CAVIGLIONE, LUCA
 Distribuzione geografica
Continente #
AS - Asia 257
NA - Nord America 68
EU - Europa 54
SA - Sud America 1
Totale 380
Nazione #
SG - Singapore 250
US - Stati Uniti d'America 66
IT - Italia 47
NL - Olanda 4
CA - Canada 2
CN - Cina 2
IN - India 2
KR - Corea 2
AT - Austria 1
BR - Brasile 1
DE - Germania 1
FI - Finlandia 1
PH - Filippine 1
Totale 380
Città #
Singapore 181
Santa Clara 23
Turin 11
Milan 7
Bitonto 5
Cosenza 5
Alzano Lombardo 3
Ashburn 3
Bari 2
Delhi 2
Ottawa 2
Rome 2
Seoul 2
Florence 1
Forest City 1
Helsinki 1
Jatai 1
Nuremberg 1
Pesaro 1
Vienna 1
Viterbo 1
Totale 256
Nome #
Erasing the Shadow: Sanitization of Images with Malicious Payloads Using Deep Autoencoders 12
Detection of Network Covert Channels in IoT Ecosystems Using Machine Learning 11
A Few to Unveil Them All: Leveraging Mixture of Experts on Minimal Data for Detecting Covert Channels in Containerized Cloud Infrastructures 9
Scamming the Scammers: Using ChatGPT to Reply Mails for Wasting Time and Resources 7
The MAVIS System: Towards the Use of Marsupial Robotic Networks for Automatic Sensing in Polar Regions 6
IPv6CC: IPv6 Covert Channels for Testing Networks Against Stegomalware and Data Exfiltration 6
Kernel-level Tracing for Detecting Stegomalware and Covert Channels in Linux Environments 6
Seeing the unseen: revealing mobile malware hidden communications via energy consumption and artificial intelligence 5
A Long-term Perspective of the Internet Susceptibility to Covert Channels 5
Revealing MageCart-like Threats in Favicons via Artificial Intelligence 4
Performance evaluation of HTTP and SPDY over a DVB-RCS satellite link with different BoD schemes 4
A Federated Approach for Detecting Data Hidden in Icons of Mobile Applications Delivered via Web and Multiple Stores 4
ORISHA: Improving Threat Detection through Orchestrated Information Sharing 4
No Country for Leaking Containers: Detecting Exfiltration of Secrets Through AI and Syscalls 4
Ensembling Sparse Autoencoders for Network Covert Channel Detection in IoT Ecosystems 4
Using AI to face covert attacks in IoT and softwarized scenarios: challenges and opportunities 4
Strumenti Intelligenti per Threat Detection e Response 4
Satellites, UAVs, vehicles and sensors for an integrated delay tolerant ad hoc network 4
Deep Adversarial Learning on Google Home Devices 4
Analysis of Reversible Network Covert Channels 4
IPv6 Covert Channels in the Wild 4
Covert Channels in Personal Cloud Storage Services: the case of Dropbox 4
Deep Reinforcement Learning for Multi-Objective Placement of Virtual Machines in Cloud Datacenters 3
Sanitization of Images Containing Stegomalware via Machine Learning Approaches 3
Code Layering for the Detection of Network Covert Channels in Agentless Systems 3
Learning autoencoder ensembles for detecting malware hidden communications in IoT ecosystems 3
Code Augmentation for Detecting Covert Channels Targeting the IPv6 Flow Label 3
DockerChannel: A Framework for Evaluating Information Leakages of Docker Containers 3
Emerging Challenges and Perspectives in Deep Learning Model Security: A Brief Survey 3
Detecting Covert Channels Through Code Augmentation 3
Modellazione di servizi informatici di elaborazione in Piattaforme Informatiche di elaborazione virtualizzate e delocalizzate - Metodi e strategie per il deployment e l'integrazione efficiente e sicura di servizi in ambito Cloud 3
Does SPDY improve the Web 2.0 experience on satellite links? 3
Investigating Traffic of Smart Speakers and IoT Devices: Security Issues and Privacy Threats 3
pcapStego: A Tool for Generating Traffic Traces for Experimenting with Network Covert Channels 3
SPDY - A new paradigm in Web technologies: performance evaluation on a satellite link 3
Analysis, Development and Deployment of Statistical Anomaly Detection Techniques for real e-mail Traffic 3
Cyber Reconnaissance Techniques 3
Information Leakages of Docker Containers: Characterization and Mitigation Strategies 3
Federated Learning for the Efficient Detection of Steganographic Threats Hidden in Image Icons 3
A Revised Taxonomy of Steganography Embedding Patterns 3
Performance evaluation of SPDY over high latency satellite channels 3
Fine-hearing Google Home: why silence will not protect your privacy 3
Optimal control of time instants for task replanning in robotic networks 3
A control theoretic approach for energy-efficient management of Online Social Network services 3
Emerging Topics in Defending Networked Systems 3
Using SPDY to improve Web 2.0 over satellite links 3
Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection 3
Design of Framework for Safety and Resource Management of Converged Networks for Seaport Applications 3
You Can't Do That On Protocols Anymore: Analysis of Covert Channels in IETF Standards 2
Are you (Google) Home? Detecting Users Presence through Traffic Analysis of Smart Speakers 2
A graph-based approach to model privacy and security issues of online social networks 2
Optimization of a peer-to-peer system for efficient content replication over vehicular networks 2
Design, optimization and performance evaluation of a content distribution overlay for streaming 2
Multiobjective Placement for Secure and Dependable Smart Industrial Environments 2
Progetto ACIS - Advanced Cooperative Infomobility Systems 2
SPDY - A new paradigm in Web technologies: performance evaluation on a satellite link 2
Performance evaluation of SPDY over high latency satellite channels 2
Using P2P Overlays to Provide QoS in Service-Oriented Wireless Networks 2
Guest Editorial: Multidisciplinary Solutions to Modern Cybersecurity Challenges 2
Traffico Dropbox per la valutazione di metodi di steganografia e data-hiding 2
The New Threats of Information Hiding The Road Ahead 2
A p2p framework for distributed and cooperative laboratories 2
Exploiting IP telephony with silence suppression for hidden data transfers 2
Security Analysis and Architectural Requirements for the Deployment of Remote Instrumentation Services 2
A task allocation middleware for wireless sensor networks in a multi-agent environment 2
bccstego: A Framework for Investigating Network Covert Channels 2
Guest Editorial: Information Security Methodology and Replication Studies 2
Avoiding Research Tribal Wars Using Taxonomies 2
Guest Editorial: Information Security Methodology, Replication Studies and Information Security Education 2
Metodo per il controllo in tempo reale delle frequenze operative di infrastrutture hardware con elevato numero di macchine e con funzionalità eterogenee/aggregabili 2
A predictive control approach for energy-aware consolidation of virtual machines in cloud computing 2
Special Issue on Security and Trust Issues in Peer-To-Peer Networks Preface 2
Design of a Peer-to-Peer System for Optimized Content Replication 2
A taxonomy-based model of security and privacy in online social networks 2
Recent Advancements in Digital Forensics, Part 2 2
An Optimized Architecture for Supporting Data Streaming in Interactive Grids 2
Covert Channels in Transport Layer Security 2
The energy impact of security mechanisms in modern mobile devices 2
Risks and Opportunities for Information Hiding in DICOM Standard 2
Model predictive control for the placement of virtual machines in cloud computing applications 2
Trends and Challenges in Network Covert Channels Countermeasures 2
The Future of Digital Forensics: Challenges and the Road Ahead 2
Handling Local User Mobility and QoS in a Controlled Ad-Hoc Environment 2
Impatto degli aspetti di sicurezza sul consumo energetico di apparati TLC 2
A First Look at the Traffic of Siri 2
Detection of Steganographic Threats Targeting Digital Images in Heterogeneous Ecosystems Through Machine Learning 2
Characterizing SPDY over high latency satellite channels 2
File-Sharing Applications Engineering 2
Detection of Malicious Images in Production-Quality Scenarios with the SIMARGL Toolkit 2
Efficient Detection and Recovery of Malicious PowerShell Scripts Embedded into Digital Images 2
Programmable Data Gathering for Detecting Stegomalware 2
Sliding Mode Dynamic Management Techniques of Remote Sensors for Energy and Traffic Control Purposes 2
A deep analysis on future web technologies and protocols over broadband GEO satellite networks 2
Covert Channels in Transport Layer Security: Performance and Security Assessment 2
Education and Training in Grid-Enabled Laboratories and Complex Systems 2
Opportunities, integration and issues of applying new technologies over e-learning platforms 2
Extending HTTP models to Web 2.0 applications: The case of online social networks 2
Analysis and Development of Green-Aware Security Mechanisms for Modern Internet Applications 2
Performance evaluation of HTTP and SPDY over a DVB-RCS satellite link with different BoD schemes 2
Measuring the energy consumption of cyber security 2
Totale 301
Categoria #
all - tutte 3.128
article - articoli 1.301
book - libri 30
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 391
Totale 4.850


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2023/202434 0 0 0 0 0 0 0 0 20 0 7 7
2024/2025361 22 20 204 112 3 0 0 0 0 0 0 0
Totale 395