Zobrazeno 1 - 10
of 48
pro vyhledávání: '"Gianluca Papaleo"'
Publikováno v:
International Journal of Computing and Digital Systems 4 (2015): 165–173. doi:10.12785/ijcds/040303
info:cnr-pdr/source/autori:Enrico Cambiaso, Gianluca Papaleo, Maurizio Aiello/titolo:Implementation of SlowDroid: Slow DoS Attack Performed by a Smartphone/doi:10.12785%2Fijcds%2F040303/rivista:International Journal of Computing and Digital Systems/anno:2015/pagina_da:165/pagina_a:173/intervallo_pagine:165–173/volume:4
info:cnr-pdr/source/autori:Enrico Cambiaso, Gianluca Papaleo, Maurizio Aiello/titolo:Implementation of SlowDroid: Slow DoS Attack Performed by a Smartphone/doi:10.12785%2Fijcds%2F040303/rivista:International Journal of Computing and Digital Systems/anno:2015/pagina_da:165/pagina_a:173/intervallo_pagine:165–173/volume:4
In terms of capabilities, today's smartphones are comparable to desktop computers. Last generation cellphones are indeed able to execute almost all the operation a common computer is able to accomplish. In this paper we focus on the use of mobile dev
Publikováno v:
International Journal of Communication Systems. 28:1987-2002
The use of covert-channel methods to bypass security policies has increased considerably in the recent years. Malicious users neutralize security restriction by encapsulating protocols like peer-to-peer, chat or http proxy into other allowed protocol
Publikováno v:
International Journal of Computing and Digital Systems 5 (2016): 31–42. doi:10.12785/ijcds/050104
info:cnr-pdr/source/autori:Enrico Cambiaso, Gianluca Papaleo, Giovanni Chiola, Maurizio Aiello/titolo:A Network Traffic Representation Model for Detecting Application Layer Attacks/doi:10.12785%2Fijcds%2F050104/rivista:International Journal of Computing and Digital Systems/anno:2016/pagina_da:31/pagina_a:42/intervallo_pagine:31–42/volume:5
info:cnr-pdr/source/autori:Enrico Cambiaso, Gianluca Papaleo, Giovanni Chiola, Maurizio Aiello/titolo:A Network Traffic Representation Model for Detecting Application Layer Attacks/doi:10.12785%2Fijcds%2F050104/rivista:International Journal of Computing and Digital Systems/anno:2016/pagina_da:31/pagina_a:42/intervallo_pagine:31–42/volume:5
Intrusion Detection Systems (IDS) play an important role in network security, protecting systems and infrastructures from malicious attacks. With the emerging of novel threats and offensive mechanisms, IDS require updates in order to efficiently dete
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::90aca8fabf37fef8976032d848a5b755
https://publications.cnr.it/doc/341915
https://publications.cnr.it/doc/341915
Publikováno v:
Future Internet of Things and Cloud Workshops (FiCloudW), IEEE International Conference on, pp. 270–275, Vienna, Austria, 22/08/2016, 24/08/2016
info:cnr-pdr/source/autori:Gianluca Papaleo, Enrico Cambiaso, Luca Patti, Maurizio Aiello/congresso_nome:Future Internet of Things and Cloud Workshops (FiCloudW), IEEE International Conference on/congresso_luogo:Vienna, Austria/congresso_data:22%2F08%2F2016, 24%2F08%2F2016/anno:2016/pagina_da:270/pagina_a:275/intervallo_pagine:270–275
FiCloud Workshops
info:cnr-pdr/source/autori:Gianluca Papaleo, Enrico Cambiaso, Luca Patti, Maurizio Aiello/congresso_nome:Future Internet of Things and Cloud Workshops (FiCloudW), IEEE International Conference on/congresso_luogo:Vienna, Austria/congresso_data:22%2F08%2F2016, 24%2F08%2F2016/anno:2016/pagina_da:270/pagina_a:275/intervallo_pagine:270–275
FiCloud Workshops
Mobile devices are nowadays adopted almost in every corner of the world. Being them crucial elements of people lives, in direct contact with their owners for the entire day and gathering sensitive information, they unwillingly attract cyber-criminals
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0abbc0390ae559371d353afb83d2b550
http://www.cnr.it/prodotto/i/359799
http://www.cnr.it/prodotto/i/359799
Publikováno v:
Computers & security 58 (2016): 268–283. doi:10.1016/j.cose.2016.02.005
info:cnr-pdr/source/autori:Paolo Farina, Enrico Cambiaso, Gianluca Papaleo, Maurizio Aiello/titolo:Are mobile botnets a possible threat? The case of SlowBot Net/doi:10.1016%2Fj.cose.2016.02.005/rivista:Computers & security/anno:2016/pagina_da:268/pagina_a:283/intervallo_pagine:268–283/volume:58
info:cnr-pdr/source/autori:Paolo Farina, Enrico Cambiaso, Gianluca Papaleo, Maurizio Aiello/titolo:Are mobile botnets a possible threat? The case of SlowBot Net/doi:10.1016%2Fj.cose.2016.02.005/rivista:Computers & security/anno:2016/pagina_da:268/pagina_a:283/intervallo_pagine:268–283/volume:58
In virtue of the large-scale diffusion of smartphones and tablets, a possible exploitation of such devices to execute cyber-attacks should be evaluated. This scenario is rarely considered by cyber-criminals, since mobile devices commonly represent a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::27a2882db07b1b7d33f487649b663195
http://www.cnr.it/prodotto/i/355603
http://www.cnr.it/prodotto/i/355603
Publikováno v:
Logic journal of the IGPL
24 (2016): 1–14. doi:10.1093/jigpal/jzw056
info:cnr-pdr/source/autori:Maurizio Aiello, Maurizio Mongelli, Enrico Cambiaso, Gianluca Papaleo/titolo:Profiling DNS tunneling attacks with PCA and mutual information/doi:10.1093%2Fjigpal%2Fjzw056/rivista:Logic journal of the IGPL (Print)/anno:2016/pagina_da:1/pagina_a:14/intervallo_pagine:1–14/volume:24
24 (2016): 1–14. doi:10.1093/jigpal/jzw056
info:cnr-pdr/source/autori:Maurizio Aiello, Maurizio Mongelli, Enrico Cambiaso, Gianluca Papaleo/titolo:Profiling DNS tunneling attacks with PCA and mutual information/doi:10.1093%2Fjigpal%2Fjzw056/rivista:Logic journal of the IGPL (Print)/anno:2016/pagina_da:1/pagina_a:14/intervallo_pagine:1–14/volume:24
The use of covert-channel methods to bypass security policies or leak sensitive data has increased in the last years. Malicious users neutralize security restriction through protocol encapsulation, tunneling peer-to-peer, chat, or HTTP packets into a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d46bee0f52ff7e7aa63da3edcc5f5b13
Publikováno v:
FiCloud
2015 3rd International Conference on Future Internet of Things and Cloud, pp. 614–619, Rome, Italy, 24-26/08/2015
info:cnr-pdr/source/autori:Paolo Farina, Enrico Cambiaso, Gianluca Papaleo, Maurizio Aiello/congresso_nome:2015 3rd International Conference on Future Internet of Things and Cloud/congresso_luogo:Rome, Italy/congresso_data:24-26%2F08%2F2015/anno:2015/pagina_da:614/pagina_a:619/intervallo_pagine:614–619
2015 3rd International Conference on Future Internet of Things and Cloud, pp. 614–619, Rome, Italy, 24-26/08/2015
info:cnr-pdr/source/autori:Paolo Farina, Enrico Cambiaso, Gianluca Papaleo, Maurizio Aiello/congresso_nome:2015 3rd International Conference on Future Internet of Things and Cloud/congresso_luogo:Rome, Italy/congresso_data:24-26%2F08%2F2015/anno:2015/pagina_da:614/pagina_a:619/intervallo_pagine:614–619
The recent proliferation of smartphones and tablets leads to consider such devices as means for the execution of cyber-attacks. This scenario has rarely been considered earlier, since mobile devices always represented a target for cyber-criminals, ra
Publikováno v:
ICUFN
the seventh International Conference on Ubiquitous and Future Networks (ICUFN 2015), pp. 597–602, Sapporo, Japan, 7-11/7/2015
info:cnr-pdr/source/autori:Papaleo, Gianluca; Cambiaso, Enrico; Farina, Paolo; Aiello, Maurizio/congresso_nome:the seventh International Conference on Ubiquitous and Future Networks (ICUFN 2015)/congresso_luogo:Sapporo, Japan/congresso_data:7-11%2F7%2F2015/anno:2015/pagina_da:597/pagina_a:602/intervallo_pagine:597–602
the seventh International Conference on Ubiquitous and Future Networks (ICUFN 2015), pp. 597–602, Sapporo, Japan, 7-11/7/2015
info:cnr-pdr/source/autori:Papaleo, Gianluca; Cambiaso, Enrico; Farina, Paolo; Aiello, Maurizio/congresso_nome:the seventh International Conference on Ubiquitous and Future Networks (ICUFN 2015)/congresso_luogo:Sapporo, Japan/congresso_data:7-11%2F7%2F2015/anno:2015/pagina_da:597/pagina_a:602/intervallo_pagine:597–602
Due to the recent evolution of mobile devices, the gap between smartphones and desktop computers has been reduced in the last year. Today, last generation smart devices can execute almost every activity associated to a common computer. In this paper