default search action
Alfonso Iacovazzi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c18]August Karlsson, Rikard Höglund, Han Wang, Alfonso Iacovazzi, Shahid Raza:
Enabling Cyber Threat Intelligence Sharing for Resource Constrained IoT. CSR 2024: 82-89 - [c17]David Eklund, Alfonso Iacovazzi, Han Wang, Apostolos Pyrgelis, Shahid Raza:
BMI: Bounded Mutual Information for Efficient Privacy-Preserving Feature Selection. ESORICS (2) 2024: 353-373 - [i5]Alfonso Iacovazzi, Han Wang, Ismail Butun, Shahid Raza:
Towards Cyber Threat Intelligence for the IoT. CoRR abs/2406.13543 (2024) - 2023
- [c16]Alfonso Iacovazzi, Han Wang, Ismail Butun, Shahid Raza:
Towards Cyber Threat Intelligence for the IoT. DCOSS-IoT 2023: 483-490 - [c15]Ivo Zenden, Han Wang, Alfonso Iacovazzi, Arash Vahidi, Rolf Blom, Shahid Raza:
On the Resilience of Machine Learning-Based IDS for Automotive Networks. VNC 2023: 239-246 - [i4]Alfonso Iacovazzi, Shahid Raza:
Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in Containers. CoRR abs/2306.14750 (2023) - [i3]Ivo Zenden, Han Wang, Alfonso Iacovazzi, Arash Vahidi, Rolf Blom, Shahid Raza:
On the Resilience of Machine Learning-Based IDS for Automotive Networks. CoRR abs/2306.14782 (2023) - 2022
- [c14]Alfonso Iacovazzi, Shahid Raza:
Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in Containers. CSR 2022: 30-37 - [c13]Sérgio Figueiredo, Paulo Silva, Alfonso Iacovazzi, Vitalina Holubenko, João Casal, José M. Alcaraz Calero, Qi Wang, Pedro Colarejo, Ross Little Armitt, Giacomo Inches, Shahid Raza:
ARCADIAN-IoT - Enabling Autonomous Trust, Security and Privacy Management for IoT. GIOTS 2022: 348-359
2010 – 2019
- 2019
- [c12]Yi Xiang Marcus Tan, Alfonso Iacovazzi, Ivan Homoliak, Yuval Elovici, Alexander Binder:
Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics. IJCNN 2019: 1-10 - [c11]Mengxuan Tan, Alfonso Iacovazzi, Ngai-Man Cheung, Yuval Elovici:
A Neural Attention Model for Real-Time Network Intrusion Detection. LCN 2019: 291-299 - [c10]Alfonso Iacovazzi, Daniel Frassinelli, Yuval Elovici:
The DUSTER Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding. RAID 2019: 213-225 - [i2]Yi Xiang Marcus Tan, Alfonso Iacovazzi, Ivan Homoliak, Yuval Elovici, Alexander Binder:
Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics. CoRR abs/1905.11831 (2019) - 2018
- [j6]Alfonso Iacovazzi, Sanat Sarda, Daniel Frassinelli, Yuval Elovici:
DropWat: An Invisible Network Flow Watermark for Data Exfiltration Traceback. IEEE Trans. Inf. Forensics Secur. 13(5): 1139-1154 (2018) - [c9]Alfonso Iacovazzi, Sanat Sarda, Yuval Elovici:
Inflow: Inverse Network Flow Watermarking for Detecting Hidden Servers. INFOCOM 2018: 747-755 - 2017
- [j5]Alfonso Iacovazzi, Yuval Elovici:
Network Flow Watermarking: A Survey. IEEE Commun. Surv. Tutorials 19(1): 512-530 (2017) - [c8]Alfonso Iacovazzi, Daniel Frassinelli, Yuval Elovici:
On packet loss modeling: An empirical assessment. NOF 2017: 33-39 - [i1]Alfonso Iacovazzi, Sanat Sarda, Daniel Frassinelli, Yuval Elovici:
DROPWAT: an Invisible Network Flow Watermark for Data Exfiltration Traceback. CoRR abs/1705.09460 (2017) - 2016
- [j4]Marco Polverini, Andrea Baiocchi, Antonio Cianfrani, Alfonso Iacovazzi, Marco Listanti:
The Power of SDN to Improve the Estimation of the ISP Traffic Matrix Through the Flow Spread Concept. IEEE J. Sel. Areas Commun. 34(6): 1904-1913 (2016) - 2015
- [j3]Alfonso Iacovazzi, Andrea Baiocchi:
Protecting traffic privacy for massive aggregated traffic. Comput. Networks 77: 1-17 (2015) - [j2]Antonello Rizzi, Alfonso Iacovazzi, Andrea Baiocchi, Silvia Colabrese:
A low complexity real-time Internet traffic flows neuro-fuzzy classifier. Comput. Networks 91: 752-771 (2015) - [c7]Marco Polverini, Alfonso Iacovazzi, Antonio Cianfrani, Andrea Baiocchi, Marco Listanti:
Traffic matrix estimation enhanced by SDNs nodes in real network topology. INFOCOM Workshops 2015: 300-305 - 2013
- [j1]Alfonso Iacovazzi, Alessandro D'Alconzo, Fabio Ricciato, Martin Burkhart:
Elementary secure-multiparty computation for massive-scale collaborative network monitoring: A quantitative assessment. Comput. Networks 57(17): 3728-3742 (2013) - [c6]Alfonso Iacovazzi, Andrea Baiocchi, Ludovico Bettini:
What are you Googling? - Inferring search type information through a statistical classifier. GLOBECOM 2013: 747-753 - [c5]Alfonso Iacovazzi, Andrea Baiocchi:
Investigating the trade-off between overhead and delay for full packet traffic privacy. ICC Workshops 2013: 1345-1350 - 2012
- [c4]Alfonso Iacovazzi, Andrea Baiocchi:
From ideality to practicability in statistical packet features masking. IWCMC 2012: 456-462 - [c3]Alfonso Iacovazzi, Andrea Baiocchi:
Padding and Fragmentation for Masking Packet Length Statistics. TMA 2012: 85-88 - 2010
- [c2]Alfonso Iacovazzi, Andrea Baiocchi:
Optimum packet length masking. ITC 2010: 1-8
2000 – 2009
- 2009
- [c1]Gianluca Maiolini, Andrea Baiocchi, Alfonso Iacovazzi, Antonello Rizzi:
Real Time Identification of SSH Encrypted Application Flows by Using Cluster Analysis Techniques. Networking 2009: 182-194
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint