Daniele Canavese
Daniele Canavese
Vahvistettu sähköpostiosoite verkkotunnuksessa polito.it
Nimike
Viittaukset
Viittaukset
Vuosi
Classification and analysis of communication protection policy anomalies
F Valenza, C Basile, D Canavese, A Lioy
IEEE/ACM Transactions on Networking 25 (5), 2601-2614, 2017
182017
A meta-model for software protections and reverse engineering attacks
C Basile, D Canavese, L Regano, P Falcarin, B De Sutter
Journal of Systems and Software 150, 3-21, 2019
172019
Inter‐function anomaly analysis for correct SDN/NFV deployment
C Basile, D Canavese, A Lioy, C Pitscheider, F Valenza
International Journal of Network Management 26 (1), 25-43, 2016
172016
Assessing network authorization policies via reachability analysis
C Basile, D Canavese, C Pitscheider, A Lioy, F Valenza
Computers & Electrical Engineering 64, 110-131, 2017
162017
Inter-technology conflict analysis for communication protection policies
C Basile, D Canavese, A Lioy, F Valenza
International Conference on Risks and Security of Internet and Systems, 148-163, 2014
122014
Quantum programming made easy
L Paolini, L Roversi, M Zorzi
arXiv preprint arXiv:1711.00774, 2017
92017
Estimating software obfuscation potency with artificial neural networks
D Canavese, L Regano, C Basile, A Viticchié
International workshop on security and trust management, 193-202, 2017
92017
Automatic discovery of software attacks via backward reasoning
C Basile, D Canavese, J d'Annoville, B De Sutter, F Valenza
2015 IEEE/ACM 1st International Workshop on Software Protection, 52-58, 2015
7*2015
Detection of encrypted cryptomining malware connections with machine and deep learning
A Pastor, A Mozo, S Vakaruk, D Canavese, DR López, L Regano, ...
IEEE Access 8, 158036-158055, 2020
62020
Towards optimally hiding protected assets in software applications
L Regano, D Canavese, C Basile, A Lioy
2017 IEEE International Conference on Software Quality, Reliability and …, 2017
52017
Improved reachability analysis for security management
C Basile, D Canavese, A Lioy, C Pitscheider
2013 21st Euromicro International Conference on Parallel, Distributed, and …, 2013
52013
Towards automatic risk analysis and mitigation of software applications
L Regano, D Canavese, C Basile, A Viticchié, A Lioy
IFIP International Conference on Information Security Theory and Practice …, 2016
42016
A unified ontology for the virtualization domain
J Silvestro, D Canavese, E Cesena, P Smiraglia
OTM Confederated International Conferences" On the Move to Meaningful …, 2011
42011
Can a light typing discipline be compatible with an efficient implementation of finite fields inversion?
D Canavese, E Cesena, R Ouchary, M Pedicini, L Roversi
International Workshop on Foundational and Practical Aspects of Resource …, 2013
22013
D3. 2–SECURITY ONTOLOGY DEFINITION
C Basile, J Silvestro, A Lioy, D Canavese
22011
Light combinators for finite fields arithmetic
D Canavese, E Cesena, R Ouchary, M Pedicini, L Roversi
Science of Computer Programming 111, 365-394, 2015
12015
Software Protection as a Risk Analysis Process
D Canavese, L Regano, C Basile, B Coppens, B De Sutter
arXiv preprint arXiv:2011.07269, 2020
2020
Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems
I Pedone, D Canavese, A Lioy
Cloud Computing Security: Foundations and Challenges, 373, 2020
2020
D3. 4–METHODS FOR ONTOLOGY ENRICHMENT
LA Org, S Paraboschi, MA Neri, S Mutti, G Psaila, P Salvaneschi, C Basile, ...
2013
D3. 5–MODELS TO REFINE THE IT POLICY AT SERVICE LEVEL
LA Org, TS SAP, MA Neri, S Mutti, C Basile, D Canavese, SM Thomas
2012
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20