Daniele Canavese
Daniele Canavese
Vahvistettu sähköpostiosoite verkkotunnuksessa
Classification and analysis of communication protection policy anomalies
F Valenza, C Basile, D Canavese, A Lioy
IEEE/ACM Transactions on Networking 25 (5), 2601-2614, 2017
Detection of encrypted cryptomining malware connections with machine and deep learning
A Pastor, A Mozo, S Vakaruk, D Canavese, DR López, L Regano, ...
IEEE Access 8, 158036-158055, 2020
A meta-model for software protections and reverse engineering attacks
C Basile, D Canavese, L Regano, P Falcarin, B De Sutter
Journal of Systems and Software 150, 3-21, 2019
Assessing network authorization policies via reachability analysis
C Basile, D Canavese, C Pitscheider, A Lioy, F Valenza
Computers & Electrical Engineering 64, 110-131, 2017
Inter‐function anomaly analysis for correct SDN/NFV deployment
C Basile, D Canavese, A Lioy, C Pitscheider, F Valenza
International Journal of Network Management 26 (1), 25-43, 2016
Inter-technology conflict analysis for communication protection policies
C Basile, D Canavese, A Lioy, F Valenza
International Conference on Risks and Security of Internet and Systems, 148-163, 2014
Estimating software obfuscation potency with artificial neural networks
D Canavese, L Regano, C Basile, A Viticchié
International workshop on security and trust management, 193-202, 2017
Automatic discovery of software attacks via backward reasoning
C Basile, D Canavese, J d'Annoville, B De Sutter, F Valenza
2015 IEEE/ACM 1st International Workshop on Software Protection, 52-58, 2015
Towards optimally hiding protected assets in software applications
L Regano, D Canavese, C Basile, A Lioy
2017 IEEE International Conference on Software Quality, Reliability and …, 2017
Toward a complete software stack to integrate quantum key distribution in a cloud environment
I Pedone, A Atzeni, D Canavese, A Lioy
IEEE Access 9, 115270-115291, 2021
Improved reachability analysis for security management
C Basile, D Canavese, A Lioy, C Pitscheider
2013 21st Euromicro International Conference on Parallel, Distributed, and …, 2013
Towards automatic risk analysis and mitigation of software applications
L Regano, D Canavese, C Basile, A Viticchié, A Lioy
IFIP International Conference on Information Security Theory and Practice …, 2016
A unified ontology for the virtualization domain
J Silvestro, D Canavese, E Cesena, P Smiraglia
OTM Confederated International Conferences" On the Move to Meaningful …, 2011
Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems
I Pedone, D Canavese, A Lioy
Cloud Computing Security, 373-386, 2020
Man-at-the-End Software Protection as a Risk Analysis Process
D Canavese, L Regano, C Basile, B Coppens, B De Sutter
arXiv preprint arXiv:2011.07269, 2022
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection
D Canavese, L Regano, C Basile, G Ciravegna, A Lioy
Computers & Electrical Engineering 97, 107621, 2022
Practical Autonomous Cyberhealth for resilient Micro, Small and Medium-sized Enterprises
E Mantas, D Papadopoulos, C Fernández, N Ortiz, M Compastié, ...
2021 IEEE International Mediterranean Conference on Communications and …, 2021
Can a light typing discipline be compatible with an efficient implementation of finite fields inversion?
D Canavese, E Cesena, R Ouchary, M Pedicini, L Roversi
International Workshop on Foundational and Practical Aspects of Resource …, 2013
Data set and machine learning models for the classification of network traffic originators
D Canavese, L Regano, C Basile, G Ciravegna, A Lioy
Data in Brief 41, 107968, 2022
Light combinators for finite fields arithmetic
D Canavese, E Cesena, R Ouchary, M Pedicini, L Roversi
Science of Computer Programming 111, 365-394, 2015
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20