


default search action
Stefano Longari
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j6]Riccardo Barelli, Mario D'Onghia, Stefano Longari:
Toward Secure Electronic Voting: A Survey on E-Voting Systems and Attacks. IEEE Access 13: 89600-89626 (2025) - [j5]Stefano Longari, Jacopo Jannone, Mario Polino, Michele Carminati, Andrea Maria Zanchettin, Mara Tanelli, Stefano Zanero:
Janus: A Trusted Execution Environment Approach for Attack Detection in Industrial Robot Controllers. IEEE Trans. Emerg. Top. Comput. 13(1): 185-195 (2025) - [c14]Sikandar Mehmood Abbasi, Stefano Longari:
CANPak: An Intrusion Detection System against Error Frame Attacks for Controller Area Network. ITASEC/SERICS 2025 - [c13]Marco Balossini, Michele Carminati, Stefano Zanero, Stefano Longari:
Micro-Mobility Security: A Holistic Approach via Mobile App Analysis. ITASEC/SERICS 2025 - [c12]Davide Giannubilo, Tommaso Giorgeschi, Michele Carminati, Stefano Zanero, Stefano Longari:
A Deep Learning Approach for False Data Injection Attacks Detection in Smart Water Infrastructure. ITASEC/SERICS 2025 - [c11]Stefano Longari, Gregorio Galletti, Jan Holle, Stefano Zanero:
CANter: Data-Link Layer Detection of Drop-and-Spoof Attacks on CAN and CAN FD. ITASEC/SERICS 2025 - [c10]Francesco Panebianco, Andrea Isgrò, Stefano Longari, Stefano Zanero, Michele Carminati:
Guessing As A Service: Large Language Models Are Not Yet Ready For Vulnerability Detection. ITASEC/SERICS 2025 - 2024
- [j4]Stefano Longari, Alessandro Pozone, Jessica Leoni
, Mario Polino, Michele Carminati
, Mara Tanelli
, Stefano Zanero:
CyFence: Securing Cyber-Physical Controllers via Trusted Execution Environment. IEEE Trans. Emerg. Top. Comput. 12(2): 521-531 (2024) - [c9]Raffaele G. Cestari, Stefano Longari, Stefano Zanero, Simone Formentin:
Model Predictive Control with adaptive resilience for Denial-of-Service Attacks mitigation on a Regulated Dam. CDC 2024: 6089-6094 - [c8]Alberto Amico, Vincenzo Apicella, Devis Bianchini, Alberto Butera, Matteo Cesana, Gabriele Digregorio
, Massimiliano Garda, Valentina Gatteschi, Corrado Innamorati, Francesco Leotta, Stefano Longari, Maria Rosa Pizzo, Pierluigi Plebani, Noemi Romani, Letizia Tanca, Andrea Vitaletti, Stefano Zanero:
BOTQUAS: Blockchain-based Solutions for Trustworthy Data Sharing in Sustainable and Circular Economy. SEAA 2024: 507-510 - [c7]Gabriele Digregorio
, Elisabetta Cainazzo, Stefano Longari, Michele Carminati
, Stefano Zanero:
Evaluating the Impact of Privacy-Preserving Federated Learning on CAN Intrusion Detection. VTC Spring 2024: 1-7 - [i4]Raffaele Giuseppe Cestari, Stefano Longari, Stefano Zanero, Simone Formentin:
Model Predictive Control with adaptive resilience for Denial-of-Service Attacks mitigation on a Regulated Dam. CoRR abs/2402.18516 (2024) - [i3]Chunheng Zhao, Stefano Longari, Michele Carminati, Pierluigi Pisu:
An Anomaly Detection System Based on Generative Classifiers for Controller Area Network. CoRR abs/2412.20255 (2024) - 2023
- [j3]Alessandro Nichelini, Carlo Alberto Pozzoli, Stefano Longari, Michele Carminati
, Stefano Zanero:
CANova: A hybrid intrusion detection framework based on automatic signal classification for CAN. Comput. Secur. 128: 103166 (2023) - [c6]Stefano Longari, Carlo Alberto Pozzoli, Alessandro Nichelini, Michele Carminati
, Stefano Zanero:
CANdito: Improving Payload-Based Detection of Attacks on Controller Area Networks. CSCML 2023: 135-150 - [c5]Stefano Longari, Francesco Noseda, Michele Carminati
, Stefano Zanero:
Evaluating the Robustness of Automotive Intrusion Detection Systems Against Evasion Attacks. CSCML 2023: 337-352 - [c4]Davide Avanzi, Stefano Longari, Mario Polino, Michele Carminati, Andrea Maria Zanchettin, Mara Tanelli, Stefano Zanero:
Task Aware Intrusion Detection for Industrial Robots. ITASEC 2023 - 2022
- [j2]Davide Maffiola, Stefano Longari, Michele Carminati
, Mara Tanelli
, Stefano Zanero:
GOLIATH: A Decentralized Framework for Data Collection in Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 23(8): 13372-13385 (2022) - [c3]Alvise de Faveri Tron, Stefano Longari, Michele Carminati
, Mario Polino, Stefano Zanero:
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks. CCS 2022: 711-723 - [i2]Stefano Longari, Alessandro Nichelini, Carlo Alberto Pozzoli, Michele Carminati, Stefano Zanero:
CANdito: Improving Payload-based Detection of Attacks on Controller Area Networks. CoRR abs/2208.06628 (2022) - [i1]Alvise de Faveri Tron, Stefano Longari, Michele Carminati, Mario Polino, Stefano Zanero:
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks. CoRR abs/2209.09557 (2022) - 2021
- [j1]Stefano Longari, Daniel Humberto Nova Valcarcel, Mattia Zago, Michele Carminati, Stefano Zanero:
CANnolo: An Anomaly Detection System Based on LSTM Autoencoders for Controller Area Network. IEEE Trans. Netw. Serv. Manag. 18(2): 1913-1924 (2021)
2010 – 2019
- 2019
- [c2]Stefano Longari, Matteo Penco, Michele Carminati
, Stefano Zanero:
CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network. CPS-SPC@CCS 2019: 39-50 - [c1]Stefano Longari, Andrea Cannizzo, Michele Carminati, Stefano Zanero:
A Secure-by-Design Framework for Automotive On-board Network Risk Analysis. VNC 2019: 1-8
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-06-17 00:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint