Sfoglia per Autore
Hypergraph-based attack models for network intrusion detection
2014-01-01 Guzzo, Antonella; Pugliese, Andrea; Rullo, A; Saccà, D.
Intrusion Detection with Hypergraph-Based Attack Models
2014-01-01 Guzzo, Antonella; Pugliese, Andrea; Rullo, A.; Sacca', Domenico
PADUA: Parallel Architecture to Detect Unexplained Activities
2014-01-01 Molinaro, Cristian; Moscato, Vincenzo; Picariello, Antonio; Pugliese, Andrea; Rullo, Antonino; Subrahmanian, Vs
Pareto-optimal adversarial defense of enterprise systems
2015-01-01 Serra, E; Jajodia, S; Pugliese, Andrea; Rullo, A; Subrahmanian, Vs
The AC-Index: Fast online detection of correlated alerts
2015-01-01 Pugliese, Andrea; Rullo, A; Piccolo, A.
Strategic Security Resource Allocation for Internet of Things
2016-01-01 Rullo, Antonino; Midi, Daniele; Serra, Edoardo; Bertino, Elisa
A game of things: Strategic allocation of security resources for IoT
2017-01-01 Rullo, A.; Midi, D.; Serra, E.; Bertino, E.
Malevolent Activity Detection with Hypergraph-Based Models
2017-01-01 Guzzo, Antonella; Pugliese, Andrea; Rullo, A; Sacca', Domenico; Piccolo, A.
Kalis - A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things
2017-01-01 Midi, D.; Rullo, A.; Mudgerikar, A.; Bertino, E.
Shortfall-based optimal placement of security resources for mobile IoT scenarios
2017-01-01 Rullo, A.; Serra, E.; Bertino, E.; Lobo, J.
Shortfall-Based Optimal Security Provisioning for Internet of Things
2017-01-01 Rullo, Antonino; Serra, Edoardo; Bertino, Elisa; Lobo, Jorge
Pareto optimal security resource allocation for Internet of Things
2017-01-01 Rullo, A.; Midi, D.; Serra, E.; Bertino, E.
Past: Protocol-adaptable security tool for heterogeneous iot ecosystems
2018-01-01 Rullo, Antonino; Antonino and, Bertino; Elisa and, Sacc('a); Domenico,
Optimal placement of security resources for the internet of things
2019-01-01 Rullo, A.; Serra, E.; Bertino, E.; Lobo, J.
Extending inverse frequent itemsets mining to generate realistic datasets: complexity, accuracy and emerging applications
2019-01-01 Sacca, D.; Serra, E.; Rullo, A.
Redundancy as a measure of fault-tolerance for the Internet of Things: A review
2019-01-01 Rullo, Antonino; Antonino and, Serra; Edoardo and, Lobo; Jorge,
A Framework for the Multi-modal Analysis of Novel Behavior in Business Processes
2020-01-01 Rullo, A.; Guzzo, A.; Serra, E.; Tirrito, E.
Exploiting Silicon Fingerprint for Device Authentication Using CMOS-PUF and ECC
2021-01-01 Felicetti, Carmelo; Lanuzza, Marco; Rullo, Antonino; Sacca', Domenico; Crupi, Felice
Multi-sorted inverse frequent itemsets mining for generating realistic no-SQL datasets
2021-01-01 Sacca, D.; Serra, E.; Rullo, A.
PUF-based Smart Tags for Supply Chain Management
2021-01-01 Falcone, A.; Felicetti, C.; Garro, A.; Rullo, A.; Sacca, D.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Hypergraph-based attack models for network intrusion detection | 1-gen-2014 | Guzzo, Antonella; Pugliese, Andrea; Rullo, A; Saccà, D. | |
Intrusion Detection with Hypergraph-Based Attack Models | 1-gen-2014 | Guzzo, Antonella; Pugliese, Andrea; Rullo, A.; Sacca', Domenico | |
PADUA: Parallel Architecture to Detect Unexplained Activities | 1-gen-2014 | Molinaro, Cristian; Moscato, Vincenzo; Picariello, Antonio; Pugliese, Andrea; Rullo, Antonino; Subrahmanian, Vs | |
Pareto-optimal adversarial defense of enterprise systems | 1-gen-2015 | Serra, E; Jajodia, S; Pugliese, Andrea; Rullo, A; Subrahmanian, Vs | |
The AC-Index: Fast online detection of correlated alerts | 1-gen-2015 | Pugliese, Andrea; Rullo, A; Piccolo, A. | |
Strategic Security Resource Allocation for Internet of Things | 1-gen-2016 | Rullo, Antonino; Midi, Daniele; Serra, Edoardo; Bertino, Elisa | |
A game of things: Strategic allocation of security resources for IoT | 1-gen-2017 | Rullo, A.; Midi, D.; Serra, E.; Bertino, E. | |
Malevolent Activity Detection with Hypergraph-Based Models | 1-gen-2017 | Guzzo, Antonella; Pugliese, Andrea; Rullo, A; Sacca', Domenico; Piccolo, A. | |
Kalis - A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things | 1-gen-2017 | Midi, D.; Rullo, A.; Mudgerikar, A.; Bertino, E. | |
Shortfall-based optimal placement of security resources for mobile IoT scenarios | 1-gen-2017 | Rullo, A.; Serra, E.; Bertino, E.; Lobo, J. | |
Shortfall-Based Optimal Security Provisioning for Internet of Things | 1-gen-2017 | Rullo, Antonino; Serra, Edoardo; Bertino, Elisa; Lobo, Jorge | |
Pareto optimal security resource allocation for Internet of Things | 1-gen-2017 | Rullo, A.; Midi, D.; Serra, E.; Bertino, E. | |
Past: Protocol-adaptable security tool for heterogeneous iot ecosystems | 1-gen-2018 | Rullo, Antonino; Antonino and, Bertino; Elisa and, Sacc('a); Domenico, | |
Optimal placement of security resources for the internet of things | 1-gen-2019 | Rullo, A.; Serra, E.; Bertino, E.; Lobo, J. | |
Extending inverse frequent itemsets mining to generate realistic datasets: complexity, accuracy and emerging applications | 1-gen-2019 | Sacca, D.; Serra, E.; Rullo, A. | |
Redundancy as a measure of fault-tolerance for the Internet of Things: A review | 1-gen-2019 | Rullo, Antonino; Antonino and, Serra; Edoardo and, Lobo; Jorge, | |
A Framework for the Multi-modal Analysis of Novel Behavior in Business Processes | 1-gen-2020 | Rullo, A.; Guzzo, A.; Serra, E.; Tirrito, E. | |
Exploiting Silicon Fingerprint for Device Authentication Using CMOS-PUF and ECC | 1-gen-2021 | Felicetti, Carmelo; Lanuzza, Marco; Rullo, Antonino; Sacca', Domenico; Crupi, Felice | |
Multi-sorted inverse frequent itemsets mining for generating realistic no-SQL datasets | 1-gen-2021 | Sacca, D.; Serra, E.; Rullo, A. | |
PUF-based Smart Tags for Supply Chain Management | 1-gen-2021 | Falcone, A.; Felicetti, C.; Garro, A.; Rullo, A.; Sacca, D. |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile