Sfoglia per Autore
A field study of computer-security perceptions using anti-virus customer-support chats
2019-01-01 Sharif, M.; Roundy, K. A.; Dell'Amico, M.; Gates, C.; Kats, D.; Bauer, L.; Christin, N.
Discovery of computer system incidents to be remediated based on correlation between support interaction data and computer system telemetry data
2019-03-22 Roundy, Kevin A.; Sharif, Mahmood; Dell'Amico, Matteo; Gates, Christopher; Kats, Daniel; Chung, Dong
Malware fingerprinting on encrypted transport layer security (TLS) traffic
2019-03-27 Bilge, Leyla; Dell'Amico, Matteo
Systems and methods for protecting against password attacks by concealing the use of honeywords in password files
2019-12-18 Dell'Amico, Matteo
Webs of Trust: Choosing Who to Trust on the Internet
2020-01-01 Dell'Amico, M.
The Tangled Genealogy of IoT Malware
2020-01-01 Cozzi, E.; Vervier, P. -A.; Dell'Amico, M.; Shen, Y.; Bilge, L.; Balzarotti, D.
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships
2021-01-01 Sanchez-Rola, I.; Dell'Amico, M.; Balzarotti, D.; Vervier, P. -A.; Bilge, L.
MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations
2022-01-01 Camurati, Giovanni; Dell'Amico, Matteo; Standaert, François-Xavier
The Supermarket Model with Known and Predicted Service Times
2022-01-01 Mitzenmacher, Michael; Dell'Amico, Matteo
An OS-agnostic approach to memory forensics
2023-01-01 Oliveri, Andrea; Dell'Amico, Matteo; Balzarotti, Davide
Unsupervised Detection and Clustering of Malicious TLS Flows
2023-01-01 Gomez, Gibran; Kotzias, Platon; Dell’Amico, Matteo; Bilge, Leyla; Caballero, Juan
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
A field study of computer-security perceptions using anti-virus customer-support chats | 1-gen-2019 | Sharif, M.; Roundy, K. A.; Dell'Amico, M.; Gates, C.; Kats, D.; Bauer, L.; Christin, N. | |
Discovery of computer system incidents to be remediated based on correlation between support interaction data and computer system telemetry data | 22-mar-2019 | Roundy, Kevin A.; Sharif, Mahmood; Dell'Amico, Matteo; Gates, Christopher; Kats, Daniel; Chung, Dong | |
Malware fingerprinting on encrypted transport layer security (TLS) traffic | 27-mar-2019 | Bilge, Leyla; Dell'Amico, Matteo | |
Systems and methods for protecting against password attacks by concealing the use of honeywords in password files | 18-dic-2019 | Dell'Amico, Matteo | |
Webs of Trust: Choosing Who to Trust on the Internet | 1-gen-2020 | Dell'Amico, M. | |
The Tangled Genealogy of IoT Malware | 1-gen-2020 | Cozzi, E.; Vervier, P. -A.; Dell'Amico, M.; Shen, Y.; Bilge, L.; Balzarotti, D. | |
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships | 1-gen-2021 | Sanchez-Rola, I.; Dell'Amico, M.; Balzarotti, D.; Vervier, P. -A.; Bilge, L. | |
MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations | 1-gen-2022 | Camurati, Giovanni; Dell'Amico, Matteo; Standaert, François-Xavier | |
The Supermarket Model with Known and Predicted Service Times | 1-gen-2022 | Mitzenmacher, Michael; Dell'Amico, Matteo | |
An OS-agnostic approach to memory forensics | 1-gen-2023 | Oliveri, Andrea; Dell'Amico, Matteo; Balzarotti, Davide | |
Unsupervised Detection and Clustering of Malicious TLS Flows | 1-gen-2023 | Gomez, Gibran; Kotzias, Platon; Dell’Amico, Matteo; Bilge, Leyla; Caballero, Juan |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile