


default search action
1st ITASEC 2017: Venice, Italy
- Alessandro Armando, Roberto Baldoni, Riccardo Focardi:

Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017. CEUR Workshop Proceedings 1816, CEUR-WS.org 2017
Science and Technology Track
- Alessandro Barenghi, Gerardo Pelosi:

An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers. 8-18 - Giampaolo Bella, Denis Butin, Hugo Jonker:

Analysing Privacy Analyses. 19-28 - Domenico Amelino, Mario Barbareschi, Alessandro Cilardo:

A Proposal for the Secure Activation and Licensing of FPGA IP Cores. 29-37 - Chiara Bodei, Letterio Galletta:

Tracking Sensitive and Untrustworthy Data in IoT. 38-52 - Enrico Schiavone

, Andrea Ceccarelli, Andrea Bondavalli:
Risk Assessment of a Biometric Continuous Authentication Protocol for Internet Services. 53-65 - Luca Ghiani, Valerio Mura, Pierluigi Tuveri, Gian Luca Marcialis:

On the Interoperability of Capture Devices in Fingerprint Presentation Attacks Detection. 66-75 - Gianluigi Folino, Francesco Sergio Pisani:

A Software Architecture for Classifying Users in E-payment Systems. 76-85 - Fabio Del Vigna, Andrea Cimino, Felice Dell'Orletta, Marinella Petrocchi, Maurizio Tesconi:

Hate Me, Hate Me Not: Hate Speech Detection on Facebook. 86-95 - Davide Maiorca, Paolo Russu, Igino Corona, Battista Biggio, Giorgio Giacinto:

Detection of Malicious Scripting Code Through Discriminant and Adversary-Aware API Analysis. 96-105 - Ambra Demontis, Battista Biggio, Giorgio Fumera, Giorgio Giacinto, Fabio Roli:

Infinity-Norm Support Vector Machines Against Adversarial Label Contamination. 106-115 - Giuseppe Bernieri, Federica Pascucci, Javier López:

Network Anomaly Detection in Critical Infrastructure Based on Mininet Network Simulator. 116-125 - Giovanni Bottazzi, Giuseppe Francesco Italiano, Giuseppe Giulio Rutigliano:

An Operational Framework for Incident Handling. 126-135 - Marc Richter, Konrad S. Wrona:

Devil in the Details: Assessing Automated Confidentiality Classifiers in the Context of NATO Documents. 136-145 - Edoardo Gaetani, Leonardo Aniello, Roberto Baldoni, Federico Lombardi, Andrea Margheri, Vladimiro Sassone:

Blockchain-Based Database to Ensure Data Integrity in Cloud Computing Environments. 146-155 - Marco Baldi, Franco Chiaraluce, Emanuele Frontoni, Giuseppe Gottardi, Daniele Sciarroni, Luca Spalazzi:

Certificate Validation Through Public Ledgers and Blockchains. 156-165
Fil Rouge Track
- Andrea Monti:

Rules of (Digital) Evidence and Prosecution's Actual Needs. When the Law Falls Behind Technology. 166-174 - Maria Cristina Arcuri, Marina Brogi, Gino Gandolfi:

How Does Cyber Crime Affect Firms? The Effect of Information Security Breaches on Stock Returns. 175-193 - Mario Dal Co:

Restructuring and Securing Italian Banks (in Italian). 194-201 - Giampiero Bonfiglio, Ludovica Coletta, Alessandra Teresa Coscarella, Martina Limonta, Panfilo Ventresca:

Web-based Intelligence in Adaptive Security Models and Multidisciplinary Aspects of Activation and Analysis (in Italian). 202-211 - Filippo Pierozzi:

The Hacking Team Case: Quis Custodiet Ipsos Custodes? Issues and Challenges for a More Efficient Partnership Between Private Industry and Intelligence Agencies (in Italian). 212-221
Demos Track
- Maurizio Mencarini, Gianluca Sensidoni:

Multilanguage Semantic Behavioural Algorithms to Discover Terrorist Related Online Contents. 222-231 - Mauro Alberto Brignoli, Luisa Franchina:

An Intelligence Platform based on OSINT tools and Open Source Technologies (in Italian). 232-241 - Pietro Ferrara, Elisa Burato, Fausto Spoto:

Security Analysis of the OWASP Benchmark with Julia. 242-247 - Armend Duzha, Panagiotis Gouvas, Monica Canepa:

MITIGATE: An Innovative Cyber-Security Maritime Supply Chain Risk Management System. 248-252 - Antonella Chirichiello, Claudio Porretti, Antonio Berardi:

Cyber Threat Intelligence for Supporting the ATM Security Management. 253-257

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














