default search action
Angelo Spognardi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c44]Federica Bianchi, Enrico Bassetti, Angelo Spognardi:
Scalable and automated Evaluation of Blue Team cyber posture in Cyber Ranges. SAC 2024: 1539-1541 - 2023
- [c43]Edoardo Di Paolo, Enrico Bassetti, Angelo Spognardi:
A New Model for Testing IPv6 Fragment Handling. ESORICS (2) 2023: 277-294 - [c42]Edoardo Di Paolo, Marinella Petrocchi, Angelo Spognardi:
From Online Behaviours to Images: A Novel Approach to Social Bot Detection. ICCS (1) 2023: 593-607 - [i19]Stefano Cresci, Roberto Di Pietro, Angelo Spognardi, Maurizio Tesconi, Marinella Petrocchi:
Demystifying Misconceptions in Social Bots Research. CoRR abs/2303.17251 (2023) - [i18]Edoardo Di Paolo, Marinella Petrocchi, Angelo Spognardi:
From Online Behaviours to Images: A Novel Approach to Social Bot Detection. CoRR abs/2304.07535 (2023) - [i17]Edoardo Di Paolo, Enrico Bassetti, Angelo Spognardi:
A New Model for Testing IPv6 Fragment Handling. CoRR abs/2309.03525 (2023) - [i16]Edoardo Di Paolo, Enrico Bassetti, Angelo Spognardi:
Security assessment of common open source MQTT brokers and clients. CoRR abs/2309.03547 (2023) - [i15]Federica Bianchi, Enrico Bassetti, Angelo Spognardi:
Scalable and automated Evaluation of Blue Team cyber posture in Cyber Ranges. CoRR abs/2312.17221 (2023) - 2022
- [j20]Jovana Mijalkovic, Angelo Spognardi:
Reducing the False Negative Rate in Deep Learning Based Network Intrusion Detection Systems. Algorithms 15(8): 258 (2022) - [j19]Stefano Cresci, Marinella Petrocchi, Angelo Spognardi, Stefano Tognazzi:
Adversarial Machine Learning for Protecting Against Online Manipulation. IEEE Internet Comput. 26(2): 47-52 (2022) - 2021
- [j18]Stefano Cresci, Marinella Petrocchi, Angelo Spognardi, Stefano Tognazzi:
The coming age of adversarial social bot detection. First Monday 26(6) (2021) - [c41]Edoardo Di Paolo, Enrico Bassetti, Angelo Spognardi:
Security Assessment of Common Open Source MQTT Brokers and Clients. ITASEC 2021: 475-487 - [i14]Stefano Cresci, Marinella Petrocchi, Angelo Spognardi, Stefano Tognazzi:
Adversarial machine learning for protecting against online manipulation. CoRR abs/2111.12034 (2021) - 2020
- [j17]Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi:
Emergent properties, models, and laws of behavioral similarities within groups of twitter users. Comput. Commun. 150: 47-61 (2020) - [c40]Angelo Spognardi, Marinella Petrocchi:
On the Robustness of Rating Aggregators Against Injection Attacks. MISDOOM 2020: 205-217 - [e2]Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi:
Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12146, Springer 2020, ISBN 978-3-030-57807-7 [contents] - [e1]Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi:
Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12147, Springer 2020, ISBN 978-3-030-57877-0 [contents]
2010 – 2019
- 2019
- [j16]Stefano Cresci, Marinella Petrocchi, Angelo Spognardi, Stefano Tognazzi:
On the capability of evolved spambots to evade detection via genetic engineering. Online Soc. Networks Media 9: 1-16 (2019) - [c39]Stefano Cresci, Marinella Petrocchi, Angelo Spognardi, Stefano Tognazzi:
Better Safe Than Sorry: An Adversarial Approach to Improve Social Bot Detection. WebSci 2019: 47-56 - [i13]Stefano Cresci, Marinella Petrocchi, Angelo Spognardi, Stefano Tognazzi:
Better Safe Than Sorry: An Adversarial Approach to Improve Social Bot Detection. CoRR abs/1904.05132 (2019) - 2018
- [j15]Marios Argyriou, Nicola Dragoni, Angelo Spognardi:
Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications. Secur. Commun. Networks 2018: 4672072:1-4672072:15 (2018) - [j14]Michele De Donno, Nicola Dragoni, Alberto Giaretta, Angelo Spognardi:
DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation. Secur. Commun. Networks 2018: 7178164:1-7178164:30 (2018) - [j13]Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi:
Social Fingerprinting: Detection of Spambot Groups Through DNA-Inspired Behavioral Modeling. IEEE Trans. Dependable Secur. Comput. 15(4): 561-576 (2018) - [c38]Udo Bub, Ajantha Dahanayake, Jérôme Darmont, Claudia Diamantini, Fabio Fassetti, Eduardo Fermé, Nadia Kabachi, Ilaria Matteucci, Bálint Molnár, Sham Navathe, Ermelinda Oro, Marinella Petrocchi, Simona E. Rombo, Massimo Ruffolo, Angelo Spognardi, Bernhard Thalheim, Domenico Ursino:
Contributions from ADBIS 2018 Workshops. ADBIS (Short Papers and Workshops) 2018: 91-102 - [c37]Vittoria Cozza, Marinella Petrocchi, Angelo Spognardi:
Mining Implicit Data Association from Tripadvisor Hotel Reviews. EDBT/ICDT Workshops 2018: 56-61 - [c36]Michela Fazzolari, Marinella Petrocchi, Angelo Spognardi:
Predicting Online Review Scores Across Reviewer Categories. IDEAL (1) 2018: 698-710 - [c35]Stefano Cresci, Marinella Petrocchi, Angelo Spognardi, Stefano Tognazzi:
From Reaction to Proaction: Unexplored Ways to the Detection of Evolving Spambots. WWW (Companion Volume) 2018: 1469-1470 - 2017
- [j12]Michela Fazzolari, Vittoria Cozza, Marinella Petrocchi, Angelo Spognardi:
A Study on Text-Score Disagreement in Online Reviews. Cogn. Comput. 9(5): 689-701 (2017) - [j11]Alessandro Maggi, Marinella Petrocchi, Angelo Spognardi, Francesco Tiezzi:
A language-based approach to modelling and analysis of Twitter interactions. J. Log. Algebraic Methods Program. 87: 67-91 (2017) - [c34]Daniel Tolboe Handler, Lotte Hauge, Angelo Spognardi, Nicola Dragoni:
Security And Privacy Issues in Healthcare Monitoring Systems: A Case Study. HEALTHINF 2017: 383-388 - [c33]Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi:
Exploiting Digital DNA for the Analysis of Similarities in Twitter Behaviours. DSAA 2017: 686-695 - [c32]Angelo Spognardi, Michele De Donno, Nicola Dragoni, Alberto Giaretta:
Analysis of DDoS-Capable IoT Malwares. FedCSIS 2017: 807-816 - [c31]Marios Argyriou, Nicola Dragoni, Angelo Spognardi:
Security Flows in OAuth 2.0 Framework: A Case Study. SAFECOMP Workshops 2017: 396-406 - [c30]Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi:
The Paradigm-Shift of Social Spambots: Evidence, Theories, and Tools for the Arms Race. WWW (Companion Volume) 2017: 963-972 - [i12]Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi:
The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race. CoRR abs/1701.03017 (2017) - [i11]Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi:
Social Fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling. CoRR abs/1703.04482 (2017) - [i10]Michela Fazzolari, Vittoria Cozza, Marinella Petrocchi, Angelo Spognardi:
A study on text-score disagreement in online reviews. CoRR abs/1707.06932 (2017) - 2016
- [j10]Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi:
DNA-Inspired Online Behavioral Modeling and Its Application to Spambot Detection. IEEE Intell. Syst. 31(5): 58-64 (2016) - [j9]Marinella Petrocchi, Angelo Spognardi, Paolo Santi:
Bioinspired Security Analysis of Wireless Protocols. Mob. Networks Appl. 21(1): 139-148 (2016) - [c29]Daniel Schougaard, Nicola Dragoni, Angelo Spognardi:
Evaluation of Professional Cloud Password Management Tools. ICWE Workshops 2016: 16-28 - [c28]Vittoria Cozza, Van Tien Hoang, Marinella Petrocchi, Angelo Spognardi:
Experimental Measures of News Personalization in Google News. ICWE Workshops 2016: 93-104 - [c27]Vittoria Cozza, Marinella Petrocchi, Angelo Spognardi:
A Matter of Words: NLP for Quality Evaluation of Wikipedia Medical Articles. ICWE 2016: 448-456 - [c26]Rohit Goyal, Nicola Dragoni, Angelo Spognardi:
Mind the tracker you wear: a security analysis of wearable health trackers. SAC 2016: 131-136 - [c25]Rohit Goyal, Angelo Spognardi, Nicola Dragoni, Marios Argyriou:
SafeDroid: A Distributed Malware Detection Service for Android. SOCA 2016: 59-66 - [i9]Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi:
DNA-inspired online behavioral modeling and its application to spambot detection. CoRR abs/1602.00110 (2016) - [i8]Vittoria Cozza, Marinella Petrocchi, Angelo Spognardi:
A matter of words: NLP for quality evaluation of Wikipedia medical articles. CoRR abs/1603.01987 (2016) - [i7]Stefano Cresci, Marinella Petrocchi, Maurizio Tesconi, Roberto Di Pietro, Angelo Spognardi:
Social Fingerprinting - or the Truth About You. ERCIM News 2016(106) (2016) - 2015
- [j8]Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi:
Fame for sale: Efficient detection of fake Twitter followers. Decis. Support Syst. 80: 56-71 (2015) - [j7]Giuseppe Ateniese, Luigi V. Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali, Giovanni Felici:
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers. Int. J. Secur. Networks 10(3): 137-150 (2015) - [c24]Alessandro Colantonio, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi:
Visual detection of singularities in review platforms. SAC 2015: 1294-1295 - [c23]Rocco De Nicola, Alessandro Maggi, Marinella Petrocchi, Angelo Spognardi, Francesco Tiezzi:
Twitlang(er): Interactions Modeling Language (and Interpreter) for Twitter. SEFM 2015: 327-343 - [c22]Alessandro Colantonio, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi:
VISIO: A Visual Approach for Singularity Detection in Recommendation Systems. TrustBus 2015: 33-47 - [c21]Mauro Conti, Vittoria Cozza, Marinella Petrocchi, Angelo Spognardi:
TRAP: Using Targeted ads to unveil Google personal profiles. WIFS 2015: 1-6 - [c20]Van Tien Hoang, Angelo Spognardi, Francesco Tiezzi, Marinella Petrocchi, Rocco De Nicola:
Domain-specific queries and Web search personalization: some investigations. WWV 2015: 51-58 - [i6]Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi:
Fame for sale: efficient detection of fake Twitter followers. CoRR abs/1509.04098 (2015) - [i5]Mauro Conti, Vittoria Cozza, Marinella Petrocchi, Angelo Spognardi:
TRAP: using TaRgeted Ads to unveil Google personal Profiles. CoRR abs/1510.04031 (2015) - 2014
- [j6]Mauro Conti, Roberto Di Pietro, Angelo Spognardi:
Clone wars: Distributed detection of clone attacks in mobile WSNs. J. Comput. Syst. Sci. 80(3): 654-669 (2014) - [c19]Marinella Petrocchi, Angelo Spognardi, Paolo Santi:
Cryptofraglets Reloaded - Bioinspired Security Modeling of a RFID Protocol and Properties. BICT 2014 - [c18]Riccardo Conti, Emanuel Marzini, Angelo Spognardi, Ilaria Matteucci, Paolo Mori, Marinella Petrocchi:
Maturity Assessment of Wikipedia Medical Articles. CBMS 2014: 281-286 - [c17]Nino Vincenzo Verde, Giuseppe Ateniese, Emanuele Gabrielli, Luigi Vincenzo Mancini, Angelo Spognardi:
No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone. ICDCS 2014: 218-227 - [c16]Stefano Cresci, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi, Roberto Di Pietro:
A Criticism to Society (As Seen by Twitter Analytics). ICDCS Workshops 2014: 194-200 - [c15]Emanuel Marzini, Angelo Spognardi, Ilaria Matteucci, Paolo Mori, Marinella Petrocchi, Riccardo Conti:
Improved Automatic Maturity Assessment of Wikipedia Medical Articles - (Short Paper). OTM Conferences 2014: 612-622 - [c14]Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi:
A Lot of Slots - Outliers Confinement in Review-Based Systems. WISE (1) 2014: 15-30 - [i4]Nino Vincenzo Verde, Giuseppe Ateniese, Emanuele Gabrielli, Luigi Vincenzo Mancini, Angelo Spognardi:
No NAT'd User left Behind: Fingerprinting Users behind NAT from NetFlow Records alone. CoRR abs/1402.1940 (2014) - [i3]Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi:
Discriminating Between the Wheat and the Chaff in Online Recommendation Systems. ERCIM News 2014(96) (2014) - 2013
- [i2]Giuseppe Ateniese, Giovanni Felici, Luigi V. Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali:
Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers. CoRR abs/1306.4447 (2013) - 2012
- [c13]Luigi Vincenzo Mancini, Angelo Spognardi, Claudio Soriente, Antonio Villani, Domenico Vitali:
Relieve Internet Routing Security of Public Key Infrastructure. ICCCN 2012: 1-9 - [c12]Mauro Conti, Roberto Di Pietro, Angelo Spognardi:
Wireless Sensor Replica Detection in Mobile Environments. ICDCN 2012: 249-264 - [c11]Angelo Spognardi, Antonio Villani, Domenico Vitali, Luigi Vincenzo Mancini, Roberto Battistoni:
Large-Scale Traffic Anomaly Detection: Analysis of Real Netflow Datasets. ICETE (Selected Papers) 2012: 192-208 - [c10]Domenico Vitali, Antonio Villani, Angelo Spognardi, Roberto Battistoni, Luigi V. Mancini:
DDoS Detection with Information Theory Metrics and Netflows - A Real Case. SECRYPT 2012: 172-181 - 2011
- [j5]Mauro Conti, Roberto Di Pietro, Angelo Spognardi:
"Who Counterfeited My Viagra?" Probabilistic Item Removal Detection via RFID Tag Cooperation. EURASIP J. Wirel. Commun. Netw. 2011 (2011) - [j4]Roberto Di Pietro, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Intrusion-resilient integrity in data-centric unattended WSNs. Pervasive Mob. Comput. 7(4): 495-508 (2011) - [c9]Domenico Vitali, Angelo Spognardi, Luigi V. Mancini:
Replication Schemes in Unattended Wireless Sensor Networks. NTMS 2011: 1-5 - [c8]Domenico Vitali, Angelo Spognardi, Antonio Villani, Luigi V. Mancini:
MhRep: Multi-hop Replication Scheme for Data Survival in Unattended Wireless Sensor Networks. SRDS Workshops 2011: 42-51 - 2010
- [j3]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi:
eRIPP-FS: Enforcing privacy and security in RFID. Secur. Commun. Networks 3(1): 58-70 (2010)
2000 – 2009
- 2009
- [j2]Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks. Ad Hoc Networks 7(8): 1463-1475 (2009) - [j1]Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Data Security in Unattended Wireless Sensor Networks. IEEE Trans. Computers 58(11): 1500-1511 (2009) - [c7]Roberto Di Pietro, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Collaborative authentication in unattended WSNs. WISEC 2009: 237-244 - 2008
- [c6]Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Catch Me (If You Can): Data Survival in Unattended Sensor Networks. PerCom 2008: 185-194 - [i1]Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary. IACR Cryptol. ePrint Arch. 2008: 293 (2008) - 2007
- [c5]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi:
RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. PerCom Workshops 2007: 229-234 - [c4]Claude Castelluccia, Angelo Spognardi:
RoK: A robust key pre-distribution protocol for multi-phase wireless sensor networks. SecureComm 2007: 351-360 - 2006
- [c3]Angelo Spognardi, Roberto Di Pietro:
A formal framework for the performance analysis of P2P networks protocols. IPDPS 2006 - 2005
- [c2]Angelo Spognardi, Alessandro Lucarelli, Roberto Di Pietro:
A methodology for P2P file-sharing traffic detection. HOT-P2P 2005: 52-61 - 2004
- [c1]Angelo Spognardi, Roberto Di Pietro, Luigi V. Mancini:
BaRT, balanced randomized tree: a scalable and distributed protocol for lookup in peer-to-peer networks. HOT-P2P 2004: 22-29
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-03 00:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint