


default search action
5th ITASEC 2021: Virtual Event
- Alessandro Armando, Michele Colajanni:

Proceedings of the Italian Conference on Cybersecurity, ITASEC 2021, All Digital Event, April 7-9, 2021. CEUR Workshop Proceedings 2940, CEUR-WS.org 2021 - Didier Danet:

Punish and Perish: The Human Factor in Cybersecurity. 1-8 - Giuseppina Murino, Marina Ribaudo, Simon Pietro Romano, Armando Tacchella:

OT Cyber Security Frameworks Comparison Tool (CSFCTool). 9-22 - Sara Narteni, Ivan Vaccari, Maurizio Mongelli, Maurizio Aiello, Enrico Cambiaso:

On the Feasibility of Covert Channels through Short-Message-Service. 23-34 - Ivan Vaccari, Sara Narteni, Maurizio Mongelli, Maurizio Aiello, Enrico Cambiaso:

Perpetrate Cyber-threats using IoT Devices as Attack Vector: The ESP8266 Use Case. 35-46 - Gustavo Gonzalez Granadillo, Rodrigo Diaz, Eleni Veroni, Christos Xenakis:

A Multi-factor Assessment Mechanism to Define Priorities on Vulnerabilities affecting Healthcare Organizations. 47-60 - Filippo Cerocchi, Gabriele Rizzo:

A Topological Approach to Secure Key Exchange. 61-71 - Giacomo Abbattista, Donato Impedovo, Giuseppe Pirlo, Lucia Sarcinella, Nicola Stigliano:

Identifying Anomalous Places, Routes by GPS Feature: A System for Child Monitoring. 72-79 - Alessandro Placido Luise, Gaetano Perrone, Claudio Perrotta, Simon Pietro Romano:

On-demand Deployment and Orchestration of Cyber Ranges in the Cloud. 80-91 - Tommaso Zoppi, Enrico Schiavone, Irene Bicchierai, Francesco Brancati, Andrea Bondavalli:

Spoofing Detectability as a Property of Biometric Characteristics. 92-105 - Luisa Franchina, Serena Ferracci, Federico Palmaro:

Detecting Phishing E-mails Using Text Mining and Features Analysis. 106-119 - Christian Catalano, Paolo Afrune, Mario Angelelli, Giovanni Maglio, Fabrizio Striani, Franco Tommasi:

Security Testing Reuse Enhancing Active Cyber Defence in Public Administration. 120-132 - Marco Zuppelli, Luca Caviglione, Matteo Repetto:

Detecting Covert Channels Through Code Augmentation. 133-144 - Marco Bozzetti, Luca Olivieri, Fausto Spoto:

Cybersecurity Impacts of the Covid-19 Pandemic in Italy. 145-155 - Axel De Nardin, Marino Miculan, Claudio Piciarelli, Gian Luca Foresti:

A Time-series Classification Approach to Shallow Web Traffic De-anonymization. 156-165 - Alessandro Bocci, Stefano Forti, Gian-Luigi Ferrari, Antonio Brogi:

Placing FaaS in the Fog, Securely. 166-179 - Tobia Fiorese, Pietro Montino:

Learning-based Intrusion Detection System for On-Board Vehicle Communication. 180-192 - Roberto De Prisco, Alfredo De Santis, Rocco Zaccagnino:

An Accelerometer-based Privacy Attack on Smartphones. 193-206 - Daniele Granata, Massimiliano Rak, Giovanni Salzillo, Umberto Barbato:

Security in IoT Pairing & Authentication protocols, a Threat Model, a Case Study Analysis. 207-218 - Giuseppe Mario Malandrone, Giovanni Virdis, Giorgio Giacinto, Davide Maiorca:

PowerDecode: A PowerShell Script Decoder Dedicated to Malware Analysis. 219-232 - Dario Stabili, Francesco Pollicino, Alessio Rota:

A Benchmark Framework for CAN IDS. 233-245 - Shaharyar Khan, Alberto Volpatto, Geet Kalra, Jonathan Esteban, Tommaso Pescanoce, Sabino Caporusso, Michael Siegel:

Cyber Range for Industrial Control Systems (CR-ICS) for Simulating Attack Scenarios. 246-259 - Alessia Boi:

Comparative Analysis of Cyber Intelligence: The Italian Case. 260-269 - Carmelo Ardito, Tommaso Di Noia, Eugenio Di Sciascio, Domenico Lofù, Andrea Pazienza, Felice Vitulano:

An Artificial Intelligence Cyberattack Detection System to Improve Threat Reaction in e-Health. 270-283 - Giulio Berra, Gaspare Ferraro, Matteo Fornero, Nicolò Maunero, Paolo Prinetto, Gianluca Roascio:

PAIDEUSIS: A Remote Hybrid Cyber Range for Hardware, Network, IoT Security Training. 284-297 - Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Paolo Campegiani:

Facing the Blockchain Endpoint Vulnerability, an SGX-based Solution for Secure eHealth Auditing. 298-308 - Vincenzo Dentamaro, Vito Nicola Convertini, Stefano Galantucci, Paolo Giglio, Tonino Palmisano, Giuseppe Pirlo:

Ensemble Consensus: An Unsupervised Algorithm for Anomaly Detection in Network Security data. 309-318 - Massimiliano Masi, Tanja Pavleska, Simone Pezzoli:

A Systematic Approach for the definition of countermeasures in industrial IoT: An Automotive Case. 319-330 - Massimiliano Calani, Giovanni Denaro, Alberto Leporati:

Exploiting the Blockchain to Guarantee GDPR Compliance while Consents Evolve under Data Owners' Control. 331-343 - Manuel Cheminod, Luca Durante, Lucia Seno, Adriano Valenzano:

An Algorithm for Security Policy Migration in Multiple Firewall Networks. 344-359 - Mario Ciampi, Fabrizio Marangio, Giovanni Schmid, Mario Sicuranza:

A Blockchain-based Smart Contract System Architecture for Dependable Health Processes. 360-373 - Marco Zuppelli, Giuseppe Manco, Luca Caviglione, Massimo Guarascio:

Sanitization of Images Containing Stegomalware via Machine Learning Approaches. 374-386 - Marzio Di Feo:

Overcoming Complexity of (Cyber)War: The Logic of Useful Fiction in Cyber Exercises Scenarios. 387-393 - Simone Raponi, Maurantonio Caprolu, Roberto Di Pietro:

Beyond SolarWinds: The Systemic Risks of Critical Infrastructures, State of Play, Future Directions. 394-405 - Paolo Spagnoletti, Federica Ceci, Andrea Salvi:

Adversarial Evolution: Competing Dynamics and Reactive Institutional Forms in Financial Services Ecosystem. 406-413 - Vincenzo Carletti, Antonio Greco, Alessia Saggese, Mario Vento:

Robustness Evaluation of Convolutional Neural Networks for Malware Classification. 414-423 - Gabriele Costa, Enrico Russo, Andrea Valenza:

Damn Vulnerable Application Scanner. 424-435 - Giuseppe Amato, Simone Ciccarone, Pasquale Digregorio, Giuseppe Natalucci:

A Service Architecture for an Enhanced Cyber Threat Intelligence Capability. 436-446 - Giovanni Lagorio, Marina Ribaudo, Alessandro Armando:

Capture the Flag competitions for Higher Education. 447-460 - Francesco Benvenuto, Francesco Palmarini, Riccardo Focardi, Flaminia L. Luccio:

Firmware Extraction from Real IoT Devices through Power Analysis of AES. 461-474 - Edoardo Di Paolo, Enrico Bassetti, Angelo Spognardi:

Security Assessment of Common Open Source MQTT Brokers and Clients. 475-487 - Anna Pagnacco:

Critical Information Infrastructure Protection: Between Cybersecurity and Policymaking. 488-498 - Vita Santa Barletta, Paolo Buono, Danilo Caivano, Giovanni Dimauro, Antonio Pontrelli:

An Overview on the Security Technological Levels in the Italian Smart Cities. 499-508 - Chinmay Siwach, Gabriele Costa, Rocco De Nicola:

Enhancing Malware Classification with Symbolic Features. 509-522 - Carmelo Ardito, Yashar Deldjoo, Eugenio Di Sciascio, Fatemeh Nazary:

Revisiting Security Threat on Smart Grids: Accurate and Interpretable Fault Location Prediction and Type Classification. 523-533 - Vishnu Ramesh, Sara Abraham, Vinod P, Isham Mohamed, Corrado Aaron Visaggio, Sonia Laudanna:

A Study on Misclassification of Software Vulnerabilities when using Deep Learning and Machine Learning Algorithms. 534-545

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














