Follow
Stefano Zanero
Stefano Zanero
Verified email at polimi.it - Homepage
Title
Cited by
Cited by
Year
Bitiodine: Extracting intelligence from the bitcoin network
M Spagnuolo, F Maggi, S Zanero
Financial Cryptography and Data Security: 18th International Conference, FC …, 2014
4642014
Unsupervised learning techniques for an intrusion detection system
S Zanero, SM Savaresi
Proceedings of the 2004 ACM symposium on Applied computing, 412-419, 2004
3902004
Shieldfs: a self-healing, ransomware-aware filesystem
A Continella, A Guagnelli, G Zingaro, G De Pasquale, A Barenghi, ...
Proceedings of the 32nd annual conference on computer security applications …, 2016
3832016
HelDroid: Dissecting and Detecting Mobile Ransomware
N Andronio, S Zanero, F Maggi
Research in Attacks, Intrusions, and Defenses: 18th International Symposium …, 2015
3182015
Phoenix: DGA-based botnet tracking and intelligence
S Schiavoni, F Maggi, L Cavallaro, S Zanero
International Conference on detection of intrusions and malware, and …, 2014
3142014
An Experimental Security Analysis of an Industrial Robot Controller
D Quarta, M Pogliani, M Polino, F Maggi, AM Zanchettin, S Zanero
IEEE Symposium on Security and Privacy (Oakland) 2017, 2017
2292017
Computer virus propagation models
G Serazzi, S Zanero
International Workshop on Modeling, Analysis, and Simulation of Computer and …, 2003
2162003
Detecting intrusions through system call sequence and argument analysis
F Maggi, M Matteucci, S Zanero
IEEE Transactions on Dependable and Secure Computing 7 (4), 381-395, 2008
2152008
A stealth, selective, link-layer denial-of-service attack against automotive networks
A Palanca, E Evenchick, F Maggi, S Zanero
Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017
1742017
Identifying dormant functionality in malware programs
PM Comparetti, G Salvaneschi, E Kirda, C Kolbitsch, C Kruegel, S Zanero
2010 IEEE Symposium on Security and Privacy, 61-76, 2010
1672010
Cyber-physical systems
S Zanero
Computer 50 (4), 14-16, 2017
1522017
BankSealer: A decision support system for online banking fraud analysis and investigation
M Carminati, R Caron, F Maggi, I Epifani, S Zanero
computers & security 53, 175-186, 2015
1342015
CANnolo: An Anomaly Detection System based on LSTM Autoencoders for Controller Area Network
S Longari, DHN Valcarcel, M Zago, M Carminati, S Zanero
IEEE Transactions on Network and Service Management 18 (2), 1913-1924, 2021
1172021
A fast eavesdropping attack against touchscreens
F Maggi, A Volpatto, S Gasparini, G Boracchi, S Zanero
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
1092011
Studying Bluetooth Malware Propagation: The BlueBag Project
L Carettoni, C Merloni, S Zanero
IEEE Security & Privacy 5 (2), 17-25, 2007
1072007
AndRadar: fast discovery of android applications in alternative markets
M Lindorfer, S Volanis, A Sisto, M Neugschwandtner, E Athanasopoulos, ...
Detection of Intrusions and Malware, and Vulnerability Assessment: 11th …, 2014
972014
Lines of malicious code: Insights into the malicious software industry
M Lindorfer, A Di Federico, F Maggi, PM Comparetti, S Zanero
Proceedings of the 28th annual computer security applications conference …, 2012
962012
Two years of short urls internet measurement: security threats and countermeasures
F Maggi, A Frossi, S Zanero, G Stringhini, B Stone-Gross, C Kruegel, ...
proceedings of the 22nd international conference on World Wide Web, 861-872, 2013
912013
Constrained concealment attacks against reconstruction-based anomaly detectors in industrial control systems
A Erba, R Taormina, S Galelli, M Pogliani, M Carminati, S Zanero, ...
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
90*2020
Stranger danger: exploring the ecosystem of ad-based url shortening services
N Nikiforakis, F Maggi, G Stringhini, MZ Rafique, W Joosen, C Kruegel, ...
Proceedings of the 23rd international conference on World wide web, 51-62, 2014
822014
The system can't perform the operation now. Try again later.
Articles 1–20