关注
Tommaso Zoppi
Tommaso Zoppi
University of Trento, Department of Information Engineering & Computer Science
在 unitn.it 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Quantitative comparison of unsupervised anomaly detection algorithms for intrusion detection
F Falcão, T Zoppi, CBV Silva, A Santos, B Fonseca, A Ceccarelli, ...
Proceedings of the 34th ACM/SIGAPP symposium on applied computing, 318-327, 2019
602019
Unsupervised algorithms to detect zero-day attacks: Strategy and application
T Zoppi, A Ceccarelli, A Bondavalli
Ieee Access 9, 90603-90615, 2021
472021
Unsupervised anomaly detectors to detect intrusions in the current threat landscape
T Zoppi, A Ceccarelli, T Capecchi, A Bondavalli
ACM/IMS Transactions on Data Science 2 (2), 1-26, 2021
442021
Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection
T Zoppi, A Ceccarelli, T Puccetti, A Bondavalli
Computers & Security 127, 103107, 2023
352023
MADneSs: A multi-layer anomaly detection framework for complex dynamic systems
T Zoppi, A Ceccarelli, A Bondavalli
IEEE Transactions on Dependable and Secure computing 18 (2), 796-809, 2019
352019
On the educated selection of unsupervised algorithms via attacks and anomaly classes
T Zoppi, A Ceccarelli, L Salani, A Bondavalli
Journal of Information Security and Applications 52, 102474, 2020
302020
Meta-learning to improve unsupervised intrusion detection in cyber-physical systems
T Zoppi, M Gharib, M Atif, A Bondavalli
ACM Transactions on Cyber-Physical Systems (TCPS) 5 (4), 1-27, 2021
272021
Towards a collaborative framework to improve urban grid resilience
O Jung, S Bessler, A Ceccarelli, T Zoppi, A Vasenev, L Montoya, T Clarke, ...
2016 IEEE International Energy Conference (ENERGYCON), 1-6, 2016
232016
Evaluation of Anomaly Detection algorithms made easy with RELOAD
T Zoppi, A Ceccarelli, A Bondavalli
2019 IEEE 30th International Symposium on Software Reliability Engineering …, 2019
222019
Prepare for trouble and make it double! Supervised–Unsupervised stacking for anomaly-based intrusion detection
T Zoppi, A Ceccarelli
Journal of Network and Computer Applications 189, 103106, 2021
212021
Threat analysis in systems-of-systems: an emergence-oriented approach
A Ceccarelli, T Zoppi, A Vasenev, M Mori, D Ionita, L Montoya, ...
ACM Transactions on Cyber-Physical Systems 3 (2), 1-24, 2018
192018
Context-awareness to improve anomaly detection in dynamic service oriented architectures
T Zoppi, A Ceccarelli, A Bondavalli
Computer Safety, Reliability, and Security: 35th International Conference …, 2016
192016
Exploring anomaly detection in systems of systems
T Zoppi, A Ceccarelli, A Bondavalli
Proceedings of the Symposium on Applied Computing, 1139-1146, 2017
162017
Towards enhancing traffic sign recognition through sliding windows
M Atif, T Zoppi, M Gharib, A Bondavalli
Sensors 22 (7), 2683, 2022
152022
On the impact of emergent properties on SoS security
M Mori, A Ceccarelli, T Zoppi, A Bondavalli
2016 11th System of Systems Engineering Conference (SoSE), 1-6, 2016
152016
Into the unknown: Unsupervised machine learning algorithms for anomaly-based intrusion detection
T Zoppi, A Ceccarelli, A Bondavalli
2020 50th Annual IEEE-IFIP International Conference on Dependable Systems …, 2020
142020
On algorithms selection for unsupervised anomaly detection
T Zoppi, A Ceccarelli, A Bondavalli
2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing …, 2018
112018
A multi-layer anomaly detector for dynamic service-based systems
A Ceccarelli, T Zoppi, M Itria, A Bondavalli
Computer Safety, Reliability, and Security: 34th International Conference …, 2015
112015
A testbed for evaluating anomaly detection monitors through fault injection
A Ceccarelli, T Zoppi, A Bondavalli, F Duchi, G Vella
2014 IEEE 17th International Symposium on Object/Component/Service-Oriented …, 2014
92014
Quantitative comparison of supervised algorithms and feature sets for traffic sign recognition
M Atif, T Zoppi, M Gharib, A Bondavalli
Proceedings of the 36th annual ACM symposium on applied computing, 174-177, 2021
82021
系统目前无法执行此操作,请稍后再试。
文章 1–20