Digital forensics as a big data challenge A Guarino ISSE 2013 Securing Electronic Business Processes: Highlights of the …, 2013 | 105 | 2013 |
Autonomous intelligent cyber-defense agent (AICA) reference architecture. Release 2.0 A Kott, P Théron, M Drašar, E Dushku, B LeBlanc, P Losiewicz, A Guarino, ... arXiv preprint arXiv:1803.10664, 2018 | 33 | 2018 |
Autonomous Intelligent Agents in Cyber Offence A Guarino CyCon 2013 - 5th International Conference on Cyber Conflict, 377-388, 2013 | 30 | 2013 |
Autonomous intelligent cyber-defense agent (AICA) reference architecture A Kott, P Théron, M Drašar, E Dushku, B LeBlanc, P Losiewicz, A Guarino, ... Release 2, 20783-1138, 2019 | 9 | 2019 |
The State vs. the People A Guarino Engineering & Technology 8 (10), 43-45, 2013 | 9 | 2013 |
Toward intelligent autonomous agents for cyber defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG A Kott, R Thomas, M Drašar, M Kont, A Poylisher, B Blakely, P Theron, ... arXiv preprint arXiv:1804.07646, 2018 | 8 | 2018 |
An introductory preview of Autonomous Intelligent Cyber-defense Agent reference architecture, release 2.0 A Kott, P Théron, LV Mancini, E Dushku, A Panico, M Drašar, B LeBlanc, ... The Journal of Defense Modeling and Simulation 17 (1), 51-54, 2020 | 7 | 2020 |
Information Security Standards in Critical Infrastructure Protection A Guarino ISSE 2015 - Highlights of the Information Security Solutions Europe …, 2015 | 5 | 2015 |
Autonomous cyber weapons no longer science-fi ction A Guarino Engineering and Technology Magazine 8 (8), 2013 | 4 | 2013 |
Realising honeypot-as-a-service for smart home solutions A Kostopoulos, IP Chochliouros, T Apostolopoulos, C Patsakis, ... 2020 5th South-East Europe Design Automation, Computer Engineering, Computer …, 2020 | 3 | 2020 |
Protocol Deployment for Employing Honeypot-as-a-Service A Kostopoulos, I Chochliouros, C Patsakis, M Anastasiadis, A Guarino Artificial Intelligence Applications and Innovations, 105-115, 2020 | 3 | 2020 |
What now? Data Retention Scenarios After the ECJ Ruling A Guarino ISSE 2014 Securing Electronic Business Processes: Highlights of the …, 2014 | 2 | 2014 |
Art Crime Does not pay: Multiplexed Social Network Analysis in Cultural Heritage Trafficking Forensics J Salonen, A Guarino International Conference on Cyber Warfare and Security 19 (1), 617-620, 2024 | | 2024 |
Planes, Trains, and Automobiles: A New Dimension in Cyber Conflict A Guarino, E Iasiello The Journal of Intelligence and Cyber Security 1 (1), 2018 | | 2018 |
Imposing and Evading Cyber Borders: The Sovereignty Dilemma A Guarino, E Iasiello Cyber, Intelligence, and Security 1 (2), 3 - 20, 2017 | | 2017 |
I veicoli connessi: punto focale dell'Internet delle cose A Guarino Stati Generali dell'Intelligence Economica II Edizione, 2017 | | 2017 |
Cyberspace Does Not Exist A Guarino http://www.studioag.pro/en/2015/01/la-nuvola-non-esiste/, 2015 | | 2015 |
Attrition in the Alps [structural engineering] A Guarino Engineering & Technology 9 (6), 34-36, 2014 | | 2014 |
L'approccio economico alla sicurezza delle informazioni A Guarino Università di Verona, 2013 | | 2013 |
Intelligent weapons are coming [Engineering Cyber Agents] A Guarino Engineering & Technology 8 (8), 75-77, 2013 | | 2013 |