default search action
5th ITASEC 2021: Virtual Event
- Alessandro Armando, Michele Colajanni:
Proceedings of the Italian Conference on Cybersecurity, ITASEC 2021, All Digital Event, April 7-9, 2021. CEUR Workshop Proceedings 2940, CEUR-WS.org 2021 - Didier Danet:
Punish and Perish: The Human Factor in Cybersecurity. 1-8 - Giuseppina Murino, Marina Ribaudo, Simon Pietro Romano, Armando Tacchella:
OT Cyber Security Frameworks Comparison Tool (CSFCTool). 9-22 - Sara Narteni, Ivan Vaccari, Maurizio Mongelli, Maurizio Aiello, Enrico Cambiaso:
On the Feasibility of Covert Channels through Short-Message-Service. 23-34 - Ivan Vaccari, Sara Narteni, Maurizio Mongelli, Maurizio Aiello, Enrico Cambiaso:
Perpetrate Cyber-threats using IoT Devices as Attack Vector: The ESP8266 Use Case. 35-46 - Gustavo Gonzalez Granadillo, Rodrigo Diaz, Eleni Veroni, Christos Xenakis:
A Multi-factor Assessment Mechanism to Define Priorities on Vulnerabilities affecting Healthcare Organizations. 47-60 - Filippo Cerocchi, Gabriele Rizzo:
A Topological Approach to Secure Key Exchange. 61-71 - Giacomo Abbattista, Donato Impedovo, Giuseppe Pirlo, Lucia Sarcinella, Nicola Stigliano:
Identifying Anomalous Places, Routes by GPS Feature: A System for Child Monitoring. 72-79 - Alessandro Placido Luise, Gaetano Perrone, Claudio Perrotta, Simon Pietro Romano:
On-demand Deployment and Orchestration of Cyber Ranges in the Cloud. 80-91 - Tommaso Zoppi, Enrico Schiavone, Irene Bicchierai, Francesco Brancati, Andrea Bondavalli:
Spoofing Detectability as a Property of Biometric Characteristics. 92-105 - Luisa Franchina, Serena Ferracci, Federico Palmaro:
Detecting Phishing E-mails Using Text Mining and Features Analysis. 106-119 - Christian Catalano, Paolo Afrune, Mario Angelelli, Giovanni Maglio, Fabrizio Striani, Franco Tommasi:
Security Testing Reuse Enhancing Active Cyber Defence in Public Administration. 120-132 - Marco Zuppelli, Luca Caviglione, Matteo Repetto:
Detecting Covert Channels Through Code Augmentation. 133-144 - Marco Bozzetti, Luca Olivieri, Fausto Spoto:
Cybersecurity Impacts of the Covid-19 Pandemic in Italy. 145-155 - Axel De Nardin, Marino Miculan, Claudio Piciarelli, Gian Luca Foresti:
A Time-series Classification Approach to Shallow Web Traffic De-anonymization. 156-165 - Alessandro Bocci, Stefano Forti, Gian-Luigi Ferrari, Antonio Brogi:
Placing FaaS in the Fog, Securely. 166-179 - Tobia Fiorese, Pietro Montino:
Learning-based Intrusion Detection System for On-Board Vehicle Communication. 180-192 - Roberto De Prisco, Alfredo De Santis, Rocco Zaccagnino:
An Accelerometer-based Privacy Attack on Smartphones. 193-206 - Daniele Granata, Massimiliano Rak, Giovanni Salzillo, Umberto Barbato:
Security in IoT Pairing & Authentication protocols, a Threat Model, a Case Study Analysis. 207-218 - Giuseppe Mario Malandrone, Giovanni Virdis, Giorgio Giacinto, Davide Maiorca:
PowerDecode: A PowerShell Script Decoder Dedicated to Malware Analysis. 219-232 - Dario Stabili, Francesco Pollicino, Alessio Rota:
A Benchmark Framework for CAN IDS. 233-245 - Shaharyar Khan, Alberto Volpatto, Geet Kalra, Jonathan Esteban, Tommaso Pescanoce, Sabino Caporusso, Michael Siegel:
Cyber Range for Industrial Control Systems (CR-ICS) for Simulating Attack Scenarios. 246-259 - Alessia Boi:
Comparative Analysis of Cyber Intelligence: The Italian Case. 260-269 - Carmelo Ardito, Tommaso Di Noia, Eugenio Di Sciascio, Domenico Lofù, Andrea Pazienza, Felice Vitulano:
An Artificial Intelligence Cyberattack Detection System to Improve Threat Reaction in e-Health. 270-283 - Giulio Berra, Gaspare Ferraro, Matteo Fornero, Nicolò Maunero, Paolo Prinetto, Gianluca Roascio:
PAIDEUSIS: A Remote Hybrid Cyber Range for Hardware, Network, IoT Security Training. 284-297 - Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Paolo Campegiani:
Facing the Blockchain Endpoint Vulnerability, an SGX-based Solution for Secure eHealth Auditing. 298-308 - Vincenzo Dentamaro, Vito Nicola Convertini, Stefano Galantucci, Paolo Giglio, Tonino Palmisano, Giuseppe Pirlo:
Ensemble Consensus: An Unsupervised Algorithm for Anomaly Detection in Network Security data. 309-318 - Massimiliano Masi, Tanja Pavleska, Simone Pezzoli:
A Systematic Approach for the definition of countermeasures in industrial IoT: An Automotive Case. 319-330 - Massimiliano Calani, Giovanni Denaro, Alberto Leporati:
Exploiting the Blockchain to Guarantee GDPR Compliance while Consents Evolve under Data Owners' Control. 331-343 - Manuel Cheminod, Luca Durante, Lucia Seno, Adriano Valenzano:
An Algorithm for Security Policy Migration in Multiple Firewall Networks. 344-359 - Mario Ciampi, Fabrizio Marangio, Giovanni Schmid, Mario Sicuranza:
A Blockchain-based Smart Contract System Architecture for Dependable Health Processes. 360-373 - Marco Zuppelli, Giuseppe Manco, Luca Caviglione, Massimo Guarascio:
Sanitization of Images Containing Stegomalware via Machine Learning Approaches. 374-386 - Marzio Di Feo:
Overcoming Complexity of (Cyber)War: The Logic of Useful Fiction in Cyber Exercises Scenarios. 387-393 - Simone Raponi, Maurantonio Caprolu, Roberto Di Pietro:
Beyond SolarWinds: The Systemic Risks of Critical Infrastructures, State of Play, Future Directions. 394-405 - Paolo Spagnoletti, Federica Ceci, Andrea Salvi:
Adversarial Evolution: Competing Dynamics and Reactive Institutional Forms in Financial Services Ecosystem. 406-413 - Vincenzo Carletti, Antonio Greco, Alessia Saggese, Mario Vento:
Robustness Evaluation of Convolutional Neural Networks for Malware Classification. 414-423 - Gabriele Costa, Enrico Russo, Andrea Valenza:
Damn Vulnerable Application Scanner. 424-435 - Giuseppe Amato, Simone Ciccarone, Pasquale Digregorio, Giuseppe Natalucci:
A Service Architecture for an Enhanced Cyber Threat Intelligence Capability. 436-446 - Giovanni Lagorio, Marina Ribaudo, Alessandro Armando:
Capture the Flag competitions for Higher Education. 447-460 - Francesco Benvenuto, Francesco Palmarini, Riccardo Focardi, Flaminia L. Luccio:
Firmware Extraction from Real IoT Devices through Power Analysis of AES. 461-474 - Edoardo Di Paolo, Enrico Bassetti, Angelo Spognardi:
Security Assessment of Common Open Source MQTT Brokers and Clients. 475-487 - Anna Pagnacco:
Critical Information Infrastructure Protection: Between Cybersecurity and Policymaking. 488-498 - Vita Santa Barletta, Paolo Buono, Danilo Caivano, Giovanni Dimauro, Antonio Pontrelli:
An Overview on the Security Technological Levels in the Italian Smart Cities. 499-508 - Chinmay Siwach, Gabriele Costa, Rocco De Nicola:
Enhancing Malware Classification with Symbolic Features. 509-522 - Carmelo Ardito, Yashar Deldjoo, Eugenio Di Sciascio, Fatemeh Nazary:
Revisiting Security Threat on Smart Grids: Accurate and Interpretable Fault Location Prediction and Type Classification. 523-533 - Vishnu Ramesh, Sara Abraham, Vinod P, Isham Mohamed, Corrado Aaron Visaggio, Sonia Laudanna:
A Study on Misclassification of Software Vulnerabilities when using Deep Learning and Machine Learning Algorithms. 534-545
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.