


default search action
7th ITASEC 2023: Bari, Italy
- Francesco Buccafurri, Elena Ferrari, Gianluca Lax:
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), Bari, Italy, May 2-5, 2023. CEUR Workshop Proceedings 3488, CEUR-WS.org 2023 - Andrea Altarui, Marino Miculan, Matteo Paier:
DBCChecker: a Bigraph-based Tool for Checking Security Properties of Container Compositions. - Mauro Andreolini, Andrea Artioli, Luca Ferretti, Mirco Marchetti, Michele Colajanni:
A Framework for Automating Security Assessments with Deductive Reasoning. - Davide Avanzi, Stefano Longari, Mario Polino, Michele Carminati, Andrea Maria Zanchettin, Mara Tanelli, Stefano Zanero:
Task Aware Intrusion Detection for Industrial Robots. - Giorgio Bernardinetti, Dimitri Di Cristofaro, Giuseppe Bianchi:
Windows Antivirus Evasion Techniques: How to Stay Ahead of the Hooks. - Stefano Bistarelli, Francesco Micheli, Francesco Santini:
A Survey on Decentralized Identifier Methods for Self Sovereign Identity. - Alessandro Bonfiglio, Gabriele Costa, Silvia de Francisci:
NIF: Reactive Injection Attack via Nmap Piggybacking. - Bernardo Breve, Gaetano Cimino, Vincenzo Deufemia, Annunziata Elefante:
User Perception of Risks Associated with IFTTT Applets: A Preliminary User Study. - Enrico Cambiaso, Luca Caviglione:
Scamming the Scammers: Using ChatGPT to Reply Mails for Wasting Time and Resources. - Daniele Capone, Angelo Delicato, Gaetano Perrone
, Simon Pietro Romano:
Container-based Virtualization for Ethical Hacking with HOUDINI. - Francesco Castro, Stefano Galantucci, Donato Impedovo, Giuseppe Pirlo:
A Heuristic to Select the Optimal Transformation Matrixes in Bio-Convolving with Mixing Transform. - Guglielmo Cola, Michele Mazza, Maurizio Tesconi:
From Tweet to Theft: Tracing the Flow of Stolen Cryptocurrency. - Carmela Comito, Francesco Sergio Pisani, Erica Coppolillo, Angelica Liguori, Massimo Guarascio, Giuseppe Manco:
Towards Self-Supervised Cross-Domain Fake News Detection. - Sara Concas, Giulia Orrù, Emiliano De Paoli, Gian Luca Marcialis:
Preliminary Results on a "Real" Iris Recognition System under Challenging Operational Conditions. - Andrew Cook, Luca Viganò:
Formal Analysis of Security Protocols with Movement. - Said Daoudagh, Eda Marchetti:
Breakthroughs in Testing and Certification in Cybersecurity: Research Gaps and Open Problems. - Bernardo David, Rosario Giustolisi, Victor Mortensen, Morten Pedersen:
Local Differential Privacy in Voting. - Roberto De Prisco, Ciro Fusco, Michele Iannucci, Delfina Malandrino, Rocco Zaccagnino:
Text-Independent Voice Recognition based on Siamese Networks and Fusion Embeddings. - Giuseppe Fenza, Vincenzo Loia, Paola Montserrat Mainardi, Claudio Stanzione:
OSINT Knowledge Graph for Fact-Checking: Google Map Hacks Debunking. - Luca Ferretti, Mattia Trabucco, Mauro Andreolini, Mirco Marchetti:
How (not) to Index Order Revealing Encrypted Databases. - Francesco Gennai, Fabio Sinibaldi, Loredana Martusciello, Marina Buzzi:
SAE - Secure Application Email Architecture. - Massimiliano Gervasi, Nicolò Gianmauro Totaro, Anna Fornaio, Danilo Caivano:
Big Data Value Graph: Enhancing Security and Generating new Value from Big Data. - Francesco Greco, Giuseppe Desolda, Andrea Esposito:
Explaining Phishing Attacks: An XAI Approach to Enhance User Awareness and Trust. - Jodie Knapp, Elizabeth A. Quaglia:
CLUE: Certificateless Updatable Encryption. - Davide Mancino, Alberto Leporati, Marco Viviani, Giovanni Denaro:
Exploiting Ethereum after "The Merge": The Interplay between PoS and MEV Strategies. - Valerio Giuseppe Massaro, Luca Capacci, Rebecca Montanari:
Towards Context-Aware Risk Assessment Scoring System for IoT/IIoT Devices. - Bruno Pala, Lorenzo Pisu, Silvia Lucia Sanna, Davide Maiorca, Giorgio Giacinto:
A Targeted Assessment of Cross-Site Scripting Detection Tools. - Andrea Piccione, Giorgio Bernardinetti, Alessandro Pellegrini, Giuseppe Bianchi:
Is Your Smartphone Really Safe? A Wake-up Call on Android Antivirus Software Effectiveness. - Simon Pietro Romano, Alfonso Calabria, Anna Piscitelli, Antonio Russo:
Sharing Responsibilities through Distributed Key Generation in the Chirotonia e-Voting Framework. - Andrea Venturi, Daniele Pellegrini, Mauro Andreolini, Luca Ferretti, Mirco Marchetti, Michele Colajanni:
Practical Evaluation of Graph Neural Networks in Network Intrusion Detection.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.