Assessment of source code obfuscation techniques A Viticchié, L Regano, M Torchiano, C Basile, M Ceccato, P Tonella, ... 2016 IEEE 16th international working conference on source code analysis and …, 2016 | 64 | 2016 |
Detection of encrypted cryptomining malware connections with machine and deep learning A Pastor, A Mozo, S Vakaruk, D Canavese, DR López, L Regano, ... IEEE Access 8, 158036-158055, 2020 | 62 | 2020 |
A meta-model for software protections and reverse engineering attacks C Basile, D Canavese, L Regano, P Falcarin, B De Sutter Journal of Systems and Software 150, 3-21, 2019 | 39 | 2019 |
Security at the Edge for Resource-Limited IoT Devices D Canavese, L Mannella, L Regano, C Basile Sensors 24 (2), 590, 2024 | 20 | 2024 |
Empirical assessment of the effort needed to attack programs protected with client/server code splitting A Viticchié, L Regano, C Basile, M Torchiano, M Ceccato, P Tonella Empirical Software Engineering 25, 1-48, 2020 | 19 | 2020 |
Estimating Software Obfuscation Potency with Artificial Neural Networks D Canavese, L Regano, C Basile, A Viticchié International Workshop on Security and Trust Management, 193-202, 2017 | 17 | 2017 |
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection D Canavese, L Regano, C Basile, G Ciravegna, A Lioy Computers & Electrical Engineering 97, 107621, 2022 | 14 | 2022 |
Towards optimally hiding protected assets in software applications L Regano, D Canavese, C Basile, A Lioy 2017 IEEE International Conference on Software Quality, Reliability and …, 2017 | 13 | 2017 |
Privacy issues of ISPs in the modern web AS Khatouni, M Trevisan, L Regano, A Viticchié 2017 8th IEEE Annual Information Technology, Electronics and Mobile …, 2017 | 12 | 2017 |
Towards automatic risk analysis and mitigation of software applications L Regano, D Canavese, C Basile, A Viticchié, A Lioy Information Security Theory and Practice: 10th IFIP WG 11.2 International …, 2016 | 9 | 2016 |
A model of capabilities of Network Security Functions C Basile, D Canavese, L Regano, I Pedone, A Lioy 2022 IEEE 8th International Conference on Network Softwarization (NetSoft …, 2022 | 7 | 2022 |
Data set and machine learning models for the classification of network traffic originators D Canavese, L Regano, C Basile, G Ciravegna, A Lioy Data in Brief 41, 107968, 2022 | 7 | 2022 |
Design, implementation, and automation of a risk management approach for man-at-the-End software protection C Basile, B De Sutter, D Canavese, L Regano, B Coppens Computers & Security 132, 103321, 2023 | 6 | 2023 |
An Expert System for Automatic Software Protection. L Regano Polytechnic University of Turin, Italy, 2019 | 5 | 2019 |
A Model for Automated Cybersecurity Threat Remediation and Sharing F Settanni, L Regano, C Basile, A Lioy 2023 IEEE 9th International Conference on Network Softwarization (NetSoft …, 2023 | 3 | 2023 |
A Privacy-Preserving Approach for Vulnerability Scanning Detection L Regano, D Canavese, L Mannella Proceedings of the Italian Conference on Cybersecurity (ITASEC 2024). CEUR-WS, 2024 | 2 | 2024 |
Smart intrusion detection systems based on machine learning M Coscia Politecnico di Torino, 2021 | 2 | 2021 |
Software protection as a risk analysis process D Canavese, L Regano, C Basile, B Coppens, B De Sutter IEEE Transactions On Dependable And Secure Computing, 2020 | 2 | 2020 |
A meta-model for software protections and reverse engineering attacks: an instance of the metamodel C Basile, D Cavanese, L Regano, P Falcarin, B De Sutter Journal of Systems and SoftwareUnder submission, 0 | 1 | |
Exploring the Robustness of AI-Driven Tools in Digital Forensics: A Preliminary Study SL Sanna, L Regano, D Maiorca, G Giacinto arXiv preprint arXiv:2412.01363, 2024 | | 2024 |