REGANO, LEONARDO
Mostra
records
Risultati 1 - 8 di 8 (tempo di esecuzione: 0.023 secondi).
A Model for Automated Cybersecurity Threat Remediation and Sharing
2023 Settanni, F; Regano, L; Basile, C; Lioy, A
Computer-Aided Reverse Engineering of Protected Software
2023 Canavese, Daniele; Regano, Leonardo; Lioy, Antonio
A model of capabilities of Network Security Functions
2022 Basile, C.; Canavese, D.; Regano, L.; Pedone, I.; Lioy, A.
Estimating Software Obfuscation Potency with Artificial Neural Networks
2017 Canavese, Daniele; Regano, Leonardo; Basile, Cataldo; Viticchie', Alessio
Privacy issues of ISPs in the modern web
2017 Khatouni, Ali Safari; Trevisan, Martino; Regano, Leonardo; Viticchie, Alessio
Towards Optimally Hiding Protected Assets in Software Applications
2017 Regano, Leonardo; Canavese, Daniele; Basile, Cataldo; Lioy, Antonio
Assessment of Source Code Obfuscation Techniques
2016 Viticchie', Alessio; Regano, Leonardo; Torchiano, Marco; Basile, Cataldo; Ceccato, Mariano; Tonella, Paolo; Tiella, Roberto
Towards Automatic Risk Analysis and Mitigation of Software Applications
2016 Regano, Leonardo; Canavese, Daniele; Basile, Cataldo; Viticchie', Alessio; Lioy, Antonio
Citazione | Data di pubblicazione | Autori | File |
---|---|---|---|
A Model for Automated Cybersecurity Threat Remediation and Sharing / Settanni, F; Regano, L; Basile, C; Lioy, A. - STAMPA. - (2023), pp. 492-497. (Intervento presentato al convegno 2023 IEEE 9th International Conference on Network Softwarization (NetSoft) tenutosi a Madrid (Spain) nel June 19-23, 2023) [10.1109/NetSoft57336.2023.10175486]. | 1-gen-2023 | Settanni, FRegano, LBasile, CLioy, A | torsec_netsoft_2023_06.pdf; A_Model_for_Automated_Cybersecurity_Threat_Remediation_and_Sharing.pdf |
Computer-Aided Reverse Engineering of Protected Software / Canavese, Daniele; Regano, Leonardo; Lioy, Antonio. - STAMPA. - 1807:(2023), pp. 3-15. (Intervento presentato al convegno First International Workshop, CyberSec4Europe 2022 tenutosi a Venice (IT) nel April 17–21, 2022) [10.1007/978-3-031-36096-1_1]. | 1-gen-2023 | Daniele CanaveseLeonardo ReganoAntonio Lioy | 978-3-031-36096-1_1.pdf |
A model of capabilities of Network Security Functions / Basile, C.; Canavese, D.; Regano, L.; Pedone, I.; Lioy, A.. - STAMPA. - (2022), pp. 474-479. (Intervento presentato al convegno 2022 IEEE 8th International Conference on Network Softwarization tenutosi a Milano (Italy) nel 27 June - 1 July 2022) [10.1109/NetSoft54395.2022.9844057]. | 1-gen-2022 | Basile C.Canavese D.Regano L.Pedone I.Lioy A. | A_model_of_capabilities_of_Network_Security_Functions.pdf |
Estimating Software Obfuscation Potency with Artificial Neural Networks / Canavese, Daniele; Regano, Leonardo; Basile, Cataldo; Viticchie', Alessio. - STAMPA. - 10547:(2017), pp. 193-202. (Intervento presentato al convegno STM - 2017: 13th International Workshop on Security and Trust Management tenutosi a Oslo (NO) nel September 14–15, 2017) [10.1007/978-3-319-68063-7_13]. | 1-gen-2017 | CANAVESE, DANIELEREGANO, LEONARDOBASILE, CATALDOVITICCHIE', ALESSIO | - |
Privacy issues of ISPs in the modern web / Khatouni, Ali Safari; Trevisan, Martino; Regano, Leonardo; Viticchie, Alessio. - ELETTRONICO. - (2017), pp. 588-594. (Intervento presentato al convegno 2017 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) tenutosi a Vancouver nel 3-5 Ottobre 2017) [10.1109/IEMCON.2017.8117145]. | 1-gen-2017 | Khatouni, Ali SafariTrevisan, MartinoRegano, LeonardoViticchie, Alessio | privacy-issues-isps-public.pdf |
Towards Optimally Hiding Protected Assets in Software Applications / Regano, Leonardo; Canavese, Daniele; Basile, Cataldo; Lioy, Antonio. - CD-ROM. - (2017), pp. 374-385. (Intervento presentato al convegno 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS) tenutosi a Prague (CZ) nel July 25-29, 2017) [10.1109/QRS.2017.47]. | 1-gen-2017 | REGANO, LEONARDOCANAVESE, DANIELEBASILE, CATALDOLIOY, ANTONIO | - |
Assessment of Source Code Obfuscation Techniques / Viticchie', Alessio; Regano, Leonardo; Torchiano, Marco; Basile, Cataldo; Ceccato, Mariano; Tonella, Paolo; Tiella, Roberto. - ELETTRONICO. - (2016), pp. 11-20. (Intervento presentato al convegno IEEE 16th International Working Conference on Source Code Analysis and Manipulation tenutosi a Raleigh, NC (USA) nel October 2-3, 2016) [10.1109/SCAM.2016.17]. | 1-gen-2016 | VITICCHIE', ALESSIOREGANO, LEONARDOTORCHIANO, MARCOBASILE, CATALDO + | scam2016.pdf |
Towards Automatic Risk Analysis and Mitigation of Software Applications / Regano, Leonardo; Canavese, Daniele; Basile, Cataldo; Viticchie', Alessio; Lioy, Antonio. - STAMPA. - (2016), pp. 120-135. (Intervento presentato al convegno WISTP 2016 - IFIP International Conference on Information Security Throey and Practice tenutosi a Heraklion, Crete (Greece) nel September 26–27, 2016) [10.1007/978-3-319-45931-8_8]. | 1-gen-2016 | REGANO, LEONARDOCANAVESE, DANIELEBASILE, CATALDOVITICCHIE', ALESSIOLIOY, ANTONIO | main.pdf |