Antonio Villani
Antonio Villani
Geverifieerd e-mailadres voor
Geciteerd door
Geciteerd door
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers
G Ateniese, LV Mancini, A Spognardi, A Villani, D Vitali, G Felici
International Journal of Security and Networks 10 (3), 137-150, 2015
CUDA leaks: a detailed hack for CUDA and a (partial) fix
RD Pietro, F Lombardi, A Villani
ACM Transactions on Embedded Computing Systems (TECS) 15 (1), 1-25, 2016
CUDA leaks: Information leakage in GPU architectures
R Di Pietro, F Lombardi, A Villani
arXiv preprint arXiv:1305.7383, 2013
Obfuscation of sensitive data in network flows
D Riboni, A Villani, D Vitali, C Bettini, LV Mancini
2012 Proceedings IEEE INFOCOM, 2372-2380, 2012
Bypassing censorship: A proven tool against the recent internet censorship in Turkey
A Di Florio, NV Verde, A Villani, D Vitali, LV Mancini
2014 IEEE International Symposium on Software Reliability Engineering …, 2014
No place to hide that bytes won’t reveal: Sniffing location-based encrypted traffic to track a user’s position
G Ateniese, B Hitaj, LV Mancini, NV Verde, A Villani
International Conference on Network and System Security, 46-59, 2015
The impact of GPU-assisted malware on memory forensics: A case study
D Balzarotti, R Di Pietro, A Villani
Digital Investigation 14, S16-S24, 2015
Obfuscation of sensitive data for incremental release of network flows
D Riboni, A Villani, D Vitali, C Bettini, LV Mancini
IEEE/ACM Transactions on Networking 23 (2), 672-686, 2014
Large-scale traffic anomaly detection: Analysis of real netflow datasets
A Spognardi, A Villani, D Vitali, LV Mancini, R Battistoni
International Conference on E-Business and Telecommunications, 192-208, 2012
DDoS Detection with Information Theory Metrics and Netflows-A Real Case.
D Vitali, A Villani, A Spognardi, R Battistoni, LV Mancini
SECRYPT, 172-181, 2012
Obsidian: a scalable and efficient framework for NetFlow obfuscation
A Villani, D Riboni, D Vitali, C Bettini, LV Mancini
2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2013
Relieve Internet routing security of public key infrastructure
LV Mancini, A Spognardi, C Soriente, A Villani, D Vitali
2012 21st International Conference on Computer Communications and Networks …, 2012
MhRep: Multi-hop replication scheme for data survival in unattended wireless sensor networks
D Vitali, A Spognardi, A Villani, LV Mancini
2011 IEEE 30th Symposium on Reliable Distributed Systems Workshops, 42-51, 2011
Uniqueness of the file systems genome: Supporting arguments and massive experimental measurements
R Di Pietro, LV Mancini, A Villani, D Vitali
2013 International Conference on Risks and Security of Internet and Systems …, 2013
Mapping the File Systems Genome: rationales, technique, results and applications
R Di Pietro, LV Mancini, A Villani, D Vitali
arXiv preprint arXiv:1306.2833, 2013
FAN: FAst Netflow analyser
A Cosentino, A Spognardi, A Villani, D Vitali, LV Mancini
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–16