Antonio Villani

According to our database1, Antonio Villani authored at least 17 papers between 1975 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
CUDA Leaks: A Detailed Hack for CUDA and a (Partial) Fix.
ACM Trans. Embed. Comput. Syst., 2016

2015
Obfuscation of Sensitive Data for Incremental Release of Network Flows.
IEEE/ACM Trans. Netw., 2015

Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers.
Int. J. Secur. Networks, 2015

The impact of GPU-assisted malware on memory forensics: A case study.
Digit. Investig., 2015

No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track User Position.
CoRR, 2015

No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position.
Proceedings of the Network and System Security - 9th International Conference, 2015

2014
Bypassing Censorship: A Proven Tool against the Recent Internet Censorship in Turkey.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

2013
Mapping the File Systems Genome: rationales, technique, results and applications.
CoRR, 2013

CUDA Leaks: Information Leakage in GPU Architectures.
CoRR, 2013

Obsidian: A scalable and efficient framework for NetFlow obfuscation.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Uniqueness of the file systems genome: Supporting arguments and massive experimental measurements.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

2012
DDoS Detection with Information Theory Metrics and Netflows - A Real Case.
Proceedings of the SECRYPT 2012, 2012

Obfuscation of sensitive data in network flows.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Large-Scale Traffic Anomaly Detection: Analysis of Real Netflow Datasets.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2012

Relieve Internet Routing Security of Public Key Infrastructure.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

2011
MhRep: Multi-hop Replication Scheme for Data Survival in Unattended Wireless Sensor Networks.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops, 2011

1975
A Simple FORTRAN Support for Computer-Assisted Instruction.
Inf. Process. Lett., 1975


  Loading...