Zobrazeno 1 - 10
of 1 928
pro vyhledávání: '"Massacci, A."'
Autor:
Nicoletti, Stefano M., Lopuhaä-Zwakenberg, Milan, Stoelinga, Mariëlle, Massacci, Fabio, Budde, Carlos E.
The landscape of cyber threats grows more complex by the day. Advanced Persistent Threats carry out systematic attack campaigns against which cybersecurity practitioners must defend. Examples of such organized attacks are operations Dream Job, Wocao,
Externí odkaz:
http://arxiv.org/abs/2410.06692
The use of AI technologies is percolating into the secure development of software-based systems, with an increasing trend of composing AI-based subsystems (with uncertain levels of performance) into automated pipelines. This presents a fundamental re
Externí odkaz:
http://arxiv.org/abs/2407.14540
Autor:
Klemmer, Jan H., Horstmann, Stefan Albert, Patnaik, Nikhil, Ludden, Cordelia, Burton Jr., Cordell, Powers, Carson, Massacci, Fabio, Rahman, Akond, Votipka, Daniel, Lipford, Heather Richter, Rashid, Awais, Naiakshina, Alena, Fahl, Sascha
Following the recent release of AI assistants, such as OpenAI's ChatGPT and GitHub Copilot, the software industry quickly utilized these tools for software development tasks, e.g., generating code or consulting AI for advice. While recent research ha
Externí odkaz:
http://arxiv.org/abs/2405.06371
Analyzing and Mitigating (with LLMs) the Security Misconfigurations of Helm Charts from Artifact Hub
Background: Helm is a package manager that allows defining, installing, and upgrading applications with Kubernetes (K8s), a popular container orchestration platform. A Helm chart is a collection of files describing all dependencies, resources, and pa
Externí odkaz:
http://arxiv.org/abs/2403.09537
Context: Software of different functional categories, such as text processing vs. networking, has different profiles in terms of metrics like security and updates. Using popularity to compare e.g. Java vs. Python libraries might give a skewed perspec
Externí odkaz:
http://arxiv.org/abs/2403.06300
Publikováno v:
IEEE Transactions on Information Forensics and Security, 2023
[Context] Researchers analyze underground forums to study abuse and cybercrime activities. Due to the size of the forums and the domain expertise required to identify criminal discussions, most approaches employ supervised machine learning techniques
Externí odkaz:
http://arxiv.org/abs/2308.09413
Autor:
Massacci, Fabio, Di Tizio, Giorgio
Publikováno v:
Communications of the ACM 66, 1 (2023)
A dilemma worth Shakespeare's Hamlet is increasingly haunting companies and security researchers: ``to update or not to update, this is the question``. From the perspective of recommended common practices by software vendors the answer is unambiguous
Externí odkaz:
http://arxiv.org/abs/2306.07355
Making sure that users understand privacy policies that impact them is a key challenge for a real GDPR deployment. Research studies are mostly carried in English, but in Europe and elsewhere, users speak a language that is not English. Replicating st
Externí odkaz:
http://arxiv.org/abs/2302.05355
Autor:
Ciclosi, Francesco, Massacci, Fabio
Among all cybersecurity and privacy workers, the Data Protection Officer (DPO) stands between those auditing a company's compliance and those acting as management advisors. A person that must be somehow versed in legal, management, and cybersecurity
Externí odkaz:
http://arxiv.org/abs/2212.07712
Autor:
Giorgia Massacci, Veronica Venafra, Maximilian Zwiebel, Maria Wahle, Rocco Cerroni, Jacopo Bissacco, Livia Perfetto, Vito Michienzi, Alessandro Stefani, Nicola Biagio Mercuri, Tommaso Schirinzi, Francesca Sacco
Publikováno v:
Neurobiology of Disease, Vol 200, Iss , Pp 106622- (2024)
The complexity and heterogeneity of PD necessitate advanced diagnostic and prognostic tools to elucidate its molecular mechanisms accurately. In this study, we addressed this challenge by conducting a pilot phospho-proteomic analysis of peripheral bl
Externí odkaz:
https://doaj.org/article/950cc03d9ec44c17b6dac7150ecc5c5c