Abstract is missing.
- The Internet of Quantum Things (IoQT) - A New Frontier in Quantum Emulation and SimulationIoannis Kefaloukos, Nikolay Tcholtchev, Michail-Alexandros Kourtis, Giorgos Oikonomakis, Emmanouil Eleftherios Rompogiannakis, Evangelos Markakis. [doi]
- Evaluating SCAS Tests in Closed Source 5G Core NetworkLeonardo Sagratella, Andrea Bernardini, Francesco D'Alterio, Marina Settembre, Roberta Terruggia. [doi]
- On Policies for Bartering Access to ResourcesLorenzo Bettini, Rosario Pugliese, Francesco Tiezzi 0001. [doi]
- PECSo: A Privacy Enhancing Framework for Applications in the Automotive DomainGiampaolo Bella, Sergio Esposito, Mirko Giuseppe Mangano, Salvatore Riccobene, Daniele Francesco Santamaria, Gabriele Veneziano Broccia. [doi]
- HDDroid: Federated Hyperdimensional Computing for Mobile Malware DetectionAndrea Augello, Alessandra De Paola, Giuseppe Lo Re, Antoine Menager. [doi]
- Evaluating Explainability of Graph Neural Networks for Network Intrusion Detection with Structural AttacksDimitri Galli, Andrea Venturi, Isabella Marasco, Mirco Marchetti. [doi]
- How effective are Large Language Models (LLMs) at inferring people's personality based on texts they authored?Victoria Popa, Guglielmo Cola, Caterina Senette, Maurizio Tesconi. [doi]
- BinSAFE: Extending Functions Embeddings to Entire BinariesGianluca Capozzi, Giordano Laurenzi, Marco Mormando, Carmine Gianni, Gianluca Marcilli, Giuseppe Antonio Di Luna, Leonardo Querzoni. [doi]
- Guessing As A Service: Large Language Models Are Not Yet Ready For Vulnerability DetectionFrancesco Panebianco, Andrea Isgrò, Stefano Longari, Stefano Zanero, Michele Carminati. [doi]
- Reporting potential vulnerabilities: a plea for coordinationFederica Casarosa, Giovanni Comandè. [doi]
- Cybersecurity Education Showdown: A Comparative Analysis of K-12 Education Systems in the United States, the European Union and ChinaBerenice Fernández Nieto, Daisy Romanini, Yuhui Zhu. [doi]
- Multi-LLM Agents Architecture for Claim VerificationGiuseppe Fenza, Domenico Furno, Vincenzo Loia, Pio Pasquale Trotta. [doi]
- An Experimental Analysis of Semi-supervised Learning for Malware DetectionLuca Minnei, Giorgio Piras, Angelo Sotgiu, Maura Pintor, Ambra Demontis, Davide Maiorca, Battista Biggio. [doi]
- Cognitive Filter Bubble: Investigating Bias and Neutrality Vulnerabilities of LLMs in Sensitive ContextsMaria Di Gisi, Giuseppe Fenza, Mariacristina Gallo, Vincenzo Loia, Claudio Stanzione. [doi]
- A Survey of WebAssembly Usage for Embedded Applications: Safety and Portability ConsiderationsTancredi Orlando, Luca D'Agati, Francesco Longo 0001, Giovanni Merlino. [doi]
- Leveraging Pre-trained LLMs for GDPR Compliance in Online Privacy PoliciesGiovanni Ciaramella, Luca Petrillo, Margaret Varilek, Francesco Mercaldo, Giovanni Comandè, Fabio Martinelli. [doi]
- Application of Quantum Resistant Cryptography to Smart Grid deploymentsDavid Domingo Martín, Rodrigo Martín Sánchez-Ledesma, Marta Irene García Cid. [doi]
- An Adaptive Dual-Stack QKD-PQC Framework for Secure and Reliable Inter-Site CommunicationAlessio Di Santo, Walter Tiberti, Dajana Cassioli. [doi]
- Forgotten & Reclaimed: Detecting and Preventing Subdomain Takeover in the Italian Medical LandscapeLorenzo Bracciale, Matteo Coni, Pierpaolo Loreti, Emanuele Raso, Giuseppe Bianchi 0001. [doi]
- CrawLLMentor: An LLM-Powered Tool to Assist Pen Testers in Identifying Business Logic VulnerabilitiesNicolò Romandini, Luca Capacci, Rebecca Montanari. [doi]
- Stateful Handling of Critical Events: Leveraging eBPF to Realize eXtended Finite State Machine AbstractionsArianna Quinci, Giacomo Belocchi, Francesco Quaglia, Giuseppe Bianchi 0001. [doi]
- Adversarial Training to Improve Accuracy and Robustness of a Windows PE Malware Detection ModelLuca Lobascio, Giuseppina Andresini, Annalisa Appice, Donato Malerba. [doi]
- A working experimentation model for cyber resilience regulatory sandboxesFabio Seferi. [doi]
- VMORPH: A Virtualization/Metamorphic Framework for Binary Obfuscation and Intellectual Property ProtectionPierciro Caliandro, Matteo Ciccaglione, Andrea Pepe, Giuseppe Bianchi, Alessandro Pellegrini 0001. [doi]
- Revocable Anonymous Credentials from Attribute-Based EncryptionGiovanni Bartolomeo. [doi]
- Undercover Disruption: Stealth Jamming Attacks on 5G Synchronization StagesRosolino Alaimo, Silvia Schilleci, Alessandra Dino, Stefano Mangione, Ilenia Tinnirello, Domenico Garlisi, Roberto Corallo. [doi]
- CANPak: An Intrusion Detection System against Error Frame Attacks for Controller Area NetworkSikandar Mehmood Abbasi, Stefano Longari. [doi]
- OWSM: Empowering Rego for Stateful Access ControlMassimiliano Baldo, Fabio Ionut Ion, Marino Miculan, Matteo Paier, Vincenzo Riccio. [doi]
- 5G Security Assurance: Lessons Learned from 3GPP SCAS Tests on Virtualized Network ArchitecturesFrancesco Mancini, Lorenzo Cannella, Giorgia Messina, Marco Centenaro, Ivan Di Pietro, Alessandro Greco, Samuela Persia, Francesca Cuomo, Giuseppe Bianchi. [doi]
- Towards Cyber Resilience against APTsAlessandro Gaudenzi, Lorenzo Nodari, Rodolfo V. Valentim, Danilo Giordano, Idilio Drago, Alessandra Russo, Federico Cerutti 0001. [doi]
- On the Feasibility of Android Stegomalware: A Detection StudyDiego Soi, Silvia Lucia Sanna, Angelica Liguori, Marco Zuppelli, Leonardo Regano, Davide Maiorca, Luca Caviglione, Giuseppe Manco 0001, Giorgio Giacinto. [doi]
- Analysis and Study of a Cybersecurity Maturity Assessment System for SMEsStefano Bistarelli, Sara Geoli, Chiara Luchini, Ivan Mercanti. [doi]
- The informational disorder and Artificial Intelligence; between major insidies and possible contrasting toolsAndrea Ruffo. [doi]
- Cyber-DRIVE: Dynamic Risk Versatile Engine for Cyber Security Risk Analysis, Situational Awareness and Incident ResponseStefano Solari, Umberto Pedrotti, Enrico Castelli, Gianluca Ceccoli, Alessandro Oneto, Enrico Russo. [doi]
- A Classification of Malware Sandboxes and Their ArchitecturesStefano Bistarelli, Emanuele Burberi, Francesco Santini 0001. [doi]
- Attack Originality Detector Using Machine LearningCharlotte Millan, Lotfi Chaâri, Amel Aissaoui, Eric Gilbert. [doi]
- LLM-based Fact-Checking: A Pipeline for Studying Information DisorderGabriele Fioretti, Lorenzo Goglia, Eugenio Zimeo. [doi]
- Improving MQTT Security Through the Generation of Malicious Test CasesCamilla Cespi Polisiani, Maria Carla Calzarossa, Marco Zuppelli, Luca Caviglione, Massimo Guarascio 0001. [doi]
- Multi-Domain Fake News Detection Exploiting Ensemble Learning TechniquesFarwa Batool, Giuseppe Lo Re, Marco Morana, Mario Tortorici. [doi]
- A Comparative Analysis of Datasets for Intrusion Detection in Software-Defined NetworksFrancesco Di Gennaro, Alessandro Cucchiarelli, Christian Morbidoni, Luca Spalazzi. [doi]
- Advancing Ethical Hacking with AI: A Linux-Based Experimental StudyHaitham S. Al-Sinani, Nabil Sahli, Chris J. Mitchell, Mohamed Al-Siyabi. [doi]
- Exposing the Cracks: A Case Study on the Quality of Public Linux Malware Data SetsAlessandro Sanna, Daniele Canavese, Leonardo Regano, Davide Maiorca, Giorgio Giacinto. [doi]
- VFSMon: an Innovative Reference Monitor in LinuxEdoardo Manenti, Pasquale Caporaso, Giuseppe Bianchi 0001, Francesco Quaglia. [doi]
- Securing Telephone Communication with Trusted ServicesFrancesco Buccafurri, Vincenzo De Angelis, Sara Lazzaro, Carmen Licciardi. [doi]
- Automated Analysis of Key Management PoliciesMatteo Busi 0001, Riccardo Focardi, Sana Gul, Flaminia L. Luccio. [doi]
- Micro-Mobility Security: A Holistic Approach via Mobile App AnalysisMarco Balossini, Michele Carminati, Stefano Zanero, Stefano Longari. [doi]
- Key challenges in LoRaWAN-based Edge-Cloud infrastructures for security-sensitive smart cities applicationsMaurizio Giacobbe, Ida Falco, Sarah Zanafi, Carmine Colarusso, Jiregna Abdissa Olana, Antonio Puliafito, Eugenio Zimeo. [doi]
- Cross-chain Smart Contracts and dApps Verification by Static Analysis: Limits and ChallengesLuca Olivieri, Aradhita Mukherjee, Nabendu Chaki, Agostino Cortesi. [doi]
- On the Usage of ChatGPT for Integrating CAPEC Attacks into ADVISE Meta OntologyMarzieh Kordi, Francesco Mariotti, Paolo Lollini, Roberto Magrini, Andrea Bondavalli. [doi]
- The Security of Quantum Computing in 6G: from Technical Perspectives to Ethical ImplicationsLuca Barbieri, Abdelkrim Menina, Riccardo Bassoli, Frank H. P. Fitzek. [doi]
- Finding Vulnerabilities in Solidity Smart Contracts with In-Context LearningBadaruddin Chachar, Marc Cavazza, Andrea Bracciali, Pietro Ferrara 0001, Agostino Cortesi. [doi]
- A Proportional Approach to Cybersecurity Challanges in the Financial Sector: Ideas from Post-Quantum Cryptography Legal AnalysisMaria Gagliardi, Chiara D'Elia. [doi]
- Managing Concept Drift in Online Intrusion Detection Systems with Active LearningFrancesco Camarda, Alessandra De Paola, Salvatore Drago, Pierluca Ferraro, Giuseppe Lo Re. [doi]
- Children and Artificial Intelligence. Towards an Italian Discussion on Artificial Intelligence, Children's Rights and Regulatory SandboxesSara Tibidò, Nadia Spatari, Azzurra Ragone. [doi]
- CANter: Data-Link Layer Detection of Drop-and-Spoof Attacks on CAN and CAN FDStefano Longari, Gregorio Galletti, Jan Holle, Stefano Zanero. [doi]
- Unveiling Attack Patterns from CTF Network Logs with Process Mining TechniquesFrancesco Romeo, Francesco Blefari, Francesco Aurelio Pironti, Angelo Furfaro. [doi]
- Challenging Antivirus against Elusive Android Malware over TimeDanilo Dell'Orco, Lorenzo Valeriani, Giuseppe Bianchi 0001, Alessandro Pellegrini 0001, Alessio Merlo. [doi]
- Digital Authoritarianism: ICT-enabled Repression Across Regime TypesMartina Lucaccini. [doi]
- Integrating OpenTitan as a Security Controller for Cryptographic Tasks in RISC-V SoCsAlberto Musa, Emanuele Parisi, Luca Barbierato, Edoardo Patti, Andrea Acquaviva, Francesco Barchi. [doi]
- Enhancing Training Time for Sustainability of Intrusion Detection Systems based on Machine LearningIsabella Marasco, Karina Chichifoi, Silvio Russo, Claudio Zanasi. [doi]
- Real-Time Anomaly Detection in Docker Containers: A Continuous Learning Approach Using SF-SOINNDennis Glenn Ejeh, Gian Luca Foresti, Marino Miculan, Axel De Nardin. [doi]
- A Deep Learning Approach for False Data Injection Attacks Detection in Smart Water InfrastructureDavide Giannubilo, Tommaso Giorgeschi, Michele Carminati, Stefano Zanero, Stefano Longari. [doi]
- Understanding Regression in Continual Learning for Malware DetectionDaniele Ghiani, Daniele Angioni, Angelo Sotgiu, Maura Pintor, Battista Biggio. [doi]
- Confidential Computing: A Security Overview and Future Research DirectionsAlessandro Bertani, Danilo Caraccio, Stefano Zanero, Mario Polino. [doi]
- Advancing Internet-Connected Devices Posture Analysis with a Meta-Search Engine: A Case Study in Energy SystemsAndrea Bernardini, Mario Lezoche, Simone Angelini, Giovanna Dondossola, Roberta Terruggia. [doi]
- A GPU Covert Channel Based on Workload Manipulation Through the CuPy LibraryGianluca De Lucia, Alessio Merlo, Luca Caviglione. [doi]
- Optimizing 5G Protocol Fuzzing: Structure-Aware Techniques and Feedback IntegrationSara Da Canal, Francesco Mancini, Luca Mastrobattista, Giuseppe Bianchi. [doi]
- A Stackelberg Approach to Federated Learning for Malware DetectionAndrea Augello, Alessandra De Paola, Giuseppe Lo Re, Marena Jestin. [doi]
- Preventing Disinformation Spread Across Network Clusters by Strategic Edge Deletions: a Lagrangian HeuristicMartina Cerulli, Manlio Gaudioso, Domenico Serra, Carmine Sorgente. [doi]
- Towards the Responsible/Trustworthy AI in Multi-Domain Operations for Cyber Social Security: A Black-Box AML Case Study in the CAN Bus Frame Detection TaskVita Santa Barletta, Danilo Caivano, Christian Catalano, Samuele del Vescovo, Michele Scalera. [doi]