Claudio Ciccotelli
22  results:
Search for persons X
?
2

Toward a Context-Aware Methodology for Information Security..:

, In: Cyber-Physical Security for Critical Infrastructures Protection; Lecture Notes in Computer Science,
 
?
4

Italian National Framework for Cybersecurity and Data Prote..:

, In: Privacy Technologies and Policy; Lecture Notes in Computer Science,
 
?
5

Cyber-attacks and threats for healthcare – a multi-layer th..:

, In: 2020 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC),
 
?
6

Peel the Onion: Recognition of Android Apps Behind the Tor ..:

, In: Information Security Practice and Experience; Lecture Notes in Computer Science,
 
?
7

FADa-CPS—Faults and Attacks Discrimination in Cyber Physica..:

, In: Policy-Based Autonomic Data Governance; Lecture Notes in Computer Science,
 
?
8

The overlay scan attack : inferring topologies of distri..:

, In: Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems,
 
?
9

Machine Learning for Malware Analysis in Embedded Systems:

, In: Machine Learning for Embedded System Security,
 
?
10

Emerging and Established Trends to Support Secure Health In..:

Emmanouil G. Spanakis ; Stelios Sfakianakis ; Silvia Bonomi...
https://www.frontiersin.org/articles/10.3389/fdgth.2021.636082/full.  , 2021
 
?
 
?
 
?
 
1-15