Claudio Ciccotelli

According to our database1, Claudio Ciccotelli authored at least 14 papers between 2014 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
AndroDFA: Android Malware Classification Based on Resource Consumption.
Inf., 2020

Cyber-attacks and threats for healthcare - a multi-layer thread analysis.
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020

Italian National Framework for Cybersecurity and Data Protection.
Proceedings of the Privacy Technologies and Policy - 8th Annual Privacy Forum, 2020

2019
B-CoC: A Blockchain-Based Chain of Custody for Evidences Management in Digital Forensics.
Proceedings of the International Conference on Blockchain Economics, 2019

Peel the Onion: Recognition of Android Apps Behind the Tor Network.
Proceedings of the Information Security Practice and Experience, 2019

2018
FADa-CPS - Faults and Attacks Discrimination in Cyber Physical Systems.
Proceedings of the Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, 2018

2017
Android malware family classification based on resource consumption over time.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

2016
Automatic Invariant Selection for Online Anomaly Detection.
Proceedings of the Computer Safety, Reliability, and Security, 2016

Towards the Usage of Invariant-Based App Behavioral Fingerprinting for the Detection of Obfuscated Versions of Known Malware.
Proceedings of the 10th International Conference on Next Generation Mobile Applications, 2016

2015
NIRVANA: A Non-intrusive Black-Box Monitoring Framework for Rack-Level Fault Detection.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

2014
Correlating power consumption and network traffic for improving data centers resiliency.
CoRR, 2014

Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities.
CoRR, 2014

Towards a Non-intrusive Recognition of Anomalous System Behavior in Data Centers.
Proceedings of the Computer Safety, Reliability, and Security, 2014

The overlay scan attack: inferring topologies of distributed pub/sub systems through broker saturation.
Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, 2014


  Loading...