Daniele Canavese

Orcid: 0000-0002-4265-7743

According to our database1, Daniele Canavese authored at least 25 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Security at the Edge for Resource-Limited IoT Devices.
Sensors, January, 2024

2023
Design, implementation, and automation of a risk management approach for man-at-the-End software protection.
Comput. Secur., September, 2023

Autoencoder-SAD: An Autoencoder-based Model for Security Attacks Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

2022
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection.
Comput. Electr. Eng., 2022

A model of capabilities of Network Security Functions.
Proceedings of the 8th IEEE International Conference on Network Softwarization, 2022


Computer-Aided Reverse Engineering of Protected Software.
Proceedings of the Digital Sovereignty in Cyber Security: New Challenges in Future Vision, 2022

2021
Toward a Complete Software Stack to Integrate Quantum Key Distribution in a Cloud Environment.
IEEE Access, 2021


2020
Software Protection as a Risk Analysis Process.
CoRR, 2020

Detection of Encrypted Cryptomining Malware Connections With Machine and Deep Learning.
IEEE Access, 2020

2019
A meta-model for software protections and reverse engineering attacks.
J. Syst. Softw., 2019

2017
Classification and Analysis of Communication Protection Policy Anomalies.
IEEE/ACM Trans. Netw., 2017

Assessing network authorization policies via reachability analysis.
Comput. Electr. Eng., 2017

Estimating Software Obfuscation Potency with Artificial Neural Networks.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

Towards Optimally Hiding Protected Assets in Software Applications.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

2016
Automatic generation of high speed elliptic curve cryptography code.
PhD thesis, 2016

Inter-function anomaly analysis for correct SDN/NFV deployment.
Int. J. Netw. Manag., 2016

Towards Automatic Risk Analysis and Mitigation of Software Applications.
Proceedings of the Information Security Theory and Practice, 2016

2015
Light combinators for finite fields arithmetic.
Sci. Comput. Program., 2015

Automatic Discovery of Software Attacks via Backward Reasoning.
Proceedings of the 1st IEEE/ACM International Workshop on Software Protection, 2015

2014
Inter-technology Conflict Analysis for Communication Protection Policies.
Proceedings of the Risks and Security of Internet and Systems, 2014

2013
Improved Reachability Analysis for Security Management.
Proceedings of the 21st Euromicro International Conference on Parallel, 2013

Can a Light Typing Discipline Be Compatible with an Efficient Implementation of Finite Fields Inversion?
Proceedings of the Foundational and Practical Aspects of Resource Analysis, 2013

2011
A Unified Ontology for the Virtualization Domain.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2011, 2011


  Loading...