default search action
Stefano Zanero
Person information
- affiliation: Polytechnic University of Milan, Italy
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Stefano Longari, Alessandro Pozone, Jessica Leoni, Mario Polino, Michele Carminati, Mara Tanelli, Stefano Zanero:
CyFence: Securing Cyber-Physical Controllers via Trusted Execution Environment. IEEE Trans. Emerg. Top. Comput. 12(2): 521-531 (2024) - [c84]Gabriele Digregorio, Salvatore Maccarrone, Mario D'Onghia, Luigi Gallo, Michele Carminati, Mario Polino, Stefano Zanero:
Tarallo: Evading Behavioral Malware Detectors in the Problem Space. DIMVA 2024: 128-149 - [c83]Tommaso Paladini, Lara Ferro, Mario Polino, Stefano Zanero, Michele Carminati:
You Might Have Known It Earlier: Analyzing the Role of Underground Forums in Threat Intelligence. RAID 2024: 368-383 - [c82]Lorenzo Binosi, Pietro Mazzini, Alessandro Sanna, Michele Carminati, Giorgio Giacinto, Riccardo Lazzeretti, Stefano Zanero, Mario Polino, Emilio Coppa, Davide Maiorca:
Do You Trust Your Device? Open Challenges in IoT Security Analysis. SECRYPT 2024: 568-575 - [c81]Gabriele Digregorio, Elisabetta Cainazzo, Stefano Longari, Michele Carminati, Stefano Zanero:
Evaluating the Impact of Privacy-Preserving Federated Learning on CAN Intrusion Detection. VTC Spring 2024: 1-7 - [i11]Raffaele Giuseppe Cestari, Stefano Longari, Stefano Zanero, Simone Formentin:
Model Predictive Control with adaptive resilience for Denial-of-Service Attacks mitigation on a Regulated Dam. CoRR abs/2402.18516 (2024) - [i10]Lorenzo Binosi, Gregorio Barzasi, Michele Carminati, Stefano Zanero, Mario Polino:
The Illusion of Randomness: An Empirical Analysis of Address Space Layout Randomization Implementations. CoRR abs/2408.15107 (2024) - 2023
- [j28]Stefano Zanero:
Coming of Age. Commun. ACM 66(9): 21-23 (2023) - [j27]Alessandro Nichelini, Carlo Alberto Pozzoli, Stefano Longari, Michele Carminati, Stefano Zanero:
CANova: A hybrid intrusion detection framework based on automatic signal classification for CAN. Comput. Secur. 128: 103166 (2023) - [j26]Lorenzo Binosi, Mario Polino, Michele Carminati, Stefano Zanero:
BINO: Automatic recognition of inline binary functions from template classes. Comput. Secur. 132: 103312 (2023) - [j25]Tommaso Paladini, Francesco Monti, Mario Polino, Michele Carminati, Stefano Zanero:
Fraud Detection under Siege: Practical Poisoning Attacks and Defense Strategies. ACM Trans. Priv. Secur. 26(4): 45:1-45:35 (2023) - [c80]Yianna Danidou, Sara Ricci, Antonio F. Skarmeta, Jiri Hosek, Stefano Zanero, Imre Lendak:
DJM-CYBER: A Joint Master in Advanced Cybersecurity. ARES 2023: 65:1-65:10 - [c79]Mario D'Onghia, Federico Di Cesare, Luigi Gallo, Michele Carminati, Mario Polino, Stefano Zanero:
Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors. AISec@CCS 2023: 209-220 - [c78]Stefano Longari, Carlo Alberto Pozzoli, Alessandro Nichelini, Michele Carminati, Stefano Zanero:
CANdito: Improving Payload-Based Detection of Attacks on Controller Area Networks. CSCML 2023: 135-150 - [c77]Maria Paola Tatulli, Tommaso Paladini, Mario D'Onghia, Michele Carminati, Stefano Zanero:
HAMLET: A Transformer Based Approach for Money Laundering Detection. CSCML 2023: 234-250 - [c76]Stefano Longari, Francesco Noseda, Michele Carminati, Stefano Zanero:
Evaluating the Robustness of Automotive Intrusion Detection Systems Against Evasion Attacks. CSCML 2023: 337-352 - [c75]Alessandro Bertani, Marco Bonelli, Lorenzo Binosi, Michele Carminati, Stefano Zanero, Mario Polino:
Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation. DIMVA 2023: 256-275 - [c74]Lorenzo Binosi, Luca Rullo, Mario Polino, Michele Carminati, Stefano Zanero:
Rainfuzz: Reinforcement-Learning Driven Heat-Maps for Boosting Coverage-Guided Fuzzing. ICPRAM 2023: 39-50 - [c73]Davide Avanzi, Stefano Longari, Mario Polino, Michele Carminati, Andrea Maria Zanchettin, Mara Tanelli, Stefano Zanero:
Task Aware Intrusion Detection for Industrial Robots. ITASEC 2023 - [c72]Riccardo Remigio, Alessandro Bertani, Mario Polino, Michele Carminati, Stefano Zanero:
The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis. IWSEC 2023: 16-35 - [c71]Tommaso Paladini, Martino Bernasconi de Luca, Michele Carminati, Mario Polino, Francesco Trovò, Stefano Zanero:
Advancing Fraud Detection Systems Through Online Learning. ECML/PKDD (6) 2023: 275-292 - [c70]Armando Bellante, William Bonvini, Stefano Vanerio, Stefano Zanero:
Quantum Eigenfaces: Linear Feature Mapping and Nearest Neighbor Classification with Outlier Detection. QCE 2023: 196-207 - 2022
- [j24]Danilo Labanca, Luca Primerano, Marcus Markland-Montgomery, Mario Polino, Michele Carminati, Stefano Zanero:
Amaretto: An Active Learning Framework for Money Laundering Detection. IEEE Access 10: 41720-41739 (2022) - [j23]Nicola Galloro, Mario Polino, Michele Carminati, Andrea Continella, Stefano Zanero:
A Systematical and longitudinal study of evasive behaviors in windows malware. Comput. Secur. 113: 102550 (2022) - [j22]Mario D'Onghia, Matteo Salvadore, Benedetto Maria Nespoli, Michele Carminati, Mario Polino, Stefano Zanero:
Apícula: Static detection of API calls in generic streams of bytes. Comput. Secur. 119: 102775 (2022) - [j21]Armando Bellante, Alessandro Luongo, Stefano Zanero:
Quantum algorithms for SVD-based data representation and analysis. Quantum Mach. Intell. 4(2): 1-23 (2022) - [j20]Davide Maffiola, Stefano Longari, Michele Carminati, Mara Tanelli, Stefano Zanero:
GOLIATH: A Decentralized Framework for Data Collection in Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 23(8): 13372-13385 (2022) - [c69]Alvise de Faveri Tron, Stefano Longari, Michele Carminati, Mario Polino, Stefano Zanero:
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks. CCS 2022: 711-723 - [c68]Javier Fernández Rodríguez, Michele Papale, Michele Carminati, Stefano Zanero:
A Natural Language Processing Approach for Financial Fraud Detection. ITASEC 2022: 135-149 - [i9]Stefano Longari, Alessandro Nichelini, Carlo Alberto Pozzoli, Michele Carminati, Stefano Zanero:
CANdito: Improving Payload-based Detection of Attacks on Controller Area Networks. CoRR abs/2208.06628 (2022) - [i8]Alvise de Faveri Tron, Stefano Longari, Michele Carminati, Mario Polino, Stefano Zanero:
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks. CoRR abs/2209.09557 (2022) - 2021
- [j19]Stefano Longari, Daniel Humberto Nova Valcarcel, Mattia Zago, Michele Carminati, Stefano Zanero:
CANnolo: An Anomaly Detection System Based on LSTM Autoencoders for Controller Area Network. IEEE Trans. Netw. Serv. Manag. 18(2): 1913-1924 (2021) - [c67]Nicola Ruaro, Kyle Zeng, Lukas Dresel, Mario Polino, Tiffany Bao, Andrea Continella, Stefano Zanero, Christopher Kruegel, Giovanni Vigna:
SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning. RAID 2021: 456-468 - [i7]Armando Bellante, Alessandro Luongo, Stefano Zanero:
Quantum Algorithms for Data Representation and Analysis. CoRR abs/2104.08987 (2021) - 2020
- [c66]Alessandro Erba, Riccardo Taormina, Stefano Galelli, Marcello Pogliani, Michele Carminati, Stefano Zanero, Nils Ole Tippenhauer:
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems. ACSAC 2020: 480-495 - [c65]Dario Ferrari, Michele Carminati, Mario Polino, Stefano Zanero:
NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services. ACSAC 2020: 567-581 - [c64]Marcello Pogliani, Federico Maggi, Marco Balduzzi, Davide Quarta, Stefano Zanero:
Detecting Insecure Code Patterns in Industrial Robot Programs. AsiaCCS 2020: 759-771 - [c63]Federico Maggi, Marco Balduzzi, Rainer Vosseler, Martin Rösler, Walter Quadrini, Giacomo Tavola, Marcello Pogliani, Davide Quarta, Stefano Zanero:
Smart Factory Security: A Case Study on a Modular Smart Manufacturing System. ISM 2020: 666-675 - [c62]Michele Carminati, Luca Santini, Mario Polino, Stefano Zanero:
Evasion Attacks against Banking Fraud Detection Systems. RAID 2020: 285-300
2010 – 2019
- 2019
- [j18]Marcello Pogliani, Davide Quarta, Mario Polino, Martino Vittone, Federico Maggi, Stefano Zanero:
Security of controlled manufacturing systems in the connected factory: the case of industrial robots. J. Comput. Virol. Hacking Tech. 15(3): 161-175 (2019) - [c61]Stefano Longari, Matteo Penco, Michele Carminati, Stefano Zanero:
CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network. CPS-SPC@CCS 2019: 39-50 - [c60]Pietro Ferretti, Marcello Pogliani, Stefano Zanero:
Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots. CPS-SPC@CCS 2019: 51-61 - [c59]Stefano Longari, Andrea Cannizzo, Michele Carminati, Stefano Zanero:
A Secure-by-Design Framework for Automotive On-board Network Risk Analysis. VNC 2019: 1-8 - [i6]Alessandro Erba, Riccardo Taormina, Stefano Galelli, Marcello Pogliani, Michele Carminati, Stefano Zanero, Nils Ole Tippenhauer:
Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems. CoRR abs/1907.07487 (2019) - 2018
- [j17]Michele Carminati, Mario Polino, Andrea Continella, Andrea Lanzi, Federico Maggi, Stefano Zanero:
Security Evaluation of a Banking Fraud Analysis System. ACM Trans. Priv. Secur. 21(3): 11:1-11:31 (2018) - [c58]Gabriele Viglianisi, Michele Carminati, Mario Polino, Andrea Continella, Stefano Zanero:
SysTaint: Assisting Reversing of Malicious Network Communications. SSPREW@ACSAC 2018: 4:1-4:12 - [c57]Andrea Continella, Mario Polino, Marcello Pogliani, Stefano Zanero:
There's a Hole in that Bucket!: A Large-scale Analysis of Misconfigured S3 Buckets. ACSAC 2018: 702-711 - [c56]Michele Carminati, Alessandro Baggio, Federico Maggi, Umberto Spagnolini, Stefano Zanero:
FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds. DIMVA 2018: 211-233 - [c55]Pietro De Nicolao, Marcello Pogliani, Mario Polino, Michele Carminati, Davide Quarta, Stefano Zanero:
ELISA: ELiciting ISA of Raw Binaries for Fine-Grained Code and Data Separation. DIMVA 2018: 351-371 - [c54]Davide Quarta, Federico Salvioni, Andrea Continella, Stefano Zanero:
Extended Abstract: Toward Systematically Exploring Antivirus Engines. DIMVA 2018: 393-403 - [c53]Stefano Zanero:
When Cyber Got Real: Challenges in Securing Cyber-Physical Systems. IEEE SENSORS 2018: 1-4 - 2017
- [j16]Stefano Zanero:
Cyber-Physical Systems. Computer 50(4): 14-16 (2017) - [j15]Andrea Continella, Michele Carminati, Mario Polino, Andrea Lanzi, Stefano Zanero, Federico Maggi:
Prometheus: Analyzing WebInject-based information stealers. J. Comput. Secur. 25(2): 117-137 (2017) - [c52]Michele Carminati, Luca Valentini, Stefano Zanero:
A Supervised Auto-Tuning Approach for a Banking Fraud Detection System. CSCML 2017: 215-233 - [c51]Mario Polino, Andrea Continella, Sebastiano Mariani, Stefano D'Alessio, Lorenzo Fontana, Fabio Gritti, Stefano Zanero:
Measuring and Defeating Anti-Instrumentation-Equipped Malware. DIMVA 2017: 73-96 - [c50]Andrea Palanca, Eric Evenchick, Federico Maggi, Stefano Zanero:
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks. DIMVA 2017: 185-206 - [c49]Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, Andrea Maria Zanchettin, Stefano Zanero:
An Experimental Security Analysis of an Industrial Robot Controller. IEEE Symposium on Security and Privacy 2017: 268-286 - 2016
- [j14]Giorgio Di Natale, Stefano Zanero:
Editorial. IEEE Trans. Emerg. Top. Comput. 4(1): 33-34 (2016) - [c48]Andrea Continella, Alessandro Guagnelli, Giovanni Zingaro, Giulio De Pasquale, Alessandro Barenghi, Stefano Zanero, Federico Maggi:
ShieldFS: a self-healing, ransomware-aware filesystem. ACSAC 2016: 336-347 - [c47]Chengyu Zheng, Mila Dalla Preda, Jorge Granjal, Stefano Zanero, Federico Maggi:
On-chip system call tracing: A feasibility study and open prototype. CNS 2016: 73-81 - [c46]Andrea Mambretti, Kaan Onarlioglu, Collin Mulliner, William Robertson, Engin Kirda, Federico Maggi, Stefano Zanero:
Trellis: Privilege Separation for Multi-user Applications Made Easy. RAID 2016: 437-456 - [c45]Enrico Bazzoli, Claudio Criscione, Federico Maggi, Stefano Zanero:
XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners. SEC 2016: 243-258 - [c44]Chengyu Zheng, Nicola Dellarocca, Niccolò Andronio, Stefano Zanero, Federico Maggi:
GreatEatlon: Fast, Static Detection of Mobile Ransomware. SecureComm 2016: 617-636 - 2015
- [j13]Michele Carminati, Roberto Caron, Federico Maggi, Ilenia Epifani, Stefano Zanero:
BankSealer: A decision support system for online banking fraud analysis and investigation. Comput. Secur. 53: 175-186 (2015) - [j12]Andrea Valdi, Eros Lever, Simone Benefico, Davide Quarta, Stefano Zanero, Federico Maggi:
Scalable Testing of Mobile Antivirus Applications. Computer 48(11): 60-68 (2015) - [c43]Luca Falsina, Yanick Fratantonio, Stefano Zanero, Christopher Kruegel, Giovanni Vigna, Federico Maggi:
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications. ACSAC 2015: 201-210 - [c42]Daniele Gallingani, Rigel Gjomemo, V. N. Venkatakrishnan, Stefano Zanero:
Practical Exploit Generation for Intent Message Vulnerabilities in Android. CODASPY 2015: 155-157 - [c41]Mario Polino, Andrea Scorti, Federico Maggi, Stefano Zanero:
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries. DIMVA 2015: 121-143 - [c40]Nicoló Andronio, Stefano Zanero, Federico Maggi:
HelDroid: Dissecting and Detecting Mobile Ransomware. RAID 2015: 382-404 - [i5]Federico Maggi, Stefano Zanero, Evangelos P. Markatos:
European Cyber-Security Research and Innovation. ERCIM News 2015(100) (2015) - 2014
- [j11]Sergey Bratus, Iván Arce, Michael E. Locasto, Stefano Zanero:
Why Offensive Security Needs Engineering Textbooks: Or, How to Avoid a Replay of "Crypto Wars" in Security Research. login Usenix Mag. 39(4) (2014) - [j10]Gabriele Bonetti, Marco Viglione, Alessandro Frossi, Federico Maggi, Stefano Zanero:
Black-box forensic and antiforensic characteristics of solid-state drives. J. Comput. Virol. Hacking Tech. 10(4): 255-271 (2014) - [c39]Iasonas Polakis, Federico Maggi, Stefano Zanero, Angelos D. Keromytis:
Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned. BADGERS@ESORICS 2014: 18-29 - [c38]Iasonas Polakis, Panagiotis Ilia, Federico Maggi, Marco Lancini, Georgios Kontaxis, Stefano Zanero, Sotiris Ioannidis, Angelos D. Keromytis:
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication. CCS 2014: 501-512 - [c37]Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero, Sotiris Ioannidis:
AndRadar: Fast Discovery of Android Applications in Alternative Markets. DIMVA 2014: 51-71 - [c36]Stefano Schiavoni, Federico Maggi, Lorenzo Cavallaro, Stefano Zanero:
Phoenix: DGA-Based Botnet Tracking and Intelligence. DIMVA 2014: 192-211 - [c35]Michele Spagnuolo, Federico Maggi, Stefano Zanero:
BitIodine: Extracting Intelligence from the Bitcoin Network. Financial Cryptography 2014: 457-468 - [c34]Alessio Antonini, Federico Maggi, Stefano Zanero:
A Practical Attack Against a KNX-based Building Automation System. ICS-CSR 2014 - [c33]Claudio Criscione, Fabio Bosatelli, Stefano Zanero, Federico Maggi:
ZARATHUSTRA: Extracting Webinject signatures from banking trojans. PST 2014: 139-148 - [c32]Michele Carminati, Roberto Caron, Federico Maggi, Ilenia Epifani, Stefano Zanero:
BankSealer: An Online Banking Fraud Analysis and Decision Support System. SEC 2014: 380-394 - [c31]Nick Nikiforakis, Federico Maggi, Gianluca Stringhini, M. Zubair Rafique, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna, Stefano Zanero:
Stranger danger: exploring the ecosystem of ad-based URL shortening services. WWW 2014: 51-62 - [i4]Andrea Gianazza, Federico Maggi, Aristide Fattori, Lorenzo Cavallaro, Stefano Zanero:
PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications. CoRR abs/1402.4826 (2014) - [i3]Enrico Bazzoli, Claudio Criscione, Federico Maggi, Stefano Zanero:
XSS Peeker: A Systematic Analysis of Cross-site Scripting Vulnerability Scanners. CoRR abs/1410.4207 (2014) - 2013
- [j9]Andrea Dardanelli, Federico Maggi, Mara Tanelli, Stefano Zanero, Sergio M. Savaresi, R. Kochanek, Thorsten Holz:
A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth. IEEE Embed. Syst. Lett. 5(3): 34-37 (2013) - [c30]Gabriele Bonetti, Marco Viglione, Alessandro Frossi, Federico Maggi, Stefano Zanero:
A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives. ACSAC 2013: 269-278 - [c29]Federico Maggi, Andrea Valdi, Stefano Zanero:
AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors. SPSM@CCS 2013: 49-54 - [c28]Federico Maggi, Alessandro Frossi, Stefano Zanero, Gianluca Stringhini, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna:
Two years of short URLs internet measurement: security threats and countermeasures. WWW 2013: 861-872 - [i2]Stefano Schiavoni, Federico Maggi, Lorenzo Cavallaro, Stefano Zanero:
Tracking and Characterizing Botnets Using Automatically Generated Domains. CoRR abs/1311.5612 (2013) - 2012
- [c27]Martina Lindorfer, Alessandro Di Federico, Federico Maggi, Paolo Milani Comparetti, Stefano Zanero:
Lines of malicious code: insights into the malicious software industry. ACSAC 2012: 349-358 - [c26]Iasonas Polakis, Marco Lancini, Georgios Kontaxis, Federico Maggi, Sotiris Ioannidis, Angelos D. Keromytis, Stefano Zanero:
All your face are belong to us: breaking Facebook's social authentication. ACSAC 2012: 399-408 - [c25]Luigi Sportiello, Stefano Zanero:
Context-Based File Block Classification. IFIP Int. Conf. Digital Forensics 2012: 67-82 - [c24]Federico Maggi, Stefano Zanero:
Integrated detection of anomalous behavior of computer infrastructures. NOMS 2012: 866-871 - [i1]Stefano Zanero, Sotiris Ioannidis, Evangelos P. Markatos:
i-Code: Real-Time Malicious Code Identification. ERCIM News 2012(90) (2012) - 2011
- [c23]Luigi Sportiello, Stefano Zanero:
File Block Classification by Support Vector Machine. ARES 2011: 307-312 - [c22]Federico Maggi, Alessandro Sisto, Stefano Zanero:
A social-engineering-centric data collection initiative to study phishing. BADGERS@EuroSys 2011: 107-108 - [c21]Stefano Maggi, Alberto Volpatto, Simone Gasparini, Giacomo Boracchi, Stefano Zanero:
Poster: fast, automatic iPhone shoulder surfing. CCS 2011: 805-808 - [c20]Federico Maggi, Stefano Zanero:
Systems Security Research at Politecnico di Milano. SysSec@DIMVA 2011: 127-130 - [c19]Federico Maggi, Andrea Bellini, Guido Salvaneschi, Stefano Zanero:
Finding Non-trivial Malware Naming Inconsistencies. ICISS 2011: 144-159 - [c18]Francesco Roveta, Giorgio Caviglia, Luca Di Mario, Stefano Zanero, Federico Maggi, Paolo Ciuccarelli:
BURN: baring unknown rogue networks. VizSEC 2011: 6 - 2010
- [j8]Federico Maggi, Matteo Matteucci, Stefano Zanero:
Detecting Intrusions through System Call Sequence and Argument Analysis. IEEE Trans. Dependable Secur. Comput. 7(4): 381-395 (2010) - [c17]Alberto Volpatto, Federico Maggi, Stefano Zanero:
Effective Multimodel Anomaly Detection Using Cooperative Negotiation. GameSec 2010: 180-191 - [c16]Paolo Milani Comparetti, Guido Salvaneschi, Engin Kirda, Clemens Kolbitsch, Christopher Kruegel, Stefano Zanero:
Identifying Dormant Functionality in Malware Programs. IEEE Symposium on Security and Privacy 2010: 61-76
2000 – 2009
- 2009
- [j7]Stefano Zanero:
Wireless Malware Propagation: A Reality Check. IEEE Secur. Priv. 7(5): 70-74 (2009) - [j6]Federico Maggi, Matteo Matteucci, Stefano Zanero:
Reducing false positives in anomaly detectors through fuzzy alert aggregation. Inf. Fusion 10(4): 300-311 (2009) - [c15]Alessandro Frossi, Federico Maggi, Gian Luigi Rizzo, Stefano Zanero:
Selecting and Improving System Call Models for Anomaly Detection. DIMVA 2009: 206-223 - [c14]Antonio Galante, Ary Kokos, Stefano Zanero:
BlueBat: Towards Practical Bluetooth Honeypots. ICC 2009: 1-6 - 2008
- [j5]Stefano Zanero, Giuliano Casale:
GIVS: integrity validation for grid security. Int. J. Crit. Infrastructures 4(3): 319-333 (2008) - [c13]Stefano Zanero:
ULISSE, a network intrusion detection system. CSIIRW 2008: 20:1-20:4 - [c12]Cory Altheide, Claudio Merloni, Stefano Zanero:
A methodology for the repeatable forensic analysis of encrypted drives. EUROSEC 2008: 22-26 - [c11]Francesco Amigoni, Fabrizio Basilico, Nicola Basilico, Stefano Zanero:
Integrating Partial Models of Network Normality via Cooperative Negotiation: An Approach to Development of Multiagent Intrusion Detection Systems. IAT 2008: 531-537 - [c10]Stefano Zanero, Giuseppe Serazzi:
Unsupervised learning algorithms for intrusion detection. NOMS 2008: 1043-1048 - 2007
- [j4]Luca Carettoni, Claudio Merloni, Stefano Zanero:
Studying Bluetooth Malware Propagation: The BlueBag Project. IEEE Secur. Priv. 5(2): 17-25 (2007) - [c9]Federico Maggi, Stefano Zanero:
On the Use of Different Statistical Tests for Alert Correlation - Short Paper. RAID 2007: 167-177 - 2006
- [b1]Stefano Zanero:
Unsupervised learning algorithms for intrusion detection. Polytechnic University of Milan, Italy, 2006 - [j3]Eric Filiol, Marko Helenius, Stefano Zanero:
Open Problems in Computer Virology. J. Comput. Virol. 1(3-4): 55-66 (2006) - 2005
- [c8]Giuliano Casale, Paolo Cremonesi, Giuseppe Serazzi, Stefano Zanero:
Performance Issues in Video Streaming Environments. FIRB-Perf 2005: 3-14 - [c7]Giuliano Casale, Stefano Zanero:
GIVS: Integrity Validation for Grid Security. International Conference on Computational Science (3) 2005: 147-154 - [c6]Stefano Zanero:
Analyzing TCP Traffic Patterns Using Self Organizing Maps. ICIAP 2005: 83-90 - [c5]Stefano Zanero:
Security and Trust in the Italian Legal Digital Signature Framework. iTrust 2005: 34-44 - 2004
- [j2]Pierluigi Perri, Stefano Zanero:
Lessons learned from the Italian law on privacy - Part I. Comput. Law Secur. Rev. 20(4): 310-313 (2004) - [j1]Pierluigi Perri, Stefano Zanero:
Lessons learned from the Italian law on privacy - Part II. Comput. Law Secur. Rev. 20(5): 384-389 (2004) - [c4]Stefano Zanero:
Behavioral Intrusion Detection. ISCIS 2004: 657-666 - [c3]Lorenzo Muttoni, Giuliano Casale, Federico Granata, Stefano Zanero:
Optimal Number of Nodes for Computation in Grid Environments. PDP 2004: 282-289 - [c2]Stefano Zanero, Sergio M. Savaresi:
Unsupervised learning techniques for an intrusion detection system. SAC 2004: 412-419 - 2003
- [c1]Giuseppe Serazzi, Stefano Zanero:
Computer Virus Propagation Models. MASCOTS Tutorials 2003: 26-50
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 21:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint