Making Byzantine fault tolerant systems tolerate Byzantine faults A Clement, E Wong, L Alvisi, M Dahlin, M Marchetti Proceedings of the 6th USENIX symposium on Networked systems design and …, 2009 | 606 | 2009 |
On the effectiveness of machine and deep learning for cyber security G Apruzzese, M Colajanni, L Ferretti, A Guido, M Marchetti 2018 10th international conference on cyber Conflict (CyCon), 371-390, 2018 | 360 | 2018 |
Anomaly detection of CAN bus messages through analysis of ID sequences M Marchetti, D Stabili 2017 IEEE intelligent vehicles symposium (IV), 1577-1583, 2017 | 262 | 2017 |
Analysis of high volumes of network traffic for advanced persistent threat detection M Marchetti, F Pierazzi, M Colajanni, A Guido Computer Networks 109, 127-141, 2016 | 194 | 2016 |
Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms M Marchetti, D Stabili, A Guido, M Colajanni 2016 IEEE 2nd International Forum on Research and Technologies for Society …, 2016 | 184 | 2016 |
READ: Reverse engineering of automotive data frames M Marchetti, D Stabili IEEE Transactions on Information Forensics and Security 14 (4), 1083-1097, 2018 | 144 | 2018 |
Distributed, concurrent, and independent access to encrypted cloud databases L Ferretti, M Colajanni, M Marchetti IEEE transactions on parallel and distributed systems 25 (2), 437-446, 2013 | 131 | 2013 |
FlightPath: Obedience vs. Choice in Cooperative Services. HC Li, A Clement, M Marchetti, M Kapritsos, L Robison, L Alvisi, M Dahlin OSDI 8, 355-368, 2008 | 125 | 2008 |
Detecting attacks to internal vehicle networks through Hamming distance D Stabili, M Marchetti, M Colajanni 2017 AEIT International Annual Conference, 1-6, 2017 | 121 | 2017 |
Addressing adversarial attacks against security systems based on machine learning G Apruzzese, M Colajanni, L Ferretti, M Marchetti 2019 11th international conference on cyber conflict (CyCon) 900, 1-18, 2019 | 118 | 2019 |
Deep reinforcement adversarial learning against botnet evasion attacks G Apruzzese, M Andreolini, M Marchetti, A Venturi, M Colajanni IEEE Transactions on Network and Service Management 17 (4), 1975-1987, 2020 | 97 | 2020 |
Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems G Apruzzese, M Andreolini, L Ferretti, M Marchetti, M Colajanni Digital Threats: Research and Practice, 2021 | 95 | 2021 |
Supporting security and consistency for cloud database L Ferretti, M Colajanni, M Marchetti Cyberspace Safety and Security: 4th International Symposium, CSS 2012 …, 2012 | 70 | 2012 |
Countering advanced persistent threats through security intelligence and big data analytics M Marchetti, F Pierazzi, A Guido, M Colajanni 2016 8th International Conference on Cyber Conflict (CyCon), 243-261, 2016 | 58 | 2016 |
Hardening random forest cyber detectors against adversarial attacks G Apruzzese, M Andreolini, M Colajanni, M Marchetti IEEE Transactions on Emerging Topics in Computational Intelligence 4 (4 …, 2020 | 56 | 2020 |
A parallel architecture for stateful intrusion detection in high traffic networks M Colajanni, M Marchetti Proc. of the IEEE/IST Workshop on” Monitoring, attack detection and …, 2006 | 52 | 2006 |
Evaluating the effectiveness of adversarial attacks against botnet detectors G Apruzzese, M Colajanni, M Marchetti 2019 IEEE 18th International Symposium on Network Computing and Applications …, 2019 | 46 | 2019 |
A framework for the evaluation of trainee performance in cyber range exercises M Andreolini, VG Colacino, M Colajanni, M Marchetti Mobile Networks and Applications 25, 236-247, 2020 | 42 | 2020 |
Fog-based secure communications for low-power IoT devices L Ferretti, M Marchetti, M Colajanni ACM Transactions on Internet Technology (TOIT) 19 (2), 1-21, 2019 | 40 | 2019 |
Detection and threat prioritization of pivoting attacks in large networks G Apruzzese, F Pierazzi, M Colajanni, M Marchetti IEEE transactions on emerging topics in computing 8 (2), 404-415, 2017 | 40 | 2017 |