Sfoglia per Autore
Lessons Learned from the Italian Law on Privacy - Part I
2004-01-01 Perri, P; Zanero, Stefano
Lessons learned from the Italian law on privacy – Part II
2004-01-01 Perri, P; Zanero, Stefano
Unsupervised Learning Techniques for an Intrusion Detection System
2004-01-01 Zanero, Stefano; Savaresi, SERGIO MATTEO
Behavioral Intrusion Detection
2004-01-01 Zanero, Stefano
Optimal Number of Nodes for Computations in Grid Enviroments
2004-01-01 Casale, Giuliano; Granata, Federico; L., Muttoni; Zanero, Stefano
Computer Virus Propagation Models
2004-01-01 Serazzi, Giuseppe; Zanero, Stefano
Improving Self Organizing Map Performance for Network Intrusion Detection.
2005-01-01 Zanero, Stefano
Performance Issues in Video Streaming Environments
2005-01-01 Casale, Giuliano; Cremonesi, Paolo; Serazzi, Giuseppe; Zanero, Stefano
Security and Trust in the Italian Legal Digital Signature Framework
2005-01-01 Zanero, Stefano
Analyzing TCP Traffic Patterns using Self Organizing Maps.
2005-01-01 Zanero, Stefano
GIVS: Integrity Validation for Grid Security
2005-01-01 Casale, Giuliano; Zanero, Stefano
Mondi digitali e avventure nella rete
2006-01-01 Zanero, Stefano
Open Problems in Computer Virology
2006-01-01 E., Filiol; M., Helenius; Zanero, Stefano
Network access control
2007-01-01 Serazzi, Giuseppe; Zanero, Stefano
Flaws and frauds in the evaluation of IDS/IPS technologies
2007-01-01 Zanero, Stefano
On the use of different statistical tests for alert correlation - Short Paper
2007-01-01 Maggi, Federico; Zanero, Stefano
Studying Bluetooth Malware Propagation: the BlueBag Project
2007-01-01 L., Carettoni; C., Merloni; Zanero, Stefano
Proceedings of WISTDCS 2008, WOMBAT Workshop on Internet Security Threat Data Collection and Sharing
2008-01-01 Zanero, Stefano
A methodology for the repeatable forensic analysis of encrypted drives
2008-01-01 C., Altheide; C., Merloni; Zanero, Stefano
Integrating Partial Models of Network Normality via Cooperative Negotiation - An Approach to Development of Multiagent Intrusion Detection Systems
2008-01-01 Amigoni, Francesco; F., Basilico; Basilico, Nicola; Zanero, Stefano
Seeing the Invisible - Forensic Uses of Anomaly Detection and Machine Learning
2008-01-01 Maggi, Federico; Zanero, Stefano; V., Iozzo
Unsupervised Learning Algorithms for Intrusion Detection
2008-01-01 Zanero, Stefano; Serazzi, Giuseppe
GIVS: Integrity Validation for Grid Security
2008-01-01 Casale, Giuliano; Zanero, Stefano
ULISSE: A Network Intrusion Detection System
2008-01-01 Zanero, Stefano
Wireless Malware Propagation: A Reality Check
2009-01-01 Zanero, Stefano
Integrated Detection of Attacks Against Browsers, Web Applications and Databases
2009-01-01 Criscione, Claudio; Salvaneschi, Guido; Maggi, Federico; Zanero, Stefano
BlueBat: Towards Practical Bluetooth Honeypots
2009-01-01 A., Galante; A., Kokos; Zanero, Stefano
Reducing False Positives In Anomaly Detectors Through Fuzzy Alert Aggregation
2009-01-01 Maggi, Federico; Matteucci, Matteo; Zanero, Stefano
Selecting and Improving System Call Models for Anomaly Detection
2009-01-01 Frossi, Alessandro; Maggi, Federico; G., Rizzo; Zanero, Stefano
Proceedings of EC2ND 2009, European Conference on Computer Networks Defence
2010-01-01 Zanero, Stefano
Observing the tidal waves of malware: experiences from the WOMBAT project
2010-01-01 Zanero, Stefano
Open Source Software for Digital Forensics
2010-01-01 E., Huebner; Zanero, Stefano
The Case for Open Source Software in Digital Forensics
2010-01-01 Zanero, Stefano; Ewa, Huebner
Identifying Dormant Functionality in Malware Programs
2010-01-01 P., Milani Comparetti; Salvaneschi, Guido; C., Kolbitsch; E., Kirda; C., Kruegel; Zanero, Stefano
Detecting Intrusions through System Call Sequence and Argument Analysis
2010-01-01 Maggi, Federico; Matteucci, Matteo; Zanero, Stefano
Effective multimodel anomaly detection using cooperative negotiation
2010-01-01 Volpatto, Alberto; Maggi, Federico; Zanero, Stefano
2011 First SysSec Workshop (SysSec 2011)
2011-01-01 Evangelos, Markatos; Zanero, Stefano
File Block Classification by Support Vector Machines
2011-01-01 Sportiello, Luigi; Zanero, Stefano
A Fast Eavesdropping Attack Against Touchscreens
2011-01-01 Maggi, Federico; Volpatto, Alberto; S., Gasparini; Boracchi, Giacomo; Zanero, Stefano
System Security research at Politecnico di Milano
2011-01-01 Maggi, Federico; Zanero, Stefano
Is the future Web more insecure? Distractions and solutions of new-old security issues and measures
2011-01-01 Maggi, Federico; Zanero, Stefano
Finding Non-trivial Malware Naming Inconsistencies
2011-01-01 Maggi, Federico; A., Bellini; Salvaneschi, Guido; Zanero, Stefano
BURN: Baring Unknown Rogue Networks
2011-01-01 Francesco, Roveta; Luca Di, Mario; Maggi, Federico; Caviglia, Giorgio; Zanero, Stefano; Ciuccarelli, Paolo
POSTER: Fast, Automatic iPhone Shoulder Surfing
2011-01-01 Maggi, Federico; Volpatto, Alberto; Gasparini, Simone; Boracchi, Giacomo; Zanero, Stefano
A social-engineering-centric data collection initiative to study phishing
2011-01-01 Maggi, Federico; Alessandro, Sisto; Zanero, Stefano
i-Code: Real-Time Malicious Code Identification
2012-01-01 Zanero, Stefano; Sotiris, Ioannidis; Evangelos, Markatos
All your face are belong to us: breaking Facebook's social authentication
2012-01-01 I., Polakis; M., Lancini; G., Kontaxis; Maggi, Federico; S., Ioannidis; A. D., Keromytis; Zanero, Stefano
Lines of malicious code: insights into the malicious software industry
2012-01-01 M., Lindorfer; DI FEDERICO, Alessandro; Maggi, Federico; P., Milani Comparetti; Zanero, Stefano
Context-Based File Block Classification
2012-01-01 Sportiello, Luigi; Zanero, Stefano
A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth
2013-01-01 Dardanelli, Andrea; Maggi, Federico; Tanelli, Mara; Zanero, Stefano; Savaresi, SERGIO MATTEO; R., Kochanek; T., Holz
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile