Follow
Alessandro Guarino
Alessandro Guarino
StAG SASU
Verified email at studioag.eu - Homepage
Title
Cited by
Cited by
Year
Digital forensics as a big data challenge
A Guarino
ISSE 2013 Securing Electronic Business Processes: Highlights of the …, 2013
942013
Autonomous intelligent cyber-defense agent (AICA) reference architecture. Release 2.0
A Kott, P Théron, M Drašar, E Dushku, B LeBlanc, P Losiewicz, A Guarino, ...
arXiv preprint arXiv:1803.10664, 2018
282018
Autonomous Intelligent Agents in Cyber Offence
A Guarino
CyCon 2013 - 5th International Conference on Cyber Conflict, 377-388, 2013
232013
The State vs. the People
A Guarino
Engineering & Technology 8 (10), 43-45, 2013
92013
Autonomous intelligent cyber-defense agent (AICA) reference architecture
A Kott, P Théron, M Drašar, E Dushku, B LeBlanc, P Losiewicz, A Guarino, ...
Release 2, 20783-1138, 2019
82019
Toward intelligent autonomous agents for cyber defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG
A Kott, R Thomas, M Drašar, M Kont, A Poylisher, B Blakely, P Theron, ...
arXiv preprint arXiv:1804.07646, 2018
82018
An introductory preview of Autonomous Intelligent Cyber-defense Agent reference architecture, release 2.0
A Kott, P Théron, LV Mancini, E Dushku, A Panico, M Drašar, B LeBlanc, ...
The Journal of Defense Modeling and Simulation 17 (1), 51-54, 2020
72020
Information Security Standards in Critical Infrastructure Protection
A Guarino
ISSE 2015 - Highlights of the Information Security Solutions Europe …, 2015
52015
Autonomous cyber weapons no longer science-fi ction
A Guarino
Engineering and Technology Magazine 8 (8), 2013
42013
Realising honeypot-as-a-service for smart home solutions
A Kostopoulos, IP Chochliouros, T Apostolopoulos, C Patsakis, ...
2020 5th South-East Europe Design Automation, Computer Engineering, Computer …, 2020
32020
Protocol Deployment for Employing Honeypot-as-a-Service
A Kostopoulos, I Chochliouros, C Patsakis, M Anastasiadis, A Guarino
Artificial Intelligence Applications and Innovations, 105-115, 2020
32020
What now? Data Retention Scenarios After the ECJ Ruling
A Guarino
ISSE 2014 Securing Electronic Business Processes: Highlights of the …, 2014
22014
Art Crime Does not pay: Multiplexed Social Network Analysis in Cultural Heritage Trafficking Forensics
J Salonen, A Guarino
International Conference on Cyber Warfare and Security 19 (1), 617-620, 2024
2024
Planes, Trains, and Automobiles: A New Dimension in Cyber Conflict
A Guarino, E Iasiello
The Journal of Intelligence and Cyber Security 1 (1), 2018
2018
Imposing and Evading Cyber Borders: The Sovereignty Dilemma
A Guarino, E Iasiello
Cyber, Intelligence, and Security 1 (2), 3 - 20, 2017
2017
I veicoli connessi: punto focale dell'Internet delle cose
A Guarino
Stati Generali dell'Intelligence Economica II Edizione, 2017
2017
Cyberspace Does Not Exist
A Guarino
http://www.studioag.pro/en/2015/01/la-nuvola-non-esiste/, 2015
2015
Attrition in the Alps [structural engineering]
A Guarino
Engineering & Technology 9 (6), 34-36, 2014
2014
L'approccio economico alla sicurezza delle informazioni
A Guarino
Università di Verona, 2013
2013
Intelligent weapons are coming [Engineering Cyber Agents]
A Guarino
Engineering & Technology 8 (8), 75-77, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–20