default search action
8th ITASEC 2024: Salerno, Italy
- Gianni D'Angelo, Flaminia L. Luccio, Francesco Palmieri:
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), Salerno, Italy, April 8-12, 2024. CEUR Workshop Proceedings 3731, CEUR-WS.org 2024 - Francesco Buccafurri, Vincenzo De Angelis, Sara Lazzaro, Giorgia Sigilli:
Towards K-Anonymous Payments in Ethereum. - Michele Salvatori, Giorgio Bernardinetti, Francesco Quaglia, Giuseppe Bianchi:
ShiftyLoader: Syscall-free Reflective Code Injection in the Linux Operating System. - Mulualem Bitew Anley, Otuekong Ekpo, T. Milinda H. Gedara:
Cybersecurity Assessment of Digital Twin in Smart Grids. - Vincenzo Carletti, Pasquale Foggia, Alessia Saggese, Mario Vento:
Predicting Source Code Vulnerabilities Using Deep Learning: A Fair Comparison on Real Data. - Davide Cerotti, Daniele Codetta Raiteri, Giovanna Dondossola, Lavinia Egidi, Giuliana Franceschinis, Luigi Portinale, Roberta Terruggia, Davide Savarro:
SecuriDN: a customizable GUI generating cybersecurity models for DER control architectures. - Alessandra De Paola, Salvatore Drago, Pierluca Ferraro, Giuseppe Lo Re:
Detecting Zero-Day Attacks under Concept Drift: An Online Unsupervised Threat Detection System. - Davide Baldini, Kate Francis:
AI Regulatory Sandboxes between the AI Act and the GDPR: the role of Data Protection as a Corporate Social. - Farwa Batool, Federico Canino, Federico Concone, Giuseppe Lo Re, Marco Morana:
A Black-box Adversarial Attack on Fake News Detection Systems. - Enrico Talotti, Matteo Paier, Marino Miculan:
ECC's Achilles' Heel: Unveiling Weak Keys in Standardized Curves. - Pasquale Caporaso, Giuseppe Bianchi, Francesco Quaglia:
Benchmarking Virtualized Page Permission for Malware Detection: a Web Server Case Study. - Alessandro Rivitti, Angelo Tulumello, Giuseppe Bianchi:
The Case for Ultra High Speed Portable Network Security Filters. - Federica Casarosa, Giovanni Comandè:
Private law perspectives of cybersecurity. - Fabio Calefato, Filippo Lanubile, Luigi Quaranta:
Security Risks and Best Practices of MLOps: A Multivocal Literature Review. - Luca Verderame, Luca Caviglione:
Design of a Hardening Module for Automatically Securing Containers. - Lorenzo Bracciale, Pierpaolo Loreti, Emanuele Raso, Giuseppe Bianchi:
In Plain Sight: A Pragmatic Exploration of the Medical Landscape (In)security. - Andrea Venturi, Dimitri Gall, Dario Stabili, Mirco Marchetti:
Hardening Machine Learning based Network Intrusion Detection Systems with synthetic netflows. - Gianmarco Lusvardi, Luca Ferretti, Mauro Andreolini:
Timing side-channel attacks on USB devices using eBPF. - Fabio Patrone, Pierpaolo Loreti, Luca Fiscariello, Lorenzo Bracciale, Alessandro Amici, Andrea Detti, Cesare Roseti, Michele Luglio, Francesco Zampognaro, Giuseppe Bianchi, Mario Marchese:
OpenSatRange: An open cyber range for operators and users of satellite communication networks. - Giuseppe Fenza, Salvatore Froncillo, Claudio Stanzione:
Enhancing Fraud Detection through Cascading Machine Learning Models and Clustering Techniques. - Ludovico Fusco, Alessandro Aldini:
Hyperproperties for Safe and Secure RFID Systems. - Francesco Zampognaro, Domenico Verde, Giuseppe Bianchi:
VoWiFi Security: An Exploration of Non-3GPP Untrusted Access via Public ePDG URLs. - Silvio Russo, Claudio Zanasi, Isabella Marasco:
Feature extraction for anomaly detection in industrial control systems. - Tommaso Puccetti, Tommaso Zoppi, Andrea Ceccarelli:
On attacks (dis)similarities to test adversarial defense: can we reduce the attack set? - Alì Aghazadeh Ardebili, Cristian Martella, Angelo Martella, Alessandro Lazari, Antonella Longo, Antonio Ficarella:
Smart Critical Infrastructures Security management and governance: Implementation of Cyber Resilience KPIs for Decentralized Energy Asset. - Gabriele Costa, Cosimo Perini Brogi:
Toward dynamic epistemic verification of zero-knowledge protocols. - Arturo di Corinto:
The role of disinformation, propaganda and active measures in cyber warfare. noname(057)16 travels to Italy. - Andrea Bernardini, Claudio Carpineto, Simone Angelini, Giovanna Dondossola, Roberta Terruggia:
Ask the right queries: Improving search engine retrieval of vulnerable internet-connected devices through interactive query reformulation. - Lorenzo Ferro, Antonio Lioy:
Standard-Based Remote Attestation: The Veraison Project. - Alessandra Recordare, Guglielmo Cola, Tiziano Fagni, Maurizio Tesconi:
Unveiling Online Conspiracy Theorists: a Text-Based Approach and Characterization. - Mattia Paccamiccio, Franco Raimondi, Michele Loreti:
Building call graph of WebAssembly programs via abstract semantics. - Attaullah Buriro, Flaminia L. Luccio:
2in1: A Bimodal Behavioral Biometric-based User Authentication Scheme for Smartphones. - Fabrizio Baiardi, Cosimo Comella, Vincenzo Sammartino:
Multilevel Database Decomposition Framework. - Marco Blanchini, Michele Cerreta, Davide Di Monda, Matteo Fabbri, Mario Raciti, Hamza Sajjad Ahmad, Gabriele Costa:
Supporting Criminal Investigations on the Blockchain: A Temporal Logic-based Approach. - Stefano Bistarelli, Michele Ceccarelli, Chiara Luchini, Ivan Mercanti, Francesco Santini:
A Preliminary Study on the Creation of a Covert Channel with HTTP Headers. - Flavio Ciravegna, Giacomo Bruno, Antonio Lioy:
IKE-less IPsec: Enhancing Security for IoT Device Networks. - Mario Barbareschi, Biagio Boi, Franco Cirillo, Marco De Santis, Christian Esposito:
Securing the Internet of Medical Things using PUF-based SSI Authentication. - Matteo Paier, Mattia Pizzolitto, Gian Luca Foresti, Marino Miculan:
Netstaldi: A Modular Distributed Architecture for Incremental Network Discovery. - Luigi Coppolino, Alessandro De Crecchio, Roberto Nardone, Alfredo Petruolo, Luigi Romano, Federica Uccello:
Exploiting Data Spaces to Enable Privacy Preserving Data Exchange in the Energy Supply Chain. - Caterina Senette, Margherita Gambini, Tiziano Fagni, Victoria Popa, Maurizio Tesconi:
Inferring Political Leaning on X (Twitter): A Zero-Shot Approach in an Italian Scenario. - Dario Stabili, Filip Valgimigli, Tobia Bocchi, Filippo Veronesi, Mirco Marchetti:
Implementing and testing RollJam on Software-Defined Radios. - Francesco Greco, Giuseppe Desolda, Andrea Esposito, Alessandro Carelli:
David versus Goliath: Can Machine Learning Detect LLM-Generated Text? A Case Study in the Detection of Phishing Emails. - Andrea Artioli, Mauro Andreolini, Luca Ferretti, Mirco Marchetti:
Evaluating trainees in large cyber exercises. - Alessia Michela Di Campi, Flaminia L. Luccio:
Understanding how users choose passwords: analysis and best practices. - Leonardo Regano, Daniele Canavese, Luca Mannella:
A Privacy-Preserving Approach for Vulnerability Scanning Detection. - Gaia Fiorinelli, Maria Vittoria Zucca:
Is the Road to Hell Paved with Good Intentions? A Criminological and Criminal Law Analysis of Prospective Regulation for Ethical Hacking in Italy and the EU.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.