Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Cambiaso, E."'
Publikováno v:
Italian Conference on CyberSecurity (ITASEC21), pp. 35–46, Online, 07-09/04/2021
info:cnr-pdr/source/autori:Vaccari I.; Narteni S.; Mongelli M.; Aiello M.; Cambiaso E./congresso_nome:Italian Conference on CyberSecurity (ITASEC21)/congresso_luogo:Online/congresso_data:07-09%2F04%2F2021/anno:2021/pagina_da:35/pagina_a:46/intervallo_pagine:35–46
info:cnr-pdr/source/autori:Vaccari I.; Narteni S.; Mongelli M.; Aiello M.; Cambiaso E./congresso_nome:Italian Conference on CyberSecurity (ITASEC21)/congresso_luogo:Online/congresso_data:07-09%2F04%2F2021/anno:2021/pagina_da:35/pagina_a:46/intervallo_pagine:35–46
Security of the Internet of Things is a crucial topic, due to the criticality of the networks and the sensitivity of exchanged data. In this paper, we evaluate the adoption of IoT devices to execute cyber-threats by using a specific Wi-Fi module call
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=cnr_________::4a54482ea8faff3f4bcd1eacd66e283a
http://www.scopus.com/record/display.url?eid=2-s2.0-85114925745&origin=inward
http://www.scopus.com/record/display.url?eid=2-s2.0-85114925745&origin=inward
Publikováno v:
Journal of internet services and information security
11 (2021): 30–46. doi:10.22667/JISIS.2021.08.31.030
info:cnr-pdr/source/autori:Narteni S.; Vaccari I.; Mongelli M.; Aiello M.; Cambiaso E./titolo:Evaluating the possibility to perpetrate tunneling attacks exploiting short-message-service/doi:10.22667%2FJISIS.2021.08.31.030/rivista:Journal of internet services and information security (Print)/anno:2021/pagina_da:30/pagina_a:46/intervallo_pagine:30–46/volume:11
11 (2021): 30–46. doi:10.22667/JISIS.2021.08.31.030
info:cnr-pdr/source/autori:Narteni S.; Vaccari I.; Mongelli M.; Aiello M.; Cambiaso E./titolo:Evaluating the possibility to perpetrate tunneling attacks exploiting short-message-service/doi:10.22667%2FJISIS.2021.08.31.030/rivista:Journal of internet services and information security (Print)/anno:2021/pagina_da:30/pagina_a:46/intervallo_pagine:30–46/volume:11
In the cyber-security context, tunneling systems are exploited to bypass network restrictions to com-municate outside of the targeted perimeter, without being detected. Such attacks represent a serious threat for the victim network, as they exploit l
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=cnr_________::a0a7ce94e026502c5f3bc813393a86b0
http://www.scopus.com/record/display.url?eid=2-s2.0-85114870115&origin=inward
http://www.scopus.com/record/display.url?eid=2-s2.0-85114870115&origin=inward
Publikováno v:
ITASEC19, Pisa, Italy, 12-15/02/2019
info:cnr-pdr/source/autori:Enrico Cambiaso, Ivan Vaccari, Luca Patti, Maurizio Aiello/congresso_nome:ITASEC19/congresso_luogo:Pisa, Italy/congresso_data:12-15%2F02%2F2019/anno:2019/pagina_da:/pagina_a:/intervallo_pagine
Scopus-Elsevier
info:cnr-pdr/source/autori:Enrico Cambiaso, Ivan Vaccari, Luca Patti, Maurizio Aiello/congresso_nome:ITASEC19/congresso_luogo:Pisa, Italy/congresso_data:12-15%2F02%2F2019/anno:2019/pagina_da:/pagina_a:/intervallo_pagine
Scopus-Elsevier
In the darknet security topic, it is important to analyze the threats that characterize the network. This paper deeply investigates the literature of attacks against the Tor network, presenting the most relevant threats in this context. In order to p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::82cfbf4b61af191022003f2e71da1d4c
http://www.cnr.it/prodotto/i/400082
http://www.cnr.it/prodotto/i/400082
Autor:
Baldoni, R., De Nicola, R., Prinetto, P., Anglano, C., Aniello, L., Antinori, A., Armando, A., Aversa, R., Baldi, Marco, Barili, A., Bartoletti, M., Bellini, M., Bergadano, F., Bernardeschi, C., Bianchi, E., Biancotti, C., Bistarelli, S., Blefari Melazzi, N., Boetti, M., Bondavalli, A., Bonomi, ., Buccafurri, F., Cambiaso, E., Caputo, B., Carminati, B., Cataliotti, F. S., Catarci, T., Ceccarelli, A., Cesa Bianchi, N., Chiaraluce, F., Colajanni, M., Conti, M., Coppolino, L., Costa, G., Costamagna, V., Cotroneo, D., Crispo, B., Cucchiara, R., D’Antonio, S., Damiani, E., De Santis, A., Di Battista, G., Di Martino, B., Degiovanni, I. P., Demetrescu, C., Di Corinto, A., Di Luna, A., Di Natale, G., Dini, G., Evangelisti, M., Falcinelli, D., Figà, G., Ferretti, M., Ficco, M., Flocchini, P., Flottes, M., Focardi, R., Furfaro, Franchina., Girdinio, P., Guida, F., Italiano, G. F., Lain, D., Laurenti, N., Lioy, A., Loreti, M., Malerba, D., Mancini, L. V., Marchetti Spaccamela, A., Marcialis, G., Margheri, A., Marrella, A., Martinelli, F., Martinelli, M., Martino, L., Massacci, F., Mayer, M., Mecella, M., Mensi, M., Merlo, A., Miculan, M., Montanari, L., Morana, M., Mosco, G. D., Mostarda, L., Murino, V., Nardi, D., Navigli, R., Palazzi, A., Palmieri, F., Panetta, I. C., Passarella, A., Pellegrini, A., Pelosi, G., Pellegrino, G., Pirlo, G., Piuri, V., Pizzonia, M., Pogliani, M., Polino, M., Pontil, M., Quaglia, F., Quattrociocchi, W., Querzoni, L., Rak, M., Ranise, S., Ricci, E., Rossi, L., Rota, P., Russo, L. O., Samarati, P., Santoro, N., Santucci, B., Sassone, V., Scala, A., Scotti, F., Servida, A., Spagnoletti, P., Spalazzi, L., Spidalieri, F., Spoto, A., Squarcina, M., Stefanelli, S., Vecchio, A., Venticinque, S., Villoresi, P., Visaggio, A., Vitaletti, A., Zanero, S.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______3686::d33606d285794e02ca75a3d4e3e788df
http://hdl.handle.net/11573/1212349
http://hdl.handle.net/11573/1212349
Publikováno v:
2015 IEEE International Conference on Communications (ICC); 2015, p7204-7209, 6p
Publikováno v:
2014 International Carnahan Conference on Security Technology (ICCST); 2014, p1-6, 6p
Autor:
Bernabe, J. B., Molina, A., Skarmeta, A., Bianchi, S., Cambiaso, E., Vaccari, I., Silvia Scaglione, Aiello, M., Trapero, R., Bouet, M., Belabed, D., Bagaa, M., Addad, R., Taleb, T., Rivera, D., Mady, A. E-D, Rodriguez, A. Q., Crettaz, C., Ziegler, S., Kim, E., Filipponi, M., Bajic, B., Garcia-Carrillo, D., Marin-Perez, R.
Publikováno v:
Scopus-Elsevier
CIÊNCIAVITAE
CIÊNCIAVITAE
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::334676e5140bedb4254f96ef14a69010
http://www.scopus.com/inward/record.url?eid=2-s2.0-85106630877&partnerID=MN8TOARS
http://www.scopus.com/inward/record.url?eid=2-s2.0-85106630877&partnerID=MN8TOARS
Autor:
Bernabe, J. B., Molina, A., Skarmeta, A., Bianchi, S., Cambiaso, E., Vaccari, I., Scaglione, S., Aiello, M., Trapero, R., Bouet, M., Belabed, D., Bagaa, M., Addad, R., Taleb, T., Rivera, D., Mady, A. E-D, Rodriguez, A. Q., Crettaz, C., Ziegler, S., Kim, E., Filipponi, M., Bajic, B., Garcia-Carrillo, D., Rafael Marin-Perez
Publikováno v:
Scopus-Elsevier
Challenges in Cybersecurity and Privacy-the European Research Landscape ISBN: 9781003337492
Challenges in Cybersecurity and Privacy-the European Research Landscape, edited by Jorge Bernal Bernabe, Antonio Skarmeta, pp. 23–53, 2019
info:cnr-pdr/source/autori:Jorge Bernal Bernabe, Alejandro Molina, Antonio Skarmeta, Stefano Bianchi, Enrico Cambiaso, Ivan Vaccari, Silvia Scaglione, Maurizio Aiello, Rubén Trapero, Mathieu Bouet, Dallal Belabed, Miloud Bagaa, Rami Addad, Tarik Taleb, Diego Rivera, Alie El-Din Mady, Adrian Quesada Rodriguez, Cédric Crettaz, Sébastien Ziegler, Eunah Kim, Matteo Filipponi, Bojana Bajic, Dan Garcia-Carrillo, Rafael Marin-Perez/titolo:Key Innovations in ANASTACIA: Advanced Networked Agents for Security and Trust Assessment in CPS%2FIOT Architectures/titolo_volume:Challenges in Cybersecurity and Privacy-the European Research Landscape/curatori_volume:Jorge Bernal Bernabe, Antonio Skarmeta/editore:/anno:2019
Challenges in Cybersecurity and Privacy-the European Research Landscape ISBN: 9781003337492
Challenges in Cybersecurity and Privacy-the European Research Landscape, edited by Jorge Bernal Bernabe, Antonio Skarmeta, pp. 23–53, 2019
info:cnr-pdr/source/autori:Jorge Bernal Bernabe, Alejandro Molina, Antonio Skarmeta, Stefano Bianchi, Enrico Cambiaso, Ivan Vaccari, Silvia Scaglione, Maurizio Aiello, Rubén Trapero, Mathieu Bouet, Dallal Belabed, Miloud Bagaa, Rami Addad, Tarik Taleb, Diego Rivera, Alie El-Din Mady, Adrian Quesada Rodriguez, Cédric Crettaz, Sébastien Ziegler, Eunah Kim, Matteo Filipponi, Bojana Bajic, Dan Garcia-Carrillo, Rafael Marin-Perez/titolo:Key Innovations in ANASTACIA: Advanced Networked Agents for Security and Trust Assessment in CPS%2FIOT Architectures/titolo_volume:Challenges in Cybersecurity and Privacy-the European Research Landscape/curatori_volume:Jorge Bernal Bernabe, Antonio Skarmeta/editore:/anno:2019
This book chapter presents the main key innovations being devised, implemented and validated in the scope of Anastacia H2020 EU research project, to meet the cybersecurity challenge of protecting dynamically heterogenous IoT scenarios, endowed with S
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::edb06864d76d6faa206acf4f0979f799
http://www.scopus.com/inward/record.url?eid=2-s2.0-85106630877&partnerID=MN8TOARS
http://www.scopus.com/inward/record.url?eid=2-s2.0-85106630877&partnerID=MN8TOARS
Autor:
Husnain M; Al-Khwarizmi Institute of Computer Science (KICS), University of Engineering and Technology (UET), Lahore 39161, Pakistan., Hayat K; Al-Khwarizmi Institute of Computer Science (KICS), University of Engineering and Technology (UET), Lahore 39161, Pakistan., Cambiaso E; Consiglio Nazionale delle Ricerche (CNR), IEIIT Institute, 16149 Genoa, Italy., Fayyaz UU; Al-Khwarizmi Institute of Computer Science (KICS), University of Engineering and Technology (UET), Lahore 39161, Pakistan., Mongelli M; Consiglio Nazionale delle Ricerche (CNR), IEIIT Institute, 16149 Genoa, Italy., Akram H; Al-Khwarizmi Institute of Computer Science (KICS), University of Engineering and Technology (UET), Lahore 39161, Pakistan., Ghazanfar Abbas S; Al-Khwarizmi Institute of Computer Science (KICS), University of Engineering and Technology (UET), Lahore 39161, Pakistan., Shah GA; Al-Khwarizmi Institute of Computer Science (KICS), University of Engineering and Technology (UET), Lahore 39161, Pakistan.
Publikováno v:
Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Jan 12; Vol. 22 (2). Date of Electronic Publication: 2022 Jan 12.
Autor:
Abbas SG; Al-Khwarizmi Institute of Computer Science (KICS), University of Engineering & Technology (UET), Lahore 54890, Pakistan., Vaccari I; Consiglio Nazionale delle Ricerche (CNR), IEIIT Institute, 16149 Genoa, Italy., Hussain F; Al-Khwarizmi Institute of Computer Science (KICS), University of Engineering & Technology (UET), Lahore 54890, Pakistan., Zahid S; Al-Khwarizmi Institute of Computer Science (KICS), University of Engineering & Technology (UET), Lahore 54890, Pakistan., Fayyaz UU; Al-Khwarizmi Institute of Computer Science (KICS), University of Engineering & Technology (UET), Lahore 54890, Pakistan., Shah GA; Al-Khwarizmi Institute of Computer Science (KICS), University of Engineering & Technology (UET), Lahore 54890, Pakistan., Bakhshi T; Department of Computer Science, National University of Computer and Emerging Sciences, Lahore 54000, Pakistan., Cambiaso E; Consiglio Nazionale delle Ricerche (CNR), IEIIT Institute, 16149 Genoa, Italy.
Publikováno v:
Sensors (Basel, Switzerland) [Sensors (Basel)] 2021 Jul 14; Vol. 21 (14). Date of Electronic Publication: 2021 Jul 14.