498-1","text":"Matteo Busi 0001"},{"@pid":"90/1344","text":"Pierpaolo Degano"},{"@pid":"00/10043","text":"Letterio Galletta"}]},"title":"Control-flow Flattening Preserves the Constant-Time Policy.","venue":"ITASEC","pages":"82-92","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/BusiDG20","ee":"https://ceur-ws.org/Vol-2597/paper-08.pdf","url":"https://dblp.org/rec/conf/itasec/BusiDG20"}, "url":"URL#1806779" }, { "@score":"1", "@id":"1806780", "info":{"authors":{"author":[{"@pid":"89/9526","text":"Stefano Calzavara"},{"@pid":"f/RiccardoFocardi","text":"Riccardo Focardi"},{"@pid":"159/0703","text":"Alvise Rabitti"},{"@pid":"263/6222","text":"Lorenzo Soligo"}]},"title":"A Hard Lesson: Assessing the HTTPS Deployment of Italian University Websites.","venue":"ITASEC","pages":"93-104","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/CalzavaraFRS20","ee":"https://ceur-ws.org/Vol-2597/paper-09.pdf","url":"https://dblp.org/rec/conf/itasec/CalzavaraFRS20"}, "url":"URL#1806780" }, { "@score":"1", "@id":"1806781", "info":{"authors":{"author":[{"@pid":"40/9997","text":"Davide Caputo"},{"@pid":"14/11488","text":"Luca Verderame"},{"@pid":"54/3464","text":"Alessio Merlo"},{"@pid":"89/7545","text":"Andrea Ranieri"},{"@pid":"76/6202","text":"Luca Caviglione"}]},"title":"Are you (Google) Home? Detecting Users' Presence through Traffic Analysis of Smart Speakers.","venue":"ITASEC","pages":"105-118","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/CaputoVMRC20","ee":"https://ceur-ws.org/Vol-2597/paper-10.pdf","url":"https://dblp.org/rec/conf/itasec/CaputoVMRC20"}, "url":"URL#1806781" }, { "@score":"1", "@id":"1806782", "info":{"authors":{"author":[{"@pid":"235/1550","text":"Lorenzo Ceragioli"},{"@pid":"90/1344","text":"Pierpaolo Degano"},{"@pid":"00/10043","text":"Letterio Galletta"}]},"title":"MuAC: Access Control Language for Mutual Benefits.","venue":"ITASEC","pages":"119-127","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/CeragioliDG20","ee":"https://ceur-ws.org/Vol-2597/paper-11.pdf","url":"https://dblp.org/rec/conf/itasec/CeragioliDG20"}, "url":"URL#1806782" }, { "@score":"1", "@id":"1806783", "info":{"authors":{"author":[{"@pid":"60/11428","text":"Said Daoudagh"},{"@pid":"54/2616","text":"Eda Marchetti"}]},"title":"A Life Cycle for Authorization Systems Development in the GDPR Perspective.","venue":"ITASEC","pages":"128-140","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/DaoudaghM20","ee":"https://ceur-ws.org/Vol-2597/paper-12.pdf","url":"https://dblp.org/rec/conf/itasec/DaoudaghM20"}, "url":"URL#1806783" }, { "@score":"1", "@id":"1806784", "info":{"authors":{"author":[{"@pid":"263/6338","text":"Kristjane Koleci"},{"@pid":"26/3594","text":"Marco Baldi"},{"@pid":"26/3014","text":"Maurizio Martina"},{"@pid":"54/1377","text":"Guido Masera"}]},"title":"A Hardware Implementation for Code-based Post-quantum Asymmetric Cryptography.","venue":"ITASEC","pages":"141-152","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/KoleciBMM20","ee":"https://ceur-ws.org/Vol-2597/paper-13.pdf","url":"https://dblp.org/rec/conf/itasec/KoleciBMM20"}, "url":"URL#1806784" }, { "@score":"1", "@id":"1806786", "info":{"authors":{"author":[{"@pid":"213/8816","text":"Ivan Letteri"},{"@pid":"86/1480","text":"Giuseppe Della Penna"},{"@pid":"263/6563","text":"Luca Di Vita"},{"@pid":"263/6495","text":"Maria Teresa Grifa"}]},"title":"MTA-KDD'19: A Dataset for Malware Traffic Detection.","venue":"ITASEC","pages":"153-165","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/LetteriPVG20","ee":"https://ceur-ws.org/Vol-2597/paper-14.pdf","url":"https://dblp.org/rec/conf/itasec/LetteriPVG20"}, "url":"URL#1806786" }, { "@score":"1", "@id":"1806787", "info":{"authors":{"author":[{"@pid":"263/6513","text":"Sabrina Magris"},{"@pid":"263/6411","text":"Claudio Masci"},{"@pid":"263/6250","text":"Luciano Piacentini"}]},"title":"The mind is like a parachute, it only functions when open. National Security: the importance of the human being that works behind the machine.","venue":"ITASEC","pages":"166-176","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/MagrisMP20","ee":"https://ceur-ws.org/Vol-2597/paper-15.pdf","url":"https://dblp.org/rec/conf/itasec/MagrisMP20"}, "url":"URL#1806787" }, { "@score":"1", "@id":"1806791", "info":{"authors":{"author":[{"@pid":"60/3110","text":"Paolo Prinetto"},{"@pid":"252/6195","text":"Gianluca Roascio"}]},"title":"Hardware Security, Vulnerabilities, and Attacks: A Comprehensive Taxonomy.","venue":"ITASEC","pages":"177-189","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/PrinettoR20","ee":"https://ceur-ws.org/Vol-2597/paper-16.pdf","url":"https://dblp.org/rec/conf/itasec/PrinettoR20"}, "url":"URL#1806791" }, { "@score":"1", "@id":"1806792", "info":{"authors":{"author":[{"@pid":"90/6488","text":"Massimiliano Rak"},{"@pid":"263/6473","text":"Giovanni Salzillo"},{"@pid":"263/6344","text":"Claudia Romeo"}]},"title":"Systematic IoT Penetration Testing: Alexa Case Study.","venue":"ITASEC","pages":"190-200","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/RakSR20","ee":"https://ceur-ws.org/Vol-2597/paper-17.pdf","url":"https://dblp.org/rec/conf/itasec/RakSR20"}, "url":"URL#1806792" }, { "@score":"1", "@id":"1806793", "info":{"authors":{"author":[{"@pid":"48/6909","text":"Matteo Repetto"},{"@pid":"69/11510","text":"Alessandro Carrega"},{"@pid":"197/6330","text":"Armend Duzha"}]},"title":"A novel cyber-security framework leveraging programmable capabilities in digital services.","venue":"ITASEC","pages":"201-211","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/RepettoCD20","ee":"https://ceur-ws.org/Vol-2597/paper-18.pdf","url":"https://dblp.org/rec/conf/itasec/RepettoCD20"}, "url":"URL#1806793" }, { "@score":"1", "@id":"1806794", "info":{"authors":{"author":[{"@pid":"263/6460","text":"Francesco Scicchitano"},{"@pid":"263/6386","text":"Angelica Liguori"},{"@pid":"41/7251","text":"Massimo Guarascio 0001"},{"@pid":"67/4235","text":"Ettore Ritacco"},{"@pid":"m/GiuseppeManco-1","text":"Giuseppe Manco 0001"}]},"title":"A Deep Learning Approach for Detecting Security Attacks on Blockchain.","venue":"ITASEC","pages":"212-222","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/ScicchitanoLGR020","ee":"https://ceur-ws.org/Vol-2597/paper-19.pdf","url":"https://dblp.org/rec/conf/itasec/ScicchitanoLGR020"}, "url":"URL#1806794" }, { "@score":"1", "@id":"1806795", "info":{"authors":{"author":[{"@pid":"230/8639","text":"Borce Stojkovski"},{"@pid":"78/5724","text":"Gabriele Lenzini"}]},"title":"Evaluating ambiguity of privacy indicators in a secure email app.","venue":"ITASEC","pages":"223-234","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/StojkovskiL20","ee":"https://ceur-ws.org/Vol-2597/paper-20.pdf","url":"https://dblp.org/rec/conf/itasec/StojkovskiL20"}, "url":"URL#1806795" }, { "@score":"1", "@id":"1806796", "info":{"authors":{"author":[{"@pid":"263/6501","text":"Silvestro Veneruso"},{"@pid":"134/7245","text":"Lauren S. Ferro"},{"@pid":"17/1681","text":"Andrea Marrella"},{"@pid":"42/2448","text":"Massimo Mecella"},{"@pid":"c/TCatarci","text":"Tiziana Catarci"}]},"title":"A game-based learning experience for improving cybersecurity awareness.","venue":"ITASEC","pages":"235-242","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/VenerusoFMMC20","ee":"https://ceur-ws.org/Vol-2597/paper-21.pdf","url":"https://dblp.org/rec/conf/itasec/VenerusoFMMC20"}, "url":"URL#1806796" }, { "@score":"1", "@id":"1806797", "info":{"authors":{"author":[{"@pid":"38/2506","text":"Corrado Aaron Visaggio"},{"@pid":"263/6437","text":"Sonia Laudanna"},{"@pid":"171/5109","text":"Andrea Di Sorbo"},{"@pid":"63/4434","text":"Gerardo Canfora"},{"@pid":"263/6472","text":"Sara Caruso"},{"@pid":"263/6441","text":"Marianna Fucci"}]},"title":"Repadiography: towards a visual support for triaging repackaged apps.","venue":"ITASEC","pages":"243-255","year":"2020","type":"Conference and Workshop Papers","access":"open","key":"conf/itasec/VisaggioLSCCF20","ee":"https://ceur-ws.org/Vol-2597/paper-22.pdf","url":"https://dblp.org/rec/conf/itasec/VisaggioLSCCF20"}, "url":"URL#1806797" }, { "@score":"1", "@id":"1861599", "info":{"authors":{"author":[{"@pid":"l/MicheleLoreti","text":"Michele Loreti"},{"@pid":"83/522","text":"Luca Spalazzi"}]},"title":"Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020.","venue":["ITASEC","CEUR Workshop Proceedings"],"volume":"2597","publisher":"CEUR-WS.org","year":"2020","type":"Editorship","access":"open","key":"conf/itasec/2020","ee":"https://ceur-ws.org/Vol-2597","url":"https://dblp.org/rec/conf/itasec/2020"}, "url":"URL#1861599" } ] } } } )