Follow
Matteo Dell'Amico
Title
Cited by
Cited by
Year
Password strength: An empirical analysis
M Dell'Amico, P Michiardi, Y Roudier
2010 Proceedings IEEE INFOCOM, 1-9, 2010
3792010
Can I opt out yet? GDPR and the global illusion of cookie control
I Sanchez-Rola, M Dell'Amico, P Kotzias, D Balzarotti, L Bilge, PA Vervier, ...
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
2232019
Monte Carlo strength evaluation: Fast and reliable password checking
M Dell'Amico, M Filippone
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
1092015
Riskteller: Predicting the risk of cyber incidents
L Bilge, Y Han, M Dell'Amico
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
962017
NG-DBSCAN: scalable density-based clustering for arbitrary data
A Lulli, M Dell'Amico, P Michiardi, L Ricci
Proceedings of the VLDB Endowment 10 (3), 157-168, 2016
892016
The tangled genealogy of IoT malware
E Cozzi, PA Vervier, M Dell'Amico, Y Shen, L Bilge, D Balzarotti
Proceedings of the 36th Annual Computer Security Applications Conference, 1-16, 2020
702020
Online data backup: A peer-assisted approach
L Toka, M Dell'Amico, P Michiardi
2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P), 1-10, 2010
692010
An empirical study of availability in friend-to-friend storage systems
R Sharma, A Datta, M Dell'Amico, P Michiardi
P2P 2011, 2011
662011
HFSP: size-based scheduling for Hadoop
M Pastorelli, A Barbuzzi, D Carra, M Dell'Amico, P Michiardi
2013 IEEE International Conference on Big Data, 51-59, 2013
602013
Take a deep breath: a stealthy, resilient and cost-effective botnet using Skype
A Nappa, A Fattori, M Balduzzi, M Dell’Amico, L Cavallaro
International Conference on Detection of Intrusions and Malware, and …, 2010
522010
HFSP: bringing size-based scheduling to hadoop
M Pastorelli, D Carra, M Dell'Amico, P Michiardi
IEEE Transactions on Cloud Computing 5 (1), 43-56, 2015
442015
Sofia: Social filtering for robust recommendations
M Dell'Amico, L Capra
Trust Management II, 135-150, 2008
432008
Beyond precision and recall: understanding uses (and misuses) of similarity hashes in binary analysis
F Pagani, M Dell'Amico, D Balzarotti
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
422018
Revisiting size-based scheduling with estimated job sizes
M Dell'Amico, D Carra, M Pastorelli, P Michiardi
2014 IEEE 22nd International Symposium on Modelling, Analysis & Simulation …, 2014
352014
Systems and methods for providing integrated security management
K Roundy, M Dell'Amico, C Gates, M Hart, S Miskovic
US Patent 10,242,187, 2019
322019
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships
I Sanchez-Rola, M Dell'Amico, D Balzarotti, PA Vervier, L Bilge
IEEE Security and Privacy 2021, 2021
312021
PSBS: Practical size-based scheduling
M Dell'Amico, D Carra, P Michiardi
IEEE Transactions on Computers 65 (7), 2199-2212, 2015
292015
Lean on me: Mining internet service dependencies from large-scale DNS data
M Dell'Amico, L Bilge, A Kayyoor, P Efstathopoulos, PA Vervier
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
282017
Data transfer scheduling for p2p storage
L Toka, M Dell'Amico, P Michiardi
2011 IEEE International Conference on Peer-to-Peer Computing, 132-141, 2011
282011
A measurement of mixing time in social networks
M Dellamico, Y Roudier
Proceedings of the 5th International Workshop on Security and Trust …, 2009
272009
The system can't perform the operation now. Try again later.
Articles 1–20