default search action
2nd ITASEC 2018: Milan, Italy
- Elena Ferrari, Marco Baldi, Roberto Baldoni:
Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018. CEUR Workshop Proceedings 2058, CEUR-WS.org 2018
Session 1: Science and Technology Track
- Stefano Calzavara, Alvise Rabitti, Michele Bugliesi:
Dr Cookie and Mr Token - Web Session Implementations and How to Live with Them. - Ivan Letteri, Massimo Del Rosso, Pasquale Caianiello, Dajana Cassioli:
Performance of Botnet Detection by Neural Networks in Software-Defined Networks. - Andrea Bernardini:
Extending Domain Name Monitoring. Identifying Potentially Malicious Domains Using Hash Signatures of DOM Elements. - Cinzia Bernardeschi, Paolo Masci, Antonella Santone:
Data Leakage in Java Applets with Exception Mechanism. - Stefano De Angelis, Leonardo Aniello, Roberto Baldoni, Federico Lombardi, Andrea Margheri, Vladimiro Sassone:
PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain. - Alessandra De Paola, Salvatore Favaloro, Salvatore Gaglio, Giuseppe Lo Re, Marco Morana:
Malware Detection through Low-level Features and Stacked Denoising Autoencoders. - Giovanni Bottazzi, Giuseppe F. Italiano, Domenico Spera:
Preventing Ransomware Attacks Through File System Filter Drivers. - Michelangelo Puliga, Guido Caldarelli, Alessandro Chessa, Rocco De Nicola:
Understanding the Twitter User Networks of Viruses and Ransomware Attacks. - Pietro Ferrara, Fausto Spoto:
Static Analysis for GDPR Compliance. - Raffaele Bolla, Paolo Maria Comi, Matteo Repetto:
A Distributed Cyber-security Framework for Heterogeneous Environments.
Session 2: Demo
- Luca Nicoletti, Andrea Margheri, Federico Lombardi, Vladimiro Sassone, Francesco Paolo Schiavo:
Cross-Cloud Management of Sensitive Data via Blockchain: a Payslip Calculation Use Case. - Stefano Bistarelli, Matteo Parroccini, Francesco Santini:
Visualizing Bitcoin Flows of Ransomware: WannaCry One Week Later. - Alfonso Solimeo, Luca Capacci, Stefano Taino, Rebecca Montanari:
MAD-IOS: Dynamic App Vulnerability Analysis in Non-jailbroken Devices. - Luca Deri, Arianna Del Soldato:
Enforcing Security in IoT and Home Networks. - Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Mauro Tempesta, Lorenzo Veronese:
Firewall Management With FireWall Synthesizer.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.