Abstract is missing.
- Secure e-Voting in Smart CommunitiesVincenzo Agate, Marco Curaba, Pierluca Ferraro, Giuseppe Lo Re, Marco Morana. 1-11 [doi]
- EVA: A Hybrid Cyber RangeShabeer Ahmad, Nicolò Maunero, Paolo Prinetto. 12-23 [doi]
- Modeling and Verification of the Worth-One-Minute Security ProtocolsAlessandro Aldini, Alessandro Bogliolo, Saverio Delpriori, Lorenz Cuno Klopfenstein, Giorgia Remedi. 24-35 [doi]
- An Unsupervised Behavioral Analysis of Highway Traffic Flow for Security ApplicationsFabrizio Balducci, Gabriella Calvano, Donato Impedovo, Giuseppe Pirlo. 36-46 [doi]
- How many bots are you following?Alessandro Balestrucci. 47-59 [doi]
- A Report on the Security of Home Connections with IoT and Docker HoneypotsStefano Bistarelli, Emanuele Bosimini, Francesco Santini 0001. 60-70 [doi]
- Enhancing user awareness during internet browsingBernardo Breve, Loredana Caruccio, Stefano Cirillo, Domenico Desiato, Vincenzo Deufemia, Giuseppe Polese. 71-81 [doi]
- Control-flow Flattening Preserves the Constant-Time PolicyMatteo Busi, Pierpaolo Degano, Letterio Galletta. 82-92 [doi]
- A Hard Lesson: Assessing the HTTPS Deployment of Italian University WebsitesStefano Calzavara, Riccardo Focardi, Alvise Rabitti, Lorenzo Soligo. 93-104 [doi]
- Are you (Google) Home? Detecting Users' Presence through Traffic Analysis of Smart SpeakersDavide Caputo, Luca Verderame, Alessio Merlo, Andrea Ranieri, Luca Caviglione. 105-118 [doi]
- MuAC: Access Control Language for Mutual BenefitsLorenzo Ceragioli, Pierpaolo Degano, Letterio Galletta. 119-127 [doi]
- A Life Cycle for Authorization Systems Development in the GDPR PerspectiveSaid Daoudagh, Eda Marchetti. 128-140 [doi]
- A Hardware Implementation for Code-based Post-quantum Asymmetric CryptographyKristjane Koleci, Marco Baldi, Maurizio Martina, Guido Masera. 141-152 [doi]
- MTA-KDD'19: A Dataset for Malware Traffic DetectionIvan Letteri, Giuseppe Della Penna, Luca Di Vita, Maria Teresa Grifa. 153-165 [doi]
- The mind is like a parachute, it only functions when open. National Security: the importance of the human being that works behind the machineSabrina Magris, Claudio Masci, Luciano Piacentini. 166-176 [doi]
- Hardware Security, Vulnerabilities, and Attacks: A Comprehensive TaxonomyPaolo Prinetto, Gianluca Roascio. 177-189 [doi]
- Systematic IoT Penetration Testing: Alexa Case StudyMassimiliano Rak, Giovanni Salzillo, Claudia Romeo. 190-200 [doi]
- A novel cyber-security framework leveraging programmable capabilities in digital servicesMatteo Repetto, Alessandro Carrega, Armend Duzha. 201-211 [doi]
- A Deep Learning Approach for Detecting Security Attacks on BlockchainFrancesco Scicchitano, Angelica Liguori, Massimo Guarascio, Ettore Ritacco, Giuseppe Manco 0001. 212-222 [doi]
- Evaluating ambiguity of privacy indicators in a secure email appBorce Stojkovski, Gabriele Lenzini. 223-234 [doi]
- A game-based learning experience for improving cybersecurity awarenessSilvestro Veneruso, Lauren S. Ferro, Andrea Marrella, Massimo Mecella, Tiziana Catarci. 235-242 [doi]
- Repadiography: towards a visual support for triaging repackaged appsCorrado Aaron Visaggio, Sonia Laudanna, Andrea Di Sorbo, Gerardo Canfora, Sara Caruso, Marianna Fucci. 243-255 [doi]