Analyzing android encrypted network traffic to identify user actions M Conti, LV Mancini, R Spolaor, NV Verde IEEE Transactions on Information Forensics and Security 11 (1), 114-125, 2015 | 310 | 2015 |
Security in wireless ad-hoc networks–a survey R Di Pietro, S Guarino, NV Verde, J Domingo-Ferrer Computer Communications 51, 1-20, 2014 | 204 | 2014 |
Can't you hear me knocking: Identification of user actions on android apps via traffic analysis M Conti, LV Mancini, R Spolaor, NV Verde Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015 | 155 | 2015 |
A formal framework to elicit roles with business meaning in RBAC systems A Colantonio, R Di Pietro, A Ocello, NV Verde Proceedings of the 14th ACM symposium on Access control models and …, 2009 | 79 | 2009 |
No NAT'd user left behind: Fingerprinting users behind NAT from NetFlow records alone NV Verde, G Ateniese, E Gabrielli, LV Mancini, A Spognardi 2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014 | 72 | 2014 |
Visual role mining: A picture is worth a thousand roles A Colantonio, R Di Pietro, A Ocello, NV Verde IEEE Transactions on Knowledge and Data Engineering 24 (6), 1120-1133, 2011 | 67 | 2011 |
Taming role mining complexity in RBAC A Colantonio, R Di Pietro, A Ocello, NV Verde Computers & Security 29 (5), 548-564, 2010 | 52 | 2010 |
A new role mining framework to elicit business roles and to mitigate enterprise risk A Colantonio, R Di Pietro, A Ocello, NV Verde Decision Support Systems 50 (4), 715-731, 2011 | 49 | 2011 |
A business-driven decomposition methodology for role mining A Colantonio, R Di Pietro, NV Verde Computers & Security 31 (7), 844-855, 2012 | 36 | 2012 |
Role engineering: from theory to practice NV Verde, J Vaidya, V Atluri, A Colantonio Proceedings of the second ACM conference on Data and Application Security …, 2012 | 34 | 2012 |
Epidemic data survivability in unattended wireless sensor networks R Di Pietro, NV Verde Proceedings of the fourth ACM conference on Wireless network security, 11-22, 2011 | 31 | 2011 |
ABBA: Adaptive bicluster-based approach to impute missing values in binary matrices A Colantonio, R Di Pietro, A Ocello, NV Verde Proceedings of the 2010 ACM Symposium on Applied Computing, 1026-1033, 2010 | 31 | 2010 |
Mining stable roles in RBAC A Colantonio, R Di Pietro, A Ocello, NV Verde IFIP International Information Security Conference, 259-269, 2009 | 31 | 2009 |
A probabilistic bound on the basic role mining problem and its applications A Colantonio, R Di Pietro, A Ocello, NV Verde Emerging Challenges for Security, Privacy and Trust: 24th IFIP TC 11 …, 2009 | 27 | 2009 |
No place to hide that bytes won’t reveal: Sniffing location-based encrypted traffic to track a user’s position G Ateniese, B Hitaj, LV Mancini, NV Verde, A Villani Network and System Security: 9th International Conference, NSS 2015, New …, 2015 | 25 | 2015 |
Introducing epidemic models for data survivability in unattended wireless sensor networks R Di Pietro, NV Verde 2011 IEEE International symposium on a world of wireless, mobile and …, 2011 | 23 | 2011 |
Bypassing censorship: A proven tool against the recent internet censorship in Turkey A Di Florio, NV Verde, A Villani, D Vitali, LV Mancini 2014 IEEE International Symposium on Software Reliability Engineering …, 2014 | 22 | 2014 |
Mining business-relevant RBAC states through decomposition A Colantonio, R Di Pietro, A Ocello, NV Verde IFIP International Information Security Conference, 19-30, 2010 | 19 | 2010 |
Agir: Automating cyber threat intelligence reporting with natural language generation F Perrina, F Marchiori, M Conti, NV Verde 2023 IEEE International Conference on Big Data (BigData), 3053-3062, 2023 | 16 | 2023 |
Track me if you can: Transparent obfuscation for Location based Services R Di Pietro, R Mandati, NV Verde 2013 IEEE 14th International Symposium on" A World of Wireless, Mobile and …, 2013 | 16 | 2013 |