Seguir
Daniele Sgandurra
Daniele Sgandurra
Afiliación desconocida
Dirección de correo verificada de danielesgandurra.com - Página principal
Título
Citado por
Citado por
Año
A survey on security for mobile devices
M La Polla, F Martinelli, D Sgandurra
IEEE communications surveys & tutorials 15 (1), 446-471, 2012
7622012
MADAM: a multi-level anomaly detector for android malware
G Dini, F Martinelli, A Saracino, D Sgandurra
International Conference on Mathematical Methods, Models, and Architectures …, 2012
5482012
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention
A Saracino, D Sgandurra, G Dini, F Martinelli
IEEE Transactions on Dependable and Secure Computing, 2016
5142016
Lightweight classification of IoT malware based on image recognition
J Su, DV Vasconcellos, S Prasad, D Sgandurra, Y Feng, K Sakurai
2018 IEEE 42Nd annual computer software and applications conference (COMPSAC …, 2018
4172018
Automated dynamic analysis of ransomware: Benefits, limitations and use for detection
D Sgandurra, L Muñoz-González, R Mohsen, EC Lupu
arXiv preprint arXiv:1609.03020, 2016
3912016
Cloud security is not (just) virtualization security: a short paper
M Christodorescu, R Sailer, DL Schales, D Sgandurra, D Zamboni
Proceedings of the 2009 ACM workshop on Cloud computing security, 97-102, 2009
2942009
Evolution of attacks, threat models, and solutions for virtualized systems
D Sgandurra, E Lupu
ACM Computing Surveys (CSUR) 48 (3), 1-38, 2016
1202016
Exact inference techniques for the analysis of Bayesian attack graphs
L Muñoz-González, D Sgandurra, M Barrère, EC Lupu
IEEE Transactions on Dependable and Secure Computing 16 (2), 231-244, 2017
1102017
Hierarchical, model-based risk management of critical infrastructures
F Baiardi, C Telmon, D Sgandurra
Reliability Engineering & System Safety 94 (9), 1403-1415, 2009
732009
Risk analysis of Android applications: A user-centric solution
G Dini, F Martinelli, I Matteucci, M Petrocchi, A Saracino, D Sgandurra
722016
A new security middleware architecture based on fog computing and cloud to support IoT constrained devices
W Razouk, D Sgandurra, K Sakurai
Proceedings of the 1st international conference on internet of things and …, 2017
672017
Efficient attack graph analysis through approximate inference
L Munoz-Gonzalez, D Sgandurra, A Paudice, EC Lupu
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-30, 2017
622017
Building trustworthy intrusion detection through vm introspection
F Baiardi, D Sgandurra
Third International Symposium on Information Assurance and Security, 209-214, 2007
532007
Towards a Framework for Testing the Security of IoT Devices Consistently
G Lally, D Sgandurra
International Workshop on Emerging Technologies for Authorization and …, 2018
502018
Automating the assessment of ICT risk
F Baiardi, F Corò, F Tonelli, D Sgandurra
Journal of Information Security and Applications 19 (3), 182-193, 2014
452014
On deception-based protection against cryptographic ransomware
ZA Genç, G Lenzini, D Sgandurra
Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019
422019
Detection of repackaged mobile applications through a collaborative approach
A Aldini, F Martinelli, A Saracino, D Sgandurra
Concurrency and Computation: Practice and Experience 27 (11), 2818–2838, 2015
382015
Probabilistic contract compliance for mobile applications
G Dini, F Martinelli, A Saracino, D Sgandurra
2013 International Conference on Availability, Reliability and Security, 599-606, 2013
352013
Secure computing resource allocation framework for open fog computing
J Jiang, L Tang, K Gu, WJ Jia
The Computer Journal 63 (4), 567-592, 2020
322020
Assessing ict risk through a monte carlo method
F Baiardi, D Sgandurra
Environment Systems and Decisions 33, 486-499, 2013
322013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20