Nino Vincenzo Verde
Title
Cited by
Cited by
Year
Security in wireless ad-hoc networks–a survey
R Di Pietro, S Guarino, NV Verde, J Domingo-Ferrer
Computer Communications 51, 1-20, 2014
1542014
Analyzing android encrypted network traffic to identify user actions
M Conti, LV Mancini, R Spolaor, NV Verde
IEEE Transactions on Information Forensics and Security 11 (1), 114-125, 2015
1362015
Can't you hear me knocking: Identification of user actions on android apps via traffic analysis
M Conti, LV Mancini, R Spolaor, NV Verde
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
762015
A formal framework to elicit roles with business meaning in RBAC systems
A Colantonio, R Di Pietro, A Ocello, NV Verde
Proceedings of the 14th ACM symposium on Access control models and …, 2009
692009
Visual role mining: A picture is worth a thousand roles
A Colantonio, R Di Pietro, A Ocello, NV Verde
IEEE Transactions on Knowledge and Data Engineering 24 (6), 1120-1133, 2011
532011
No NAT'd user left behind: Fingerprinting users behind NAT from NetFlow records alone
NV Verde, G Ateniese, E Gabrielli, LV Mancini, A Spognardi
2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014
452014
A new role mining framework to elicit business roles and to mitigate enterprise risk
A Colantonio, R Di Pietro, A Ocello, NV Verde
Decision Support Systems 50 (4), 715-731, 2011
442011
Taming role mining complexity in RBAC
A Colantonio, R Di Pietro, A Ocello, NV Verde
Computers & Security 29 (5), 548-564, 2010
432010
ABBA: Adaptive bicluster-based approach to impute missing values in binary matrices
A Colantonio, R Di Pietro, A Ocello, NV Verde
Proceedings of the 2010 ACM Symposium on Applied Computing, 1026-1033, 2010
292010
Epidemic data survivability in unattended wireless sensor networks
R Di Pietro, NV Verde
Proceedings of the fourth ACM conference on Wireless network security, 11-22, 2011
262011
A business-driven decomposition methodology for role mining
A Colantonio, R Di Pietro, NV Verde
Computers & Security 31 (7), 844-855, 2012
252012
Mining stable roles in RBAC
A Colantonio, R Di Pietro, A Ocello, NV Verde
IFIP International Information Security Conference, 259-269, 2009
252009
Role engineering: from theory to practice
NV Verde, J Vaidya, V Atluri, A Colantonio
Proceedings of the second ACM conference on Data and Application Security …, 2012
242012
A probabilistic bound on the basic role mining problem and its applications
A Colantonio, R Di Pietro, A Ocello, NV Verde
IFIP International Information Security Conference, 376-386, 2009
232009
On the fast fading Gaussian wiretap channel with statistical channel state information at the transmitter
PH Lin, E Jorswieck
IEEE Transactions on Information Forensics and Security 11 (1), 46-58, 2015
212015
Introducing epidemic models for data survivability in unattended wireless sensor networks
R Di Pietro, NV Verde
2011 IEEE International Symposium on a World of Wireless, Mobile and …, 2011
192011
Mining business-relevant RBAC states through decomposition
A Colantonio, R Di Pietro, A Ocello, NV Verde
IFIP International Information Security Conference, 19-30, 2010
162010
Bypassing censorship: A proven tool against the recent internet censorship in Turkey
A Di Florio, NV Verde, A Villani, D Vitali, LV Mancini
2014 IEEE International Symposium on Software Reliability Engineering …, 2014
152014
No place to hide that bytes won’t reveal: Sniffing location-based encrypted traffic to track a user’s position
G Ateniese, B Hitaj, LV Mancini, NV Verde, A Villani
International Conference on Network and System Security, 46-59, 2015
132015
Track me if you can: Transparent obfuscation for location based services
R Di Pietro, R Mandati, NV Verde
2013 IEEE 14th International Symposium on" A World of Wireless, Mobile and …, 2013
122013
The system can't perform the operation now. Try again later.
Articles 1–20