Abstract is missing.
- Reinforcement Learning Agents for Simulating Normal and Malicious Actions in Cyber Range ScenariosAlessandro Santorsola, Aldo Migliau, Sabino Caporusso. 1-16 [doi]
- On Identifying Repeated Patterns of OT Attacks with LOGistICSStefano Bistarelli, Emanuele Bosimini, Francesco Santini 0001. 17-29 [doi]
- "Safe Prescription": A Decentralized Blockchain Protocol to Manage Medical PrescriptionsClaudio Cilli, Giulio Magnanini, Marco Silipigni, Fabrizio Venettoni. 30-51 [doi]
- Ontology for Cybersecurity Governance of ICT SystemsFabio De Rosa, Nicolò Maunero, Luca Nicoletti, Paolo Prinetto, Martina Trussoni. 52-63 [doi]
- A Secure Canary-Based Hardware Approach Against ROPMahboobe Sadeghipour Roodsari, Ebrahim Nouri, Fatemeh Sheikhshoaei, Paolo Prinetto, Zainalabedin Navabi. 64-75 [doi]
- ThePhish: an Automated Open-Source Phishing Email Analysis PlatformEmanuele Galdi, Gaetano Perrone, Simon Pietro Romano. 76-101 [doi]
- Detection of Network Covert Channels in IoT Ecosystems Using Machine LearningMassimo Guarascio, Marco Zuppelli, Nunziato Cassavia, Giuseppe Manco 0001, Luca Caviglione. 102-113 [doi]
- An Investigation on Voice Mimicry Attacks to a Speaker Recognition SystemDonato Impedovo, Annalisa Longo, Tonino Palmisano, Lucia Sarcinella, Davide Veneto. 114-123 [doi]
- A Study on Malware Detection and Classification Using the Analysis of API Calls Sequences Through Shallow Learning and Recurrent Neural NetworksAngelo Cannarile, Francesco Carrera, Stefano Galantucci, Andrea Iannacone, Giuseppe Pirlo. 124-134 [doi]
- A Natural Language Processing Approach for Financial Fraud DetectionJavier Fernández Rodríguez, Michele Papale, Michele Carminati, Stefano Zanero. 135-149 [doi]
- Explaining Machine Learning DGA Detectors from DNS Traffic DataGiorgio Piras, Maura Pintor, Luca Demetrio, Battista Biggio. 150-168 [doi]
- Robust Machine Learning for Malware Detection over TimeDaniele Angioni, Luca Demetrio, Maura Pintor, Battista Biggio. 169-180 [doi]
- Machine Learning Techniques for Italian Phishing DetectionLeonardo Ranaldi, Michele Petito, Marco Gerardi, Francesca Fallucchid, Fabio Massimo Zanzotto. 181-194 [doi]
- Cyber Security Strategies for the Protection of Electrical SubstationsRoberto Setola, Francesco Morelli. 195-206 [doi]
- A Behavior-Based Intrusion Detection System Using Ensemble Learning TechniquesVincenzo Agate, Felice Maria D'Anna, Alessandra De Paola, Pierluca Ferraro, Giuseppe Lo Re, Marco Morana. 207-218 [doi]
- C-OSINT: COVID-19 Open Source Artificial INTelligence FrameworkLeonardo Ranaldi, Aria Nourbakhsh, Francesca Fallucchid, Fabio Massimo Zanzotto. 219-235 [doi]
- A Novel Genetic Algorithm Approach for Firewall Policy OptimizationAntonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Donato Impedovo, Antonio Maci. 236-248 [doi]