default search action
Nino Vincenzo Verde
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c18]Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde:
STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports. ARES 2023: 3:1-3:11 - [c17]Filippo Perrina, Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde:
AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation. IEEE Big Data 2023: 3053-3062 - [i5]Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde:
STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports. CoRR abs/2303.09999 (2023) - [i4]Filippo Perrina, Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde:
AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation. CoRR abs/2310.02655 (2023)
2010 – 2019
- 2016
- [j8]Mauro Conti, Luigi Vincenzo Mancini, Riccardo Spolaor, Nino Vincenzo Verde:
Analyzing Android Encrypted Network Traffic to Identify User Actions. IEEE Trans. Inf. Forensics Secur. 11(1): 114-125 (2016) - 2015
- [c16]Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino Vincenzo Verde:
Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis. CODASPY 2015: 297-304 - [c15]Giuseppe Ateniese, Briland Hitaj, Luigi Vincenzo Mancini, Nino Vincenzo Verde, Antonio Villani:
No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position. NSS 2015: 46-59 - [i3]Giuseppe Ateniese, Briland Hitaj, Luigi V. Mancini, Nino Vincenzo Verde, Antonio Villani:
No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track User Position. CoRR abs/1505.07774 (2015) - 2014
- [j7]Roberto Di Pietro, Stefano Guarino, Nino Vincenzo Verde, Josep Domingo-Ferrer:
Security in wireless ad-hoc networks - A survey. Comput. Commun. 51: 1-20 (2014) - [c14]Nino Vincenzo Verde, Giuseppe Ateniese, Emanuele Gabrielli, Luigi Vincenzo Mancini, Angelo Spognardi:
No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone. ICDCS 2014: 218-227 - [c13]Andrea Di Florio, Nino Vincenzo Verde, Antonio Villani, Domenico Vitali, Luigi Vincenzo Mancini:
Bypassing Censorship: A Proven Tool against the Recent Internet Censorship in Turkey. ISSRE Workshops 2014: 389-394 - [i2]Nino Vincenzo Verde, Giuseppe Ateniese, Emanuele Gabrielli, Luigi Vincenzo Mancini, Angelo Spognardi:
No NAT'd User left Behind: Fingerprinting Users behind NAT from NetFlow Records alone. CoRR abs/1402.1940 (2014) - [i1]Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino Vincenzo Verde:
Can't you hear me knocking: Identification of user actions on Android apps via traffic analysis. CoRR abs/1407.7844 (2014) - 2013
- [j6]Roberto Di Pietro, Nino Vincenzo Verde:
Epidemic theory and data survivability in unattended wireless sensor networks: Models and gaps. Pervasive Mob. Comput. 9(4): 588-597 (2013) - [c12]Wafa Ben Jaballah, Mauro Conti, Roberto Di Pietro, Mohamed Mosbah, Nino Vincenzo Verde:
MASS: An efficient and secure broadcast authentication scheme for resource constrained devices. CRiSIS 2013: 1-6 - [c11]Roberto Di Pietro, Roberto Mandati, Nino Vincenzo Verde:
Track me if you can: Transparent obfuscation for Location based Services. WOWMOM 2013: 1-9 - 2012
- [j5]Alessandro Colantonio, Roberto Di Pietro, Nino Vincenzo Verde:
A business-driven decomposition methodology for role mining. Comput. Secur. 31(7): 844-855 (2012) - [j4]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
Visual Role Mining: A Picture Is Worth a Thousand Roles. IEEE Trans. Knowl. Data Eng. 24(6): 1120-1133 (2012) - [c10]Nino Vincenzo Verde, Jaideep Vaidya, Vijay Atluri, Alessandro Colantonio:
Role engineering: from theory to practice. CODASPY 2012: 181-192 - [c9]Roberto Di Pietro, Fabio Martinelli, Nino Vincenzo Verde:
Broadcast Authentication for Resource Constrained Devices: A Major Pitfall and Some Solutions. SRDS 2012: 213-218 - 2011
- [j3]Elisabetta Allegra, Roberto Di Pietro, Mauro La Noce, Valerio Ruocco, Nino Vincenzo Verde:
Cross-border co-operation and education in digital investigations: A European perspective. Digit. Investig. 8(2): 106-113 (2011) - [j2]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
A new role mining framework to elicit business roles and to mitigate enterprise risk. Decis. Support Syst. 50(4): 715-731 (2011) - [c8]Roberto Di Pietro, Nino Vincenzo Verde:
Epidemic data survivability in unattended wireless sensor networks. WISEC 2011: 11-22 - [c7]Roberto Di Pietro, Nino Vincenzo Verde:
Introducing epidemic models for data survivability in Unattended Wireless Sensor Networks. WOWMOM 2011: 1-6 - 2010
- [j1]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
Taming role mining complexity in RBAC. Comput. Secur. 29(5): 548-564 (2010) - [c6]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
Evaluating the Risk of Adopting RBAC Roles. DBSec 2010: 303-310 - [c5]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
ABBA: adaptive bicluster-based approach to impute missing values in binary matrices. SAC 2010: 1026-1033 - [c4]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
Mining Business-Relevant RBAC States through Decomposition. SEC 2010: 19-30
2000 – 2009
- 2009
- [c3]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
A formal framework to elicit roles with business meaning in RBAC systems. SACMAT 2009: 85-94 - [c2]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
Mining Stable Roles in RBAC. SEC 2009: 259-269 - [c1]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
A Probabilistic Bound on the Basic Role Mining Problem and Its Applications. SEC 2009: 376-386
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint