Author of the publication

A Privacy-Preserving Approach for Vulnerability Scanning Detection.

, , and . ITASEC, volume 3731 of CEUR Workshop Proceedings, CEUR-WS.org, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classification and Analysis of Communication Protection Policy Anomalies., , , and . CoRR, (2017)Automated Intel SGX Integration for Enhanced Application Security., and . IEEE Access, (2024)A Privacy-Preserving Approach for Vulnerability Scanning Detection., , and . ITASEC, volume 3731 of CEUR Workshop Proceedings, CEUR-WS.org, (2024)A meta-model for software protections and reverse engineering attacks., , , , and . J. Syst. Softw., (2019)A model of capabilities of Network Security Functions., , , , and . NetSoft, page 474-479. IEEE, (2022)Autoencoder-SAD: An Autoencoder-based Model for Security Attacks Detection., , and . ISCC, page 758-763. IEEE, (2023)Computer-Aided Reverse Engineering of Protected Software., , and . CyberSec4Europe, volume 1807 of Communications in Computer and Information Science, page 3-15. Springer, (2022)Inter-technology Conflict Analysis for Communication Protection Policies., , , and . CRiSIS, volume 8924 of Lecture Notes in Computer Science, page 148-163. Springer, (2014)Automatic Discovery of Software Attacks via Backward Reasoning., , , , and . SPRO@ICSE, page 52-58. IEEE Computer Society, (2015)Automatic generation of high speed elliptic curve cryptography code.. Polytechnic University of Turin, Italy, (2016)base-search.net (ftpoltorinoiris:oai:iris.polito.it:11583/2652694).