Follow
Daniele Canavese
Daniele Canavese
IRIT-CNRS
Verified email at irit.fr
Title
Cited by
Cited by
Year
Detection of encrypted cryptomining malware connections with machine and deep learning
A Pastor, A Mozo, S Vakaruk, D Canavese, DR López, L Regano, ...
IEEE Access 8, 158036-158055, 2020
592020
Classification and analysis of communication protection policy anomalies
F Valenza, C Basile, D Canavese, A Lioy
IEEE/ACM Transactions on Networking 25 (5), 2601-2614, 2017
462017
A meta-model for software protections and reverse engineering attacks
C Basile, D Canavese, L Regano, P Falcarin, B De Sutter
Journal of Systems and Software 150, 3-21, 2019
382019
Assessing network authorization policies via reachability analysis
C Basile, D Canavese, C Pitscheider, A Lioy, F Valenza
Computers & Electrical Engineering 64, 110-131, 2017
242017
Inter‐function anomaly analysis for correct SDN/NFV deployment
C Basile, D Canavese, A Lioy, C Pitscheider, F Valenza
International Journal of Network Management 26 (1), 25-43, 2016
202016
Inter-technology conflict analysis for communication protection policies
C Basile, D Canavese, A Lioy, F Valenza
Risks and Security of Internet and Systems: 9th International Conference …, 2015
182015
Estimating software obfuscation potency with artificial neural networks
D Canavese, L Regano, C Basile, A Viticchié
Security and Trust Management: 13th International Workshop, STM 2017, Oslo …, 2017
172017
Security at the Edge for Resource-Limited IoT Devices
D Canavese, L Mannella, L Regano, C Basile
Sensors 24 (2), 590, 2024
162024
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection
D Canavese, L Regano, C Basile, G Ciravegna, A Lioy
Computers & Electrical Engineering 97, 107621, 2022
142022
Toward a complete software stack to integrate quantum key distribution in a cloud environment
I Pedone, A Atzeni, D Canavese, A Lioy
Ieee Access 9, 115270-115291, 2021
142021
Towards optimally hiding protected assets in software applications
L Regano, D Canavese, C Basile, A Lioy
2017 IEEE International Conference on Software Quality, Reliability and …, 2017
122017
Automatic discovery of software attacks via backward reasoning
C Basile, D Canavese, J d'Annoville, B De Sutter, F Valenza
2015 IEEE/ACM 1st International Workshop on Software Protection, 52-58, 2015
112015
Practical autonomous cyberhealth for resilient micro, small and medium-sized enterprises
E Mantas, D Papadopoulos, C Fernández, N Ortiz, M Compastié, ...
2021 IEEE International Mediterranean Conference on Communications and …, 2021
102021
Towards automatic risk analysis and mitigation of software applications
L Regano, D Canavese, C Basile, A Viticchié, A Lioy
Information Security Theory and Practice: 10th IFIP WG 11.2 International …, 2016
92016
Data set and machine learning models for the classification of network traffic originators
D Canavese, L Regano, C Basile, G Ciravegna, A Lioy
Data in Brief 41, 107968, 2022
72022
Design, implementation, and automation of a risk management approach for man-at-the-End software protection
C Basile, B De Sutter, D Canavese, L Regano, B Coppens
Computers & Security 132, 103321, 2023
62023
A model of capabilities of Network Security Functions
C Basile, D Canavese, L Regano, I Pedone, A Lioy
2022 IEEE 8th International Conference on Network Softwarization (NetSoft …, 2022
62022
Autoencoder-SAD: an autoencoder-based model for security attacks detection
DG Berbecaru, S Giannuzzi, D Canavese
2023 IEEE Symposium on Computers and Communications (ISCC), 758-763, 2023
52023
Improved reachability analysis for security management
C Basile, D Canavese, A Lioy, C Pitscheider
2013 21st Euromicro International Conference on Parallel, Distributed, and …, 2013
52013
Trusted computing technology and proposals for resolving cloud computing security problems
I Pedone, D Canavese, A Lioy
Cloud Computing Security, 373-386, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20