Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/itasec/itasec2018.bht:"
@inproceedings{DBLP:conf/itasec/AngelisABLMS18, author = {Stefano De Angelis and Leonardo Aniello and Roberto Baldoni and Federico Lombardi and Andrea Margheri and Vladimiro Sassone}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {{PBFT} vs Proof-of-Authority: Applying the {CAP} Theorem to Permissioned Blockchain}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-06.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:11 +0100}, biburl = {https://dblp.org/rec/conf/itasec/AngelisABLMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BernardeschiMS18, author = {Cinzia Bernardeschi and Paolo Masci and Antonella Santone}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Data Leakage in Java Applets with Exception Mechanism}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-05.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BernardeschiMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/Bernardini18, author = {Andrea Bernardini}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Extending Domain Name Monitoring. Identifying Potentially Malicious Domains Using Hash Signatures of {DOM} Elements}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-04.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/Bernardini18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BistarelliP018, author = {Stefano Bistarelli and Matteo Parroccini and Francesco Santini}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Visualizing Bitcoin Flows of Ransomware: WannaCry One Week Later}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-13.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BistarelliP018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BodeiDFGTV18, author = {Chiara Bodei and Pierpaolo Degano and Riccardo Focardi and Letterio Galletta and Mauro Tempesta and Lorenzo Veronese}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Firewall Management With FireWall Synthesizer}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-16.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BodeiDFGTV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BollaCR18, author = {Raffaele Bolla and Paolo Maria Comi and Matteo Repetto}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {A Distributed Cyber-security Framework for Heterogeneous Environments}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-11.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BollaCR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BottazziIS18, author = {Giovanni Bottazzi and Giuseppe F. Italiano and Domenico Spera}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Preventing Ransomware Attacks Through File System Filter Drivers}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-08.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BottazziIS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CalzavaraRB18, author = {Stefano Calzavara and Alvise Rabitti and Michele Bugliesi}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Dr Cookie and Mr Token - Web Session Implementations and How to Live with Them}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-02.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/CalzavaraRB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/DeriS18, author = {Luca Deri and Arianna Del Soldato}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Enforcing Security in IoT and Home Networks}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-15.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/DeriS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/FerraraS18, author = {Pietro Ferrara and Fausto Spoto}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Static Analysis for {GDPR} Compliance}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-10.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/FerraraS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/LetteriRCC18, author = {Ivan Letteri and Massimo Del Rosso and Pasquale Caianiello and Dajana Cassioli}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Performance of Botnet Detection by Neural Networks in Software-Defined Networks}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-03.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/LetteriRCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/NicolettiMLSS18, author = {Luca Nicoletti and Andrea Margheri and Federico Lombardi and Vladimiro Sassone and Francesco Paolo Schiavo}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Cross-Cloud Management of Sensitive Data via Blockchain: a Payslip Calculation Use Case}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-12.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/NicolettiMLSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/PaolaFGRM18, author = {Alessandra De Paola and Salvatore Favaloro and Salvatore Gaglio and Giuseppe Lo Re and Marco Morana}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Malware Detection through Low-level Features and Stacked Denoising Autoencoders}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-07.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/PaolaFGRM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/PuligaCCN18, author = {Michelangelo Puliga and Guido Caldarelli and Alessandro Chessa and Rocco De Nicola}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Understanding the Twitter User Networks of Viruses and Ransomware Attacks}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-09.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/PuligaCCN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/SolimeoCTM18, author = {Alfonso Solimeo and Luca Capacci and Stefano Taino and Rebecca Montanari}, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {{MAD-IOS:} Dynamic App Vulnerability Analysis in Non-jailbroken Devices}, booktitle = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058/paper-14.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/SolimeoCTM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/itasec/2018, editor = {Elena Ferrari and Marco Baldi and Roberto Baldoni}, title = {Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2058}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2058}, urn = {urn:nbn:de:0074-2058-8}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.