Mirco Marchetti
Cited by
Cited by
Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults.
A Clement, EL Wong, L Alvisi, M Dahlin, M Marchetti
NSDI 9, 153-168, 2009
Distributed, concurrent, and independent access to encrypted cloud databases
L Ferretti, M Colajanni, M Marchetti
IEEE transactions on parallel and distributed systems 25 (2), 437-446, 2013
Analysis of high volumes of network traffic for advanced persistent threat detection
M Marchetti, F Pierazzi, M Colajanni, A Guido
Computer Networks 109, 127-141, 2016
FlightPath: Obedience vs. Choice in Cooperative Services.
HC Li, A Clement, M Marchetti, M Kapritsos, L Robison, L Alvisi, M Dahlin
OSDI 8, 355-368, 2008
Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms
M Marchetti, D Stabili, A Guido, M Colajanni
2016 IEEE 2nd International Forum on Research and Technologies for Society …, 2016
Anomaly detection of CAN bus messages through analysis of ID sequences
M Marchetti, D Stabili
2017 IEEE Intelligent Vehicles Symposium (IV), 1577-1583, 2017
On the effectiveness of machine and deep learning for cyber security
G Apruzzese, M Colajanni, L Ferretti, A Guido, M Marchetti
2018 10th international conference on cyber Conflict (CyCon), 371-390, 2018
Supporting security and consistency for cloud database
L Ferretti, M Colajanni, M Marchetti
International Symposium on Cyberspace Safety and Security, 179-193, 2012
A parallel architecture for stateful intrusion detection in high traffic networks
M Colajanni, M Marchetti
Proc. of the IEEE/IST Workshop on” Monitoring, attack detection and …, 2006
READ: Reverse engineering of automotive data frames
M Marchetti, D Stabili
IEEE Transactions on Information Forensics and Security 14 (4), 1083-1097, 2018
Detecting attacks to internal vehicle networks through Hamming distance
D Stabili, M Marchetti, M Colajanni
2017 AEIT International Annual Conference, 1-6, 2017
BFT: The time is now
A Clement, M Marchetti, E Wong, L Alvisi, M Dahlin
Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and …, 2008
Countering Advanced Persistent Threats through security intelligence and big data analytics
M Marchetti, F Pierazzi, A Guido, M Colajanni
2016 8th International Conference on Cyber Conflict (CyCon), 243-261, 2016
Peer-to-peer architecture for collaborative intrusion and malware detection on a large scale
M Marchetti, M Messori, M Colajanni
International Conference on Information Security, 475-490, 2009
Defending financial infrastructures through early warning systems: the intelligence cloud approach
G Lodi, L Querzoni, R Baldoni, M Marchetti, M Colajanni, V Bortnikov, ...
Proceedings of the 5th Annual Workshop on Cyber Security and Information …, 2009
Security and confidentiality solutions for public cloud database services
L Ferretti, F Pierazzi, M Colajanni, M Marchetti
The Seventh International Conference on Emerging Security Information …, 2013
Access control enforcement on query-aware encrypted cloud databases
L Ferretti, M Colajanni, M Marchetti
2013 IEEE 5th International Conference on Cloud Computing Technology and …, 2013
A collaborative framework for intrusion detection in mobile networks
M Andreolini, M Colajanni, M Marchetti
Information Sciences 321, 179-192, 2015
Scalable architecture for multi-user encrypted SQL operations on cloud database services
L Ferretti, F Pierazzi, M Colajanni, M Marchetti
IEEE Transactions on Cloud computing 2 (4), 448-458, 2014
Dynamic load balancing for network intrusion detection systems based on distributed architectures
M Andreolini, S Casolari, M Colajanni, M Marchetti
Sixth IEEE International Symposium on Network Computing and Applications …, 2007
The system can't perform the operation now. Try again later.
Articles 1–20