default search action
BibTeX records: Alfonso Iacovazzi
@inproceedings{DBLP:conf/esorics/EklundIWPR24, author = {David Eklund and Alfonso Iacovazzi and Han Wang and Apostolos Pyrgelis and Shahid Raza}, editor = {Joaquin Garc{\'{\i}}a{-}Alfaro and Rafal Kozik and Michal Choras and Sokratis K. Katsikas}, title = {{BMI:} Bounded Mutual Information for Efficient Privacy-Preserving Feature Selection}, booktitle = {Computer Security - {ESORICS} 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14983}, pages = {353--373}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-70890-9\_18}, doi = {10.1007/978-3-031-70890-9\_18}, timestamp = {Fri, 13 Sep 2024 21:29:56 +0200}, biburl = {https://dblp.org/rec/conf/esorics/EklundIWPR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2406-13543, author = {Alfonso Iacovazzi and Han Wang and Ismail Butun and Shahid Raza}, title = {Towards Cyber Threat Intelligence for the IoT}, journal = {CoRR}, volume = {abs/2406.13543}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2406.13543}, doi = {10.48550/ARXIV.2406.13543}, eprinttype = {arXiv}, eprint = {2406.13543}, timestamp = {Fri, 12 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2406-13543.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dcoss/IacovazziWBR23, author = {Alfonso Iacovazzi and Han Wang and Ismail Butun and Shahid Raza}, title = {Towards Cyber Threat Intelligence for the IoT}, booktitle = {19th International Conference on Distributed Computing in Smart Systems and the Internet of Things, DCOSS-IoT 2023, Pafos, Cyprus, June 19-21, 2023}, pages = {483--490}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DCOSS-IoT58021.2023.00081}, doi = {10.1109/DCOSS-IOT58021.2023.00081}, timestamp = {Mon, 17 Jun 2024 13:21:54 +0200}, biburl = {https://dblp.org/rec/conf/dcoss/IacovazziWBR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vnc/ZendenWIVBR23, author = {Ivo Zenden and Han Wang and Alfonso Iacovazzi and Arash Vahidi and Rolf Blom and Shahid Raza}, editor = {Sinem Coleri and Onur Altintas and Frank Kargl and Takamasa Higuchi and Michele Segata and Florian Klingler}, title = {On the Resilience of Machine Learning-Based {IDS} for Automotive Networks}, booktitle = {{IEEE} Vehicular Networking Conference, {VNC} 2023, Istanbul, Turkey, April 26-28, 2023}, pages = {239--246}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/VNC57357.2023.10136285}, doi = {10.1109/VNC57357.2023.10136285}, timestamp = {Fri, 09 Jun 2023 15:18:18 +0200}, biburl = {https://dblp.org/rec/conf/vnc/ZendenWIVBR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-14750, author = {Alfonso Iacovazzi and Shahid Raza}, title = {Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in Containers}, journal = {CoRR}, volume = {abs/2306.14750}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.14750}, doi = {10.48550/ARXIV.2306.14750}, eprinttype = {arXiv}, eprint = {2306.14750}, timestamp = {Tue, 27 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-14750.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-14782, author = {Ivo Zenden and Han Wang and Alfonso Iacovazzi and Arash Vahidi and Rolf Blom and Shahid Raza}, title = {On the Resilience of Machine Learning-Based {IDS} for Automotive Networks}, journal = {CoRR}, volume = {abs/2306.14782}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.14782}, doi = {10.48550/ARXIV.2306.14782}, eprinttype = {arXiv}, eprint = {2306.14782}, timestamp = {Tue, 27 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-14782.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csr2/IacovazziR22, author = {Alfonso Iacovazzi and Shahid Raza}, title = {Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in Containers}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2022, Rhodes, Greece, July 27-29, 2022}, pages = {30--37}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSR54599.2022.9850307}, doi = {10.1109/CSR54599.2022.9850307}, timestamp = {Fri, 19 Aug 2022 14:18:24 +0200}, biburl = {https://dblp.org/rec/conf/csr2/IacovazziR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/giots/FigueiredoSIHCC22, author = {S{\'{e}}rgio Figueiredo and Paulo Silva and Alfonso Iacovazzi and Vitalina Holubenko and Jo{\~{a}}o Casal and Jos{\'{e}} M. Alcaraz Calero and Qi Wang and Pedro Colarejo and Ross Little Armitt and Giacomo Inches and Shahid Raza}, editor = {Aurora Gonz{\'{a}}lez{-}Vidal and Ahmed Mohamed Abdelgawad and Essaid Sabir and S{\'{e}}bastien Ziegler and Latif Ladid}, title = {ARCADIAN-IoT - Enabling Autonomous Trust, Security and Privacy Management for IoT}, booktitle = {Internet of Things - 5th The Global IoT Summit, GIoTS 2022, Dublin, Ireland, June 20-23, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13533}, pages = {348--359}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20936-9\_28}, doi = {10.1007/978-3-031-20936-9\_28}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/giots/FigueiredoSIHCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/TanIHEB19, author = {Yi Xiang Marcus Tan and Alfonso Iacovazzi and Ivan Homoliak and Yuval Elovici and Alexander Binder}, title = {Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2019 Budapest, Hungary, July 14-19, 2019}, pages = {1--10}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IJCNN.2019.8852414}, doi = {10.1109/IJCNN.2019.8852414}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ijcnn/TanIHEB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/TanICE19, author = {Mengxuan Tan and Alfonso Iacovazzi and Ngai{-}Man Cheung and Yuval Elovici}, editor = {Karl Andersson and Hwee{-}Pink Tan and Sharief Oteafy}, title = {A Neural Attention Model for Real-Time Network Intrusion Detection}, booktitle = {44th {IEEE} Conference on Local Computer Networks, {LCN} 2019, Osnabrueck, Germany, October 14-17, 2019}, pages = {291--299}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/LCN44214.2019.8990890}, doi = {10.1109/LCN44214.2019.8990890}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/TanICE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/IacovazziFE19, author = {Alfonso Iacovazzi and Daniel Frassinelli and Yuval Elovici}, title = {The {DUSTER} Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {213--225}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/iacovazzi}, timestamp = {Wed, 10 Feb 2021 22:02:04 +0100}, biburl = {https://dblp.org/rec/conf/raid/IacovazziFE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-11831, author = {Yi Xiang Marcus Tan and Alfonso Iacovazzi and Ivan Homoliak and Yuval Elovici and Alexander Binder}, title = {Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics}, journal = {CoRR}, volume = {abs/1905.11831}, year = {2019}, url = {http://arxiv.org/abs/1905.11831}, eprinttype = {arXiv}, eprint = {1905.11831}, timestamp = {Mon, 03 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-11831.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/IacovazziSFE18, author = {Alfonso Iacovazzi and Sanat Sarda and Daniel Frassinelli and Yuval Elovici}, title = {DropWat: An Invisible Network Flow Watermark for Data Exfiltration Traceback}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1139--1154}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2779113}, doi = {10.1109/TIFS.2017.2779113}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/IacovazziSFE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/IacovazziSE18, author = {Alfonso Iacovazzi and Sanat Sarda and Yuval Elovici}, title = {Inflow: Inverse Network Flow Watermarking for Detecting Hidden Servers}, booktitle = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018, Honolulu, HI, USA, April 16-19, 2018}, pages = {747--755}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/INFOCOM.2018.8486375}, doi = {10.1109/INFOCOM.2018.8486375}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/IacovazziSE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/IacovazziE17, author = {Alfonso Iacovazzi and Yuval Elovici}, title = {Network Flow Watermarking: {A} Survey}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {19}, number = {1}, pages = {512--530}, year = {2017}, url = {https://doi.org/10.1109/COMST.2016.2604405}, doi = {10.1109/COMST.2016.2604405}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/IacovazziE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nof/IacovazziFE17, author = {Alfonso Iacovazzi and Daniel Frassinelli and Yuval Elovici}, editor = {Toktam Mahmoodi and Stefano Secci and Antonio Cianfrani and Filip Idzikowski}, title = {On packet loss modeling: An empirical assessment}, booktitle = {8th International Conference on the Network of the Future, {NOF} 2017, London, United Kingdom, November 22-24, 2017}, pages = {33--39}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/NOF.2017.8251217}, doi = {10.1109/NOF.2017.8251217}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nof/IacovazziFE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/IacovazziSFE17, author = {Alfonso Iacovazzi and Sanat Sarda and Daniel Frassinelli and Yuval Elovici}, title = {{DROPWAT:} an Invisible Network Flow Watermark for Data Exfiltration Traceback}, journal = {CoRR}, volume = {abs/1705.09460}, year = {2017}, url = {http://arxiv.org/abs/1705.09460}, eprinttype = {arXiv}, eprint = {1705.09460}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/IacovazziSFE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/PolveriniBCIL16, author = {Marco Polverini and Andrea Baiocchi and Antonio Cianfrani and Alfonso Iacovazzi and Marco Listanti}, title = {The Power of {SDN} to Improve the Estimation of the {ISP} Traffic Matrix Through the Flow Spread Concept}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {34}, number = {6}, pages = {1904--1913}, year = {2016}, url = {https://doi.org/10.1109/JSAC.2016.2559178}, doi = {10.1109/JSAC.2016.2559178}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/PolveriniBCIL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/IacovazziB15, author = {Alfonso Iacovazzi and Andrea Baiocchi}, title = {Protecting traffic privacy for massive aggregated traffic}, journal = {Comput. Networks}, volume = {77}, pages = {1--17}, year = {2015}, url = {https://doi.org/10.1016/j.comnet.2014.11.019}, doi = {10.1016/J.COMNET.2014.11.019}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/IacovazziB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/RizziIBC15, author = {Antonello Rizzi and Alfonso Iacovazzi and Andrea Baiocchi and Silvia Colabrese}, title = {A low complexity real-time Internet traffic flows neuro-fuzzy classifier}, journal = {Comput. Networks}, volume = {91}, pages = {752--771}, year = {2015}, url = {https://doi.org/10.1016/j.comnet.2015.09.011}, doi = {10.1016/J.COMNET.2015.09.011}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/RizziIBC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/PolveriniICBL15, author = {Marco Polverini and Alfonso Iacovazzi and Antonio Cianfrani and Andrea Baiocchi and Marco Listanti}, title = {Traffic matrix estimation enhanced by SDNs nodes in real network topology}, booktitle = {2015 {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops, Hong Kong, China, April 26 - May 1, 2015}, pages = {300--305}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFCOMW.2015.7179401}, doi = {10.1109/INFCOMW.2015.7179401}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/PolveriniICBL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/IacovazziDRB13, author = {Alfonso Iacovazzi and Alessandro D'Alconzo and Fabio Ricciato and Martin Burkhart}, title = {Elementary secure-multiparty computation for massive-scale collaborative network monitoring: {A} quantitative assessment}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3728--3742}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.08.017}, doi = {10.1016/J.COMNET.2013.08.017}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/IacovazziDRB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/IacovazziBB13, author = {Alfonso Iacovazzi and Andrea Baiocchi and Ludovico Bettini}, title = {What are you Googling? - Inferring search type information through a statistical classifier}, booktitle = {2013 {IEEE} Global Communications Conference, {GLOBECOM} 2013, Atlanta, GA, USA, December 9-13, 2013}, pages = {747--753}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/GLOCOM.2013.6831162}, doi = {10.1109/GLOCOM.2013.6831162}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/IacovazziBB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/IacovazziB13, author = {Alfonso Iacovazzi and Andrea Baiocchi}, title = {Investigating the trade-off between overhead and delay for full packet traffic privacy}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2013, Budapest, Hungary, June 9-13, 2013, Workshops Proceedings}, pages = {1345--1350}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICCW.2013.6649446}, doi = {10.1109/ICCW.2013.6649446}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/IacovazziB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/IacovazziB12, author = {Alfonso Iacovazzi and Andrea Baiocchi}, title = {From ideality to practicability in statistical packet features masking}, booktitle = {8th International Wireless Communications and Mobile Computing Conference, {IWCMC} 2012, Limassol, Cyprus, August 27-31, 2012}, pages = {456--462}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/IWCMC.2012.6314247}, doi = {10.1109/IWCMC.2012.6314247}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/iwcmc/IacovazziB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tma/IacovazziB12, author = {Alfonso Iacovazzi and Andrea Baiocchi}, editor = {Antonio Pescap{\`{e}} and Luca Salgarelli and Xenofontas A. Dimitropoulos}, title = {Padding and Fragmentation for Masking Packet Length Statistics}, booktitle = {Traffic Monitoring and Analysis - 4th International Workshop, {TMA} 2012, Vienna, Austria, March 12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7189}, pages = {85--88}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28534-9\_9}, doi = {10.1007/978-3-642-28534-9\_9}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/tma/IacovazziB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/teletraffic/IacovazziB10, author = {Alfonso Iacovazzi and Andrea Baiocchi}, title = {Optimum packet length masking}, booktitle = {22nd International Teletraffic Congress, {ITC} 2010, Amsterdam, The Netherlands, September 7-9, 2010}, pages = {1--8}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ITC.2010.5608728}, doi = {10.1109/ITC.2010.5608728}, timestamp = {Sat, 12 Nov 2022 12:58:30 +0100}, biburl = {https://dblp.org/rec/conf/teletraffic/IacovazziB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/MaioliniBIR09, author = {Gianluca Maiolini and Andrea Baiocchi and Alfonso Iacovazzi and Antonello Rizzi}, editor = {Luigi Fratta and Henning Schulzrinne and Yutaka Takahashi and Otto Spaniol}, title = {Real Time Identification of {SSH} Encrypted Application Flows by Using Cluster Analysis Techniques}, booktitle = {{NETWORKING} 2009, 8th International {IFIP-TC} 6 Networking Conference, Aachen, Germany, May 11-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5550}, pages = {182--194}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01399-7\_15}, doi = {10.1007/978-3-642-01399-7\_15}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/networking/MaioliniBIR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.