Claudio Ciccotelli
Orcid: 0000-0003-4687-8241
  According to our database1,
  Claudio Ciccotelli
  authored at least 16 papers
  between 2014 and 2021.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2021
    Frontiers Digit. Health, 2021
    
  
  2020
    Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020
    
  
Toward a Context-Aware Methodology for Information Security Governance Assessment Validation.
    
  
    Proceedings of the Cyber-Physical Security for Critical Infrastructures Protection, 2020
    
  
    Proceedings of the Privacy Technologies and Policy - 8th Annual Privacy Forum, 2020
    
  
  2019
B-CoC: A Blockchain-Based Chain of Custody for Evidences Management in Digital Forensics.
    
  
    Proceedings of the International Conference on Blockchain Economics, 2019
    
  
    Proceedings of the Information Security Practice and Experience, 2019
    
  
  2018
    Proceedings of the Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, 2018
    
  
  2017
    Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017
    
  
  2016
    Proceedings of the Computer Safety, Reliability, and Security, 2016
    
  
Towards the Usage of Invariant-Based App Behavioral Fingerprinting for the Detection of Obfuscated Versions of Known Malware.
    
  
    Proceedings of the 10th International Conference on Next Generation Mobile Applications, 2016
    
  
  2015
NIRVANA: A Non-intrusive Black-Box Monitoring Framework for Rack-Level Fault Detection.
    
  
    Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015
    
  
  2014
Correlating power consumption and network traffic for improving data centers resiliency.
    
  
    CoRR, 2014
    
  
Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities.
    
  
    CoRR, 2014
    
  
    Proceedings of the Computer Safety, Reliability, and Security, 2014
    
  
The overlay scan attack: inferring topologies of distributed pub/sub systems through broker saturation.
    
  
    Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, 2014