Abstract is missing.
- Cybersecurity Assessment of Digital Twin in Smart GridsMulualem Bitew Anley, Otuekong Ekpo, T. Milinda H. Gedara. [doi]
- David versus Goliath: Can Machine Learning Detect LLM-Generated Text? A Case Study in the Detection of Phishing EmailsFrancesco Greco, Giuseppe Desolda, Andrea Esposito, Alessandro Carelli. [doi]
- Design of a Hardening Module for Automatically Securing ContainersLuca Verderame, Luca Caviglione. [doi]
- IKE-less IPsec: Enhancing Security for IoT Device NetworksFlavio Ciravegna, Giacomo Bruno, Antonio Lioy. [doi]
- Evaluating trainees in large cyber exercisesAndrea Artioli, Mauro Andreolini, Luca Ferretti, Mirco Marchetti. [doi]
- The role of disinformation, propaganda and active measures in cyber warfare. noname(057)16 travels to ItalyArturo di Corinto. [doi]
- Supporting Criminal Investigations on the Blockchain: A Temporal Logic-based ApproachMarco Blanchini, Michele Cerreta, Davide Di Monda, Matteo Fabbri, Mario Raciti, Hamza Sajjad Ahmad, Gabriele Costa 0001. [doi]
- Security Risks and Best Practices of MLOps: A Multivocal Literature ReviewFabio Calefato, Filippo Lanubile, Luigi Quaranta. [doi]
- Exploiting Data Spaces to Enable Privacy Preserving Data Exchange in the Energy Supply ChainLuigi Coppolino, Alessandro De Crecchio, Roberto Nardone, Alfredo Petruolo, Luigi Romano, Federica Uccello. [doi]
- Towards K-Anonymous Payments in EthereumFrancesco Buccafurri, Vincenzo De Angelis, Sara Lazzaro, Giorgia Sigilli. [doi]
- Toward dynamic epistemic verification of zero-knowledge protocolsGabriele Costa, Cosimo Perini Brogi. [doi]
- Hyperproperties for Safe and Secure RFID SystemsLudovico Fusco, Alessandro Aldini. [doi]
- Understanding how users choose passwords: analysis and best practicesAlessia Michela Di Campi, Flaminia L. Luccio. [doi]
- In Plain Sight: A Pragmatic Exploration of the Medical Landscape (In)securityLorenzo Bracciale, Pierpaolo Loreti, Emanuele Raso, Giuseppe Bianchi 0001. [doi]
- Securing the Internet of Medical Things using PUF-based SSI AuthenticationMario Barbareschi, Biagio Boi, Franco Cirillo, Marco De Santis, Christian Esposito 0001. [doi]
- Enhancing Fraud Detection through Cascading Machine Learning Models and Clustering TechniquesGiuseppe Fenza, Salvatore Froncillo, Claudio Stanzione. [doi]
- A Privacy-Preserving Approach for Vulnerability Scanning DetectionLeonardo Regano, Daniele Canavese, Luca Mannella. [doi]
- Hardening Machine Learning based Network Intrusion Detection Systems with synthetic netflowsAndrea Venturi, Dimitri Gall, Dario Stabili, Mirco Marchetti. [doi]
- 2in1: A Bimodal Behavioral Biometric-based User Authentication Scheme for SmartphonesAttaullah Buriro, Flaminia L. Luccio. [doi]
- A Preliminary Study on the Creation of a Covert Channel with HTTP HeadersStefano Bistarelli, Michele Ceccarelli, Chiara Luchini, Ivan Mercanti, Francesco Santini 0001. [doi]
- ECC's Achilles' Heel: Unveiling Weak Keys in Standardized CurvesEnrico Talotti, Matteo Paier, Marino Miculan. [doi]
- Detecting Zero-Day Attacks under Concept Drift: An Online Unsupervised Threat Detection SystemAlessandra De Paola, Salvatore Drago, Pierluca Ferraro, Giuseppe Lo Re. [doi]
- The Case for Ultra High Speed Portable Network Security FiltersAlessandro Rivitti, Angelo Tulumello, Giuseppe Bianchi 0001. [doi]
- Private law perspectives of cybersecurityFederica Casarosa, Giovanni Comandé. [doi]
- Predicting Source Code Vulnerabilities Using Deep Learning: A Fair Comparison on Real DataVincenzo Carletti, Pasquale Foggia, Alessia Saggese, Mario Vento. [doi]
- A Black-box Adversarial Attack on Fake News Detection SystemsFarwa Batool, Federico Canino, Federico Concone, Giuseppe Lo Re, Marco Morana. [doi]
- Smart Critical Infrastructures Security management and governance: Implementation of Cyber Resilience KPIs for Decentralized Energy AssetAlì Aghazadeh Ardebili, Cristian Martella, Angelo Martella, Alessandro Lazari, Antonella Longo, Antonio Ficarella. [doi]
- ShiftyLoader: Syscall-free Reflective Code Injection in the Linux Operating SystemMichele Salvatori, Giorgio Bernardinetti, Francesco Quaglia, Giuseppe Bianchi 0001. [doi]
- Multilevel Database Decomposition FrameworkFabrizio Baiardi, Cosimo Comella, Vincenzo Sammartino. [doi]
- OpenSatRange: An open cyber range for operators and users of satellite communication networksFabio Patrone, Pierpaolo Loreti, Luca Fiscariello, Lorenzo Bracciale, Alessandro Amici, Andrea Detti, Cesare Roseti, Michele Luglio, Francesco Zampognaro, Giuseppe Bianchi 0001, Mario Marchese. [doi]
- Benchmarking Virtualized Page Permission for Malware Detection: a Web Server Case StudyPasquale Caporaso, Giuseppe Bianchi 0001, Francesco Quaglia. [doi]
- Netstaldi: A Modular Distributed Architecture for Incremental Network DiscoveryMatteo Paier, Mattia Pizzolitto, Gian Luca Foresti, Marino Miculan. [doi]
- On attacks (dis)similarities to test adversarial defense: can we reduce the attack set?Tommaso Puccetti, Tommaso Zoppi, Andrea Ceccarelli. [doi]
- Timing side-channel attacks on USB devices using eBPFGianmarco Lusvardi, Luca Ferretti, Mauro Andreolini. [doi]
- Unveiling Online Conspiracy Theorists: a Text-Based Approach and CharacterizationAlessandra Recordare, Guglielmo Cola, Tiziano Fagni, Maurizio Tesconi. [doi]
- Standard-Based Remote Attestation: The Veraison ProjectLorenzo Ferro, Antonio Lioy. [doi]
- Ask the right queries: Improving search engine retrieval of vulnerable internet-connected devices through interactive query reformulationAndrea Bernardini, Claudio Carpineto, Simone Angelini, Giovanna Dondossola, Roberta Terruggia. [doi]
- Feature extraction for anomaly detection in industrial control systemsSilvio Russo, Claudio Zanasi, Isabella Marasco. [doi]
- Is the Road to Hell Paved with Good Intentions? A Criminological and Criminal Law Analysis of Prospective Regulation for Ethical Hacking in Italy and the EUGaia Fiorinelli, Maria Vittoria Zucca. [doi]
- Implementing and testing RollJam on Software-Defined RadiosDario Stabili, Filip Valgimigli, Tobia Bocchi, Filippo Veronesi, Mirco Marchetti. [doi]
- Building call graph of WebAssembly programs via abstract semanticsMattia Paccamiccio, Franco Raimondi, Michele Loreti. [doi]
- SecuriDN: a customizable GUI generating cybersecurity models for DER control architecturesDavide Cerotti, Daniele Codetta Raiteri, Giovanna Dondossola, Lavinia Egidi, Giuliana Franceschinis, Luigi Portinale, Roberta Terruggia, Davide Savarro. [doi]
- VoWiFi Security: An Exploration of Non-3GPP Untrusted Access via Public ePDG URLsFrancesco Zampognaro, Domenico Verde, Giuseppe Bianchi 0001. [doi]
- Inferring Political Leaning on X (Twitter): A Zero-Shot Approach in an Italian ScenarioCaterina Senette, Margherita Gambini, Tiziano Fagni, Victoria Popa, Maurizio Tesconi. [doi]
- AI Regulatory Sandboxes between the AI Act and the GDPR: the role of Data Protection as a Corporate SocialDavide Baldini, Kate Francis. [doi]