Seguir
Leonardo Regano
Leonardo Regano
Assistant Professor, Università di Cagliari
Dirección de correo verificada de unica.it
Título
Citado por
Citado por
Año
Assessment of source code obfuscation techniques
A Viticchié, L Regano, M Torchiano, C Basile, M Ceccato, P Tonella, ...
2016 IEEE 16th international working conference on source code analysis and …, 2016
642016
Detection of encrypted cryptomining malware connections with machine and deep learning
A Pastor, A Mozo, S Vakaruk, D Canavese, DR López, L Regano, ...
IEEE Access 8, 158036-158055, 2020
622020
A meta-model for software protections and reverse engineering attacks
C Basile, D Canavese, L Regano, P Falcarin, B De Sutter
Journal of Systems and Software 150, 3-21, 2019
392019
Security at the Edge for Resource-Limited IoT Devices
D Canavese, L Mannella, L Regano, C Basile
Sensors 24 (2), 590, 2024
202024
Empirical assessment of the effort needed to attack programs protected with client/server code splitting
A Viticchié, L Regano, C Basile, M Torchiano, M Ceccato, P Tonella
Empirical Software Engineering 25, 1-48, 2020
192020
Estimating Software Obfuscation Potency with Artificial Neural Networks
D Canavese, L Regano, C Basile, A Viticchié
International Workshop on Security and Trust Management, 193-202, 2017
172017
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection
D Canavese, L Regano, C Basile, G Ciravegna, A Lioy
Computers & Electrical Engineering 97, 107621, 2022
142022
Towards optimally hiding protected assets in software applications
L Regano, D Canavese, C Basile, A Lioy
2017 IEEE International Conference on Software Quality, Reliability and …, 2017
132017
Privacy issues of ISPs in the modern web
AS Khatouni, M Trevisan, L Regano, A Viticchié
2017 8th IEEE Annual Information Technology, Electronics and Mobile …, 2017
122017
Towards automatic risk analysis and mitigation of software applications
L Regano, D Canavese, C Basile, A Viticchié, A Lioy
Information Security Theory and Practice: 10th IFIP WG 11.2 International …, 2016
92016
A model of capabilities of Network Security Functions
C Basile, D Canavese, L Regano, I Pedone, A Lioy
2022 IEEE 8th International Conference on Network Softwarization (NetSoft …, 2022
72022
Data set and machine learning models for the classification of network traffic originators
D Canavese, L Regano, C Basile, G Ciravegna, A Lioy
Data in Brief 41, 107968, 2022
72022
Design, implementation, and automation of a risk management approach for man-at-the-End software protection
C Basile, B De Sutter, D Canavese, L Regano, B Coppens
Computers & Security 132, 103321, 2023
62023
An Expert System for Automatic Software Protection.
L Regano
Polytechnic University of Turin, Italy, 2019
52019
A Model for Automated Cybersecurity Threat Remediation and Sharing
F Settanni, L Regano, C Basile, A Lioy
2023 IEEE 9th International Conference on Network Softwarization (NetSoft …, 2023
32023
A Privacy-Preserving Approach for Vulnerability Scanning Detection
L Regano, D Canavese, L Mannella
Proceedings of the Italian Conference on Cybersecurity (ITASEC 2024). CEUR-WS, 2024
22024
Smart intrusion detection systems based on machine learning
M Coscia
Politecnico di Torino, 2021
22021
Software protection as a risk analysis process
D Canavese, L Regano, C Basile, B Coppens, B De Sutter
IEEE Transactions On Dependable And Secure Computing, 2020
22020
A meta-model for software protections and reverse engineering attacks: an instance of the metamodel
C Basile, D Cavanese, L Regano, P Falcarin, B De Sutter
Journal of Systems and SoftwareUnder submission, 0
1
Exploring the Robustness of AI-Driven Tools in Digital Forensics: A Preliminary Study
SL Sanna, L Regano, D Maiorca, G Giacinto
arXiv preprint arXiv:2412.01363, 2024
2024
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20