Abstract is missing.
- Data Leakage in Java Applets with Exception MechanismCinzia Bernardeschi, Paolo Masci, Antonella Santone. [doi]
- Understanding the Twitter User Networks of Viruses and Ransomware AttacksMichelangelo Puliga, Guido Caldarelli, Alessandro Chessa, Rocco De Nicola. [doi]
- Malware Detection through Low-level Features and Stacked Denoising AutoencodersAlessandra De Paola, Salvatore Favaloro, Salvatore Gaglio, Giuseppe Lo Re, Marco Morana. [doi]
- Enforcing Security in IoT and Home NetworksLuca Deri, Arianna Del Soldato. [doi]
- Cross-Cloud Management of Sensitive Data via Blockchain: a Payslip Calculation Use CaseLuca Nicoletti, Andrea Margheri, Federico Lombardi, Vladimiro Sassone, Francesco Paolo Schiavo. [doi]
- Performance of Botnet Detection by Neural Networks in Software-Defined NetworksIvan Letteri, Massimo Del Rosso, Pasquale Caianiello, Dajana Cassioli. [doi]
- PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned BlockchainStefano De Angelis, Leonardo Aniello, Roberto Baldoni, Federico Lombardi, Andrea Margheri, Vladimiro Sassone. [doi]
- Firewall Management With FireWall SynthesizerChiara Bodei, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Mauro Tempesta, Lorenzo Veronese. [doi]
- MAD-IOS: Dynamic App Vulnerability Analysis in Non-jailbroken DevicesAlfonso Solimeo, Luca Capacci, Stefano Taino, Rebecca Montanari. [doi]
- Visualizing Bitcoin Flows of Ransomware: WannaCry One Week LaterStefano Bistarelli, Matteo Parroccini, Francesco Santini 0001. [doi]
- Static Analysis for GDPR CompliancePietro Ferrara, Fausto Spoto. [doi]
- Preventing Ransomware Attacks Through File System Filter DriversGiovanni Bottazzi, Giuseppe F. Italiano, Domenico Spera. [doi]
- Dr Cookie and Mr Token - Web Session Implementations and How to Live with ThemStefano Calzavara, Alvise Rabitti, Michele Bugliesi. [doi]
- A Distributed Cyber-security Framework for Heterogeneous EnvironmentsRaffaele Bolla, Paolo Maria Comi, Matteo Repetto. [doi]
- Extending Domain Name Monitoring. Identifying Potentially Malicious Domains Using Hash Signatures of DOM ElementsAndrea Bernardini. [doi]