Flavio Lombardi

According to our database1, Flavio Lombardi authored at least 34 papers between 2001 and 2018.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Traffic Data Classification for Police Activity.
Proceedings of the Foundations of Intelligent Systems - 24th International Symposium, 2018

Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives.
Proceedings of the From Database to Cyber Security, 2018

Exploring and Analyzing the Tor Hidden Services Graph.
TWEB, 2017

Traffic Data: Exploratory Data Analysis with Apache Accumulo.
Proceedings of the Traffic Mining Applied to Police Activities, 2017

Unsupervised Classification of Routes and Plates from the Trap-2017 Dataset.
Proceedings of the Traffic Mining Applied to Police Activities, 2017

HyBIS: Advanced Introspection for Effective Windows Guest Protection.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

CoLLIDE: CLoud Latency-based IDEntification.
Proceedings of the 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2017) / The 7th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2017) / Affiliated Workshops, 2017

A Novel GPU-Based Implementation of the Cube Attack - Preliminary Results Against Trivium.
Proceedings of the Applied Cryptography and Network Security, 2017

Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware.
IEEE Trans. Mob. Comput., 2016

CUDA Leaks: A Detailed Hack for CUDA and a (Partial) Fix.
ACM Trans. Embedded Comput. Syst., 2016

FRoDO: Fraud Resilient Device for Off-Line Micro-Payments.
IEEE Trans. Dependable Sec. Comput., 2016

CURE - Towards enforcing a reliable timeline for cloud forensics: Model, architecture, and experiments.
Computer Communications, 2016

AntiCheetah: Trustworthy computing in an outsourced (cheating) environment.
Future Generation Comp. Syst., 2015

CloRExPa: Cloud resilience via execution path analysis.
Future Generation Comp. Syst., 2014

Thwarting Obfuscated Malware via Differential Fault Analysis.
IEEE Computer, 2014

FORCE - Fully Off-line secuRe CrEdits for Mobile Micro Payments.
Proceedings of the SECRYPT 2014, 2014

SOLDI: Secure Off-Line Disposable CredIts to Secure Mobile Micro Payments.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

AntiCheetah: An Autonomic Multi-round Approach for Reliable Computing.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

CheR: Cheating Resilience in the Cloud via Smart Resource Allocation.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Secure virtualization for cloud computing.
J. Network and Computer Applications, 2011

CReW: Cloud Resilience for Windows Guests through Monitored Virtualization.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

Transparent security for cloud.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

A Security Management Architecture for the Protection of Kernel Virtual Machines.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

KvmSec: a security extension for Linux kernel virtual machines.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Processes for software development within the Public Administration.
Proceedings of the 2009 ICSE Workshop on Software Quality, 2009

Feasibility and benefits of migrating towards JEE: a real life case.
Proceedings of the 5th International Symposium on Principles and Practice of Programming in Java, 2007

Leveraging the Grid for the Autonomic Management of Complex Infrastructures.
Proceedings of the 2006 International Conference on Grid Computing & Applications, 2006

Jet-Lag, Java Heterogeneous Log Analysis on the Grid: Architecture, Implementation and Performance Evaluation.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2005

A Reliable Multicast Approach to Replica Management for Grids.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2005

Extending the UDDI API for service instance ranking.
Proceedings of The 2005 International Symposium on Web Services and Applications, 2005

Transparent Java Threads Migration Protocol over Peer2Peer.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

A Java Architecture for Secure Reliable Multicast Data Transfer: Performance Evaluation.
Proceedings of the IASTED International Conference on Communications, 2002

A Java Implementation of a Reliable Multicast File Transfer Protocol: Design and Evaluation.
Proceedings of the Fifth IASTED International Conference Internet and Multimedia Systems and Applications (IMSA 2001), 2001