REGANO, Leonardo
REGANO, Leonardo
DIPARTIMENTO DI INGEGNERIA ELETTRICA ED ELETTRONICA
A Privacy-Preserving Approach for Vulnerability Scanning Detection
2024-01-01 Regano, L.; Canavese, D.; Mannella, L.
Automated Intel SGX integration for enhanced application security
2024-01-01 Regano, L.; Canavese, D.
Detecting Cryptomining Traffic in IoT Networks
2024-01-01 Mannella, L.; Canavese, D.; Regano, L.
Security at the Edge for Resource-Limited IoT Devices
2024-01-01 Canavese, Daniele; Mannella, Luca; Regano, Leonardo; Basile, Cataldo
A Model for Automated Cybersecurity Threat Remediation and Sharing
2023-01-01 Settanni, F.; Regano, L.; Basile, C.; Lioy, A.
Computer-Aided Reverse Engineering of Protected Software
2023-01-01 Canavese, Daniele; Regano, Leonardo; Lioy, Antonio
Design, implementation, and automation of a risk management approach for man-at-the-End software protection
2023-01-01 Basile, C.; De Sutter, B.; Canavese, D.; Regano, L.; Coppens, B.
A model of capabilities of Network Security Functions
2022-01-01 Basile, C.; Canavese, D.; Regano, L.; Pedone, I.; Lioy, A.
Data set and machine learning models for the classification of network traffic originators
2022-01-01 Canavese, D.; Regano, L.; Basile, C.; Ciravegna, G.; Lioy, A.
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection
2022-01-01 Canavese, Daniele; Regano, Leonardo; Basile, Cataldo; Ciravegna, Gabriele; Lioy, Antonio
Detection of encrypted cryptomining malware connections with machine and deep learning
2020-01-01 Pastor, Antonio; Mozo, Alberto; Vakaruk, Stanislav; Canavese, Daniele; Lopez, Diego R.; Regano, Leonardo; Gomez-Canaval, Sandra; Lioy, Antonio
Empirical assessment of the effort needed to attack programs protected with client/server code splitting
2020-01-01 Viticchie, A.; Regano, L.; Basile, C.; Torchiano, M.; Ceccato, M.; Tonella, P.
A meta-model for software protections and reverse engineering attacks
2019-01-01 Basile, Cataldo; Canavese, Daniele; Regano, Leonardo; Falcarin, Paolo; De Sutter, Bjorn
Estimating Software Obfuscation Potency with Artificial Neural Networks
2017-01-01 Canavese, Daniele; Regano, Leonardo; Basile, Cataldo; Viticchie', Alessio
Privacy issues of ISPs in the modern web
2017-01-01 Khatouni, Ali Safari; Trevisan, Martino; Regano, Leonardo; Viticchie, Alessio
Towards Optimally Hiding Protected Assets in Software Applications
2017-01-01 Regano, Leonardo; Canavese, Daniele; Basile, Cataldo; Lioy, Antonio
Assessment of Source Code Obfuscation Techniques
2016-01-01 Viticchie', Alessio; Regano, Leonardo; Torchiano, Marco; Basile, Cataldo; Ceccato, Mariano; Tonella, Paolo; Tiella, Roberto
Towards Automatic Risk Analysis and Mitigation of Software Applications
2016-01-01 Regano, Leonardo; Canavese, Daniele; Basile, Cataldo; Viticchie', Alessio; Lioy, Antonio
Titolo | Data di pubblicazione | Autore(i) | Rivista | Editore |
---|---|---|---|---|
A Privacy-Preserving Approach for Vulnerability Scanning Detection | 1-gen-2024 | Regano, L.; Canavese, D.; Mannella, L. | - | CEUR-WS |
Automated Intel SGX integration for enhanced application security | 1-gen-2024 | Regano, L.; Canavese, D. | IEEE ACCESS | - |
Detecting Cryptomining Traffic in IoT Networks | 1-gen-2024 | Mannella, L.; Canavese, D.; Regano, L. | - | Institute of Electrical and Electronics Engineers Inc. |
Security at the Edge for Resource-Limited IoT Devices | 1-gen-2024 | Canavese, Daniele; Mannella, Luca; Regano, Leonardo; Basile, Cataldo | SENSORS | - |
A Model for Automated Cybersecurity Threat Remediation and Sharing | 1-gen-2023 | Settanni, F.; Regano, L.; Basile, C.; Lioy, A. | - | Institute of Electrical and Electronics Engineers Inc. |
Computer-Aided Reverse Engineering of Protected Software | 1-gen-2023 | Canavese, Daniele; Regano, Leonardo; Lioy, Antonio | - | Springer |
Design, implementation, and automation of a risk management approach for man-at-the-End software protection | 1-gen-2023 | Basile, C.; De Sutter, B.; Canavese, D.; Regano, L.; Coppens, B. | COMPUTERS & SECURITY | - |
A model of capabilities of Network Security Functions | 1-gen-2022 | Basile, C.; Canavese, D.; Regano, L.; Pedone, I.; Lioy, A. | - | IEEE |
Data set and machine learning models for the classification of network traffic originators | 1-gen-2022 | Canavese, D.; Regano, L.; Basile, C.; Ciravegna, G.; Lioy, A. | DATA IN BRIEF | - |
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection | 1-gen-2022 | Canavese, Daniele; Regano, Leonardo; Basile, Cataldo; Ciravegna, Gabriele; Lioy, Antonio | COMPUTERS & ELECTRICAL ENGINEERING | - |
Detection of encrypted cryptomining malware connections with machine and deep learning | 1-gen-2020 | Pastor, Antonio; Mozo, Alberto; Vakaruk, Stanislav; Canavese, Daniele; Lopez, Diego R.; Regano, Leonardo; Gomez-Canaval, Sandra; Lioy, Antonio | IEEE ACCESS | - |
Empirical assessment of the effort needed to attack programs protected with client/server code splitting | 1-gen-2020 | Viticchie, A.; Regano, L.; Basile, C.; Torchiano, M.; Ceccato, M.; Tonella, P. | EMPIRICAL SOFTWARE ENGINEERING | - |
A meta-model for software protections and reverse engineering attacks | 1-gen-2019 | Basile, Cataldo; Canavese, Daniele; Regano, Leonardo; Falcarin, Paolo; De Sutter, Bjorn | THE JOURNAL OF SYSTEMS AND SOFTWARE | - |
Estimating Software Obfuscation Potency with Artificial Neural Networks | 1-gen-2017 | Canavese, Daniele; Regano, Leonardo; Basile, Cataldo; Viticchie', Alessio | - | Springer International Publishing |
Privacy issues of ISPs in the modern web | 1-gen-2017 | Khatouni, Ali Safari; Trevisan, Martino; Regano, Leonardo; Viticchie, Alessio | - | IEEE |
Towards Optimally Hiding Protected Assets in Software Applications | 1-gen-2017 | Regano, Leonardo; Canavese, Daniele; Basile, Cataldo; Lioy, Antonio | - | IEEE |
Assessment of Source Code Obfuscation Techniques | 1-gen-2016 | Viticchie', Alessio; Regano, Leonardo; Torchiano, Marco; Basile, Cataldo; Ceccato, Mariano; Tonella, Paolo; Tiella, Roberto | - | IEEE Computer Society |
Towards Automatic Risk Analysis and Mitigation of Software Applications | 1-gen-2016 | Regano, Leonardo; Canavese, Daniele; Basile, Cataldo; Viticchie', Alessio; Lioy, Antonio | - | Springer |