Alfonso Iacovazzi

Orcid: 0000-0001-6116-164X

According to our database1, Alfonso Iacovazzi authored at least 21 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
On the Resilience of Machine Learning-Based IDS for Automotive Networks.
Proceedings of the IEEE Vehicular Networking Conference, 2023

2022
ARCADIAN-IoT - Enabling Autonomous Trust, Security and Privacy Management for IoT.
Proceedings of the Internet of Things, 2022

Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in Containers.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2019
The DUSTER Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

A Neural Attention Model for Real-Time Network Intrusion Detection.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics.
Proceedings of the International Joint Conference on Neural Networks, 2019

2018
DropWat: An Invisible Network Flow Watermark for Data Exfiltration Traceback.
IEEE Trans. Inf. Forensics Secur., 2018

Inflow: Inverse Network Flow Watermarking for Detecting Hidden Servers.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
Network Flow Watermarking: A Survey.
IEEE Commun. Surv. Tutorials, 2017

On packet loss modeling: An empirical assessment.
Proceedings of the 8th International Conference on the Network of the Future, 2017

2016
The Power of SDN to Improve the Estimation of the ISP Traffic Matrix Through the Flow Spread Concept.
IEEE J. Sel. Areas Commun., 2016

2015
A low complexity real-time Internet traffic flows neuro-fuzzy classifier.
Comput. Networks, 2015

Protecting traffic privacy for massive aggregated traffic.
Comput. Networks, 2015

Traffic matrix estimation enhanced by SDNs nodes in real network topology.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

2013
Elementary secure-multiparty computation for massive-scale collaborative network monitoring: A quantitative assessment.
Comput. Networks, 2013

Investigating the trade-off between overhead and delay for full packet traffic privacy.
Proceedings of the IEEE International Conference on Communications, 2013

What are you Googling? - Inferring search type information through a statistical classifier.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Padding and Fragmentation for Masking Packet Length Statistics.
Proceedings of the Traffic Monitoring and Analysis - 4th International Workshop, 2012

From ideality to practicability in statistical packet features masking.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

2010
Optimum packet length masking.
Proceedings of the 22nd International Teletraffic Congress, 2010

2009
Real Time Identification of SSH Encrypted Application Flows by Using Cluster Analysis Techniques.
Proceedings of the NETWORKING 2009, 2009


  Loading...