Abstract is missing.
- An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block CiphersAlessandro Barenghi, Gerardo Pelosi. 8-18 [doi]
- Analysing Privacy AnalysesGiampaolo Bella, Denis Butin, Hugo Jonker. 19-28 [doi]
- A Proposal for the Secure Activation and Licensing of FPGA IP CoresDomenico Amelino, Mario Barbareschi, Alessandro Cilardo. 29-37 [doi]
- Tracking Sensitive and Untrustworthy Data in IoTChiara Bodei, Letterio Galletta. 38-52 [doi]
- Risk Assessment of a Biometric Continuous Authentication Protocol for Internet ServicesEnrico Schiavone, Andrea Ceccarelli, Andrea Bondavalli. 53-65 [doi]
- On the Interoperability of Capture Devices in Fingerprint Presentation Attacks DetectionLuca Ghiani, Valerio Mura, Pierluigi Tuveri, Gian Luca Marcialis. 66-75 [doi]
- A Software Architecture for Classifying Users in E-payment SystemsGianluigi Folino, Francesco Sergio Pisani. 76-85 [doi]
- Hate Me, Hate Me Not: Hate Speech Detection on FacebookFabio Del Vigna, Andrea Cimino, Felice dell'Orletta, Marinella Petrocchi, Maurizio Tesconi. 86-95 [doi]
- Detection of Malicious Scripting Code Through Discriminant and Adversary-Aware API AnalysisDavide Maiorca, Paolo Russu, Igino Corona, Battista Biggio, Giorgio Giacinto. 96-105 [doi]
- Infinity-Norm Support Vector Machines Against Adversarial Label ContaminationAmbra Demontis, Battista Biggio, Giorgio Fumera, Giorgio Giacinto, Fabio Roli. 106-115 [doi]
- Network Anomaly Detection in Critical Infrastructure Based on Mininet Network SimulatorGiuseppe Bernieri, Federica Pascucci, Javier Lopez. 116-125 [doi]
- An Operational Framework for Incident HandlingGiovanni Bottazzi, Giuseppe Francesco Italiano, Giuseppe Giulio Rutigliano. 126-135 [doi]
- Devil in the Details: Assessing Automated Confidentiality Classifiers in the Context of NATO DocumentsMarc Richter, Konrad Wrona. 136-145 [doi]
- Blockchain-Based Database to Ensure Data Integrity in Cloud Computing EnvironmentsEdoardo Gaetani, Leonardo Aniello, Roberto Baldoni, Federico Lombardi, Andrea Margheri, Vladimiro Sassone. 146-155 [doi]
- Certificate Validation Through Public Ledgers and BlockchainsMarco Baldi, Franco Chiaraluce, Emanuele Frontoni, Giuseppe Gottardi, Daniele Sciarroni, Luca Spalazzi. 156-165 [doi]
- Rules of (Digital) Evidence and Prosecution's Actual Needs. When the Law Falls Behind TechnologyAndrea Monti. 166-174 [doi]
- How Does Cyber Crime Affect Firms? The Effect of Information Security Breaches on Stock ReturnsMaria Cristina Arcuri, Marina Brogi, Gino Gandolfi. 175-193 [doi]
- Restructuring and Securing Italian Banks (in Italian)Mario Dal Co. 194-201 [doi]
- Web-based Intelligence in Adaptive Security Models and Multidisciplinary Aspects of Activation and Analysis (in Italian)Giampiero Bonfiglio, Ludovica Coletta, Alessandra Teresa Coscarella, Martina Limonta, Panfilo Ventresca. 202-211 [doi]
- The Hacking Team Case: Quis Custodiet Ipsos Custodes? Issues and Challenges for a More Efficient Partnership Between Private Industry and Intelligence Agencies (in Italian)Filippo Pierozzi. 212-221 [doi]
- Multilanguage Semantic Behavioural Algorithms to Discover Terrorist Related Online ContentsMaurizio Mencarini, Gianluca Sensidoni. 222-231 [doi]
- An Intelligence Platform based on OSINT tools and Open Source Technologies (in Italian)Mauro Brignoli, Luisa Franchina. 232-241 [doi]
- Security Analysis of the OWASP Benchmark with JuliaPietro Ferrara, Elisa Burato, Fausto Spoto. 242-247 [doi]
- MITIGATE: An Innovative Cyber-Security Maritime Supply Chain Risk Management SystemArmend Duzha, Panagiotis Gouvas, Monica Canepa. 248-252 [doi]
- Cyber Threat Intelligence for Supporting the ATM Security ManagementAntonella Chirichiello, Claudio Porretti, Antonio Berardi. 253-257 [doi]