default search action
Search dblp for Publications
export results for "stream:conf/itasec:"
@inproceedings{DBLP:conf/itasec/AnleyEG24, author = {Mulualem Bitew Anley and Otuekong Ekpo and T. Milinda H. Gedara}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Cybersecurity Assessment of Digital Twin in Smart Grids}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper03.pdf}, timestamp = {Fri, 26 Jul 2024 13:58:33 +0200}, biburl = {https://dblp.org/rec/conf/itasec/AnleyEG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/ArdebiliMMLLF24, author = {Al{\`{\i}} Aghazadeh Ardebili and Cristian Martella and Angelo Martella and Alessandro Lazari and Antonella Longo and Antonio Ficarella}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Smart Critical Infrastructures Security management and governance: Implementation of Cyber Resilience KPIs for Decentralized Energy Asset}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper24.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/ArdebiliMMLLF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/ArtioliAFM24, author = {Andrea Artioli and Mauro Andreolini and Luca Ferretti and Mirco Marchetti}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Evaluating trainees in large cyber exercises}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper42.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/ArtioliAFM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BaiardiCS24, author = {Fabrizio Baiardi and Cosimo Comella and Vincenzo Sammartino}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Multilevel Database Decomposition Framework}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper32.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/BaiardiCS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BaldiniF24, author = {Davide Baldini and Kate Francis}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {{AI} Regulatory Sandboxes between the {AI} Act and the {GDPR:} the role of Data Protection as a Corporate Social}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper07.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/BaldiniF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BarbareschiBCS024, author = {Mario Barbareschi and Biagio Boi and Franco Cirillo and Marco De Santis and Christian Esposito}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Securing the Internet of Medical Things using PUF-based {SSI} Authentication}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper36.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/BarbareschiBCS024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BatoolCCRM24, author = {Farwa Batool and Federico Canino and Federico Concone and Giuseppe Lo Re and Marco Morana}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {A Black-box Adversarial Attack on Fake News Detection Systems}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper08.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/BatoolCCRM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BernardiniCADT24, author = {Andrea Bernardini and Claudio Carpineto and Simone Angelini and Giovanna Dondossola and Roberta Terruggia}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Ask the right queries: Improving search engine retrieval of vulnerable internet-connected devices through interactive query reformulation}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper27.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/BernardiniCADT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BistarelliCLM024, author = {Stefano Bistarelli and Michele Ceccarelli and Chiara Luchini and Ivan Mercanti and Francesco Santini}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {A Preliminary Study on the Creation of a Covert Channel with {HTTP} Headers}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper34.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/BistarelliCLM024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BlanchiniCMFRA024, author = {Marco Blanchini and Michele Cerreta and Davide Di Monda and Matteo Fabbri and Mario Raciti and Hamza Sajjad Ahmad and Gabriele Costa}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Supporting Criminal Investigations on the Blockchain: {A} Temporal Logic-based Approach}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper33.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/BlanchiniCMFRA024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BraccialeLR024, author = {Lorenzo Bracciale and Pierpaolo Loreti and Emanuele Raso and Giuseppe Bianchi}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {In Plain Sight: {A} Pragmatic Exploration of the Medical Landscape (In)security}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper15.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/BraccialeLR024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BuccafurriALS24, author = {Francesco Buccafurri and Vincenzo De Angelis and Sara Lazzaro and Giorgia Sigilli}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Towards K-Anonymous Payments in Ethereum}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper01.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/BuccafurriALS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BuriroL24, author = {Attaullah Buriro and Flaminia L. Luccio}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {2in1: {A} Bimodal Behavioral Biometric-based User Authentication Scheme for Smartphones}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper31.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/BuriroL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CalefatoLQ24, author = {Fabio Calefato and Filippo Lanubile and Luigi Quaranta}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Security Risks and Best Practices of MLOps: {A} Multivocal Literature Review}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper13.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/CalefatoLQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CampiL24, author = {Alessia Michela Di Campi and Flaminia L. Luccio}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Understanding how users choose passwords: analysis and best practices}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper43.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/CampiL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/Caporaso0Q24, author = {Pasquale Caporaso and Giuseppe Bianchi and Francesco Quaglia}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Benchmarking Virtualized Page Permission for Malware Detection: a Web Server Case Study}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper10.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/Caporaso0Q24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CarlettiFSV24, author = {Vincenzo Carletti and Pasquale Foggia and Alessia Saggese and Mario Vento}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Predicting Source Code Vulnerabilities Using Deep Learning: {A} Fair Comparison on Real Data}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper04.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/CarlettiFSV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CasarosaC24, author = {Federica Casarosa and Giovanni Comand{\`{e}}}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Private law perspectives of cybersecurity}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper12.pdf}, timestamp = {Fri, 30 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/CasarosaC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CerottiRDEFPTS24, author = {Davide Cerotti and Daniele Codetta Raiteri and Giovanna Dondossola and Lavinia Egidi and Giuliana Franceschinis and Luigi Portinale and Roberta Terruggia and Davide Savarro}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {SecuriDN: a customizable {GUI} generating cybersecurity models for {DER} control architectures}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper05.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/CerottiRDEFPTS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CiravegnaBL24, author = {Flavio Ciravegna and Giacomo Bruno and Antonio Lioy}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {IKE-less IPsec: Enhancing Security for IoT Device Networks}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper35.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/CiravegnaBL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CoppolinoCNPRU24, author = {Luigi Coppolino and Alessandro De Crecchio and Roberto Nardone and Alfredo Petruolo and Luigi Romano and Federica Uccello}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Exploiting Data Spaces to Enable Privacy Preserving Data Exchange in the Energy Supply Chain}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper38.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/CoppolinoCNPRU24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/Corinto24, author = {Arturo di Corinto}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {The role of disinformation, propaganda and active measures in cyber warfare. noname(057)16 travels to Italy}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper26.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/Corinto24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CostaB24, author = {Gabriele Costa and Cosimo {Perini Brogi}}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Toward dynamic epistemic verification of zero-knowledge protocols}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper25.pdf}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/CostaB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/FenzaFS24, author = {Giuseppe Fenza and Salvatore Froncillo and Claudio Stanzione}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Enhancing Fraud Detection through Cascading Machine Learning Models and Clustering Techniques}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper19.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/FenzaFS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/FerroL24, author = {Lorenzo Ferro and Antonio Lioy}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Standard-Based Remote Attestation: The Veraison Project}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper28.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/FerroL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/FiorinelliZ24, author = {Gaia Fiorinelli and Maria Vittoria Zucca}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Is the Road to Hell Paved with Good Intentions? {A} Criminological and Criminal Law Analysis of Prospective Regulation for Ethical Hacking in Italy and the {EU}}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper45.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/FiorinelliZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/FuscoA24, author = {Ludovico Fusco and Alessandro Aldini}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Hyperproperties for Safe and Secure {RFID} Systems}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper20.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/FuscoA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/GrecoD0C24, author = {Francesco Greco and Giuseppe Desolda and Andrea Esposito and Alessandro Carelli}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {David versus Goliath: Can Machine Learning Detect LLM-Generated Text? {A} Case Study in the Detection of Phishing Emails}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper41.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/GrecoD0C24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/LusvardiFA24, author = {Gianmarco Lusvardi and Luca Ferretti and Mauro Andreolini}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Timing side-channel attacks on {USB} devices using eBPF}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper17.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/LusvardiFA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/PaccamiccioRL24, author = {Mattia Paccamiccio and Franco Raimondi and Michele Loreti}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Building call graph of WebAssembly programs via abstract semantics}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper30.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/PaccamiccioRL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/PaierPFM24, author = {Matteo Paier and Mattia Pizzolitto and Gian Luca Foresti and Marino Miculan}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Netstaldi: {A} Modular Distributed Architecture for Incremental Network Discovery}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper37.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/PaierPFM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/PaolaDFR24, author = {Alessandra De Paola and Salvatore Drago and Pierluca Ferraro and Giuseppe Lo Re}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Detecting Zero-Day Attacks under Concept Drift: An Online Unsupervised Threat Detection System}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper06.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/PaolaDFR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/PatroneLFBADRLZ24, author = {Fabio Patrone and Pierpaolo Loreti and Luca Fiscariello and Lorenzo Bracciale and Alessandro Amici and Andrea Detti and Cesare Roseti and Michele Luglio and Francesco Zampognaro and Giuseppe Bianchi and Mario Marchese}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {OpenSatRange: An open cyber range for operators and users of satellite communication networks}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper18.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/PatroneLFBADRLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/PuccettiZC24, author = {Tommaso Puccetti and Tommaso Zoppi and Andrea Ceccarelli}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {On attacks (dis)similarities to test adversarial defense: can we reduce the attack set?}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper23.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/PuccettiZC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/RecordareCFT24, author = {Alessandra Recordare and Guglielmo Cola and Tiziano Fagni and Maurizio Tesconi}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Unveiling Online Conspiracy Theorists: a Text-Based Approach and Characterization}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper29.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/RecordareCFT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/ReganoCM24, author = {Leonardo Regano and Daniele Canavese and Luca Mannella}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {A Privacy-Preserving Approach for Vulnerability Scanning Detection}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper44.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/ReganoCM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/RivittiT024, author = {Alessandro Rivitti and Angelo Tulumello and Giuseppe Bianchi}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {The Case for Ultra High Speed Portable Network Security Filters}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper11.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/RivittiT024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/RussoZM24, author = {Silvio Russo and Claudio Zanasi and Isabella Marasco}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Feature extraction for anomaly detection in industrial control systems}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper22.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/RussoZM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/SalvatoriBQ024, author = {Michele Salvatori and Giorgio Bernardinetti and Francesco Quaglia and Giuseppe Bianchi}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {ShiftyLoader: Syscall-free Reflective Code Injection in the Linux Operating System}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper02.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/SalvatoriBQ024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/SenetteGFPT24, author = {Caterina Senette and Margherita Gambini and Tiziano Fagni and Victoria Popa and Maurizio Tesconi}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Inferring Political Leaning on {X} (Twitter): {A} Zero-Shot Approach in an Italian Scenario}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper39.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/SenetteGFPT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/StabiliVBVM24, author = {Dario Stabili and Filip Valgimigli and Tobia Bocchi and Filippo Veronesi and Mirco Marchetti}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Implementing and testing RollJam on Software-Defined Radios}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper40.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/StabiliVBVM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/TalottiPM24, author = {Enrico Talotti and Matteo Paier and Marino Miculan}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {ECC's Achilles' Heel: Unveiling Weak Keys in Standardized Curves}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper09.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/TalottiPM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/VenturiGSM24, author = {Andrea Venturi and Dimitri Gall and Dario Stabili and Mirco Marchetti}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Hardening Machine Learning based Network Intrusion Detection Systems with synthetic netflows}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper16.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/VenturiGSM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/VerderameC24, author = {Luca Verderame and Luca Caviglione}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Design of a Hardening Module for Automatically Securing Containers}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper14.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/VerderameC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/ZampognaroV024, author = {Francesco Zampognaro and Domenico Verde and Giuseppe Bianchi}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {VoWiFi Security: An Exploration of Non-3GPP Untrusted Access via Public ePDG URLs}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper21.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/ZampognaroV024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/itasec/2024, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731}, urn = {urn:nbn:de:0074-3731-3}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/AltaruiMP23, author = {Andrea Altarui and Marino Miculan and Matteo Paier}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {DBCChecker: a Bigraph-based Tool for Checking Security Properties of Container Compositions}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper01.pdf}, timestamp = {Tue, 12 Nov 2024 10:12:41 +0100}, biburl = {https://dblp.org/rec/conf/itasec/AltaruiMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/AndreoliniAFMC23, author = {Mauro Andreolini and Andrea Artioli and Luca Ferretti and Mirco Marchetti and Michele Colajanni}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {A Framework for Automating Security Assessments with Deductive Reasoning}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper02.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/AndreoliniAFMC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/AvanziLPCZTZ23, author = {Davide Avanzi and Stefano Longari and Mario Polino and Michele Carminati and Andrea Maria Zanchettin and Mara Tanelli and Stefano Zanero}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {Task Aware Intrusion Detection for Industrial Robots}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper03.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/AvanziLPCZTZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BernardinettiC023, author = {Giorgio Bernardinetti and Dimitri Di Cristofaro and Giuseppe Bianchi}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {Windows Antivirus Evasion Techniques: How to Stay Ahead of the Hooks}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper04.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/BernardinettiC023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BistarelliM023, author = {Stefano Bistarelli and Francesco Micheli and Francesco Santini}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {A Survey on Decentralized Identifier Methods for Self Sovereign Identity}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper05.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/BistarelliM023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/Bonfiglio0F23, author = {Alessandro Bonfiglio and Gabriele Costa and Silvia de Francisci}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {{NIF:} Reactive Injection Attack via Nmap Piggybacking}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper06.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/Bonfiglio0F23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BreveCDE23, author = {Bernardo Breve and Gaetano Cimino and Vincenzo Deufemia and Annunziata Elefante}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {User Perception of Risks Associated with {IFTTT} Applets: {A} Preliminary User Study}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper07.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/BreveCDE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CambiasoC23, author = {Enrico Cambiaso and Luca Caviglione}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {Scamming the Scammers: Using ChatGPT to Reply Mails for Wasting Time and Resources}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper08.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/CambiasoC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CaponeDPR23, author = {Daniele Capone and Angelo Delicato and Gaetano Perrone and Simon Pietro Romano}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {Container-based Virtualization for Ethical Hacking with {HOUDINI}}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper09.pdf}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/CaponeDPR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CastroGIP23, author = {Francesco Castro and Stefano Galantucci and Donato Impedovo and Giuseppe Pirlo}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {A Heuristic to Select the Optimal Transformation Matrixes in Bio-Convolving with Mixing Transform}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper10.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/CastroGIP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/ColaMT23, author = {Guglielmo Cola and Michele Mazza and Maurizio Tesconi}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {From Tweet to Theft: Tracing the Flow of Stolen Cryptocurrency}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper11.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/ColaMT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/ComitoPCL0023, author = {Carmela Comito and Francesco Sergio Pisani and Erica Coppolillo and Angelica Liguori and Massimo Guarascio and Giuseppe Manco}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {Towards Self-Supervised Cross-Domain Fake News Detection}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper12.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/ComitoPCL0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/ConcasOPM23, author = {Sara Concas and Giulia Orr{\`{u}} and Emiliano De Paoli and Gian Luca Marcialis}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {Preliminary Results on a "Real" Iris Recognition System under Challenging Operational Conditions}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper13.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/ConcasOPM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/Cook023, author = {Andrew Cook and Luca Vigan{\`{o}}}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {Formal Analysis of Security Protocols with Movement}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper14.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/Cook023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/DaoudaghM23, author = {Said Daoudagh and Eda Marchetti}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {Breakthroughs in Testing and Certification in Cybersecurity: Research Gaps and Open Problems}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper15.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/DaoudaghM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/DavidGMP23, author = {Bernardo David and Rosario Giustolisi and Victor Mortensen and Morten Pedersen}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {Local Differential Privacy in Voting}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper16.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/DavidGMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/FenzaLMS23, author = {Giuseppe Fenza and Vincenzo Loia and Paola Montserrat Mainardi and Claudio Stanzione}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {{OSINT} Knowledge Graph for Fact-Checking: Google Map Hacks Debunking}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper18.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/FenzaLMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/FerrettiTAM23, author = {Luca Ferretti and Mattia Trabucco and Mauro Andreolini and Mirco Marchetti}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {How (not) to Index Order Revealing Encrypted Databases}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper19.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/FerrettiTAM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/GennaiSMB23, author = {Francesco Gennai and Fabio Sinibaldi and Loredana Martusciello and Marina Buzzi}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {{SAE} - Secure Application Email Architecture}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper20.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/GennaiSMB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/GervasiTFC23, author = {Massimiliano Gervasi and Nicol{\`{o}} Gianmauro Totaro and Anna Fornaio and Danilo Caivano}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {Big Data Value Graph: Enhancing Security and Generating new Value from Big Data}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper21.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/GervasiTFC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/GrecoD023, author = {Francesco Greco and Giuseppe Desolda and Andrea Esposito}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {Explaining Phishing Attacks: An {XAI} Approach to Enhance User Awareness and Trust}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper22.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/GrecoD023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/KnappQ23, author = {Jodie Knapp and Elizabeth A. Quaglia}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {{CLUE:} Certificateless Updatable Encryption}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper23.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/KnappQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/MancinoL0D23, author = {Davide Mancino and Alberto Leporati and Marco Viviani and Giovanni Denaro}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {Exploiting Ethereum after "The Merge": The Interplay between PoS and {MEV} Strategies}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper24.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/MancinoL0D23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/MassaroCM23, author = {Valerio Giuseppe Massaro and Luca Capacci and Rebecca Montanari}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {Towards Context-Aware Risk Assessment Scoring System for IoT/IIoT Devices}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper25.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/MassaroCM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/PalaPSMG23, author = {Bruno Pala and Lorenzo Pisu and Silvia Lucia Sanna and Davide Maiorca and Giorgio Giacinto}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {A Targeted Assessment of Cross-Site Scripting Detection Tools}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper26.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/PalaPSMG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/PiccioneB0023, author = {Andrea Piccione and Giorgio Bernardinetti and Alessandro Pellegrini and Giuseppe Bianchi}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {Is Your Smartphone Really Safe? {A} Wake-up Call on Android Antivirus Software Effectiveness}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper27.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/PiccioneB0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/PriscoFIMZ23, author = {Roberto De Prisco and Ciro Fusco and Michele Iannucci and Delfina Malandrino and Rocco Zaccagnino}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {Text-Independent Voice Recognition based on Siamese Networks and Fusion Embeddings}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper17.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/PriscoFIMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/RomanoCPR23, author = {Simon Pietro Romano and Alfonso Calabria and Anna Piscitelli and Antonio Russo}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {Sharing Responsibilities through Distributed Key Generation in the Chirotonia e-Voting Framework}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper28.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/RomanoCPR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/VenturiPAFMC23, author = {Andrea Venturi and Daniele Pellegrini and Mauro Andreolini and Luca Ferretti and Mirco Marchetti and Michele Colajanni}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {Practical Evaluation of Graph Neural Networks in Network Intrusion Detection}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper29.pdf}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/VenturiPAFMC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/itasec/2023, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488}, urn = {urn:nbn:de:0074-3488-5}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/AgateDPFRM22, author = {Vincenzo Agate and Felice Maria D'Anna and Alessandra De Paola and Pierluca Ferraro and Giuseppe Lo Re and Marco Morana}, editor = {Camil Demetrescu and Alessandro Mei}, title = {A Behavior-Based Intrusion Detection System Using Ensemble Learning Techniques}, booktitle = {Proceedings of the Italian Conference on Cybersecurity {(ITASEC} 2022), Rome, Italy, June 20-23, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3260}, pages = {207--218}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3260/paper15.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:11 +0100}, biburl = {https://dblp.org/rec/conf/itasec/AgateDPFRM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/AngioniDPB22, author = {Daniele Angioni and Luca Demetrio and Maura Pintor and Battista Biggio}, editor = {Camil Demetrescu and Alessandro Mei}, title = {Robust Machine Learning for Malware Detection over Time}, booktitle = {Proceedings of the Italian Conference on Cybersecurity {(ITASEC} 2022), Rome, Italy, June 20-23, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3260}, pages = {169--180}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3260/paper12.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/AngioniDPB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BistarelliB022, author = {Stefano Bistarelli and Emanuele Bosimini and Francesco Santini}, editor = {Camil Demetrescu and Alessandro Mei}, title = {On Identifying Repeated Patterns of {OT} Attacks with LOGistICS}, booktitle = {Proceedings of the Italian Conference on Cybersecurity {(ITASEC} 2022), Rome, Italy, June 20-23, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3260}, pages = {17--29}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3260/paper2.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BistarelliB022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CannarileCGIP22, author = {Angelo Cannarile and Francesco Carrera and Stefano Galantucci and Andrea Iannacone and Giuseppe Pirlo}, editor = {Camil Demetrescu and Alessandro Mei}, title = {A Study on Malware Detection and Classification Using the Analysis of {API} Calls Sequences Through Shallow Learning and Recurrent Neural Networks}, booktitle = {Proceedings of the Italian Conference on Cybersecurity {(ITASEC} 2022), Rome, Italy, June 20-23, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3260}, pages = {124--134}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3260/paper9.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/CannarileCGIP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CilliMSV22, author = {Claudio Cilli and Giulio Magnanini and Marco Silipigni and Fabrizio Venettoni}, editor = {Camil Demetrescu and Alessandro Mei}, title = {"Safe Prescription": {A} Decentralized Blockchain Protocol to Manage Medical Prescriptions}, booktitle = {Proceedings of the Italian Conference on Cybersecurity {(ITASEC} 2022), Rome, Italy, June 20-23, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3260}, pages = {30--51}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3260/paper3.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/CilliMSV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CosciaDGIM22, author = {Antonio Coscia and Vincenzo Dentamaro and Stefano Galantucci and Donato Impedovo and Antonio Maci}, editor = {Camil Demetrescu and Alessandro Mei}, title = {A Novel Genetic Algorithm Approach for Firewall Policy Optimization}, booktitle = {Proceedings of the Italian Conference on Cybersecurity {(ITASEC} 2022), Rome, Italy, June 20-23, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3260}, pages = {236--248}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3260/paper17.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/CosciaDGIM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/GaldiPR22, author = {Emanuele Galdi and Gaetano Perrone and Simon Pietro Romano}, editor = {Camil Demetrescu and Alessandro Mei}, title = {ThePhish: an Automated Open-Source Phishing Email Analysis Platform}, booktitle = {Proceedings of the Italian Conference on Cybersecurity {(ITASEC} 2022), Rome, Italy, June 20-23, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3260}, pages = {76--101}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3260/paper6.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/GaldiPR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/GuarascioZC0C22, author = {Massimo Guarascio and Marco Zuppelli and Nunziato Cassavia and Giuseppe Manco and Luca Caviglione}, editor = {Camil Demetrescu and Alessandro Mei}, title = {Detection of Network Covert Channels in IoT Ecosystems Using Machine Learning}, booktitle = {Proceedings of the Italian Conference on Cybersecurity {(ITASEC} 2022), Rome, Italy, June 20-23, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3260}, pages = {102--113}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3260/paper7.pdf}, timestamp = {Wed, 24 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/GuarascioZC0C22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/ImpedovoLPSV22, author = {Donato Impedovo and Annalisa Longo and Tonino Palmisano and Lucia Sarcinella and Davide Veneto}, editor = {Camil Demetrescu and Alessandro Mei}, title = {An Investigation on Voice Mimicry Attacks to a Speaker Recognition System}, booktitle = {Proceedings of the Italian Conference on Cybersecurity {(ITASEC} 2022), Rome, Italy, June 20-23, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3260}, pages = {114--123}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3260/paper8.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/ImpedovoLPSV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/PirasPDB22, author = {Giorgio Piras and Maura Pintor and Luca Demetrio and Battista Biggio}, editor = {Camil Demetrescu and Alessandro Mei}, title = {Explaining Machine Learning {DGA} Detectors from {DNS} Traffic Data}, booktitle = {Proceedings of the Italian Conference on Cybersecurity {(ITASEC} 2022), Rome, Italy, June 20-23, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3260}, pages = {150--168}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3260/paper11.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/PirasPDB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/RanaldiNFZ22, author = {Leonardo Ranaldi and Aria Nourbakhsh and Francesca Fallucchid and Fabio Massimo Zanzotto}, editor = {Camil Demetrescu and Alessandro Mei}, title = {{C-OSINT:} {COVID-19} Open Source Artificial INTelligence Framework}, booktitle = {Proceedings of the Italian Conference on Cybersecurity {(ITASEC} 2022), Rome, Italy, June 20-23, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3260}, pages = {219--235}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3260/paper16.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/RanaldiNFZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/RanaldiPGFZ22, author = {Leonardo Ranaldi and Michele Petito and Marco Gerardi and Francesca Fallucchid and Fabio Massimo Zanzotto}, editor = {Camil Demetrescu and Alessandro Mei}, title = {Machine Learning Techniques for Italian Phishing Detection}, booktitle = {Proceedings of the Italian Conference on Cybersecurity {(ITASEC} 2022), Rome, Italy, June 20-23, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3260}, pages = {181--194}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3260/paper13.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/RanaldiPGFZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/RodriguezPCZ22, author = {Javier Fern{\'{a}}ndez Rodr{\'{\i}}guez and Michele Papale and Michele Carminati and Stefano Zanero}, editor = {Camil Demetrescu and Alessandro Mei}, title = {A Natural Language Processing Approach for Financial Fraud Detection}, booktitle = {Proceedings of the Italian Conference on Cybersecurity {(ITASEC} 2022), Rome, Italy, June 20-23, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3260}, pages = {135--149}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3260/paper10.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/RodriguezPCZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/RoodsariNSPN22, author = {Mahboobe Sadeghipour Roodsari and Ebrahim Nouri and Fatemeh Sheikhshoaei and Paolo Prinetto and Zainalabedin Navabi}, editor = {Camil Demetrescu and Alessandro Mei}, title = {A Secure Canary-Based Hardware Approach Against {ROP}}, booktitle = {Proceedings of the Italian Conference on Cybersecurity {(ITASEC} 2022), Rome, Italy, June 20-23, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3260}, pages = {64--75}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3260/paper5.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/RoodsariNSPN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/RosaMNPT22, author = {Fabio De Rosa and Nicol{\`{o}} Maunero and Luca Nicoletti and Paolo Prinetto and Martina Trussoni}, editor = {Camil Demetrescu and Alessandro Mei}, title = {Ontology for Cybersecurity Governance of {ICT} Systems}, booktitle = {Proceedings of the Italian Conference on Cybersecurity {(ITASEC} 2022), Rome, Italy, June 20-23, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3260}, pages = {52--63}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3260/paper4.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/RosaMNPT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/SantorsolaMC22, author = {Alessandro Santorsola and Aldo Migliau and Sabino Caporusso}, editor = {Camil Demetrescu and Alessandro Mei}, title = {Reinforcement Learning Agents for Simulating Normal and Malicious Actions in Cyber Range Scenarios}, booktitle = {Proceedings of the Italian Conference on Cybersecurity {(ITASEC} 2022), Rome, Italy, June 20-23, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3260}, pages = {1--16}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3260/paper1.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/SantorsolaMC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/SetolaM22, author = {Roberto Setola and Francesco Morelli}, editor = {Camil Demetrescu and Alessandro Mei}, title = {Cyber Security Strategies for the Protection of Electrical Substations}, booktitle = {Proceedings of the Italian Conference on Cybersecurity {(ITASEC} 2022), Rome, Italy, June 20-23, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3260}, pages = {195--206}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3260/paper14.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/SetolaM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/itasec/2022, editor = {Camil Demetrescu and Alessandro Mei}, title = {Proceedings of the Italian Conference on Cybersecurity {(ITASEC} 2022), Rome, Italy, June 20-23, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3260}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3260}, urn = {urn:nbn:de:0074-3260-3}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/AbbattistaIPSS21, author = {Giacomo Abbattista and Donato Impedovo and Giuseppe Pirlo and Lucia Sarcinella and Nicola Stigliano}, editor = {Alessandro Armando and Michele Colajanni}, title = {Identifying Anomalous Places, Routes by {GPS} Feature: {A} System for Child Monitoring}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {72--79}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper7.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:11 +0100}, biburl = {https://dblp.org/rec/conf/itasec/AbbattistaIPSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/AmatoCDN21, author = {Giuseppe Amato and Simone Ciccarone and Pasquale Digregorio and Giuseppe Natalucci}, editor = {Alessandro Armando and Michele Colajanni}, title = {A Service Architecture for an Enhanced Cyber Threat Intelligence Capability}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {436--446}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper37.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/AmatoCDN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/ArditoDSN21, author = {Carmelo Ardito and Yashar Deldjoo and Eugenio Di Sciascio and Fatemeh Nazary}, editor = {Alessandro Armando and Michele Colajanni}, title = {Revisiting Security Threat on Smart Grids: Accurate and Interpretable Fault Location Prediction and Type Classification}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {523--533}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper44.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/ArditoDSN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/ArditoNSLPV21, author = {Carmelo Ardito and Tommaso Di Noia and Eugenio Di Sciascio and Domenico Lof{\`{u}} and Andrea Pazienza and Felice Vitulano}, editor = {Alessandro Armando and Michele Colajanni}, title = {An Artificial Intelligence Cyberattack Detection System to Improve Threat Reaction in e-Health}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {270--283}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper23.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/ArditoNSLPV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BarlettaBCDP21, author = {Vita Santa Barletta and Paolo Buono and Danilo Caivano and Giovanni Dimauro and Antonio Pontrelli}, editor = {Alessandro Armando and Michele Colajanni}, title = {An Overview on the Security Technological Levels in the Italian Smart Cities}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {499--508}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper42.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BarlettaBCDP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BenvenutoPFL21, author = {Francesco Benvenuto and Francesco Palmarini and Riccardo Focardi and Flaminia L. Luccio}, editor = {Alessandro Armando and Michele Colajanni}, title = {Firmware Extraction from Real IoT Devices through Power Analysis of {AES}}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {461--474}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper39.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BenvenutoPFL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BerraFFMPR21, author = {Giulio Berra and Gaspare Ferraro and Matteo Fornero and Nicol{\`{o}} Maunero and Paolo Prinetto and Gianluca Roascio}, editor = {Alessandro Armando and Michele Colajanni}, title = {{PAIDEUSIS:} {A} Remote Hybrid Cyber Range for Hardware, Network, IoT Security Training}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {284--297}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper24.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BerraFFMPR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/Bocci0FB21, author = {Alessandro Bocci and Stefano Forti and Gian{-}Luigi Ferrari and Antonio Brogi}, editor = {Alessandro Armando and Michele Colajanni}, title = {Placing FaaS in the Fog, Securely}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {166--179}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper15.pdf}, timestamp = {Fri, 23 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/Bocci0FB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/Boi21, author = {Alessia Boi}, editor = {Alessandro Armando and Michele Colajanni}, title = {Comparative Analysis of Cyber Intelligence: The Italian Case}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {260--269}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper22.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/Boi21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BozzettiOS21, author = {Marco Bozzetti and Luca Olivieri and Fausto Spoto}, editor = {Alessandro Armando and Michele Colajanni}, title = {Cybersecurity Impacts of the Covid-19 Pandemic in Italy}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {145--155}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper13.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BozzettiOS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CalaniDL21, author = {Massimiliano Calani and Giovanni Denaro and Alberto Leporati}, editor = {Alessandro Armando and Michele Colajanni}, title = {Exploiting the Blockchain to Guarantee {GDPR} Compliance while Consents Evolve under Data Owners' Control}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {331--343}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper28.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/CalaniDL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CarlettiGSV21, author = {Vincenzo Carletti and Antonio Greco and Alessia Saggese and Mario Vento}, editor = {Alessandro Armando and Michele Colajanni}, title = {Robustness Evaluation of Convolutional Neural Networks for Malware Classification}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {414--423}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper35.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/CarlettiGSV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CatalanoAAMST21, author = {Christian Catalano and Paolo Afrune and Mario Angelelli and Giovanni Maglio and Fabrizio Striani and Franco Tommasi}, editor = {Alessandro Armando and Michele Colajanni}, title = {Security Testing Reuse Enhancing Active Cyber Defence in Public Administration}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {120--132}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper11.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/CatalanoAAMST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CerocchiR21, author = {Filippo Cerocchi and Gabriele Rizzo}, editor = {Alessandro Armando and Michele Colajanni}, title = {A Topological Approach to Secure Key Exchange}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {61--71}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper6.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/CerocchiR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CheminodDSV21, author = {Manuel Cheminod and Luca Durante and Lucia Seno and Adriano Valenzano}, editor = {Alessandro Armando and Michele Colajanni}, title = {An Algorithm for Security Policy Migration in Multiple Firewall Networks}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {344--359}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper29.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/CheminodDSV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CiampiMSS21, author = {Mario Ciampi and Fabrizio Marangio and Giovanni Schmid and Mario Sicuranza}, editor = {Alessandro Armando and Michele Colajanni}, title = {A Blockchain-based Smart Contract System Architecture for Dependable Health Processes}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {360--373}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper30.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/CiampiMSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CoppolinoDMRC21, author = {Luigi Coppolino and Salvatore D'Antonio and Giovanni Mazzeo and Luigi Romano and Paolo Campegiani}, editor = {Alessandro Armando and Michele Colajanni}, title = {Facing the Blockchain Endpoint Vulnerability, an SGX-based Solution for Secure eHealth Auditing}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {298--308}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper25.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/CoppolinoDMRC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CostaRV21, author = {Gabriele Costa and Enrico Russo and Andrea Valenza}, editor = {Alessandro Armando and Michele Colajanni}, title = {Damn Vulnerable Application Scanner}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {424--435}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper36.pdf}, timestamp = {Thu, 30 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/CostaRV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/Danet21, author = {Didier Danet}, editor = {Alessandro Armando and Michele Colajanni}, title = {Punish and Perish: The Human Factor in Cybersecurity}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {1--8}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper1.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/Danet21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/DentamaroCGGPP21, author = {Vincenzo Dentamaro and Vito Nicola Convertini and Stefano Galantucci and Paolo Giglio and Tonino Palmisano and Giuseppe Pirlo}, editor = {Alessandro Armando and Michele Colajanni}, title = {Ensemble Consensus: An Unsupervised Algorithm for Anomaly Detection in Network Security data}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {309--318}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper26.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/DentamaroCGGPP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/Feo21, author = {Marzio Di Feo}, editor = {Alessandro Armando and Michele Colajanni}, title = {Overcoming Complexity of (Cyber)War: The Logic of Useful Fiction in Cyber Exercises Scenarios}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {387--393}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper32.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/Feo21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/FioreseM21, author = {Tobia Fiorese and Pietro Montino}, editor = {Alessandro Armando and Michele Colajanni}, title = {Learning-based Intrusion Detection System for On-Board Vehicle Communication}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {180--192}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper16.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/FioreseM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/FranchinaFP21, author = {Luisa Franchina and Serena Ferracci and Federico Palmaro}, editor = {Alessandro Armando and Michele Colajanni}, title = {Detecting Phishing E-mails Using Text Mining and Features Analysis}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {106--119}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper10.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/FranchinaFP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/GranadilloDVX21, author = {Gustavo {Gonzalez Granadillo} and Rodrigo Diaz and Eleni Veroni and Christos Xenakis}, editor = {Alessandro Armando and Michele Colajanni}, title = {A Multi-factor Assessment Mechanism to Define Priorities on Vulnerabilities affecting Healthcare Organizations}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {47--60}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper5.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/GranadilloDVX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/GranataRSB21, author = {Daniele Granata and Massimiliano Rak and Giovanni Salzillo and Umberto Barbato}, editor = {Alessandro Armando and Michele Colajanni}, title = {Security in IoT Pairing {\&} Authentication protocols, a Threat Model, a Case Study Analysis}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {207--218}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper18.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/GranataRSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/KhanVKEPCS21, author = {Shaharyar Khan and Alberto Volpatto and Geet Kalra and Jonathan Esteban and Tommaso Pescanoce and Sabino Caporusso and Michael Siegel}, editor = {Alessandro Armando and Michele Colajanni}, title = {Cyber Range for Industrial Control Systems {(CR-ICS)} for Simulating Attack Scenarios}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {246--259}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper21.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/KhanVKEPCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/LagorioRA21, author = {Giovanni Lagorio and Marina Ribaudo and Alessandro Armando}, editor = {Alessandro Armando and Michele Colajanni}, title = {Capture the Flag competitions for Higher Education}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {447--460}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper38.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/LagorioRA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/LuisePPR21, author = {Alessandro Placido Luise and Gaetano Perrone and Claudio Perrotta and Simon Pietro Romano}, editor = {Alessandro Armando and Michele Colajanni}, title = {On-demand Deployment and Orchestration of Cyber Ranges in the Cloud}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {80--91}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper8.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/LuisePPR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/MalandroneVGM21, author = {Giuseppe Mario Malandrone and Giovanni Virdis and Giorgio Giacinto and Davide Maiorca}, editor = {Alessandro Armando and Michele Colajanni}, title = {PowerDecode: {A} PowerShell Script Decoder Dedicated to Malware Analysis}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {219--232}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper19.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/MalandroneVGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/MasiPP21, author = {Massimiliano Masi and Tanja Pavleska and Simone Pezzoli}, editor = {Alessandro Armando and Michele Colajanni}, title = {A Systematic Approach for the definition of countermeasures in industrial IoT: An Automotive Case}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {319--330}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper27.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/MasiPP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/MurinoRRT21, author = {Giuseppina Murino and Marina Ribaudo and Simon Pietro Romano and Armando Tacchella}, editor = {Alessandro Armando and Michele Colajanni}, title = {{OT} Cyber Security Frameworks Comparison Tool (CSFCTool)}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {9--22}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper2.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/MurinoRRT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/NardinMPF21, author = {Axel De Nardin and Marino Miculan and Claudio Piciarelli and Gian Luca Foresti}, editor = {Alessandro Armando and Michele Colajanni}, title = {A Time-series Classification Approach to Shallow Web Traffic De-anonymization}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {156--165}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper14.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/NardinMPF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/NarteniVMAC21, author = {Sara Narteni and Ivan Vaccari and Maurizio Mongelli and Maurizio Aiello and Enrico Cambiaso}, editor = {Alessandro Armando and Michele Colajanni}, title = {On the Feasibility of Covert Channels through Short-Message-Service}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {23--34}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper3.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/NarteniVMAC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/Pagnacco21, author = {Anna Pagnacco}, editor = {Alessandro Armando and Michele Colajanni}, title = {Critical Information Infrastructure Protection: Between Cybersecurity and Policymaking}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {488--498}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper41.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/Pagnacco21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/PaoloBS21, author = {Edoardo Di Paolo and Enrico Bassetti and Angelo Spognardi}, editor = {Alessandro Armando and Michele Colajanni}, title = {Security Assessment of Common Open Source {MQTT} Brokers and Clients}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {475--487}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper40.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/PaoloBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/PriscoSZ21, author = {Roberto De Prisco and Alfredo De Santis and Rocco Zaccagnino}, editor = {Alessandro Armando and Michele Colajanni}, title = {An Accelerometer-based Privacy Attack on Smartphones}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {193--206}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper17.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/PriscoSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/RameshA0MVL21, author = {Vishnu Ramesh and Sara Abraham and Vinod P and Isham Mohamed and Corrado Aaron Visaggio and Sonia Laudanna}, editor = {Alessandro Armando and Michele Colajanni}, title = {A Study on Misclassification of Software Vulnerabilities when using Deep Learning and Machine Learning Algorithms}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {534--545}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper45.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/RameshA0MVL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/RaponiCP21, author = {Simone Raponi and Maurantonio Caprolu and Roberto Di Pietro}, editor = {Alessandro Armando and Michele Colajanni}, title = {Beyond SolarWinds: The Systemic Risks of Critical Infrastructures, State of Play, Future Directions}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {394--405}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper33.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/RaponiCP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/SiwachCN21, author = {Chinmay Siwach and Gabriele Costa and Rocco De Nicola}, editor = {Alessandro Armando and Michele Colajanni}, title = {Enhancing Malware Classification with Symbolic Features}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {509--522}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper43.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/SiwachCN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/SpagnolettiCS21, author = {Paolo Spagnoletti and Federica Ceci and Andrea Salvi}, editor = {Alessandro Armando and Michele Colajanni}, title = {Adversarial Evolution: Competing Dynamics and Reactive Institutional Forms in Financial Services Ecosystem}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {406--413}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper34.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/SpagnolettiCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/StabiliPR21, author = {Dario Stabili and Francesco Pollicino and Alessio Rota}, editor = {Alessandro Armando and Michele Colajanni}, title = {A Benchmark Framework for {CAN} {IDS}}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {233--245}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper20.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/StabiliPR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/VaccariNMAC21, author = {Ivan Vaccari and Sara Narteni and Maurizio Mongelli and Maurizio Aiello and Enrico Cambiaso}, editor = {Alessandro Armando and Michele Colajanni}, title = {Perpetrate Cyber-threats using IoT Devices as Attack Vector: The {ESP8266} Use Case}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {35--46}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper4.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/VaccariNMAC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/ZoppiSBBB21, author = {Tommaso Zoppi and Enrico Schiavone and Irene Bicchierai and Francesco Brancati and Andrea Bondavalli}, editor = {Alessandro Armando and Michele Colajanni}, title = {Spoofing Detectability as a Property of Biometric Characteristics}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {92--105}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper9.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/ZoppiSBBB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/Zuppelli0CG21, author = {Marco Zuppelli and Giuseppe Manco and Luca Caviglione and Massimo Guarascio}, editor = {Alessandro Armando and Michele Colajanni}, title = {Sanitization of Images Containing Stegomalware via Machine Learning Approaches}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {374--386}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper31.pdf}, timestamp = {Wed, 24 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/Zuppelli0CG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/ZuppelliCR21, author = {Marco Zuppelli and Luca Caviglione and Matteo Repetto}, editor = {Alessandro Armando and Michele Colajanni}, title = {Detecting Covert Channels Through Code Augmentation}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {133--144}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper12.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/ZuppelliCR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/itasec/2021, editor = {Alessandro Armando and Michele Colajanni}, title = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940}, urn = {urn:nbn:de:0074-2940-2}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/AgateCFRM20, author = {Vincenzo Agate and Marco Curaba and Pierluca Ferraro and Giuseppe Lo Re and Marco Morana}, editor = {Michele Loreti and Luca Spalazzi}, title = {Secure e-Voting in Smart Communities}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {1--11}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-01.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:11 +0100}, biburl = {https://dblp.org/rec/conf/itasec/AgateCFRM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/AhmadMP20, author = {Shabeer Ahmad and Nicol{\`{o}} Maunero and Paolo Prinetto}, editor = {Michele Loreti and Luca Spalazzi}, title = {{EVA:} {A} Hybrid Cyber Range}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {12--23}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-02.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/AhmadMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/AldiniBDKR20, author = {Alessandro Aldini and Alessandro Bogliolo and Saverio Delpriori and Lorenz Cuno Klopfenstein and Giorgia Remedi}, editor = {Michele Loreti and Luca Spalazzi}, title = {Modeling and Verification of the Worth-One-Minute Security Protocols}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {24--35}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-03.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/AldiniBDKR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BalducciCIP20, author = {Fabrizio Balducci and Gabriella Calvano and Donato Impedovo and Giuseppe Pirlo}, editor = {Michele Loreti and Luca Spalazzi}, title = {An Unsupervised Behavioral Analysis of Highway Traffic Flow for Security Applications}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {36--46}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-04.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BalducciCIP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/Balestrucci20, author = {Alessandro Balestrucci}, editor = {Michele Loreti and Luca Spalazzi}, title = {How many bots are you following?}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {47--59}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-05.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/Balestrucci20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BistarelliB020, author = {Stefano Bistarelli and Emanuele Bosimini and Francesco Santini}, editor = {Michele Loreti and Luca Spalazzi}, title = {A Report on the Security of Home Connections with IoT and Docker Honeypots}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {60--70}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-06.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BistarelliB020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BreveCCDDP20, author = {Bernardo Breve and Loredana Caruccio and Stefano Cirillo and Domenico Desiato and Vincenzo Deufemia and Giuseppe Polese}, editor = {Michele Loreti and Luca Spalazzi}, title = {Enhancing user awareness during internet browsing}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {71--81}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-07.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BreveCCDDP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BusiDG20, author = {Matteo Busi and Pierpaolo Degano and Letterio Galletta}, editor = {Michele Loreti and Luca Spalazzi}, title = {Control-flow Flattening Preserves the Constant-Time Policy}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {82--92}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-08.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BusiDG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CalzavaraFRS20, author = {Stefano Calzavara and Riccardo Focardi and Alvise Rabitti and Lorenzo Soligo}, editor = {Michele Loreti and Luca Spalazzi}, title = {A Hard Lesson: Assessing the {HTTPS} Deployment of Italian University Websites}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {93--104}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-09.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/CalzavaraFRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CaputoVMRC20, author = {Davide Caputo and Luca Verderame and Alessio Merlo and Andrea Ranieri and Luca Caviglione}, editor = {Michele Loreti and Luca Spalazzi}, title = {Are you (Google) Home? Detecting Users' Presence through Traffic Analysis of Smart Speakers}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {105--118}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-10.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/CaputoVMRC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CeragioliDG20, author = {Lorenzo Ceragioli and Pierpaolo Degano and Letterio Galletta}, editor = {Michele Loreti and Luca Spalazzi}, title = {MuAC: Access Control Language for Mutual Benefits}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {119--127}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-11.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/CeragioliDG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/DaoudaghM20, author = {Said Daoudagh and Eda Marchetti}, editor = {Michele Loreti and Luca Spalazzi}, title = {A Life Cycle for Authorization Systems Development in the {GDPR} Perspective}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {128--140}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-12.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/DaoudaghM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/KoleciBMM20, author = {Kristjane Koleci and Marco Baldi and Maurizio Martina and Guido Masera}, editor = {Michele Loreti and Luca Spalazzi}, title = {A Hardware Implementation for Code-based Post-quantum Asymmetric Cryptography}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {141--152}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-13.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/KoleciBMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/LetteriPVG20, author = {Ivan Letteri and Giuseppe Della Penna and Luca Di Vita and Maria Teresa Grifa}, editor = {Michele Loreti and Luca Spalazzi}, title = {MTA-KDD'19: {A} Dataset for Malware Traffic Detection}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {153--165}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-14.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/LetteriPVG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/MagrisMP20, author = {Sabrina Magris and Claudio Masci and Luciano Piacentini}, editor = {Michele Loreti and Luca Spalazzi}, title = {The mind is like a parachute, it only functions when open. National Security: the importance of the human being that works behind the machine}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {166--176}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-15.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/MagrisMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/PrinettoR20, author = {Paolo Prinetto and Gianluca Roascio}, editor = {Michele Loreti and Luca Spalazzi}, title = {Hardware Security, Vulnerabilities, and Attacks: {A} Comprehensive Taxonomy}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {177--189}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-16.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/PrinettoR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/RakSR20, author = {Massimiliano Rak and Giovanni Salzillo and Claudia Romeo}, editor = {Michele Loreti and Luca Spalazzi}, title = {Systematic IoT Penetration Testing: Alexa Case Study}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {190--200}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-17.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/RakSR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/RepettoCD20, author = {Matteo Repetto and Alessandro Carrega and Armend Duzha}, editor = {Michele Loreti and Luca Spalazzi}, title = {A novel cyber-security framework leveraging programmable capabilities in digital services}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {201--211}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-18.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/RepettoCD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/ScicchitanoLGR020, author = {Francesco Scicchitano and Angelica Liguori and Massimo Guarascio and Ettore Ritacco and Giuseppe Manco}, editor = {Michele Loreti and Luca Spalazzi}, title = {A Deep Learning Approach for Detecting Security Attacks on Blockchain}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {212--222}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-19.pdf}, timestamp = {Wed, 24 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/ScicchitanoLGR020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/StojkovskiL20, author = {Borce Stojkovski and Gabriele Lenzini}, editor = {Michele Loreti and Luca Spalazzi}, title = {Evaluating ambiguity of privacy indicators in a secure email app}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {223--234}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-20.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/StojkovskiL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/VenerusoFMMC20, author = {Silvestro Veneruso and Lauren S. Ferro and Andrea Marrella and Massimo Mecella and Tiziana Catarci}, editor = {Michele Loreti and Luca Spalazzi}, title = {A game-based learning experience for improving cybersecurity awareness}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {235--242}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-21.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/VenerusoFMMC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/VisaggioLSCCF20, author = {Corrado Aaron Visaggio and Sonia Laudanna and Andrea Di Sorbo and Gerardo Canfora and Sara Caruso and Marianna Fucci}, editor = {Michele Loreti and Luca Spalazzi}, title = {Repadiography: towards a visual support for triaging repackaged apps}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {243--255}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-22.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/VisaggioLSCCF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/itasec/2020, editor = {Michele Loreti and Luca Spalazzi}, title = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597}, urn = {urn:nbn:de:0074-2597-0}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BaldassarreBCRS19, author = {Maria Teresa Baldassarre and Vita Santa Barletta and Danilo Caivano and Domenico Raguseo and Michele Scalera}, editor = {Pierpaolo Degano and Roberto Zunino}, title = {Teaching Cyber Security: The {HACK-SPACE} Integrated Model}, booktitle = {Proceedings of the Third Italian Conference on Cyber Security, Pisa, Italy, February 13-15, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2315}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2315/paper06.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:11 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BaldassarreBCRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BusiG19, author = {Matteo Busi and Letterio Galletta}, editor = {Pierpaolo Degano and Roberto Zunino}, title = {A Brief Tour of Formally Secure Compilation}, booktitle = {Proceedings of the Third Italian Conference on Cyber Security, Pisa, Italy, February 13-15, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2315}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2315/paper03.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BusiG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CalabroDM19, author = {Antonello Calabr{\`{o}} and Said Daoudagh and Eda Marchetti}, editor = {Pierpaolo Degano and Roberto Zunino}, title = {Integrating Access Control and Business Process for {GDPR} Compliance: {A} Preliminary Study}, booktitle = {Proceedings of the Third Italian Conference on Cyber Security, Pisa, Italy, February 13-15, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2315}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2315/paper07.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/CalabroDM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CambiasoVPA19, author = {Enrico Cambiaso and Ivan Vaccari and Luca Patti and Maurizio Aiello}, editor = {Pierpaolo Degano and Roberto Zunino}, title = {Darknet Security: {A} Categorization of Attacks to the Tor Network}, booktitle = {Proceedings of the Third Italian Conference on Cyber Security, Pisa, Italy, February 13-15, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2315}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2315/paper10.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/CambiasoVPA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CeragioliGT19, author = {Lorenzo Ceragioli and Letterio Galletta and Mauro Tempesta}, editor = {Pierpaolo Degano and Roberto Zunino}, title = {From Firewalls to Functions and Back}, booktitle = {Proceedings of the Third Italian Conference on Cyber Security, Pisa, Italy, February 13-15, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2315}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2315/paper04.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/CeragioliGT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CerottiRDEFPT19, author = {Davide Cerotti and Daniele Codetta Raiteri and Giovanna Dondossola and Lavinia Egidi and Giuliana Franceschinis and Luigi Portinale and Roberta Terruggia}, editor = {Pierpaolo Degano and Roberto Zunino}, title = {A Bayesian Network Approach for the Interpretation of Cyber Attacks to Power Systems}, booktitle = {Proceedings of the Third Italian Conference on Cyber Security, Pisa, Italy, February 13-15, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2315}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2315/paper11.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/CerottiRDEFPT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/ConconeRMR19, author = {Federico Concone and Giuseppe Lo Re and Marco Morana and Claudio Ruocco}, editor = {Pierpaolo Degano and Roberto Zunino}, title = {Twitter Spam Account Detection by Effective Labeling}, booktitle = {Proceedings of the Third Italian Conference on Cyber Security, Pisa, Italy, February 13-15, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2315}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2315/paper02.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/ConconeRMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/DemetrioBLRA19, author = {Luca Demetrio and Battista Biggio and Giovanni Lagorio and Fabio Roli and Alessandro Armando}, editor = {Pierpaolo Degano and Roberto Zunino}, title = {Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries}, booktitle = {Proceedings of the Third Italian Conference on Cyber Security, Pisa, Italy, February 13-15, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2315}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2315/paper09.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/DemetrioBLRA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/DeriSM19, author = {Luca Deri and Samuele Sabella and Simone Mainardi}, editor = {Pierpaolo Degano and Roberto Zunino}, title = {Combining System Visibility and Security Using eBPF}, booktitle = {Proceedings of the Third Italian Conference on Cyber Security, Pisa, Italy, February 13-15, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2315}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2315/paper05.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/DeriSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/FagniNPT19, author = {Tiziano Fagni and Leonardo Nizzoli and Marinella Petrocchi and Maurizio Tesconi}, editor = {Pierpaolo Degano and Roberto Zunino}, title = {Six Things {I} Hate About You (in Italian) and Six Classification Strategies to More and More Effectively Find Them}, booktitle = {Proceedings of the Third Italian Conference on Cyber Security, Pisa, Italy, February 13-15, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2315}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2315/paper13.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/FagniNPT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/FerriCBB19, author = {Giulia Ferri and Giorgiomaria Cicero and Alessandro Biondi and Giorgio C. Buttazzo}, editor = {Pierpaolo Degano and Roberto Zunino}, title = {Towards the Hypervision of Hardware-based Control Flow Integrity for Arm Platforms}, booktitle = {Proceedings of the Third Italian Conference on Cyber Security, Pisa, Italy, February 13-15, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2315}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2315/paper12.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/FerriCBB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/GerettoTM19, author = {Elia Geretto and C{\'{e}}dric Tessier and Fabio Massacci}, editor = {Pierpaolo Degano and Roberto Zunino}, title = {A QBDI-based Fuzzer Taming Magic Bytes}, booktitle = {Proceedings of the Third Italian Conference on Cyber Security, Pisa, Italy, February 13-15, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2315}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2315/paper01.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/GerettoTM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/MiculanFP19, author = {Marino Miculan and Gian Luca Foresti and Claudio Piciarelli}, editor = {Pierpaolo Degano and Roberto Zunino}, title = {Towards User Recognition by Shallow Web Traffic Inspection}, booktitle = {Proceedings of the Third Italian Conference on Cyber Security, Pisa, Italy, February 13-15, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2315}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2315/paper08.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/MiculanFP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/itasec/2019, editor = {Pierpaolo Degano and Roberto Zunino}, title = {Proceedings of the Third Italian Conference on Cyber Security, Pisa, Italy, February 13-15, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2315}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2315}, urn = {urn:nbn:de:0074-2315-4}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/AngelisABLMS18, author = {Stefano De Angelis and Leonardo Aniello and Roberto Baldoni and Federico Lombardi and Andrea Margheri and Vladimiro Sassone}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {{PBFT} vs Proof-of-Authority: Applying the {CAP} Theorem to Permissioned Blockchain}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-06.pdf}, timestamp = {Tue, 12 Nov 2024 10:12:41 +0100}, biburl = {https://dblp.org/rec/conf/itasec/AngelisABLMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BernardeschiMS18, author = {Cinzia Bernardeschi and Paolo Masci and Antonella Santone}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Data Leakage in Java Applets with Exception Mechanism}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-05.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BernardeschiMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/Bernardini18, author = {Andrea Bernardini}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Extending Domain Name Monitoring. Identifying Potentially Malicious Domains Using Hash Signatures of {DOM} Elements}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-04.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/Bernardini18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BistarelliP018, author = {Stefano Bistarelli and Matteo Parroccini and Francesco Santini}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Visualizing Bitcoin Flows of Ransomware: WannaCry One Week Later}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-13.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BistarelliP018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BodeiDFGTV18, author = {Chiara Bodei and Pierpaolo Degano and Riccardo Focardi and Letterio Galletta and Mauro Tempesta and Lorenzo Veronese}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Firewall Management With FireWall Synthesizer}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-16.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BodeiDFGTV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BollaCR18, author = {Raffaele Bolla and Paolo Maria Comi and Matteo Repetto}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {A Distributed Cyber-security Framework for Heterogeneous Environments}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-11.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BollaCR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BottazziIS18, author = {Giovanni Bottazzi and Giuseppe F. Italiano and Domenico Spera}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Preventing Ransomware Attacks Through File System Filter Drivers}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-08.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BottazziIS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CalzavaraRB18, author = {Stefano Calzavara and Alvise Rabitti and Michele Bugliesi}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Dr Cookie and Mr Token - Web Session Implementations and How to Live with Them}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-02.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/CalzavaraRB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/DeriS18, author = {Luca Deri and Arianna Del Soldato}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Enforcing Security in IoT and Home Networks}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-15.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/DeriS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/FerraraS18, author = {Pietro Ferrara and Fausto Spoto}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Static Analysis for {GDPR} Compliance}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-10.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/FerraraS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/LetteriRCC18, author = {Ivan Letteri and Massimo Del Rosso and Pasquale Caianiello and Dajana Cassioli}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Performance of Botnet Detection by Neural Networks in Software-Defined Networks}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-03.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/LetteriRCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/NicolettiMLSS18, author = {Luca Nicoletti and Andrea Margheri and Federico Lombardi and Vladimiro Sassone and Francesco Paolo Schiavo}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Cross-Cloud Management of Sensitive Data via Blockchain: a Payslip Calculation Use Case}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-12.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/NicolettiMLSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/PaolaFGRM18, author = {Alessandra De Paola and Salvatore Favaloro and Salvatore Gaglio and Giuseppe Lo Re and Marco Morana}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Malware Detection through Low-level Features and Stacked Denoising Autoencoders}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-07.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/PaolaFGRM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/PuligaCCN18, author = {Michelangelo Puliga and Guido Caldarelli and Alessandro Chessa and Rocco De Nicola}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Understanding the Twitter User Networks of Viruses and Ransomware Attacks}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-09.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/PuligaCCN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/SolimeoCTM18, author = {Alfonso Solimeo and Luca Capacci and Stefano Taino and Rebecca Montanari}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {{MAD-IOS:} Dynamic App Vulnerability Analysis in Non-jailbroken Devices}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-14.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/SolimeoCTM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/itasec/2018, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058}, urn = {urn:nbn:de:0074-2058-8}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/AmelinoBC17, author = {Domenico Amelino and Mario Barbareschi and Alessandro Cilardo}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {A Proposal for the Secure Activation and Licensing of {FPGA} {IP} Cores}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {29--37}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-04.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:11 +0100}, biburl = {https://dblp.org/rec/conf/itasec/AmelinoBC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/ArcuriBG17, author = {Maria Cristina Arcuri and Marina Brogi and Gino Gandolfi}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {How Does Cyber Crime Affect Firms? The Effect of Information Security Breaches on Stock Returns}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {175--193}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-18.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/ArcuriBG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BaldiCFGSS17, author = {Marco Baldi and Franco Chiaraluce and Emanuele Frontoni and Giuseppe Gottardi and Daniele Sciarroni and Luca Spalazzi}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {Certificate Validation Through Public Ledgers and Blockchains}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {156--165}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-16.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BaldiCFGSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BarenghiP17, author = {Alessandro Barenghi and Gerardo Pelosi}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {8--18}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-02.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BarenghiP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BellaBJ17, author = {Giampaolo Bella and Denis Butin and Hugo Jonker}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {Analysing Privacy Analyses}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {19--28}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-03.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BellaBJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BernieriPL17, author = {Giuseppe Bernieri and Federica Pascucci and Javier L{\'{o}}pez}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {Network Anomaly Detection in Critical Infrastructure Based on Mininet Network Simulator}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {116--125}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-12.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BernieriPL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BodeiG17, author = {Chiara Bodei and Letterio Galletta}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {Tracking Sensitive and Untrustworthy Data in IoT}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {38--52}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-05.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BodeiG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BonfiglioCCLV17, author = {Giampiero Bonfiglio and Ludovica Coletta and Alessandra Teresa Coscarella and Martina Limonta and Panfilo Ventresca}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {Web-based Intelligence in Adaptive Security Models and Multidisciplinary Aspects of Activation and Analysis (in Italian)}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {202--211}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-20.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BonfiglioCCLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BottazziIR17, author = {Giovanni Bottazzi and Giuseppe Francesco Italiano and Giuseppe Giulio Rutigliano}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {An Operational Framework for Incident Handling}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {126--135}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-13.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BottazziIR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BrignoliF17, author = {Mauro Alberto Brignoli and Luisa Franchina}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {An Intelligence Platform based on {OSINT} tools and Open Source Technologies (in Italian)}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {232--241}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-23.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BrignoliF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/ChirichielloPB17, author = {Antonella Chirichiello and Claudio Porretti and Antonio Berardi}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {Cyber Threat Intelligence for Supporting the {ATM} Security Management}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {253--257}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-26.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/ChirichielloPB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/Co17, author = {Mario Dal Co}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {Restructuring and Securing Italian Banks (in Italian)}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {194--201}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-19.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/Co17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/DemontisBFGR17, author = {Ambra Demontis and Battista Biggio and Giorgio Fumera and Giorgio Giacinto and Fabio Roli}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {Infinity-Norm Support Vector Machines Against Adversarial Label Contamination}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {106--115}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-11.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/DemontisBFGR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/DuzhaGC17, author = {Armend Duzha and Panagiotis Gouvas and Monica Canepa}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {{MITIGATE:} An Innovative Cyber-Security Maritime Supply Chain Risk Management System}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {248--252}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-25.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/DuzhaGC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/FerraraBS17, author = {Pietro Ferrara and Elisa Burato and Fausto Spoto}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {Security Analysis of the {OWASP} Benchmark with Julia}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {242--247}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-24.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/FerraraBS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/FolinoP17, author = {Gianluigi Folino and Francesco Sergio Pisani}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {A Software Architecture for Classifying Users in E-payment Systems}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {76--85}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-08.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/FolinoP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/GaetaniABLMS17, author = {Edoardo Gaetani and Leonardo Aniello and Roberto Baldoni and Federico Lombardi and Andrea Margheri and Vladimiro Sassone}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {Blockchain-Based Database to Ensure Data Integrity in Cloud Computing Environments}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {146--155}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-15.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/GaetaniABLMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/GhianiMTM17, author = {Luca Ghiani and Valerio Mura and Pierluigi Tuveri and Gian Luca Marcialis}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {On the Interoperability of Capture Devices in Fingerprint Presentation Attacks Detection}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {66--75}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-07.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/GhianiMTM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/MaiorcaRCBG17, author = {Davide Maiorca and Paolo Russu and Igino Corona and Battista Biggio and Giorgio Giacinto}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {Detection of Malicious Scripting Code Through Discriminant and Adversary-Aware {API} Analysis}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {96--105}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-10.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/MaiorcaRCBG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/MencariniS17, author = {Maurizio Mencarini and Gianluca Sensidoni}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {Multilanguage Semantic Behavioural Algorithms to Discover Terrorist Related Online Contents}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {222--231}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-22.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/MencariniS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/Monti17, author = {Andrea Monti}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {Rules of (Digital) Evidence and Prosecution's Actual Needs. When the Law Falls Behind Technology}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {166--174}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-17.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/Monti17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/Pierozzi17, author = {Filippo Pierozzi}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {The Hacking Team Case: Quis Custodiet Ipsos Custodes? Issues and Challenges for a More Efficient Partnership Between Private Industry and Intelligence Agencies (in Italian)}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {212--221}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-21.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/Pierozzi17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/RichterW17, author = {Marc Richter and Konrad S. Wrona}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {Devil in the Details: Assessing Automated Confidentiality Classifiers in the Context of {NATO} Documents}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {136--145}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-14.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/RichterW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/SchiavoneCB17, author = {Enrico Schiavone and Andrea Ceccarelli and Andrea Bondavalli}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {Risk Assessment of a Biometric Continuous Authentication Protocol for Internet Services}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {53--65}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-06.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/SchiavoneCB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/VignaCDPT17, author = {Fabio Del Vigna and Andrea Cimino and Felice Dell'Orletta and Marinella Petrocchi and Maurizio Tesconi}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {Hate Me, Hate Me Not: Hate Speech Detection on Facebook}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {86--95}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-09.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/VignaCDPT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/itasec/2017, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816}, urn = {urn:nbn:de:0074-1816-1}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.