Mirco Marchetti

According to our database1, Mirco Marchetti authored at least 50 papers between 2007 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Glyph: Efficient ML-Based Detection of Heap Spraying Attacks.
IEEE Trans. Inf. Forensics Secur., 2021

2020
Deep Reinforcement Adversarial Learning Against Botnet Evasion Attacks.
IEEE Trans. Netw. Serv. Manag., 2020

Hardening Random Forest Cyber Detectors Against Adversarial Attacks.
IEEE Trans. Emerg. Top. Comput. Intell., 2020

Detection and Threat Prioritization of Pivoting Attacks in Large Networks.
IEEE Trans. Emerg. Top. Comput., 2020

AppCon: Mitigating Evasion Attacks to ML Cyber Detectors.
Symmetry, 2020

A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises.
Mob. Networks Appl., 2020

An experimental analysis of ECQV implicit certificates performance in VANETs.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

2019
Fog-based Secure Communications for Low-power IoT Devices.
ACM Trans. Internet Techn., 2019

READ: Reverse Engineering of Automotive Data Frames.
IEEE Trans. Inf. Forensics Secur., 2019

Detection of Missing CAN Messages through Inter-Arrival Time Analysis.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Evaluating the effectiveness of Adversarial Attacks against Botnet Detectors.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019

Addressing Adversarial Attacks Against Security Systems Based on Machine Learning.
Proceedings of the 11th International Conference on Cyber Conflict, 2019

2018
A symmetric cryptographic scheme for data integrity verification in cloud databases.
Inf. Sci., 2018

Analyses of Secure Automotive Communication Protocols and Their Impact on Vehicles Life-Cycle.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

On the effectiveness of machine and deep learning for cyber security.
Proceedings of the 10th International Conference on Cyber Conflict, 2018

2017
Identifying malicious hosts involved in periodic communications.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Anomaly detection of CAN bus messages through analysis of ID sequences.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2017

Scalable architecture for online prioritisation of cyber threats.
Proceedings of the 9th International Conference on Cyber Conflict, 2017

Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Exploratory security analytics for anomaly detection.
Comput. Secur., 2016

Analysis of high volumes of network traffic for Advanced Persistent Threat detection.
Comput. Networks, 2016

Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms.
Proceedings of the 2nd IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2016

Guaranteeing Correctness of Bulk Operations in Outsourced Databases.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Countering Advanced Persistent Threats through security intelligence and big data analytics.
Proceedings of the 8th International Conference on Cyber Conflict, 2016

Implementation of Verified Set Operation Protocols Based on Bilinear Accumulators.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
A collaborative framework for intrusion detection in mobile networks.
Inf. Sci., 2015

The Network Perspective of Cloud Security.
Proceedings of the Fourth IEEE Symposium on Network Cloud Computing and Applications, 2015

Supporting sense-making and decision-making through time evolution analysis of open sources.
Proceedings of the 7th International Conference on Cyber Conflict: Architectures in Cyberspace, 2015

Enforcing Correct Behavior without Trust in Cloud Key-Value Databases.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases.
IEEE Trans. Parallel Distributed Syst., 2014

Scalable Architecture for Multi-User Encrypted SQL Operations on Cloud Database Services.
IEEE Trans. Cloud Comput., 2014

Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cloud Databases.
IEEE Trans. Cloud Comput., 2014

Efficient detection of unauthorized data modification in cloud databases.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

2013
Access Control Enforcement on Query-Aware Encrypted Cloud Databases.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
Supporting Security and Consistency for Cloud Database.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

Collaborative Attack Detection Using Distributed Hash Tables.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

Cyber Attacks on Financial Critical Infrastructures.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

2011
Defeating NIDS evasion in Mobile IPv6 networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Multistep Attack Detection and Alert Correlation in Intrusion Detection Systems.
Proceedings of the Information Security and Assurance - International Conference, 2011

The Problem of NIDS Evasion in Mobile Networks.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Identification of correlated network intrusion alerts.
Proceedings of the Third International Workshop on Cyberspace Safety and Security, 2011

2010
Selective and Early Threat Detection in Large Networked Systems.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults.
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, 2009

Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale.
Proceedings of the Information Security, 12th International Conference, 2009

Defending financial infrastructures through early warning systems: the intelligence cloud approach.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

2008
Collaborative architecture for malware detection and analysis.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

FlightPath: Obedience vs. Choice in Cooperative Services.
Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation, 2008

Adaptive traffic filtering for efficient and secure IP-mobility.
Proceedings of the Q2SWinet'08, 2008

2007
Dynamic load balancing for network intrusion detection systems based on distributed architectures.
Proceedings of the Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), 12, 2007

Enhancing interoperability and stateful analysis of cooperative network intrusion detection systems.
Proceedings of the 2007 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2007


  Loading...