Abstract is missing.
- NIF: Reactive Injection Attack via Nmap PiggybackingAlessandro Bonfiglio, Gabriele Costa 0001, Silvia de Francisci. [doi]
- Task Aware Intrusion Detection for Industrial RobotsDavide Avanzi, Stefano Longari, Mario Polino, Michele Carminati, Andrea Maria Zanchettin, Mara Tanelli, Stefano Zanero. [doi]
- Container-based Virtualization for Ethical Hacking with HOUDINIDaniele Capone, Angelo Delicato, Gaetano Perrone, Simon Pietro Romano. [doi]
- Is Your Smartphone Really Safe? A Wake-up Call on Android Antivirus Software EffectivenessAndrea Piccione, Giorgio Bernardinetti, Alessandro Pellegrini 0001, Giuseppe Bianchi 0001. [doi]
- OSINT Knowledge Graph for Fact-Checking: Google Map Hacks DebunkingGiuseppe Fenza, Vincenzo Loia, Paola Montserrat Mainardi, Claudio Stanzione. [doi]
- Towards Self-Supervised Cross-Domain Fake News DetectionCarmela Comito, Francesco Sergio Pisani, Erica Coppolillo, Angelica Liguori, Massimo Guarascio 0001, Giuseppe Manco 0001. [doi]
- Sharing Responsibilities through Distributed Key Generation in the Chirotonia e-Voting FrameworkSimon Pietro Romano, Alfonso Calabria, Anna Piscitelli, Antonio Russo. [doi]
- A Survey on Decentralized Identifier Methods for Self Sovereign IdentityStefano Bistarelli, Francesco Micheli, Francesco Santini 0001. [doi]
- Exploiting Ethereum after "The Merge": The Interplay between PoS and MEV StrategiesDavide Mancino, Alberto Leporati, Marco Viviani 0001, Giovanni Denaro. [doi]
- Big Data Value Graph: Enhancing Security and Generating new Value from Big DataMassimiliano Gervasi, Nicolò Gianmauro Totaro, Anna Fornaio, Danilo Caivano. [doi]
- How (not) to Index Order Revealing Encrypted DatabasesLuca Ferretti, Mattia Trabucco, Mauro Andreolini, Mirco Marchetti. [doi]
- A Framework for Automating Security Assessments with Deductive ReasoningMauro Andreolini, Andrea Artioli, Luca Ferretti, Mirco Marchetti, Michele Colajanni. [doi]
- Formal Analysis of Security Protocols with MovementAndrew Cook, Luca Viganò 0001. [doi]
- CLUE: Certificateless Updatable EncryptionJodie Knapp, Elizabeth A. Quaglia. [doi]
- SAE - Secure Application Email ArchitectureFrancesco Gennai, Fabio Sinibaldi, Loredana Martusciello, Marina Buzzi. [doi]
- Text-Independent Voice Recognition based on Siamese Networks and Fusion EmbeddingsRoberto De Prisco, Ciro Fusco, Michele Iannucci, Delfina Malandrino, Rocco Zaccagnino. [doi]
- User Perception of Risks Associated with IFTTT Applets: A Preliminary User StudyBernardo Breve, Gaetano Cimino, Vincenzo Deufemia, Annunziata Elefante. [doi]
- A Targeted Assessment of Cross-Site Scripting Detection ToolsBruno Pala, Lorenzo Pisu, Silvia Lucia Sanna, Davide Maiorca, Giorgio Giacinto. [doi]
- Scamming the Scammers: Using ChatGPT to Reply Mails for Wasting Time and ResourcesEnrico Cambiaso, Luca Caviglione. [doi]
- DBCChecker: a Bigraph-based Tool for Checking Security Properties of Container CompositionsAndrea Altarui, Marino Miculan, Matteo Paier. [doi]
- Local Differential Privacy in VotingBernardo David, Rosario Giustolisi, Victor Mortensen, Morten Pedersen. [doi]
- Towards Context-Aware Risk Assessment Scoring System for IoT/IIoT DevicesValerio Giuseppe Massaro, Luca Capacci, Rebecca Montanari. [doi]
- Explaining Phishing Attacks: An XAI Approach to Enhance User Awareness and TrustFrancesco Greco, Giuseppe Desolda, Andrea Esposito 0002. [doi]
- Windows Antivirus Evasion Techniques: How to Stay Ahead of the HooksGiorgio Bernardinetti, Dimitri Di Cristofaro, Giuseppe Bianchi 0001. [doi]
- A Heuristic to Select the Optimal Transformation Matrixes in Bio-Convolving with Mixing TransformFrancesco Castro, Stefano Galantucci, Donato Impedovo, Giuseppe Pirlo. [doi]
- Breakthroughs in Testing and Certification in Cybersecurity: Research Gaps and Open ProblemsSaid Daoudagh, Eda Marchetti. [doi]
- Preliminary Results on a "Real" Iris Recognition System under Challenging Operational ConditionsSara Concas, Giulia Orrù, Emiliano De Paoli, Gian Luca Marcialis. [doi]
- From Tweet to Theft: Tracing the Flow of Stolen CryptocurrencyGuglielmo Cola, Michele Mazza, Maurizio Tesconi. [doi]
- Practical Evaluation of Graph Neural Networks in Network Intrusion DetectionAndrea Venturi, Daniele Pellegrini, Mauro Andreolini, Luca Ferretti, Mirco Marchetti, Michele Colajanni. [doi]