Zobrazeno 1 - 10
of 48
pro vyhledávání: '"Compagna, Luca"'
Autor:
Scano, Christian, Floris, Giuseppe, Montaruli, Biagio, Demetrio, Luca, Valenza, Andrea, Compagna, Luca, Ariu, Davide, Piras, Luca, Balzarotti, Davide, Biggio, Battista
ModSecurity is widely recognized as the standard open-source Web Application Firewall (WAF), maintained by the OWASP Foundation. It detects malicious requests by matching them against the Core Rule Set (CRS), identifying well-known attack patterns. E
Externí odkaz:
http://arxiv.org/abs/2406.13547
Autor:
Montaruli, Biagio, Demetrio, Luca, Pintor, Maura, Compagna, Luca, Balzarotti, Davide, Biggio, Battista
Machine-learning phishing webpage detectors (ML-PWD) have been shown to suffer from adversarial manipulations of the HTML code of the input webpage. Nevertheless, the attacks recently proposed have demonstrated limited effectiveness due to their lack
Externí odkaz:
http://arxiv.org/abs/2310.03166
Autor:
Montaruli, Biagio, Demetrio, Luca, Valenza, Andrea, Compagna, Luca, Ariu, Davide, Piras, Luca, Balzarotti, Davide, Biggio, Battista
ModSecurity is widely recognized as the standard open-source Web Application Firewall (WAF), maintained by the OWASP Foundation. It detects malicious requests by matching them against the Core Rule Set, identifying well-known attack patterns. Each ru
Externí odkaz:
http://arxiv.org/abs/2308.04964
Publikováno v:
ESORICS 2020: Computer Security (2020) 23-41
Modern web applications often rely on third-party services to provide their functionality to users. The secure integration of these services is a non-trivial task, as shown by the large number of attacks against Single Sign On and Cashier-as-a-Servic
Externí odkaz:
http://arxiv.org/abs/2101.06043
Autor:
Armando, Alessandro, Carbone, Roberto, Compagna, Luca, Cuéllar, Jorge, Pellegrino, Giancarlo, Sorniotti, Alessandro
Publikováno v:
In Computers & Security March 2013 33:41-58
Autor:
Armando, Alessandro, Compagna, Luca
Publikováno v:
In Electronic Notes in Theoretical Computer Science 3 March 2005 125(1):91-108
Autor:
Armando, Alessandro1 armando@dist.unige.it, Compagna, Luca compa@dist.unige.it
Publikováno v:
International Journal of Information Security. Jan2008, Vol. 7 Issue 1, p3-32. 30p. 6 Diagrams, 8 Charts.
Autor:
Sabetta, Antonino, Compagna, Luca, Ponta, Serena, Dashevskyi, Stanislav, Santos, Daniel Ricardo dos, Massacci, Fabio
Publikováno v:
Sabetta, A, Compagna, L, Ponta, S, Dashevskyi, S, Santos, D R D & Massacci, F Jan. 01 2015, MULTI-CONTEXT EXPLOIT TEST MANAGEMENT, Patent No. US9811668B2 .
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::aa47e866bdc6631b2b1671f70d8759ac
https://research.vu.nl/en/publications/2de52cdd-9ebc-4e91-a437-d0b6564f8db7
https://research.vu.nl/en/publications/2de52cdd-9ebc-4e91-a437-d0b6564f8db7
Publikováno v:
Book chapter N°10 in "Digital Identity and Access Management: Technologies and Framework", Business Science Reference, Editors: Raj Sharman, R., Das Smith, S, Gupta, M, December 2011, ISBN: 978-1613504987
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1093::817c663c835507bfddaca8df09424c4d
http://www.eurecom.fr/publication/3552
http://www.eurecom.fr/publication/3552
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.