Nino Vincenzo Verde

Orcid: 0000-0002-2379-6414

According to our database1, Nino Vincenzo Verde authored at least 27 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation.
Proceedings of the IEEE International Conference on Big Data, 2023

STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2016
Analyzing Android Encrypted Network Traffic to Identify User Actions.
IEEE Trans. Inf. Forensics Secur., 2016

2015
No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track User Position.
CoRR, 2015

No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position.
Proceedings of the Network and System Security - 9th International Conference, 2015

Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
Security in wireless ad-hoc networks - A survey.
Comput. Commun., 2014

Bypassing Censorship: A Proven Tool against the Recent Internet Censorship in Turkey.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

2013
Epidemic theory and data survivability in unattended wireless sensor networks: Models and gaps.
Pervasive Mob. Comput., 2013

Track me if you can: Transparent obfuscation for Location based Services.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

MASS: An efficient and secure broadcast authentication scheme for resource constrained devices.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

2012
Visual Role Mining: A Picture Is Worth a Thousand Roles.
IEEE Trans. Knowl. Data Eng., 2012

A business-driven decomposition methodology for role mining.
Comput. Secur., 2012

Broadcast Authentication for Resource Constrained Devices: A Major Pitfall and Some Solutions.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Role engineering: from theory to practice.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
A new role mining framework to elicit business roles and to mitigate enterprise risk.
Decis. Support Syst., 2011

Cross-border co-operation and education in digital investigations: A European perspective.
Digit. Investig., 2011

Introducing epidemic models for data survivability in Unattended Wireless Sensor Networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Epidemic data survivability in unattended wireless sensor networks.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

2010
Taming role mining complexity in RBAC.
Comput. Secur., 2010

Mining Business-Relevant RBAC States through Decomposition.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

ABBA: adaptive bicluster-based approach to impute missing values in binary matrices.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Evaluating the Risk of Adopting RBAC Roles.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

2009
A Probabilistic Bound on the Basic Role Mining Problem and Its Applications.
Proceedings of the Emerging Challenges for Security, 2009

Mining Stable Roles in RBAC.
Proceedings of the Emerging Challenges for Security, 2009

A formal framework to elicit roles with business meaning in RBAC systems.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009


  Loading...