Timing Side-Channel Attacks on USB Devices Using eBPF G Lusvardi, L Ferretti, M Andreolini | | 2024 |
Dolos: A novel architecture for moving target defense G Pagnotta, F De Gaspari, D Hitaj, M Andreolini, M Colajanni, LV Mancini IEEE Transactions on Information Forensics and Security, 2023 | 6 | 2023 |
Practical Evaluation of Graph Neural Networks in Network Intrusion Detection A Venturi, D Pellegrini, M Andreolini, L Ferretti, M Marchetti, M Colajanni CEUR Workshop Proceedings 3488, 2023 | 2 | 2023 |
A Framework for Automating Security Assessments with Deductive Reasoning M Andreolini, A Artioli, L Ferretti, M Marchetti, M Colajanni, C Righi CEUR WORKSHOP PROCEEDINGS 3488, 2023 | | 2023 |
How (Not) to Index Order Revealing Encrypted Databases L Ferretti, M Trabucco, M Andreolini, M Marchetti CEUR WORKSHOP PROCEEDINGS 3488, 2023 | | 2023 |
Modeling realistic adversarial attacks against network intrusion detection systems G Apruzzese, M Andreolini, L Ferretti, M Marchetti, M Colajanni Digital Threats: Research and Practice (DTRAP) 3 (3), 1-19, 2022 | 95 | 2022 |
Daga: Detecting attacks to in-vehicle networks via n-gram analysis D Stabili, L Ferretti, M Andreolini, M Marchetti IEEE Transactions on Vehicular Technology 71 (11), 11540-11554, 2022 | 18 | 2022 |
2021 IEEE 20th International Symposium on Network Computing and Applications (NCA) M Andreolini, M Marchetti, DR Avresky | | 2021 |
Survivable zero trust for cloud computing environments L Ferretti, F Magnanini, M Andreolini, M Colajanni Computers & Security 110, 102419, 2021 | 45 | 2021 |
Big Data Integration per la valorizzazione del virtuosismo energetico con tecniche di Blockchain S Bergamaschi, L Ferretti, D Beneventano, M Colajanni, G Simonini, ... | | 2021 |
Drelab-deep reinforcement learning adversarial botnet: A benchmark dataset for adversarial attacks against botnet intrusion detection systems A Venturi, G Apruzzese, M Andreolini, M Colajanni, M Marchetti Data in Brief 34, 106631, 2021 | 29 | 2021 |
Deep reinforcement adversarial learning against botnet evasion attacks G Apruzzese, M Andreolini, M Marchetti, A Venturi, M Colajanni IEEE Transactions on Network and Service Management 17 (4), 1975-1987, 2020 | 97 | 2020 |
Hardening random forest cyber detectors against adversarial attacks G Apruzzese, M Andreolini, M Colajanni, M Marchetti IEEE Transactions on Emerging Topics in Computational Intelligence 4 (4 …, 2020 | 56 | 2020 |
AppCon: Mitigating evasion attacks to ML cyber detectors G Apruzzese, M Andreolini, M Marchetti, VG Colacino, G Russo Symmetry 12 (4), 653, 2020 | 18 | 2020 |
A framework for the evaluation of trainee performance in cyber range exercises M Andreolini, VG Colacino, M Colajanni, M Marchetti Mobile Networks and Applications 25, 236-247, 2020 | 42 | 2020 |
A symmetric cryptographic scheme for data integrity verification in cloud databases L Ferretti, M Marchetti, M Andreolini, M Colajanni Information Sciences 422, 497-515, 2018 | 36 | 2018 |
A collaborative framework for intrusion detection in mobile networks M Andreolini, M Colajanni, M Marchetti Information Sciences 321, 179-192, 2015 | 28 | 2015 |
Adaptive, scalable and reliable monitoring of big data on clouds M Andreolini, M Colajanni, M Pietri, S Tosi Journal of Parallel and Distributed Computing 79, 67-79, 2015 | 52 | 2015 |
A Scalable Monitor for Large Systems M Andreolini, M Pietri, S Tosi, R Lancellotti Cloud Computing and Services Sciences: International Conference in Cloud …, 2015 | 1 | 2015 |
Resilient and Adaptive Networked Systems. M Andreolini, S Casolari, M Pietri, S Tosi Adaptive, Dynamic, and Resilient Systems, 87-102, 2014 | | 2014 |