Follow
flavio lombardi
flavio lombardi
IAC - CNR
Verified email at cnr.it
Title
Cited by
Cited by
Year
Secure virtualization for cloud computing
F Lombardi, R Di Pietro
Journal of network and computer applications 34 (4), 1113-1122, 2011
5922011
Edge computing perspectives: Architectures, technologies, and open security issues
M Caprolu, R Di Pietro, F Lombardi, S Raponi
2019 IEEE International Conference on Edge Computing (EDGE), 116-123, 2019
1962019
CUDA leaks: a detailed hack for CUDA and a (partial) fix
RD Pietro, F Lombardi, A Villani
ACM Transactions on Embedded Computing Systems (TECS) 15 (1), 1-25, 2016
712016
KvmSec: a security extension for Linux kernel virtual machines
F Lombardi, R Di Pietro
Proceedings of the 2009 ACM symposium on Applied Computing, 2029-2034, 2009
632009
Transparent security for cloud
F Lombardi, R Di Pietro
Proceedings of the 2010 ACM symposium on applied computing, 414-415, 2010
572010
Transparent security for cloud
F Lombardi, R Di Pietro
Proceedings of the 2010 ACM symposium on applied computing, 414-415, 2010
572010
CUDA leaks: Information leakage in GPU architectures
R Di Pietro, F Lombardi, A Villani
arXiv preprint arXiv:1305.7383, 2013
432013
Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware
G Suarez-Tangil, JE Tapiador, F Lombardi, R Di Pietro
IEEE Transactions on Mobile Computing 15 (4), 789-802, 2015
392015
Exploring and analyzing the tor hidden services graph
M Bernaschi, A Celestini, S Guarino, F Lombardi
ACM Transactions on the Web (TWEB) 11 (4), 1-26, 2017
342017
Virtualization Technologies and Cloud Security: advantages, issues, and perspectives
R Di Pietro, F Lombardi
From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the …, 2018
312018
Spiders like onions: on the network of tor hidden services
M Bernaschi, A Celestini, S Guarino, F Lombardi, E Mastrostefano
The World Wide Web Conference, 105-115, 2019
282019
Thwarting obfuscated malware via differential fault analysis
G Suarez-Tangil, JE Tapiador, F Lombardi, R Di Pietro
Computer 47 (6), 24-31, 2014
262014
CURE—Towards enforcing a reliable timeline for cloud forensics: Model, architecture, and experiments
R Battistoni, R Di Pietro, F Lombardi
Computer Communications 91, 29-43, 2016
222016
CloRExPa: Cloud resilience via execution path analysis
R Di Pietro, F Lombardi, M Signorini
Future Generation Computer Systems 32, 168-179, 2014
212014
Continued rise of the cloud
Z Mahmood
Springer, 2014
172014
Continued rise of the cloud
Z Mahmood
Springer, 2014
172014
FRoDO: Fraud resilient device for off-line micro-payments
V Daza, R Di Pietro, F Lombardi, M Signorini
IEEE Transactions on Dependable and Secure Computing 13 (2), 296-311, 2015
142015
Virtualization and Cloud Security: Benefits, Caveats, and Future Developments
F Lombardi, R Di Pietro
Cloud Computing - Challenges, Limitations and R&D Solutions, 237-256, 2014
142014
Virtualization and cloud security: Benefits, caveats, and future developments
F Lombardi, R Di Pietro
Cloud computing: Challenges, limitations and R&D solutions, 237-255, 2014
142014
Crew: Cloud resilience for windows guests through monitored virtualization
F Lombardi, R Di Pietro, C Soriente
2010 29th IEEE Symposium on Reliable Distributed Systems, 338-342, 2010
142010
The system can't perform the operation now. Try again later.
Articles 1–20