Russello, Giovanni
163  results:
Search for persons X
?
3

Keep Me Updated: An Empirical Study on Embedded Javascript ..:

, In: Proceedings of the 21st International Conference on Mining Software Repositories,
Wen, Elliott ; Zhou, Jiaxiang ; Luo, Xiapu.. - p. 361-372 , 2024
 
?
4

Obfuscating Evasive Decision Trees:

, In: Lecture Notes in Computer Science; Progress in Cryptology – INDOCRYPT 2023,
 
?
5

Mostree: Malicious Secure Private Decision Tree Evaluation ..:

, In: Proceedings of the 39th Annual Computer Security Applications Conference,
Bai, Jianli ; Song, Xiangfu ; Zhang, Xiaowu... - p. 799-813 , 2023
 
?
8

A Large-Scale Study of Device and Link Presentation in Emai..:

, In: Proceedings of the 35th Australian Computer-Human Interaction Conference,
Zhuo, Sijie ; Biddle, Robert ; Betts, Lucas... - p. 78-85 , 2023
 
?
9

CryptoMask: Privacy-Preserving Face Recognition:

, In: Information and Communications Security; Lecture Notes in Computer Science,
Bai, Jianli ; Zhang, Xiaowu ; Song, Xiangfu... - p. 333-350 , 2023
 
?
12

SoK: Human-centered Phishing Susceptibility:

Zhuo, Sijie ; Biddle, Robert ; Koh, Yun Sing..
ACM Transactions on Privacy and Security.  26 (2023)  3 - p. 1-27 , 2023
 
?
 
?
14

Preventing Reverse Engineering of Control Programs in Indus..:

, In: Proceedings of the 9th ACM Cyber-Physical System Security Workshop,
 
?
15

AppBox: A Black-Box Application Sandboxing Technique for Mo..:

, In: 2023 IEEE Symposium on Computers and Communications (ISCC),
 
1-15