Seguir
Daniele Canavese
Daniele Canavese
IRIT-CNRS
Email confirmado em irit.fr
Título
Citado por
Citado por
Ano
Detection of encrypted cryptomining malware connections with machine and deep learning
A Pastor, A Mozo, S Vakaruk, D Canavese, DR López, L Regano, ...
IEEE Access 8, 158036-158055, 2020
472020
Classification and analysis of communication protection policy anomalies
F Valenza, C Basile, D Canavese, A Lioy
IEEE/ACM Transactions on Networking 25 (5), 2601-2614, 2017
402017
A meta-model for software protections and reverse engineering attacks
C Basile, D Canavese, L Regano, P Falcarin, B De Sutter
Journal of Systems and Software 150, 3-21, 2019
322019
Assessing network authorization policies via reachability analysis
C Basile, D Canavese, C Pitscheider, A Lioy, F Valenza
Computers & Electrical Engineering 64, 110-131, 2017
242017
Inter‐function anomaly analysis for correct SDN/NFV deployment
C Basile, D Canavese, A Lioy, C Pitscheider, F Valenza
International Journal of Network Management 26 (1), 25-43, 2016
192016
Inter-technology conflict analysis for communication protection policies
C Basile, D Canavese, A Lioy, F Valenza
Risks and Security of Internet and Systems: 9th International Conference …, 2015
172015
Estimating software obfuscation potency with artificial neural networks
D Canavese, L Regano, C Basile, A Viticchié
Security and Trust Management: 13th International Workshop, STM 2017, Oslo …, 2017
152017
Toward a complete software stack to integrate quantum key distribution in a cloud environment
I Pedone, A Atzeni, D Canavese, A Lioy
Ieee Access 9, 115270-115291, 2021
112021
Practical autonomous cyberhealth for resilient micro, small and medium-sized enterprises
E Mantas, D Papadopoulos, C Fernández, N Ortiz, M Compastié, ...
2021 IEEE International Mediterranean Conference on Communications and …, 2021
102021
Towards optimally hiding protected assets in software applications
L Regano, D Canavese, C Basile, A Lioy
2017 IEEE International Conference on Software Quality, Reliability and …, 2017
102017
Automatic discovery of software attacks via backward reasoning
C Basile, D Canavese, J d'Annoville, B De Sutter, F Valenza
2015 IEEE/ACM 1st International Workshop on Software Protection, 52-58, 2015
102015
Towards automatic risk analysis and mitigation of software applications
L Regano, D Canavese, C Basile, A Viticchié, A Lioy
Information Security Theory and Practice: 10th IFIP WG 11.2 International …, 2016
72016
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection
D Canavese, L Regano, C Basile, G Ciravegna, A Lioy
Computers & Electrical Engineering 97, 107621, 2022
62022
Improved reachability analysis for security management
C Basile, D Canavese, A Lioy, C Pitscheider
2013 21st Euromicro International Conference on Parallel, Distributed, and …, 2013
42013
A unified ontology for the virtualization domain
J Silvestro, D Canavese, E Cesena, P Smiraglia
On the Move to Meaningful Internet Systems: OTM 2011: Confederated …, 2011
42011
A model of capabilities of Network Security Functions
C Basile, D Canavese, L Regano, I Pedone, A Lioy
2022 IEEE 8th International Conference on Network Softwarization (NetSoft …, 2022
32022
Data set and machine learning models for the classification of network traffic originators
D Canavese, L Regano, C Basile, G Ciravegna, A Lioy
Data in Brief 41, 107968, 2022
32022
Trusted computing technology and proposals for resolving cloud computing security problems
I Pedone, D Canavese, A Lioy
Cloud Computing Security, 373-386, 2020
32020
Can a light typing discipline be compatible with an efficient implementation of finite fields inversion?
D Canavese, E Cesena, R Ouchary, M Pedicini, L Roversi
International Workshop on Foundational and Practical Aspects of Resource …, 2013
22013
Security at the Edge for Resource-Limited IoT Devices
D Canavese, L Mannella, L Regano, C Basile
Sensors 24 (2), 590, 2024
12024
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20