Abstract is missing.
- A Brief Tour of Formally Secure CompilationMatteo Busi, Letterio Galletta. [doi]
- Towards the Hypervision of Hardware-based Control Flow Integrity for Arm PlatformsGiulia Ferri, Giorgiomaria Cicero, Alessandro Biondi, Giorgio C. Buttazzo. [doi]
- Towards User Recognition by Shallow Web Traffic InspectionMarino Miculan, Gian Luca Foresti, Claudio Piciarelli. [doi]
- Twitter Spam Account Detection by Effective LabelingFederico Concone, Giuseppe Lo Re, Marco Morana, Claudio Ruocco. [doi]
- A Bayesian Network Approach for the Interpretation of Cyber Attacks to Power SystemsDavide Cerotti, Daniele Codetta Raiteri, Giovanna Dondossola, Lavinia Egidi, Giuliana Franceschinis, Luigi Portinale, Roberta Terruggia. [doi]
- A QBDI-based Fuzzer Taming Magic BytesElia Geretto, CĂ©dric Tessier, Fabio Massacci. [doi]
- Explaining Vulnerabilities of Deep Learning to Adversarial Malware BinariesLuca Demetrio, Battista Biggio, Giovanni Lagorio, Fabio Roli, Alessandro Armando. [doi]
- Darknet Security: A Categorization of Attacks to the Tor NetworkEnrico Cambiaso, Ivan Vaccari, Luca Patti, Maurizio Aiello. [doi]
- From Firewalls to Functions and BackLorenzo Ceragioli, Letterio Galletta, Mauro Tempesta. [doi]
- Teaching Cyber Security: The HACK-SPACE Integrated ModelMaria Teresa Baldassarre, Vita Santa Barletta, Danilo Caivano, Domenico Raguseo, Michele Scalera. [doi]
- Integrating Access Control and Business Process for GDPR Compliance: A Preliminary StudyAntonello Calabrò, Said Daoudagh, Eda Marchetti. [doi]
- Six Things I Hate About You (in Italian) and Six Classification Strategies to More and More Effectively Find ThemTiziano Fagni, Leonardo Nizzoli, Marinella Petrocchi, Maurizio Tesconi. [doi]
- Combining System Visibility and Security Using eBPFLuca Deri, Samuele Sabella, Simone Mainardi. [doi]