Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/itasec/itasec2020.bht:"
@inproceedings{DBLP:conf/itasec/AgateCFRM20, author = {Vincenzo Agate and Marco Curaba and Pierluca Ferraro and Giuseppe Lo Re and Marco Morana}, editor = {Michele Loreti and Luca Spalazzi}, title = {Secure e-Voting in Smart Communities}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {1--11}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-01.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:11 +0100}, biburl = {https://dblp.org/rec/conf/itasec/AgateCFRM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/AhmadMP20, author = {Shabeer Ahmad and Nicol{\`{o}} Maunero and Paolo Prinetto}, editor = {Michele Loreti and Luca Spalazzi}, title = {{EVA:} {A} Hybrid Cyber Range}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {12--23}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-02.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/AhmadMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/AldiniBDKR20, author = {Alessandro Aldini and Alessandro Bogliolo and Saverio Delpriori and Lorenz Cuno Klopfenstein and Giorgia Remedi}, editor = {Michele Loreti and Luca Spalazzi}, title = {Modeling and Verification of the Worth-One-Minute Security Protocols}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {24--35}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-03.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/AldiniBDKR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BalducciCIP20, author = {Fabrizio Balducci and Gabriella Calvano and Donato Impedovo and Giuseppe Pirlo}, editor = {Michele Loreti and Luca Spalazzi}, title = {An Unsupervised Behavioral Analysis of Highway Traffic Flow for Security Applications}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {36--46}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-04.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BalducciCIP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/Balestrucci20, author = {Alessandro Balestrucci}, editor = {Michele Loreti and Luca Spalazzi}, title = {How many bots are you following?}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {47--59}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-05.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/Balestrucci20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BistarelliB020, author = {Stefano Bistarelli and Emanuele Bosimini and Francesco Santini}, editor = {Michele Loreti and Luca Spalazzi}, title = {A Report on the Security of Home Connections with IoT and Docker Honeypots}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {60--70}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-06.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BistarelliB020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BreveCCDDP20, author = {Bernardo Breve and Loredana Caruccio and Stefano Cirillo and Domenico Desiato and Vincenzo Deufemia and Giuseppe Polese}, editor = {Michele Loreti and Luca Spalazzi}, title = {Enhancing user awareness during internet browsing}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {71--81}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-07.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BreveCCDDP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BusiDG20, author = {Matteo Busi and Pierpaolo Degano and Letterio Galletta}, editor = {Michele Loreti and Luca Spalazzi}, title = {Control-flow Flattening Preserves the Constant-Time Policy}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {82--92}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-08.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BusiDG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CalzavaraFRS20, author = {Stefano Calzavara and Riccardo Focardi and Alvise Rabitti and Lorenzo Soligo}, editor = {Michele Loreti and Luca Spalazzi}, title = {A Hard Lesson: Assessing the {HTTPS} Deployment of Italian University Websites}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {93--104}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-09.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/CalzavaraFRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CaputoVMRC20, author = {Davide Caputo and Luca Verderame and Alessio Merlo and Andrea Ranieri and Luca Caviglione}, editor = {Michele Loreti and Luca Spalazzi}, title = {Are you (Google) Home? Detecting Users' Presence through Traffic Analysis of Smart Speakers}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {105--118}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-10.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/CaputoVMRC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CeragioliDG20, author = {Lorenzo Ceragioli and Pierpaolo Degano and Letterio Galletta}, editor = {Michele Loreti and Luca Spalazzi}, title = {MuAC: Access Control Language for Mutual Benefits}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {119--127}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-11.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/CeragioliDG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/DaoudaghM20, author = {Said Daoudagh and Eda Marchetti}, editor = {Michele Loreti and Luca Spalazzi}, title = {A Life Cycle for Authorization Systems Development in the {GDPR} Perspective}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {128--140}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-12.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/DaoudaghM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/KoleciBMM20, author = {Kristjane Koleci and Marco Baldi and Maurizio Martina and Guido Masera}, editor = {Michele Loreti and Luca Spalazzi}, title = {A Hardware Implementation for Code-based Post-quantum Asymmetric Cryptography}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {141--152}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-13.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/KoleciBMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/LetteriPVG20, author = {Ivan Letteri and Giuseppe Della Penna and Luca Di Vita and Maria Teresa Grifa}, editor = {Michele Loreti and Luca Spalazzi}, title = {MTA-KDD'19: {A} Dataset for Malware Traffic Detection}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {153--165}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-14.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/LetteriPVG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/MagrisMP20, author = {Sabrina Magris and Claudio Masci and Luciano Piacentini}, editor = {Michele Loreti and Luca Spalazzi}, title = {The mind is like a parachute, it only functions when open. National Security: the importance of the human being that works behind the machine}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {166--176}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-15.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/MagrisMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/PrinettoR20, author = {Paolo Prinetto and Gianluca Roascio}, editor = {Michele Loreti and Luca Spalazzi}, title = {Hardware Security, Vulnerabilities, and Attacks: {A} Comprehensive Taxonomy}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {177--189}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-16.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/PrinettoR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/RakSR20, author = {Massimiliano Rak and Giovanni Salzillo and Claudia Romeo}, editor = {Michele Loreti and Luca Spalazzi}, title = {Systematic IoT Penetration Testing: Alexa Case Study}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {190--200}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-17.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/RakSR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/RepettoCD20, author = {Matteo Repetto and Alessandro Carrega and Armend Duzha}, editor = {Michele Loreti and Luca Spalazzi}, title = {A novel cyber-security framework leveraging programmable capabilities in digital services}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {201--211}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-18.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/RepettoCD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/ScicchitanoLGR020, author = {Francesco Scicchitano and Angelica Liguori and Massimo Guarascio and Ettore Ritacco and Giuseppe Manco}, editor = {Michele Loreti and Luca Spalazzi}, title = {A Deep Learning Approach for Detecting Security Attacks on Blockchain}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {212--222}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-19.pdf}, timestamp = {Wed, 24 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/ScicchitanoLGR020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/StojkovskiL20, author = {Borce Stojkovski and Gabriele Lenzini}, editor = {Michele Loreti and Luca Spalazzi}, title = {Evaluating ambiguity of privacy indicators in a secure email app}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {223--234}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-20.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/StojkovskiL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/VenerusoFMMC20, author = {Silvestro Veneruso and Lauren S. Ferro and Andrea Marrella and Massimo Mecella and Tiziana Catarci}, editor = {Michele Loreti and Luca Spalazzi}, title = {A game-based learning experience for improving cybersecurity awareness}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {235--242}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-21.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/VenerusoFMMC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/VisaggioLSCCF20, author = {Corrado Aaron Visaggio and Sonia Laudanna and Andrea Di Sorbo and Gerardo Canfora and Sara Caruso and Marianna Fucci}, editor = {Michele Loreti and Luca Spalazzi}, title = {Repadiography: towards a visual support for triaging repackaged apps}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {243--255}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-22.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/VisaggioLSCCF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/itasec/2020, editor = {Michele Loreti and Luca Spalazzi}, title = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597}, urn = {urn:nbn:de:0074-2597-0}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.