Author of the publication

An Experimental Approach for Estimating Cyber Risk: a Proposal Building upon Cyber Ranges and Capture the Flags.

, , , , and . EuroS&P Workshops, page 56-65. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Security Cost of Using a Free and Open Source Component in a Proprietary Product., , and . ESSoS, volume 9639 of Lecture Notes in Computer Science, page 190-206. Springer, (2016)An Experimental Approach for Estimating Cyber Risk: a Proposal Building upon Cyber Ranges and Capture the Flags., , , , and . EuroS&P Workshops, page 56-65. IEEE, (2020)TESTREX: a Testbed for Repeatable Exploits., , , and . CSET, USENIX Association, (2014)Dissecting Android Cryptocurrency Miners., , , , and . CoRR, (2019)Dissecting Android Cryptocurrency Miners., , , , and . CODASPY, page 191-202. ACM, (2020)Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020..TestREx: a Framework for Repeatable Exploits., , , and . CoRR, (2017)Security assessment of open source third-parties applications.. University of Trento, Italy, (2017)The Influence of Code Coverage Metrics on Automated Testing Efficiency in Android., , , and . CCS, page 2216-2218. ACM, (2018)An Effective Android Code Coverage Tool., , , , and . CCS, page 2189-2191. ACM, (2018)Delta-Bench: Differential Benchmark for Static Analysis Security Testing Tools., , and . ESEM, page 163-168. IEEE Computer Society, (2017)