Search results for: Stefano Zanero
Journal of Computer Virology and Hacking Techniques > 2019 > 15 > 3 > 161-175
2017 IEEE Symposium on Security and Privacy (SP) > 268 - 286
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Insider Detection and Alert Correlation > 167-177
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Anomaly Detection > 206-223
Lecture Notes in Computer Science > Image Analysis and Processing – ICIAP 2005 > Pattern Recognition for Computer Network Security > 83-90
Lecture Notes in Computer Science > Computational Science – ICCS 2005 > Workshop on “Grid Computing Security and Resource Management” > 147-154
Lecture Notes in Computer Science > Computer and Information Sciences - ISCIS 2004 > Modeling and Performance Evaluation > 657-666
Lecture Notes in Computer Science > Decision and Game Theory for Security > Network Security and Botnets > 180-191
IEEE Transactions on Emerging Topics in Computing > 2016 > 4 > 1 > 33 - 34
Computers & Security > 2015 > 53 > Complete > 175-186
Journal of Computer Virology and Hacking Techniques > 2014 > 10 > 4 > 255-271