Daniele Canavese
Daniele Canavese
Email verificata su
Citata da
Citata da
Detection of encrypted cryptomining malware connections with machine and deep learning
A Pastor, A Mozo, S Vakaruk, D Canavese, DR López, L Regano, ...
IEEE Access 8, 158036-158055, 2020
Classification and analysis of communication protection policy anomalies
F Valenza, C Basile, D Canavese, A Lioy
IEEE/ACM Transactions on Networking 25 (5), 2601-2614, 2017
A meta-model for software protections and reverse engineering attacks
C Basile, D Canavese, L Regano, P Falcarin, B De Sutter
Journal of Systems and Software 150, 3-21, 2019
Assessing network authorization policies via reachability analysis
C Basile, D Canavese, C Pitscheider, A Lioy, F Valenza
Computers & Electrical Engineering 64, 110-131, 2017
Inter‐function anomaly analysis for correct SDN/NFV deployment
C Basile, D Canavese, A Lioy, C Pitscheider, F Valenza
International Journal of Network Management 26 (1), 25-43, 2016
Inter-technology conflict analysis for communication protection policies
C Basile, D Canavese, A Lioy, F Valenza
Risks and Security of Internet and Systems: 9th International Conference …, 2015
Estimating software obfuscation potency with artificial neural networks
D Canavese, L Regano, C Basile, A Viticchié
Security and Trust Management: 13th International Workshop, STM 2017, Oslo …, 2017
Toward a complete software stack to integrate quantum key distribution in a cloud environment
I Pedone, A Atzeni, D Canavese, A Lioy
Ieee Access 9, 115270-115291, 2021
Practical autonomous cyberhealth for resilient micro, small and medium-sized enterprises
E Mantas, D Papadopoulos, C Fernández, N Ortiz, M Compastié, ...
2021 IEEE International Mediterranean Conference on Communications and …, 2021
Towards optimally hiding protected assets in software applications
L Regano, D Canavese, C Basile, A Lioy
2017 IEEE International Conference on Software Quality, Reliability and …, 2017
Automatic discovery of software attacks via backward reasoning
C Basile, D Canavese, J d'Annoville, B De Sutter, F Valenza
2015 IEEE/ACM 1st International Workshop on Software Protection, 52-58, 2015
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection
D Canavese, L Regano, C Basile, G Ciravegna, A Lioy
Computers & Electrical Engineering 97, 107621, 2022
Towards automatic risk analysis and mitigation of software applications
L Regano, D Canavese, C Basile, A Viticchié, A Lioy
Information Security Theory and Practice: 10th IFIP WG 11.2 International …, 2016
Security at the Edge for Resource-Limited IoT Devices
D Canavese, L Mannella, L Regano, C Basile
Sensors 24 (2), 590, 2024
Data set and machine learning models for the classification of network traffic originators
D Canavese, L Regano, C Basile, G Ciravegna, A Lioy
Data in Brief 41, 107968, 2022
A model of capabilities of Network Security Functions
C Basile, D Canavese, L Regano, I Pedone, A Lioy
2022 IEEE 8th International Conference on Network Softwarization (NetSoft …, 2022
Improved reachability analysis for security management
C Basile, D Canavese, A Lioy, C Pitscheider
2013 21st Euromicro International Conference on Parallel, Distributed, and …, 2013
A unified ontology for the virtualization domain
J Silvestro, D Canavese, E Cesena, P Smiraglia
On the Move to Meaningful Internet Systems: OTM 2011: Confederated …, 2011
Trusted computing technology and proposals for resolving cloud computing security problems
I Pedone, D Canavese, A Lioy
Cloud Computing Security, 373-386, 2020
Autoencoder-SAD: An Autoencoder-based Model for Security Attacks Detection
DG Berbecaru, S Giannuzzi, D Canavese
2023 IEEE Symposium on Computers and Communications (ISCC), 758-763, 2023
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20