Marco Ramilli

According to our database1, Marco Ramilli authored at least 25 papers between 2007 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Classification of Web Phishing Kits for early detection by platform providers.
CoRR, 2022

2015
Decentralized detection of network attacks through P2P data clustering of SNMP data.
Comput. Secur., 2015

2013
Peer-to-Peer Data Mining Classi ers for Decentralized Detection of Network Attacks.
Proceedings of the Twenty-Fourth Australasian Database Conference, 2013

2012
Return-Oriented Programming.
IEEE Secur. Priv., 2012

Raising Risk Awareness on the Adoption of Web 2.0 Technologies in Decision Making Processes.
Future Internet, 2012

A Browser-Based Distributed System for the Detection of HTTPS Stripping Attacks against Web Pages.
Proceedings of the Information Security and Privacy Research, 2012

Internet voting: fatally torn between conflicting goals?
Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, 2012

2011
Multiprocess malware.
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011

Results-oriented security.
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011

Security considerations about the adoption of web 2.0 technologies in sensitive e-government processes.
Proceedings of the ICEGOV 2011, 2011

Taking the Best of Both Worlds: A Comparison and Integration of the U.S. and EU Approaches to E-Voting Systems Evaluation.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Exploring Information Security Issues in Public Sector Inter-organizational Collaboration.
Proceedings of the Electronic Government - 10th IFIP WG 8.5 International Conference, 2011

2010
Always the Same, Never the Same.
IEEE Secur. Priv., 2010

Splitting the HTTPS Stream to Attack Secure Web Connections.
IEEE Secur. Priv., 2010

Multi-stage delivery of malware.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010

Towards a practical and effective security testing methodology.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

An Integrated Application of Security Testing Methodologies to e-voting Systems.
Proceedings of the Electronic Participation, Second IFIP WG 8.5 International Conference, 2010

2009
Frightened by Links.
IEEE Secur. Priv., 2009

Man-in-the-Middle Attack to the HTTPS Protocol.
IEEE Secur. Priv., 2009

Network Attack Detection Based on Peer-to-Peer Clustering of SNMP Data.
Proceedings of the Quality of Service in Heterogeneous Networks, 2009

A Messaging-Based System for Remote Server Administration.
Proceedings of the Third International Conference on Network and System Security, 2009

Comment Spam Injection Made Easy.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Redesigning remote system administration paradigms for enhanced security and flexibility.
Comput. Stand. Interfaces, 2008

Adaptive Filtering of Comment Spam in Multi-user Forums and Blogs.
Proceedings of the Security in Information Systems, 2008

2007
RoboAdmin: A Different Approach to Remote System Administration.
Proceedings of the Security in Information Systems, 2007


  Loading...