Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 50 di 145
Titolo Data di pubblicazione Autori File
Unsupervised Learning Techniques for an Intrusion Detection System 1-gen-2004 ZANERO, STEFANOSAVARESI, SERGIO MATTEO
Behavioral Intrusion Detection 1-gen-2004 ZANERO, STEFANO
Computer Virus Propagation Models 1-gen-2004 SERAZZI, GIUSEPPEZANERO, STEFANO
Optimal Number of Nodes for Computations in Grid Enviroments 1-gen-2004 CASALE, GIULIANOGRANATA, FEDERICOZANERO, STEFANO +
Lessons Learned from the Italian Law on Privacy - Part I 1-gen-2004 ZANERO, STEFANO +
Lessons learned from the Italian law on privacy – Part II 1-gen-2004 ZANERO, STEFANO +
Improving Self Organizing Map Performance for Network Intrusion Detection. 1-gen-2005 ZANERO, STEFANO
Analyzing TCP Traffic Patterns using Self Organizing Maps. 1-gen-2005 ZANERO, STEFANO
GIVS: Integrity Validation for Grid Security 1-gen-2005 CASALE, GIULIANOZANERO, STEFANO
Performance Issues in Video Streaming Environments 1-gen-2005 CASALE, GIULIANOCREMONESI, PAOLOSERAZZI, GIUSEPPEZANERO, STEFANO
Security and Trust in the Italian Legal Digital Signature Framework 1-gen-2005 ZANERO, STEFANO
Mondi digitali e avventure nella rete 1-gen-2006 ZANERO, STEFANO
Open Problems in Computer Virology 1-gen-2006 ZANERO, STEFANO +
Network access control 1-gen-2007 SERAZZI, GIUSEPPEZANERO, STEFANO
Flaws and frauds in the evaluation of IDS/IPS technologies 1-gen-2007 ZANERO, STEFANO
Studying Bluetooth Malware Propagation: the BlueBag Project 1-gen-2007 ZANERO, STEFANO +
On the use of different statistical tests for alert correlation - Short Paper 1-gen-2007 MAGGI, FEDERICOZANERO, STEFANO
A methodology for the repeatable forensic analysis of encrypted drives 1-gen-2008 ZANERO, STEFANO +
Seeing the Invisible - Forensic Uses of Anomaly Detection and Machine Learning 1-gen-2008 MAGGI, FEDERICOZANERO, STEFANO +
Proceedings of WISTDCS 2008, WOMBAT Workshop on Internet Security Threat Data Collection and Sharing 1-gen-2008 ZANERO, STEFANO
ULISSE: A Network Intrusion Detection System 1-gen-2008 ZANERO, STEFANO
GIVS: Integrity Validation for Grid Security 1-gen-2008 CASALE, GIULIANOZANERO, STEFANO
Unsupervised Learning Algorithms for Intrusion Detection 1-gen-2008 ZANERO, STEFANOSERAZZI, GIUSEPPE
Integrating Partial Models of Network Normality via Cooperative Negotiation - An Approach to Development of Multiagent Intrusion Detection Systems 1-gen-2008 AMIGONI, FRANCESCOBASILICO, NICOLAZANERO, STEFANO +
Selecting and Improving System Call Models for Anomaly Detection 1-gen-2009 FROSSI, ALESSANDROMAGGI, FEDERICOZANERO, STEFANO +
Reducing False Positives In Anomaly Detectors Through Fuzzy Alert Aggregation 1-gen-2009 MAGGI, FEDERICOMATTEUCCI, MATTEOZANERO, STEFANO
Wireless Malware Propagation: A Reality Check 1-gen-2009 ZANERO, STEFANO
Integrated Detection of Attacks Against Browsers, Web Applications and Databases 1-gen-2009 CRISCIONE, CLAUDIOSALVANESCHI, GUIDOMAGGI, FEDERICOZANERO, STEFANO
BlueBat: Towards Practical Bluetooth Honeypots 1-gen-2009 ZANERO, STEFANO +
Proceedings of EC2ND 2009, European Conference on Computer Networks Defence 1-gen-2010 ZANERO, STEFANO
Identifying Dormant Functionality in Malware Programs 1-gen-2010 SALVANESCHI, GUIDOZANERO, STEFANO +
Effective multimodel anomaly detection using cooperative negotiation 1-gen-2010 VOLPATTO, ALBERTOMAGGI, FEDERICOZANERO, STEFANO
Detecting Intrusions through System Call Sequence and Argument Analysis 1-gen-2010 MAGGI, FEDERICOMATTEUCCI, MATTEOZANERO, STEFANO
Open Source Software for Digital Forensics 1-gen-2010 ZANERO, STEFANO +
The Case for Open Source Software in Digital Forensics 1-gen-2010 ZANERO, STEFANO +
Observing the tidal waves of malware: experiences from the WOMBAT project 1-gen-2010 ZANERO, STEFANO
2011 First SysSec Workshop (SysSec 2011) 1-gen-2011 ZANERO, STEFANO +
Is the future Web more insecure? Distractions and solutions of new-old security issues and measures 1-gen-2011 MAGGI, FEDERICOZANERO, STEFANO
A social-engineering-centric data collection initiative to study phishing 1-gen-2011 MAGGI, FEDERICOZANERO, STEFANO +
System Security research at Politecnico di Milano 1-gen-2011 MAGGI, FEDERICOZANERO, STEFANO
POSTER: Fast, Automatic iPhone Shoulder Surfing 1-gen-2011 MAGGI, FEDERICOVOLPATTO, ALBERTOGASPARINI, SIMONEBORACCHI, GIACOMOZANERO, STEFANO
Finding Non-trivial Malware Naming Inconsistencies 1-gen-2011 MAGGI, FEDERICOSALVANESCHI, GUIDOZANERO, STEFANO +
File Block Classification by Support Vector Machines 1-gen-2011 SPORTIELLO, LUIGIZANERO, STEFANO
BURN: Baring Unknown Rogue Networks 1-gen-2011 MAGGI, FEDERICOCAVIGLIA, GIORGIOZANERO, STEFANOCIUCCARELLI, PAOLO +
A Fast Eavesdropping Attack Against Touchscreens 1-gen-2011 MAGGI, FEDERICOVOLPATTO, ALBERTOBORACCHI, GIACOMOZANERO, STEFANO +
All your face are belong to us: breaking Facebook's social authentication 1-gen-2012 MAGGI, FEDERICOZANERO, STEFANO +
Context-Based File Block Classification 1-gen-2012 SPORTIELLO, LUIGIZANERO, STEFANO
i-Code: Real-Time Malicious Code Identification 1-gen-2012 ZANERO, STEFANO +
Lines of malicious code: insights into the malicious software industry 1-gen-2012 DI FEDERICO, ALESSANDROMAGGI, FEDERICOZANERO, STEFANO +
Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures 1-gen-2013 MAGGI, FEDERICOFROSSI, ALESSANDROZANERO, STEFANO +
Mostrati risultati da 1 a 50 di 145
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile