Password strength: An empirical analysis M Dell'Amico, P Michiardi, Y Roudier 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 387 | 2010 |
Can I opt out yet? GDPR and the global illusion of cookie control I Sanchez-Rola, M Dell'Amico, P Kotzias, D Balzarotti, L Bilge, PA Vervier, ... Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019 | 236 | 2019 |
Monte Carlo strength evaluation: Fast and reliable password checking M Dell'Amico, M Filippone Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015 | 113 | 2015 |
Riskteller: Predicting the risk of cyber incidents L Bilge, Y Han, M Dell'Amico Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 101 | 2017 |
NG-DBSCAN: scalable density-based clustering for arbitrary data A Lulli, M Dell'Amico, P Michiardi, L Ricci Proceedings of the VLDB Endowment 10 (3), 157-168, 2016 | 91 | 2016 |
The tangled genealogy of IoT malware E Cozzi, PA Vervier, M Dell'Amico, Y Shen, L Bilge, D Balzarotti Proceedings of the 36th Annual Computer Security Applications Conference, 1-16, 2020 | 74 | 2020 |
Online data backup: A peer-assisted approach L Toka, M Dell'Amico, P Michiardi 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P), 1-10, 2010 | 69 | 2010 |
An empirical study of availability in friend-to-friend storage systems R Sharma, A Datta, M Dell'Amico, P Michiardi P2P 2011, 2011 | 67 | 2011 |
HFSP: size-based scheduling for Hadoop M Pastorelli, A Barbuzzi, D Carra, M Dell'Amico, P Michiardi 2013 IEEE International Conference on Big Data, 51-59, 2013 | 62 | 2013 |
Take a deep breath: a stealthy, resilient and cost-effective botnet using Skype A Nappa, A Fattori, M Balduzzi, M Dell’Amico, L Cavallaro International Conference on Detection of Intrusions and Malware, and …, 2010 | 53 | 2010 |
Beyond precision and recall: understanding uses (and misuses) of similarity hashes in binary analysis F Pagani, M Dell'Amico, D Balzarotti Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018 | 48 | 2018 |
HFSP: bringing size-based scheduling to hadoop M Pastorelli, D Carra, M Dell'Amico, P Michiardi IEEE Transactions on Cloud Computing 5 (1), 43-56, 2015 | 46 | 2015 |
Sofia: Social filtering for robust recommendations M Dell'Amico, L Capra Trust Management II, 135-150, 2008 | 44 | 2008 |
Revisiting size-based scheduling with estimated job sizes M Dell'Amico, D Carra, M Pastorelli, P Michiardi 2014 IEEE 22nd International Symposium on Modelling, Analysis & Simulation …, 2014 | 36 | 2014 |
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships I Sanchez-Rola, M Dell'Amico, D Balzarotti, PA Vervier, L Bilge IEEE Security and Privacy 2021, 2021 | 35 | 2021 |
Systems and methods for providing integrated security management K Roundy, M Dell'Amico, C Gates, M Hart, S Miskovic US Patent 10,242,187, 2019 | 32 | 2019 |
PSBS: Practical size-based scheduling M Dell'Amico, D Carra, P Michiardi IEEE Transactions on Computers 65 (7), 2199-2212, 2015 | 29 | 2015 |
Data transfer scheduling for p2p storage L Toka, M Dell'Amico, P Michiardi 2011 IEEE International Conference on Peer-to-Peer Computing, 132-141, 2011 | 29 | 2011 |
Systems and methods for evaluating infection risks based on profiled user behaviors HAN Yufei, L Yumer, PA Vervier, M Dell'Amico US Patent 10,116,680, 2018 | 28 | 2018 |
Lean on me: Mining internet service dependencies from large-scale DNS data M Dell'Amico, L Bilge, A Kayyoor, P Efstathopoulos, PA Vervier Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 28 | 2017 |