Sfoglia per Autore
Securing Interruptible Enclaved Execution on Small Microprocessors
2021 Busi, Matteo; Noorman, Job; Van Bulck, Jo; Galletta, Letterio; Degano, Pierpaolo; Mühlberg, Jan Tobias; Piessens, Frank
Framework, Tools and Good Practices for Cybersecurity Curricula
2021 Hajny, J.; Ricci, S.; Piesarskas, E.; Levillain, O.; Galletta, L.; De Nicola, R.
Can my Firewall System Enforce this Policy?
2022 Ceragioli, Lorenzo; Degano, Pierpaolo; Galletta, Letterio
Resilience of Hybrid Casper under varying values of parameters
2022 Galletta, Letterio; Laneve, Cosimo; Mercanti, Ivan; Veschetti, Adele
Towards effective preservation of robust safety properties
2022 Busi, Matteo; Degano, Pierpaolo; Galletta, Letterio
IFCIL: An Information Flow Configuration Language for SELinux
2022 Ceragioli, L.; Galletta, L.; Degano, P.; Basin, D.
Covid19/IT the digital side of Covid19: A picture from Italy with clustering and taxonomy
2022 Bonnici, Vincenzo; Cicceri, Giovanni; Distefano, Salvatore; Galletta, Letterio; Polignano, Marco; Scaffidi, Carlo
A type language for distributed reactive components governed by communication protocols
2023 Savanovic, Zorica; Galletta, Letterio
Risk Estimation in IoT Systems
2023 Bodei, Chiara; Ferrari, Gian-Luigi; Galletta, Letterio; Degano, Pierpaolo
Formally verifying security protocols built on watermarking and jamming
2023 Costa, Gabriele; Degano, Pierpaolo; Galletta, Letterio; Soderi, Simone
A Netting Protocol for Liquidity-saving Automated Market Makers
2024 Renieri, M.; Galletta, L.; Lafuente, A. L.; Chiang, J. H. -Y.
Systems Security Modeling and Analysis at IMT Lucca
2024 Costa, Gabriele; DE FRANCISCI, Silvia; Galletta, Letterio; Perini Brogi, Cosimo; Petrocchi, Marinella; Pinelli, Fabio; Pizziol, Roberto; Pratelli, Manuel; Renieri, Margherita; Soderi, Simone; Tribastone, Mirco; Valiani, Serenella
Explainable Ponzi Schemes Detection on Ethereum
2024 Galletta, Letterio; Pinelli, Fabio
A Logic for Policy Based Resource Exchanges in Multiagent Systems
2024 Ceragioli, Lorenzo; Degano, Pierpaolo; Galletta, Letterio; Viganò, Luca
Securing SATCOM user segment: A study on cybersecurity challenges in view of IRIS2
2024 Casaril, F.; Galletta, L.
A Comparison of Hosting Techniques for Online Cybersecurity Competitions
2024 Maggioni, N.; Galletta, L.
Specifying and Verifying Information Flow Control in SELinux Configurations
2024 Ceragioli, L.; Galletta, L.; Degano, P.; Basin, D.
X-SPIDE: an eXplainable machine learning pipeline for detecting smart Ponzi contracts in ethereum
2025 Pennella, Luca; Pinelli, Fabio; Galletta, Letterio
Space cybersecurity governance: assessing policies and frameworks in view of the future European space legislation
2025 Casaril, Francesco; Galletta, Letterio
A Policy Framework for Regulating External Calls in Smart Contracts
2025 Renieri, Margherita; Galletta, Letterio
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Securing Interruptible Enclaved Execution on Small Microprocessors | 1-gen-2021 | Busi, Matteo; Noorman, Job; Van Bulck, Jo; Galletta, Letterio; Degano, Pierpaolo; Mühlberg, Jan Tobias; Piessens, Frank | |
Framework, Tools and Good Practices for Cybersecurity Curricula | 1-gen-2021 | Hajny, J.; Ricci, S.; Piesarskas, E.; Levillain, O.; Galletta, L.; De Nicola, R. | |
Can my Firewall System Enforce this Policy? | 1-gen-2022 | Ceragioli, Lorenzo; Degano, Pierpaolo; Galletta, Letterio | |
Resilience of Hybrid Casper under varying values of parameters | 1-gen-2022 | Galletta, Letterio; Laneve, Cosimo; Mercanti, Ivan; Veschetti, Adele | |
Towards effective preservation of robust safety properties | 1-gen-2022 | Busi, Matteo; Degano, Pierpaolo; Galletta, Letterio | |
IFCIL: An Information Flow Configuration Language for SELinux | 1-gen-2022 | Ceragioli, L.; Galletta, L.; Degano, P.; Basin, D. | |
Covid19/IT the digital side of Covid19: A picture from Italy with clustering and taxonomy | 1-gen-2022 | Bonnici, Vincenzo; Cicceri, Giovanni; Distefano, Salvatore; Galletta, Letterio; Polignano, Marco; Scaffidi, Carlo | |
A type language for distributed reactive components governed by communication protocols | 1-gen-2023 | Savanovic, Zorica; Galletta, Letterio | |
Risk Estimation in IoT Systems | 1-gen-2023 | Bodei, Chiara; Ferrari, Gian-Luigi; Galletta, Letterio; Degano, Pierpaolo | |
Formally verifying security protocols built on watermarking and jamming | 1-gen-2023 | Costa, Gabriele; Degano, Pierpaolo; Galletta, Letterio; Soderi, Simone | |
A Netting Protocol for Liquidity-saving Automated Market Makers | 1-gen-2024 | Renieri, M.; Galletta, L.; Lafuente, A. L.; Chiang, J. H. -Y. | |
Systems Security Modeling and Analysis at IMT Lucca | 1-gen-2024 | Costa, Gabriele; DE FRANCISCI, Silvia; Galletta, Letterio; Perini Brogi, Cosimo; Petrocchi, Marinella; Pinelli, Fabio; Pizziol, Roberto; Pratelli, Manuel; Renieri, Margherita; Soderi, Simone; Tribastone, Mirco; Valiani, Serenella | |
Explainable Ponzi Schemes Detection on Ethereum | 1-gen-2024 | Galletta, Letterio; Pinelli, Fabio | |
A Logic for Policy Based Resource Exchanges in Multiagent Systems | 1-gen-2024 | Ceragioli, Lorenzo; Degano, Pierpaolo; Galletta, Letterio; Viganò, Luca | |
Securing SATCOM user segment: A study on cybersecurity challenges in view of IRIS2 | 1-gen-2024 | Casaril, F.; Galletta, L. | |
A Comparison of Hosting Techniques for Online Cybersecurity Competitions | 1-gen-2024 | Maggioni, N.; Galletta, L. | |
Specifying and Verifying Information Flow Control in SELinux Configurations | 1-gen-2024 | Ceragioli, L.; Galletta, L.; Degano, P.; Basin, D. | |
X-SPIDE: an eXplainable machine learning pipeline for detecting smart Ponzi contracts in ethereum | 1-gen-2025 | Pennella, Luca; Pinelli, Fabio; Galletta, Letterio | |
Space cybersecurity governance: assessing policies and frameworks in view of the future European space legislation | 1-gen-2025 | Casaril, Francesco; Galletta, Letterio | |
A Policy Framework for Regulating External Calls in Smart Contracts | 1-gen-2025 | Renieri, Margherita; Galletta, Letterio |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile