Abstract is missing.
- Punish and Perish: The Human Factor in CybersecurityDidier Danet. 1-8 [doi]
- OT Cyber Security Frameworks Comparison Tool (CSFCTool)Giuseppina Murino, Marina Ribaudo, Simon Pietro Romano, Armando Tacchella. 9-22 [doi]
- On the Feasibility of Covert Channels through Short-Message-ServiceSara Narteni, Ivan Vaccari, Maurizio Mongelli, Maurizio Aiello, Enrico Cambiaso. 23-34 [doi]
- Perpetrate Cyber-threats using IoT Devices as Attack Vector: The ESP8266 Use CaseIvan Vaccari, Sara Narteni, Maurizio Mongelli, Maurizio Aiello, Enrico Cambiaso. 35-46 [doi]
- A Multi-factor Assessment Mechanism to Define Priorities on Vulnerabilities affecting Healthcare OrganizationsGustavo Gonzalez Granadillo, Rodrigo Diaz, Eleni Veroni, Christos Xenakis. 47-60 [doi]
- A Topological Approach to Secure Key ExchangeFilippo Cerocchi, Gabriele Rizzo. 61-71 [doi]
- Identifying Anomalous Places, Routes by GPS Feature: A System for Child MonitoringGiacomo Abbattista, Donato Impedovo, Giuseppe Pirlo, Lucia Sarcinella, Nicola Stigliano. 72-79 [doi]
- On-demand Deployment and Orchestration of Cyber Ranges in the CloudAlessandro Placido Luise, Gaetano Perrone, Claudio Perrotta, Simon Pietro Romano. 80-91 [doi]
- Spoofing Detectability as a Property of Biometric CharacteristicsTommaso Zoppi, Enrico Schiavone, Irene Bicchierai, Francesco Brancati, Andrea Bondavalli. 92-105 [doi]
- Detecting Phishing E-mails Using Text Mining and Features AnalysisLuisa Franchina, Serena Ferracci, Federico Palmaro. 106-119 [doi]
- Security Testing Reuse Enhancing Active Cyber Defence in Public AdministrationChristian Catalano, Paolo Afrune, Mario Angelelli, Giovanni Maglio, Fabrizio Striani, Francesco Tommasi. 120-132 [doi]
- Detecting Covert Channels Through Code AugmentationMarco Zuppelli, Luca Caviglione, Matteo Repetto. 133-144 [doi]
- Cybersecurity Impacts of the Covid-19 Pandemic in ItalyMarco Bozzetti, Luca Olivieri, Fausto Spoto. 145-155 [doi]
- A Time-series Classification Approach to Shallow Web Traffic De-anonymizationAxel De Nardin, Marino Miculan, Claudio Piciarelli, Gian Luca Foresti. 156-165 [doi]
- Placing FaaS in the Fog, SecurelyAlessandro Bocci, Stefano Forti 0002, Gian Luigi Ferrari, Antonio Brogi. 166-179 [doi]
- Learning-based Intrusion Detection System for On-Board Vehicle CommunicationTobia Fiorese, Pietro Montino. 180-192 [doi]
- An Accelerometer-based Privacy Attack on SmartphonesRoberto De Prisco, Alfredo De Santis, Rocco Zaccagnino. 193-206 [doi]
- Security in IoT Pairing & Authentication protocols, a Threat Model, a Case Study AnalysisDaniele Granata, Massimiliano Rak, Giovanni Salzillo, Umberto Barbato. 207-218 [doi]
- PowerDecode: A PowerShell Script Decoder Dedicated to Malware AnalysisGiuseppe Mario Malandrone, Giovanni Virdis, Giorgio Giacinto, Davide Maiorca. 219-232 [doi]
- A Benchmark Framework for CAN IDSDario Stabili, Francesco Pollicino, Alessio Rota. 233-245 [doi]
- Cyber Range for Industrial Control Systems (CR-ICS) for Simulating Attack ScenariosShaharyar Khan, Alberto Volpatto, Geet Kalra, Jonathan Esteban, Tommaso Pescanoce, Sabino Caporusso, Michael Siegel. 246-259 [doi]
- Comparative Analysis of Cyber Intelligence: The Italian CaseAlessia Boi. 260-269 [doi]
- An Artificial Intelligence Cyberattack Detection System to Improve Threat Reaction in e-HealthCarmelo Ardito, Tommaso Di Noia, Eugenio Di Sciascio, Domenico Lofú, Andrea Pazienza, Felice Vitulano. 270-283 [doi]
- PAIDEUSIS: A Remote Hybrid Cyber Range for Hardware, Network, IoT Security TrainingGiulio Berra, Gaspare Ferraro, Matteo Fornero, Nicolò Maunero, Paolo Prinetto, Gianluca Roascio. 284-297 [doi]
- Facing the Blockchain Endpoint Vulnerability, an SGX-based Solution for Secure eHealth AuditingLuigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Paolo Campegiani. 298-308 [doi]
- Ensemble Consensus: An Unsupervised Algorithm for Anomaly Detection in Network Security dataVincenzo Dentamaro, Vito Nicola Convertini, Stefano Galantucci, Paolo Giglio, Tonino Palmisano, Giuseppe Pirlo. 309-318 [doi]
- A Systematic Approach for the definition of countermeasures in industrial IoT: An Automotive CaseMassimiliano Masi, Tanja Pavleska, Simone Pezzoli. 319-330 [doi]
- Exploiting the Blockchain to Guarantee GDPR Compliance while Consents Evolve under Data Owners' ControlMassimiliano Calani, Giovanni Denaro, Alberto Leporati. 331-343 [doi]
- An Algorithm for Security Policy Migration in Multiple Firewall NetworksManuel Cheminod, Luca Durante, Lucia Seno, Adriano Valenzano. 344-359 [doi]
- A Blockchain-based Smart Contract System Architecture for Dependable Health ProcessesMario Ciampi, Fabrizio Marangio, Giovanni Schmid, Mario Sicuranza. 360-373 [doi]
- Sanitization of Images Containing Stegomalware via Machine Learning ApproachesMarco Zuppelli, Giuseppe Manco 0001, Luca Caviglione, Massimo Guarascio. 374-386 [doi]
- Overcoming Complexity of (Cyber)War: The Logic of Useful Fiction in Cyber Exercises ScenariosMarzio Di Feo. 387-393 [doi]
- Beyond SolarWinds: The Systemic Risks of Critical Infrastructures, State of Play, Future DirectionsSimone Raponi, Maurantonio Caprolu, Roberto Di Pietro. 394-405 [doi]
- Adversarial Evolution: Competing Dynamics and Reactive Institutional Forms in Financial Services EcosystemPaolo Spagnoletti, Federica Ceci, Andrea Salvi. 406-413 [doi]
- Robustness Evaluation of Convolutional Neural Networks for Malware ClassificationVincenzo Carletti, Antonio Greco, Alessia Saggese, Mario Vento. 414-423 [doi]
- Damn Vulnerable Application ScannerGabriele Costa, Enrico Russo, Andrea Valenza. 424-435 [doi]
- A Service Architecture for an Enhanced Cyber Threat Intelligence CapabilityGiuseppe Amato, Simone Ciccarone, Pasquale Digregorio, Giuseppe Natalucci. 436-446 [doi]
- Capture the Flag competitions for Higher EducationGiovanni Lagorio, Marina Ribaudo, Alessandro Armando. 447-460 [doi]
- Firmware Extraction from Real IoT Devices through Power Analysis of AESFrancesco Benvenuto, Francesco Palmarini, Riccardo Focardi, Flaminia L. Luccio. 461-474 [doi]
- Security Assessment of Common Open Source MQTT Brokers and ClientsEdoardo Di Paolo, Enrico Bassetti, Angelo Spognardi. 475-487 [doi]
- Critical Information Infrastructure Protection: Between Cybersecurity and PolicymakingAnna Pagnacco. 488-498 [doi]
- An Overview on the Security Technological Levels in the Italian Smart CitiesVita Santa Barletta, Paolo Buono, Danilo Caivano, Giovanni Dimauro, Antonio Pontrelli. 499-508 [doi]
- Enhancing Malware Classification with Symbolic FeaturesChinmay Siwach, Gabriele Costa, Rocco De Nicola. 509-522 [doi]
- Revisiting Security Threat on Smart Grids: Accurate and Interpretable Fault Location Prediction and Type ClassificationCarmelo Ardito, Yashar Deldjoo, Eugenio Di Sciascio, Fatemeh Nazary. 523-533 [doi]
- A Study on Misclassification of Software Vulnerabilities when using Deep Learning and Machine Learning AlgorithmsVishnu Ramesh, Sara Abraham, Vinod P 0001, Isham Mohamed, Corrado Aaron Visaggio, Sonia Laudanna. 534-545 [doi]