Seuraa
Leonardo Regano
Leonardo Regano
Postdoctoral researcher, Politecnico di Torino
Vahvistettu sähköpostiosoite verkkotunnuksessa polito.it
Nimike
Viittaukset
Viittaukset
Vuosi
Assessment of source code obfuscation techniques
A Viticchié, L Regano, M Torchiano, C Basile, M Ceccato, P Tonella, ...
2016 IEEE 16th international working conference on source code analysis and …, 2016
412016
Detection of encrypted cryptomining malware connections with machine and deep learning
A Pastor, A Mozo, S Vakaruk, D Canavese, DR López, L Regano, ...
IEEE Access 8, 158036-158055, 2020
242020
A meta-model for software protections and reverse engineering attacks
C Basile, D Canavese, L Regano, P Falcarin, B De Sutter
Journal of Systems and Software 150, 3-21, 2019
222019
Estimating Software Obfuscation Potency with Artificial Neural Networks
D Canavese, L Regano, C Basile, A Viticchié
International Workshop on Security and Trust Management, 193-202, 2017
102017
Empirical assessment of the effort needed to attack programs protected with client/server code splitting
A Viticchie, L Regano, C Basile, M Torchiano, M Ceccato, P Tonella
Empirical Software Engineering 25 (1), 1-48, 2020
92020
Privacy issues of ISPs in the modern web
AS Khatouni, M Trevisan, L Regano, A Viticchié
2017 8th IEEE Annual Information Technology, Electronics and Mobile …, 2017
9*2017
Towards optimally hiding protected assets in software applications
L Regano, D Canavese, C Basile, A Lioy
2017 IEEE International Conference on Software Quality, Reliability and …, 2017
62017
Towards automatic risk analysis and mitigation of software applications
L Regano, D Canavese, C Basile, A Viticchié, A Lioy
IFIP International Conference on Information Security Theory and Practice …, 2016
42016
Software Protection as a Risk Analysis Process
D Canavese, L Regano, C Basile, B Coppens, B De Sutter
arXiv preprint arXiv:2011.07269, 2020
22020
An expert system for automatic software protection
L Regano
Ph. D. Dissertation. Politecnico di Torino, 2019
22019
Data set and machine learning models for the classification of network traffic originators
D Canavese, L Regano, C Basile, G Ciravegna, A Lioy
Data in Brief 41, 107968, 2022
12022
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection
D Canavese, L Regano, C Basile, G Ciravegna, A Lioy
Computers & Electrical Engineering 97, 107621, 2022
12022
A meta-model for software protections and reverse engineering attacks: an instance of the metamodel
C Basile, D Cavanese, L Regano, P Falcarin, B De Sutter
Journal of Systems and SoftwareUnder submission, 0
1
A model of capabilities of Network Security Functions
C Basile, D Canavese, L Regano, I Pedone, A Lioy
2022 IEEE 8th International Conference on Network Softwarization (NetSoft …, 2022
2022
Towards intelligence driven automated incident response
C Basile, L Regano, F Settanni
Smart intrusion detection systems based on machine learning
A Lioy, D Canavese, L Regano, M Coscia
Protezione automatica del codice tramite enclavi SGX
A Lioy, L Regano, D Canavese, M Costa
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–17