


default search action
Mirco Marchetti
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Andrea Venturi
, Mauro Andreolini
, Mirco Marchetti
, Michele Colajanni
:
Assessing generalizability of Deep Reinforcement Learning algorithms for Automated Vulnerability Assessment and Penetration Testing. Array 24: 100365 (2024) - [j20]Francesco Pollicino
, Dario Stabili
, Mirco Marchetti
:
Performance Comparison of Timing-Based Anomaly Detectors for Controller Area Network: A Reproducible Study. ACM Trans. Cyber Phys. Syst. 8(2): 15 (2024) - [c55]Claudio Zanasi, Mirco Marchetti, Michele Colajanni:
Cybersecurity Domains: A design pattern for creating Zero Trust Architectures through microsegmentation. DASC 2024: 15-22 - [c54]Andrea Artioli, Mauro Andreolini, Luca Ferretti, Mirco Marchetti:
Evaluating trainees in large cyber exercises. ITASEC 2024 - [c53]Dario Stabili, Filip Valgimigli, Tobia Bocchi, Filippo Veronesi, Mirco Marchetti:
Implementing and testing RollJam on Software-Defined Radios. ITASEC 2024 - [c52]Andrea Venturi, Dimitri Gall, Dario Stabili, Mirco Marchetti:
Hardening Machine Learning based Network Intrusion Detection Systems with synthetic netflows. ITASEC 2024 - [c51]Dario Stabili, Filip Valgimigli, Edoardo Torrini, Mirco Marchetti:
HackCar: a test platform for attacks and defenses on a cost-contained automotive architecture. IV 2024: 1099-1105 - [c50]Dario Stabili
, Tobia Bocchi
, Filip Valgimigli
, Mirco Marchetti
:
Finding (and Exploiting) Vulnerabilities on IP Cameras: The Tenda CP3 Case Study. IWSEC 2024: 195-210 - [c49]Giovanni Gambigliani Zoccoli, Dario Stabili, Mirco Marchetti:
RealCAN: bringing real-time capabilities to canplayer. VTC Fall 2024: 1-7 - [i7]Andrea Venturi, Dario Stabili, Mirco Marchetti:
Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Neural Networks. CoRR abs/2403.11830 (2024) - [i6]Dario Stabili, Filip Valgimigli, Edoardo Torrini, Mirco Marchetti:
HackCar: a test platform for attacks and defenses on a cost-contained automotive architecture. CoRR abs/2405.05023 (2024) - [i5]Dario Stabili, Tobia Bocchi, Filip Valgimigli, Mirco Marchetti:
Finding (and exploiting) vulnerabilities on IP Cameras: the Tenda CP3 case study. CoRR abs/2406.15103 (2024) - 2023
- [j19]Dario Stabili
, Raffaele Romagnoli, Mirco Marchetti
, Bruno Sinopoli, Michele Colajanni:
A multidisciplinary detection system for cyber attacks on Powertrain Cyber Physical Systems. Future Gener. Comput. Syst. 144: 151-164 (2023) - [c48]Mauro Andreolini, Andrea Artioli, Luca Ferretti, Mirco Marchetti, Michele Colajanni:
A Framework for Automating Security Assessments with Deductive Reasoning. ITASEC 2023 - [c47]Luca Ferretti, Mattia Trabucco, Mauro Andreolini, Mirco Marchetti:
How (not) to Index Order Revealing Encrypted Databases. ITASEC 2023 - [c46]Andrea Venturi, Daniele Pellegrini, Mauro Andreolini, Luca Ferretti, Mirco Marchetti, Michele Colajanni:
Practical Evaluation of Graph Neural Networks in Network Intrusion Detection. ITASEC 2023 - [c45]Andrea Venturi
, Matteo Ferrari
, Mirco Marchetti
, Michele Colajanni
:
ARGANIDS: a novel Network Intrusion Detection System based on adversarially Regularized Graph Autoencoder. SAC 2023: 1540-1548 - [c44]Francesco Pollicino, Samih Eisa, Pedro M. Rosa, Miguel L. Pardal
, Mirco Marchetti:
Decentralized position detection for moving vehicles. VTC2023-Spring 2023: 1-6 - [c43]Giovanni Gambigliani Zoccoli
, Dario Stabili, Mirco Marchetti
:
Are VANETs pseudonyms effective? An experimental evaluation of pseudonym tracking in adversarial scenario. VTC Fall 2023: 1-6 - [i4]Francesco Pollicino, Dario Stabili, Mirco Marchetti:
Performance comparison of timing-based anomaly detectors for Controller Area Network: a reproducible study. CoRR abs/2307.04561 (2023) - 2022
- [j18]Giovanni Apruzzese
, Mauro Andreolini, Luca Ferretti, Mirco Marchetti
, Michele Colajanni
:
Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems. DTRAP 3(3): 31:1-31:19 (2022) - [j17]Dario Stabili
, Luca Ferretti
, Mauro Andreolini
, Mirco Marchetti
:
DAGA: Detecting Attacks to In-Vehicle Networks via N-Gram Analysis. IEEE Trans. Veh. Technol. 71(11): 11540-11554 (2022) - [c42]Andrea Venturi
, Dario Stabili, Francesco Pollicino, Emanuele Bianchi, Mirco Marchetti
:
Comparison of Machine Learning-based anomaly detectors for Controller Area Network. NCA 2022: 81-88 - [c41]Andrea Venturi
, Claudio Zanasi, Mirco Marchetti
, Michele Colajanni:
Robustness Evaluation of Network Intrusion Detection Systems based on Sequential Machine Learning. NCA 2022: 235-242 - [c40]Gabriele Gambigliani Zoccoli, Francesco Pollicino, Dario Stabili, Mirco Marchetti
:
SixPack v2: enhancing SixPack to avoid last generation misbehavior detectors in VANETs. NCA 2022: 243-249 - [c39]Francesco Pollicino, Dario Stabili, Mirco Marchetti
:
On the effectiveness of BSM communications in V2V emergency scenarios. VTC Spring 2022: 1-5 - [i3]Dario Stabili, Raffaele Romagnoli, Mirco Marchetti, Bruno Sinopoli, Michele Colajanni:
Exploring the consequences of cyber attacks on Powertrain Cyber Physical Systems. CoRR abs/2202.00743 (2022) - 2021
- [j16]Fabio Pierazzi
, Stefano Cristalli
, Danilo Bruschi, Michele Colajanni
, Mirco Marchetti
, Andrea Lanzi:
Glyph: Efficient ML-Based Detection of Heap Spraying Attacks. IEEE Trans. Inf. Forensics Secur. 16: 740-755 (2021) - [j15]Francesco Pollicino
, Dario Stabili
, Luca Ferretti
, Mirco Marchetti
:
Hardware Limitations to Secure C-ITS: Experimental Evaluation and Solutions. IEEE Trans. Veh. Technol. 70(12): 12946-12959 (2021) - [c38]Francesco Pollicino, Luca Ferretti, Dario Stabili, Mirco Marchetti
:
Accountable and privacy-aware flexible car sharing and rental services. NCA 2021: 1-7 - [c37]Giorgio Valenziano Santangelo, Vincenzo Giuseppe Colacino, Mirco Marchetti
:
Analysis, prevention and detection of ransomware attacks on Industrial Control Systems. NCA 2021: 1-5 - [c36]Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci, Mirco Marchetti:
Towards the COSCA framework for "COnseptualing Secure CArs". Open Identity Summit 2021: 37-46 - [c35]Francesco Pollicino, Dario Stabili, Giampaolo Bella, Mirco Marchetti
:
SixPack: Abusing ABS to avoid Misbehavior detection in VANETs. VTC Spring 2021: 1-6 - [e2]Mauro Andreolini, Mirco Marchetti, Dimiter R. Avresky:
20th IEEE International Symposium on Network Computing and Applications, NCA 2021, Boston, MA, USA, November 23-26, 2021. IEEE 2021, ISBN 978-1-6654-9550-9 [contents] - [i2]Giovanni Apruzzese, Mauro Andreolini, Luca Ferretti, Mirco Marchetti, Michele Colajanni:
Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems. CoRR abs/2106.09380 (2021) - 2020
- [j14]Mauro Andreolini, Vincenzo Giuseppe Colacino, Michele Colajanni
, Mirco Marchetti
:
A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises. Mob. Networks Appl. 25(1): 236-247 (2020) - [j13]Giovanni Apruzzese
, Mauro Andreolini, Mirco Marchetti
, Vincenzo Giuseppe Colacino, Giacomo Russo:
AppCon: Mitigating Evasion Attacks to ML Cyber Detectors. Symmetry 12(4): 653 (2020) - [j12]Giovanni Apruzzese
, Fabio Pierazzi
, Michele Colajanni
, Mirco Marchetti
:
Detection and Threat Prioritization of Pivoting Attacks in Large Networks. IEEE Trans. Emerg. Top. Comput. 8(2): 404-415 (2020) - [j11]Giovanni Apruzzese
, Mauro Andreolini, Michele Colajanni
, Mirco Marchetti
:
Hardening Random Forest Cyber Detectors Against Adversarial Attacks. IEEE Trans. Emerg. Top. Comput. Intell. 4(4): 427-439 (2020) - [j10]Giovanni Apruzzese
, Mauro Andreolini
, Mirco Marchetti
, Andrea Venturi
, Michele Colajanni
:
Deep Reinforcement Adversarial Learning Against Botnet Evasion Attacks. IEEE Trans. Netw. Serv. Manag. 17(4): 1975-1987 (2020) - [c34]Francesco Pollicino, Dario Stabili, Luca Ferretti, Mirco Marchetti
:
An experimental analysis of ECQV implicit certificates performance in VANETs. VTC Fall 2020: 1-6
2010 – 2019
- 2019
- [j9]Mirco Marchetti
, Dario Stabili
:
READ: Reverse Engineering of Automotive Data Frames. IEEE Trans. Inf. Forensics Secur. 14(4): 1083-1097 (2019) - [j8]Luca Ferretti
, Mirco Marchetti
, Michele Colajanni
:
Fog-based Secure Communications for Low-power IoT Devices. ACM Trans. Internet Techn. 19(2): 27:1-27:21 (2019) - [c33]Giovanni Apruzzese
, Michele Colajanni
, Luca Ferretti
, Mirco Marchetti
:
Addressing Adversarial Attacks Against Security Systems Based on Machine Learning. CyCon 2019: 1-18 - [c32]Giovanni Apruzzese
, Michele Colajanni, Mirco Marchetti
:
Evaluating the effectiveness of Adversarial Attacks against Botnet Detectors. NCA 2019: 1-8 - [c31]Dario Stabili, Mirco Marchetti
:
Detection of Missing CAN Messages through Inter-Arrival Time Analysis. VTC Fall 2019: 1-7 - [e1]Aris Gkoulalas-Divanis, Mirco Marchetti, Dimiter R. Avresky:
18th IEEE International Symposium on Network Computing and Applications, NCA 2019, Cambridge, MA, USA, September 26-28, 2019. IEEE 2019, ISBN 978-1-7281-2522-0 [contents] - [i1]Giovanni Apruzzese, Mauro Andreolini, Michele Colajanni, Mirco Marchetti:
Hardening Random Forest Cyber Detectors Against Adversarial Attacks. CoRR abs/1912.03790 (2019) - 2018
- [j7]Luca Ferretti
, Mirco Marchetti
, Mauro Andreolini, Michele Colajanni
:
A symmetric cryptographic scheme for data integrity verification in cloud databases. Inf. Sci. 422: 497-515 (2018) - [c30]Giovanni Apruzzese
, Michele Colajanni
, Luca Ferretti
, Alessandro Guido, Mirco Marchetti
:
On the effectiveness of machine and deep learning for cyber security. CyCon 2018: 371-390 - [c29]Dario Stabili, Luca Ferretti
, Mirco Marchetti
:
Analyses of Secure Automotive Communication Protocols and Their Impact on Vehicles Life-Cycle. SMARTCOMP 2018: 452-457 - 2017
- [c28]Luca Ferretti
, Mirco Marchetti
, Michele Colajanni
:
Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation. COMPSAC (2) 2017: 718-723 - [c27]Fabio Pierazzi
, Giovanni Apruzzese
, Michele Colajanni
, Alessandro Guido, Mirco Marchetti
:
Scalable architecture for online prioritisation of cyber threats. CyCon 2017: 1-18 - [c26]Mirco Marchetti
, Dario Stabili:
Anomaly detection of CAN bus messages through analysis of ID sequences. Intelligent Vehicles Symposium 2017: 1577-1583 - [c25]Giovanni Apruzzese
, Mirco Marchetti
, Michele Colajanni, Gabriele Gambigliani Zoccoli, Alessandro Guido:
Identifying malicious hosts involved in periodic communications. NCA 2017: 11-18 - 2016
- [j6]Mirco Marchetti
, Fabio Pierazzi
, Michele Colajanni
, Alessandro Guido:
Analysis of high volumes of network traffic for Advanced Persistent Threat detection. Comput. Networks 109: 127-141 (2016) - [j5]Fabio Pierazzi
, Sara Casolari, Michele Colajanni
, Mirco Marchetti
:
Exploratory security analytics for anomaly detection. Comput. Secur. 56: 28-49 (2016) - [c24]Luca Ferretti
, Michele Colajanni
, Mirco Marchetti
:
Implementation of Verified Set Operation Protocols Based on Bilinear Accumulators. CANS 2016: 626-636 - [c23]Mirco Marchetti
, Fabio Pierazzi
, Alessandro Guido, Michele Colajanni:
Countering Advanced Persistent Threats through security intelligence and big data analytics. CyCon 2016: 243-261 - [c22]Luca Ferretti
, Michele Colajanni
, Mirco Marchetti
:
Guaranteeing Correctness of Bulk Operations in Outsourced Databases. DBSec 2016: 37-51 - [c21]Mirco Marchetti
, Dario Stabili, Alessandro Guido, Michele Colajanni
:
Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms. RTSI 2016: 1-6 - 2015
- [j4]Mauro Andreolini
, Michele Colajanni
, Mirco Marchetti
:
A collaborative framework for intrusion detection in mobile networks. Inf. Sci. 321: 179-192 (2015) - [c20]Andrea Andreoli, Luca Ferretti
, Mirco Marchetti
, Michele Colajanni
:
Enforcing Correct Behavior without Trust in Cloud Key-Value Databases. CSCloud 2015: 157-164 - [c19]Andrea Balboni
, Mirco Marchetti
, Michele Colajanni
, Andrea Melegari:
Supporting sense-making and decision-making through time evolution analysis of open sources. CyCon 2015: 185-202 - [c18]Fabio Pierazzi
, Andrea Balboni
, Alessandro Guido
, Mirco Marchetti
:
The Network Perspective of Cloud Security. NCCA 2015: 75-82 - 2014
- [j3]Luca Ferretti
, Fabio Pierazzi
, Michele Colajanni
, Mirco Marchetti
:
Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cloud Databases. IEEE Trans. Cloud Comput. 2(2): 143-155 (2014) - [j2]Luca Ferretti
, Fabio Pierazzi
, Michele Colajanni
, Mirco Marchetti
:
Scalable Architecture for Multi-User Encrypted SQL Operations on Cloud Database Services. IEEE Trans. Cloud Comput. 2(4): 448-458 (2014) - [j1]Luca Ferretti
, Michele Colajanni
, Mirco Marchetti
:
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases. IEEE Trans. Parallel Distributed Syst. 25(2): 437-446 (2014) - [c17]Luca Ferretti
, Fabio Pierazzi
, Michele Colajanni
, Mirco Marchetti
, Marcello Missiroli
:
Efficient detection of unauthorized data modification in cloud databases. ISCC 2014: 1-6 - 2013
- [c16]Luca Ferretti
, Michele Colajanni
, Mirco Marchetti
:
Access Control Enforcement on Query-Aware Encrypted Cloud Databases. CloudCom (2) 2013: 219 - 2012
- [c15]Luca Ferretti
, Michele Colajanni
, Mirco Marchetti
:
Supporting Security and Consistency for Cloud Database. CSS 2012: 179-193 - [p2]Mirco Marchetti
, Michele Colajanni, Michele Messori, Leonardo Aniello, Ymir Vigfusson:
Cyber Attacks on Financial Critical Infrastructures. Collaborative Financial Infrastructure Protection 2012: 53-82 - [p1]Paulo Esteves Verssimo, Enrico Angori, Michele Colajanni, Mirco Marchetti
, Michele Messori:
Collaborative Attack Detection Using Distributed Hash Tables. Collaborative Financial Infrastructure Protection 2012: 175-201 - 2011
- [c14]Mirco Marchetti
, Michele Colajanni
, Fabio Manganiello:
Identification of correlated network intrusion alerts. CSS 2011: 15-20 - [c13]Michele Colajanni
, Luca Dal Zotto, Mirco Marchetti
, Michele Messori:
The Problem of NIDS Evasion in Mobile Networks. NTMS 2011: 1-6 - [c12]Fabio Manganiello, Mirco Marchetti
, Michele Colajanni
:
Multistep Attack Detection and Alert Correlation in Intrusion Detection Systems. ISA 2011: 101-110 - [c11]Michele Colajanni
, Luca Dal Zotto, Mirco Marchetti
, Michele Messori:
Defeating NIDS evasion in Mobile IPv6 networks. WOWMOM 2011: 1-9 - 2010
- [c10]Michele Colajanni
, Mirco Marchetti
, Michele Messori:
Selective and Early Threat Detection in Large Networked Systems. CIT 2010: 604-611
2000 – 2009
- 2009
- [c9]Giorgia Lodi
, Leonardo Querzoni
, Roberto Baldoni, Mirco Marchetti
, Michele Colajanni
, Vita Bortnikov, Gregory V. Chockler
, Eliezer Dekel, Gennady Laventman, Alexey Roytman:
Defending financial infrastructures through early warning systems: the intelligence cloud approach. CSIIRW 2009: 18 - [c8]Mirco Marchetti
, Michele Messori, Michele Colajanni
:
Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale. ISC 2009: 475-490 - [c7]Allen Clement, Edmund L. Wong, Lorenzo Alvisi, Michael Dahlin, Mirco Marchetti:
Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults. NSDI 2009: 153-168 - 2008
- [c6]Allen Clement, Mirco Marchetti
, Edmund L. Wong, Lorenzo Alvisi, Mike Dahlin:
BFT: the time is now. LADIS 2008: 13:1-13:4 - [c5]Mirco Marchetti
, Michele Colajanni
:
Adaptive traffic filtering for efficient and secure IP-mobility. Q2SWinet 2008: 43-50 - [c4]Harry C. Li, Allen Clement, Mirco Marchetti, Manos Kapritsos, Luke Robison, Lorenzo Alvisi, Michael Dahlin:
FlightPath: Obedience vs. Choice in Cooperative Services. OSDI 2008: 355-368 - [c3]Michele Colajanni
, Daniele Gozzi, Mirco Marchetti
:
Collaborative architecture for malware detection and analysis. SEC 2008: 79-93 - 2007
- [c2]Michele Colajanni
, Daniele Gozzi, Mirco Marchetti
:
Enhancing interoperability and stateful analysis of cooperative network intrusion detection systems. ANCS 2007: 165-174 - [c1]Mauro Andreolini
, Sara Casolari, Michele Colajanni
, Mirco Marchetti
:
Dynamic load balancing for network intrusion detection systems based on distributed architectures. NCA 2007: 153-160
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint