An evaluation of X. 509 certificate revocation and related privacy issues in the web PKI ecosystem

DG Berbecaru, A Lioy - IEEE Access, 2023 - ieeexplore.ieee.org
Supporting users to transact with websites securely in a privacy-preserving manner has
become more challenging than ever in the web ecosystem based on public key …

Autoencoder-SAD: an autoencoder-based model for security attacks detection

DG Berbecaru, S Giannuzzi… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
In recent years, a variety of cybersecurity attacks affected national infrastructures, big
companies, and even medium size organizations. As countermeasures are implemented …

Threat-TLS: A Tool for Threat Identification in Weak, Malicious, or Suspicious TLS Connections

DG Berbecaru, A Lioy - … of the 19th International Conference on …, 2024 - dl.acm.org
Various applications running in network-based, mobile, Internet of Things, or embedded
systems environments exploit the Transport Layer Security (TLS) protocol to secure …

On Detecting Anomalous TLS Connections with Artificial Intelligence Models

DG Berbecaru, S Giannuzzi - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
In recent years, anomaly-based intrusion detection systems using machine learning (ML)
and deep learning techniques have started to be developed to mitigate cybersecurity …

Building Trust in Data for IoT Systems

D Margaria, A Carelli, A Vesco - arXiv preprint arXiv:2403.02225, 2024 - arxiv.org
Nowadays, Internet of Things platforms are being deployed in a wide range of application
domains. Some of these include use cases with security requirements, where the data …

On the evaluation of X. 509 certificate processing in Transport Layer Security interceptors

DG Berbecaru, S Sisinni… - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
The Transport Layer Security (TLS) interceptors are applications running on client devices or
on separate machines that filter TLS-protected traffic between two endpoints. They split the …

Secure Cloud Computing: Mitigating Network Vulnerabilities

SK Gopal, AS Mohammed… - 2024 15th …, 2024 - ieeexplore.ieee.org
As businesses increasingly depend on these cloud-based services, secure cloud computing
is vital. There is no free way with the cloud network, and our information is susceptible to …