Seguir
Matteo Dell'Amico
Matteo Dell'Amico
Dirección de correo verificada de unige.it
Título
Citado por
Citado por
Año
Password strength: An empirical analysis
M Dell'Amico, P Michiardi, Y Roudier
2010 Proceedings IEEE INFOCOM, 1-9, 2010
3822010
Can I opt out yet? GDPR and the global illusion of cookie control
I Sanchez-Rola, M Dell'Amico, P Kotzias, D Balzarotti, L Bilge, PA Vervier, ...
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
2262019
Monte Carlo strength evaluation: Fast and reliable password checking
M Dell'Amico, M Filippone
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
1102015
Riskteller: Predicting the risk of cyber incidents
L Bilge, Y Han, M Dell'Amico
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
982017
NG-DBSCAN: scalable density-based clustering for arbitrary data
A Lulli, M Dell'Amico, P Michiardi, L Ricci
Proceedings of the VLDB Endowment 10 (3), 157-168, 2016
902016
The tangled genealogy of IoT malware
E Cozzi, PA Vervier, M Dell'Amico, Y Shen, L Bilge, D Balzarotti
Proceedings of the 36th Annual Computer Security Applications Conference, 1-16, 2020
722020
Online data backup: A peer-assisted approach
L Toka, M Dell'Amico, P Michiardi
2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P), 1-10, 2010
692010
An empirical study of availability in friend-to-friend storage systems
R Sharma, A Datta, M Dell'Amico, P Michiardi
P2P 2011, 2011
662011
HFSP: size-based scheduling for Hadoop
M Pastorelli, A Barbuzzi, D Carra, M Dell'Amico, P Michiardi
2013 IEEE International Conference on Big Data, 51-59, 2013
612013
Take a deep breath: a stealthy, resilient and cost-effective botnet using Skype
A Nappa, A Fattori, M Balduzzi, M Dell’Amico, L Cavallaro
International Conference on Detection of Intrusions and Malware, and …, 2010
532010
HFSP: bringing size-based scheduling to hadoop
M Pastorelli, D Carra, M Dell'Amico, P Michiardi
IEEE Transactions on Cloud Computing 5 (1), 43-56, 2015
452015
Beyond precision and recall: understanding uses (and misuses) of similarity hashes in binary analysis
F Pagani, M Dell'Amico, D Balzarotti
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
432018
Sofia: Social filtering for robust recommendations
M Dell'Amico, L Capra
Trust Management II, 135-150, 2008
432008
Revisiting size-based scheduling with estimated job sizes
M Dell'Amico, D Carra, M Pastorelli, P Michiardi
2014 IEEE 22nd International Symposium on Modelling, Analysis & Simulation …, 2014
362014
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships
I Sanchez-Rola, M Dell'Amico, D Balzarotti, PA Vervier, L Bilge
IEEE Security and Privacy 2021, 2021
322021
Systems and methods for providing integrated security management
K Roundy, M Dell'Amico, C Gates, M Hart, S Miskovic
US Patent 10,242,187, 2019
322019
PSBS: Practical size-based scheduling
M Dell'Amico, D Carra, P Michiardi
IEEE Transactions on Computers 65 (7), 2199-2212, 2015
292015
Data transfer scheduling for p2p storage
L Toka, M Dell'Amico, P Michiardi
2011 IEEE International Conference on Peer-to-Peer Computing, 132-141, 2011
292011
Lean on me: Mining internet service dependencies from large-scale DNS data
M Dell'Amico, L Bilge, A Kayyoor, P Efstathopoulos, PA Vervier
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
282017
A measurement of mixing time in social networks
M Dellamico, Y Roudier
Proceedings of the 5th International Workshop on Security and Trust …, 2009
272009
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20