Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 50 di 141
Titolo Data di pubblicazione Autori File
CANdito: Improving Payload-Based Detection of Attacks on Controller Area Networks 1-gen-2023 Longari, StefanoCarminati, MicheleZanero, Stefano +
Rainfuzz: Reinforcement-Learning Driven Heat-Maps for Boosting Coverage-Guided Fuzzing 1-gen-2023 Binosi, LorenzoPolino, MarioCarminati, MicheleZanero, Stefano +
The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis 1-gen-2023 Bertani, AlessandroPolino, MarioCarminati, MicheleZanero, Stefano +
HAMLET: A Transformer Based Approach for Money Laundering Detection 1-gen-2023 Paladini, TommasoD’Onghia, MarioCarminati, MicheleZanero, Stefano +
A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids 1-gen-2023 Hussain, ShahbazZanero, StefanoRagaini, Enrico +
Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors 1-gen-2023 D'Onghia, MarioCarminati, MichelePolino, MarioZanero, Stefano +
Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation 1-gen-2023 Alessandro BertaniLorenzo BinosiMichele CarminatiStefano ZaneroMario Polino +
Quantum Eigenfaces: Linear Feature Mapping and Nearest Neighbor Classification with Outlier Detection 1-gen-2023 Bellante, ArmandoVanerio, StefanoZanero, Stefano +
CyFence: Securing Cyber-physical Controllers Via Trusted Execution Environment 1-gen-2023 Longari, StefanoPozone, AlessandroLeoni, JessicaPolino, MarioCarminati, MicheleTanelli, MaraZanero, Stefano
Evaluating the Robustness of Automotive Intrusion Detection Systems Against Evasion Attacks 1-gen-2023 Longari, StefanoNoseda, FrancescoCarminati, MicheleZanero, Stefano
Task Aware Intrusion Detection for Industrial Robots 1-gen-2023 Stefano LongariMario PolinoMichele CarminatiAndrea Maria ZanchettinMara TanelliStefano Zanero +
CANova: A hybrid intrusion detection framework based on automatic signal classification for CAN 1-gen-2023 Longari, StefanoCarminati, MicheleZanero, Stefano +
Fraud Detection Under Siege: Practical Poisoning Attacks and Defense Strategies 1-gen-2023 Paladini, TommasoMonti, FrancescoPolino, MarioCarminati, MicheleZanero, Stefano
Coming of Age 1-gen-2023 Zanero, Stefano
BINO: Automatic Recognition of Inline Binary Functions from Template Classes 1-gen-2023 Lorenzo BinosiMario PolinoMichele CarminatiStefano Zanero
HACK: a Holistic modeling Approach for Cubesat cyberattacKs 1-gen-2023 Borgia, S.Topputo, F.Zanero, S.
A novel hybrid cybersecurity scheme against false data injection attacks in automated power systems 1-gen-2023 Hussain S.Hemmati M.Iqbal A.Zanero S.Ragaini E.Gruosso G. +
DJM-CYBER: A Joint Master in Advanced Cybersecurity 1-gen-2023 Zanero, Stefano +
Advancing Fraud Detection Systems through Online Learning 1-gen-2023 T. PaladiniM. Bernasconi de LucaM. CarminatiM. PolinoF. Trovo'S. Zanero
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks 1-gen-2022 de Faveri Tron, AlviseLongari, StefanoCarminati, MichelePolino, MarioZanero, Stefano
A Natural Language Processing Approach for Financial Fraud Detection 1-gen-2022 Michele PapaleMichele CarminatiStefano Zanero +
COMPUTER-IMPLEMENTED REAL-TIME CONTROL SYSTEM FOR CONTROLLING A PHYSICAL SYSTEM OR DEVICE 1-gen-2022 S. LONGARIA. POZONEM. TANELLIS. ZANERO
Amaretto: An Active Learning Framework for Money Laundering Detection 1-gen-2022 Labanca, DaniloPolino, MarioCarminati, MicheleZanero, Stefano +
Quantum matching pursuit: A quantum algorithm for sparse representations 1-gen-2022 Bellante, ArmandoZanero, Stefano
Apícula: Static Detection of API Calls in Generic Streams of Bytes 1-gen-2022 D’Onghia, MarioSalvadore, MatteoCarminati, MichelePolino, MarioZanero, Stefano +
A Systematical and Longitudinal Study of Evasive Behaviors in Windows Malware 1-gen-2022 Galloro, NicolaPolino, MarioCarminati, MicheleContinella, AndreaZanero, Stefano
Quantum algorithms for SVD-based data representation and analysis 1-gen-2022 Bellante, ArmandoLuongo, AlessandroZanero, Stefano
Sistema di riconoscimento di manomissione del codice di un sistema di controllo mediante uso di processori con memoria trusted 1-gen-2021 Zanero S.Tanelli M.Longari S.Pozone A.
SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning 1-gen-2021 Ruaro, NicolaPolino, MarioContinella, AndreaZanero, Stefano +
A Novel Methodology to Validate and Evaluate Combined Cyber Attacks in Automated Power Systems Using Real Time Digital Simulation 1-gen-2021 Hussain, ShahbazZanero, StefanoRagaini, Enrico +
GOLIATH: A Decentralized Framework for Data Collection in Intelligent Transportation Systems 1-gen-2021 Maffiola, DavideLongari, StefanoCarminati, MicheleTanelli, MaraZanero, Stefano
CANnolo: An Anomaly Detection System based on LSTM Autoencoders for Controller Area Network 1-gen-2021 Longari, StefanoCarminati, MicheleZanero, Stefano +
A novel methodology to validate cyberattacks and evaluate their impact on power systems using real time digital simulation 1-gen-2021 S. ZaneroE. Ragaini +
Smart Factory Security: A Case Study on a Modular Smart Manufacturing System 1-gen-2021 Maggi, FedericoQuadrini, WalterTavola, GiacomoPogliani, MarcelloQuarta, DavideZanero, Stefano +
DETECTING UNSECURE DATA FLOW IN AUTOMATION TASK PROGRAMS 1-gen-2020 F. MaggiM. PoglianiD. QuartaS. Zanero +
Evasion Attacks against Banking Fraud Detection Systems 1-gen-2020 M. CarminatiM. PolinoS. Zanero +
Detecting Insecure Code Patterns in Industrial Robot Programs 1-gen-2020 Pogliani, MarcelloQuarta, DavideZanero, Stefano +
NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services 1-gen-2020 Michele CarminatiMario PolinoStefano Zanero +
ReCAN – Dataset for reverse engineering of Controller Area Networks 1-gen-2020 Longari, StefanoTricarico, AndreaCarminati, MicheleZanero, Stefano +
Remote monitoring of cardiac implanted electronic devices: legal requirements and ethical principles - ESC Regulatory Affairs Committee/EHRA joint task force report 1-gen-2020 Zanero, Stefano +
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems 1-gen-2020 Erba, AlessandroTaormina, RiccardoGalelli, StefanoPogliani, MarcelloCarminati, MicheleZanero, Stefano +
Poster: Using Honeypots to Understand Attacks to Industrial Control Systems 1-gen-2019 Pogliani, MarcelloZanero, Stefano +
CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network 1-gen-2019 LONGARI, STEFANOCarminati, MicheleZanero, Stefano +
Security of controlled manufacturing systems in the connected factory: the case of industrial robots 1-gen-2019 Pogliani, MarcelloQuarta, DavidePolino, MarioZanero, Stefano +
Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots 1-gen-2019 FERRETTI, PIETROPogliani, MarcelloZanero, Stefano
A Secure-by-Design Framework for Automotive On-board Network Risk Analysis 1-gen-2019 Stefano LongariMichele CarminatiStefano Zanero +
Security Evaluation of a Banking Fraud Analysis System 1-gen-2018 Carminati, MichelePolino, MarioCONTINELLA, ANDREAMaggi, FedericoZANERO, STEFANO +
When Cyber Got Real: Challenges in Securing Cyber-Physical Systems 1-gen-2018 Stefano Zanero
SysTaint: Assisting Reversing of Malicious Network Communications 1-gen-2018 Carminati, MichelePolino, MarioContinella, AndreaZanero, Stefano +
There’s a Hole in that Bucket! A Large-scale Analysis of Misconfigured S3 Buckets 1-gen-2018 Continella, AndreaPolino, MarioPogliani, MarcelloZanero, Stefano
Mostrati risultati da 1 a 50 di 141
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile