Antonio Villani
Antonio Villani
Geverifieerd e-mailadres voor mat.uniroma3.it
Geciteerd door
Geciteerd door
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers
G Ateniese, LV Mancini, A Spognardi, A Villani, D Vitali, G Felici
International Journal of Security and Networks 10 (3), 137-150, 2015
CUDA leaks: a detailed hack for CUDA and a (partial) fix
RD Pietro, F Lombardi, A Villani
ACM Transactions on Embedded Computing Systems (TECS) 15 (1), 1-25, 2016
CUDA leaks: Information leakage in GPU architectures
R Di Pietro, F Lombardi, A Villani
arXiv preprint arXiv:1305.7383, 2013
Obfuscation of sensitive data for incremental release of network flows
D Riboni, A Villani, D Vitali, C Bettini, LV Mancini
IEEE/ACM Transactions on Networking 23 (2), 672-686, 2014
No place to hide that bytes won’t reveal: Sniffing location-based encrypted traffic to track a user’s position
G Ateniese, B Hitaj, LV Mancini, NV Verde, A Villani
Network and System Security: 9th International Conference, NSS 2015, New …, 2015
Bypassing censorship: A proven tool against the recent internet censorship in Turkey
A Di Florio, NV Verde, A Villani, D Vitali, LV Mancini
2014 IEEE International Symposium on Software Reliability Engineering …, 2014
The impact of GPU-assisted malware on memory forensics: A case study
D Balzarotti, R Di Pietro, A Villani
Digital Investigation 14, S16-S24, 2015
Large-scale traffic anomaly detection: Analysis of real netflow datasets
A Spognardi, A Villani, D Vitali, LV Mancini, R Battistoni
E-Business and Telecommunications: International Joint Conference, ICETE …, 2014
DDoS Detection with Information Theory Metrics and Netflows-A Real Case.
D Vitali, A Villani, A Spognardi, R Battistoni, LV Mancini
SECRYPT, 172-181, 2012
Relieve Internet routing security of public key infrastructure
LV Mancini, A Spognardi, C Soriente, A Villani, D Vitali
2012 21st International Conference on Computer Communications and Networks …, 2012
Obsidian: a scalable and efficient framework for NetFlow obfuscation
A Villani, D Riboni, D Vitali, C Bettini, LV Mancini
2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2013
MhRep: Multi-hop replication scheme for data survival in unattended wireless sensor networks
D Vitali, A Spognardi, A Villani, LV Mancini
2011 IEEE 30th Symposium on Reliable Distributed Systems Workshops, 42-51, 2011
Uniqueness of the file systems genome: Supporting arguments and massive experimental measurements
R Di Pietro, LV Mancini, A Villani, D Vitali
2013 International Conference on Risks and Security of Internet and Systems …, 2013
Mapping the File Systems Genome: rationales, technique, results and applications
R Di Pietro, LV Mancini, A Villani, D Vitali
arXiv preprint arXiv:1306.2833, 2013
Zero-Knowledge Proofs and Applications
A Villani
Large scale anomaly detection: an analysis of true netflow dataset
D Vitali, A Villani, A Spognardi, R Battistoni, LV Mancini
FAN: FAst Netflow analyser
A Cosentino, A Spognardi, A Villani, D Vitali, LV Mancini
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–17