Mirco Marchetti
Citado por
Citado por
Making Byzantine fault tolerant systems tolerate Byzantine faults
A Clement, E Wong, L Alvisi, M Dahlin, M Marchetti
Proceedings of the 6th USENIX symposium on Networked systems design and …, 2009
On the effectiveness of machine and deep learning for cyber security
G Apruzzese, M Colajanni, L Ferretti, A Guido, M Marchetti
2018 10th international conference on cyber Conflict (CyCon), 371-390, 2018
Anomaly detection of CAN bus messages through analysis of ID sequences
M Marchetti, D Stabili
2017 IEEE intelligent vehicles symposium (IV), 1577-1583, 2017
Analysis of high volumes of network traffic for advanced persistent threat detection
M Marchetti, F Pierazzi, M Colajanni, A Guido
Computer Networks 109, 127-141, 2016
Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms
M Marchetti, D Stabili, A Guido, M Colajanni
2016 IEEE 2nd International Forum on Research and Technologies for Society …, 2016
READ: Reverse engineering of automotive data frames
M Marchetti, D Stabili
IEEE Transactions on Information Forensics and Security 14 (4), 1083-1097, 2018
Distributed, concurrent, and independent access to encrypted cloud databases
L Ferretti, M Colajanni, M Marchetti
IEEE transactions on parallel and distributed systems 25 (2), 437-446, 2013
FlightPath: Obedience vs. Choice in Cooperative Services.
HC Li, A Clement, M Marchetti, M Kapritsos, L Robison, L Alvisi, M Dahlin
OSDI 8, 355-368, 2008
Detecting attacks to internal vehicle networks through Hamming distance
D Stabili, M Marchetti, M Colajanni
2017 AEIT International Annual Conference, 1-6, 2017
Addressing adversarial attacks against security systems based on machine learning
G Apruzzese, M Colajanni, L Ferretti, M Marchetti
2019 11th international conference on cyber conflict (CyCon) 900, 1-18, 2019
Deep reinforcement adversarial learning against botnet evasion attacks
G Apruzzese, M Andreolini, M Marchetti, A Venturi, M Colajanni
IEEE Transactions on Network and Service Management 17 (4), 1975-1987, 2020
Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems
G Apruzzese, M Andreolini, L Ferretti, M Marchetti, M Colajanni
Digital Threats: Research and Practice, 2021
Supporting security and consistency for cloud database
L Ferretti, M Colajanni, M Marchetti
Cyberspace Safety and Security: 4th International Symposium, CSS 2012 …, 2012
Countering advanced persistent threats through security intelligence and big data analytics
M Marchetti, F Pierazzi, A Guido, M Colajanni
2016 8th International Conference on Cyber Conflict (CyCon), 243-261, 2016
Hardening random forest cyber detectors against adversarial attacks
G Apruzzese, M Andreolini, M Colajanni, M Marchetti
IEEE Transactions on Emerging Topics in Computational Intelligence 4 (4 …, 2020
A parallel architecture for stateful intrusion detection in high traffic networks
M Colajanni, M Marchetti
Proc. of the IEEE/IST Workshop on” Monitoring, attack detection and …, 2006
Evaluating the effectiveness of adversarial attacks against botnet detectors
G Apruzzese, M Colajanni, M Marchetti
2019 IEEE 18th International Symposium on Network Computing and Applications …, 2019
A framework for the evaluation of trainee performance in cyber range exercises
M Andreolini, VG Colacino, M Colajanni, M Marchetti
Mobile Networks and Applications 25, 236-247, 2020
Detection and threat prioritization of pivoting attacks in large networks
G Apruzzese, F Pierazzi, M Colajanni, M Marchetti
IEEE transactions on emerging topics in computing 8 (2), 404-415, 2017
Fog-based secure communications for low-power IoT devices
L Ferretti, M Marchetti, M Colajanni
ACM Transactions on Internet Technology (TOIT) 19 (2), 1-21, 2019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20