Zannone, Nicola
266  Ergebnisse:
Personensuche X
?
1

WiP: Enhancing the Comprehension of XACML Policies:

, In: Proceedings of the 29th ACM Symposium on Access Control Models and Technologies,
 
?
2

Cognition in Social Engineering Empirical Research: A Syste..:

Burda, Pavlo ; Allodi, Luca ; Zannone, Nicola
ACM Transactions on Computer-Human Interaction.  31 (2024)  2 - p. 1-55 , 2024
 
?
 
?
4

A Bargaining-Game Framework for Multi-Party Access Control:

, In: Proceedings of the 29th ACM Symposium on Access Control Models and Technologies,
 
?
5

The Influence of Human Factors on the Intention to Report P..:

, In: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems,
 
?
6

Impact Analysis of Coordinated Cyber-Physical Attacks via S..:

, In: Formal Techniques for Distributed Objects, Components, and Systems; Lecture Notes in Computer Science,
 
?
7

ICS Honeypot Interactions: A Latitudinal Study:

, In: 2023 IEEE International Conference on Big Data (BigData),
Lupia, Francesco ; Lucchese, Marco ; Merro, Massimo. - p. 3025-3034 , 2023
 
?
8

Data Sharing in Social Networks:

, In: Proceedings of the 28th ACM Symposium on Access Control Models and Technologies,
 
?
9

A Decision-Support Tool for Experimentation on Zero-Hour Ph..:

, In: Foundations and Practice of Security; Lecture Notes in Computer Science,
Burda, Pavlo ; Allodi, Luca ; Zannone, Nicola - p. 443-452 , 2023
 
?
10

A Comprehensive Study on Third-Party User Tracking in Mobil..:

, In: Proceedings of the 18th International Conference on Availability, Reliability and Security,
 
?
11

Mitigating Privilege Misuse in Access Control through Anoma..:

, In: Proceedings of the 18th International Conference on Availability, Reliability and Security,
 
?
12

Towards Obfuscation of Programmable Logic Controllers:

, In: Proceedings of the 18th International Conference on Availability, Reliability and Security,
 
?
13

Privacy-Preserving Multi-Party Access Control for Third-Par..:

, In: Proceedings of the 28th ACM Symposium on Access Control Models and Technologies,
 
?
14

Investigating the Resolution of Vulnerable Dependencies wit..:

, In: 2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR),
 
?
15

Towards A High-interaction Physics-aware Honeynet for Indus..:

, In: Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing,
 
1-15