Flavio Lombardi

According to our database1, Flavio Lombardi authored at least 36 papers between 2001 and 2018.

Collaborative distances :

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Virtualization Technologies and Cloud Security: advantages, issues, and perspectives.
CoRR, 2018

2017
Exploring and Analyzing the Tor Hidden Services Graph.
TWEB, 2017

Traffic Data: Exploratory Data Analysis with Apache Accumulo.
Proceedings of the Traffic Mining Applied to Police Activities, 2017

Unsupervised Classification of Routes and Plates from the Trap-2017 Dataset.
Proceedings of the Traffic Mining Applied to Police Activities, 2017

HyBIS: Advanced Introspection for Effective Windows Guest Protection.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

CoLLIDE: CLoud Latency-based IDEntification.
Proceedings of the 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2017) / The 7th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2017) / Affiliated Workshops, 2017

A Novel GPU-Based Implementation of the Cube Attack - Preliminary Results Against Trivium.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware.
IEEE Trans. Mob. Comput., 2016

CUDA Leaks: A Detailed Hack for CUDA and a (Partial) Fix.
ACM Trans. Embedded Comput. Syst., 2016

FRoDO: Fraud Resilient Device for Off-Line Micro-Payments.
IEEE Trans. Dependable Sec. Comput., 2016

HyBIS: Windows Guest Protection through Advanced Memory Introspection.
CoRR, 2016

CURE - Towards enforcing a reliable timeline for cloud forensics: Model, architecture, and experiments.
Computer Communications, 2016

2015
AntiCheetah: Trustworthy computing in an outsourced (cheating) environment.
Future Generation Comp. Syst., 2015

CloRoFor: Cloud Robust Forensics.
CoRR, 2015

2014
CloRExPa: Cloud resilience via execution path analysis.
Future Generation Comp. Syst., 2014

Thwarting Obfuscated Malware via Differential Fault Analysis.
IEEE Computer, 2014

FORCE - Fully Off-line secuRe CrEdits for Mobile Micro Payments.
Proceedings of the SECRYPT 2014, 2014

SOLDI: Secure Off-Line Disposable CredIts to Secure Mobile Micro Payments.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

2013
CUDA Leaks: Information Leakage in GPU Architectures.
CoRR, 2013

AntiCheetah: An Autonomic Multi-round Approach for Reliable Computing.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

CheR: Cheating Resilience in the Cloud via Smart Resource Allocation.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

2011
Secure virtualization for cloud computing.
J. Network and Computer Applications, 2011

2010
CReW: Cloud Resilience for Windows Guests through Monitored Virtualization.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

Transparent security for cloud.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

A Security Management Architecture for the Protection of Kernel Virtual Machines.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
KvmSec: a security extension for Linux kernel virtual machines.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Processes for software development within the Public Administration.
Proceedings of the 2009 ICSE Workshop on Software Quality, 2009

2007
Feasibility and benefits of migrating towards JEE: a real life case.
Proceedings of the 5th International Symposium on Principles and Practice of Programming in Java, 2007

2006
Leveraging the Grid for the Autonomic Management of Complex Infrastructures.
Proceedings of the 2006 International Conference on Grid Computing & Applications, 2006

2005
Jet-Lag, Java Heterogeneous Log Analysis on the Grid: Architecture, Implementation and Performance Evaluation.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2005

A Reliable Multicast Approach to Replica Management for Grids.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2005

Extending the UDDI API for service instance ranking.
Proceedings of The 2005 International Symposium on Web Services and Applications, 2005

Transparent Java Threads Migration Protocol over Peer2Peer.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

2002
A Java Architecture for Secure Reliable Multicast Data Transfer: Performance Evaluation.
Proceedings of the IASTED International Conference on Communications, 2002

2001
A Java Implementation of a Reliable Multicast File Transfer Protocol: Design and Evaluation.
Proceedings of the Fifth IASTED International Conference Internet and Multimedia Systems and Applications (IMSA 2001), 2001


  Loading...