Rak, Massimiliano
74  results:
Search for persons X
?
1

Advancing ESSecA: a step forward in Automated Penetration T..:

, In: Proceedings of the 19th International Conference on Availability, Reliability and Security,
 
?
2

DEFEDGE: Threat-Driven Security Testing and Proactive Defen..:

, In: Advanced Information Networking and Applications; Lecture Notes on Data Engineering and Communications Technologies,
 
?
4

Attacking a packet Analyzer: Caronte case study:

, In: 2023 IEEE International Conference on Cyber Security and Resilience (CSR),
 
?
8

MetaSEnD: A Security Enabled Development Life Cycle Meta-Mo..:

, In: Proceedings of the 17th International Conference on Availability, Reliability and Security,
 
?
 
?
10

A Semantic Methodology for Security Controls Verification i..:

, In: Complex, Intelligent and Software Intensive Systems; Lecture Notes in Networks and Systems,
 
?
11

Automated Threat Modeling Approaches: Comparison of Open So..:

, In: Communications in Computer and Information Science; Quality of Information and Communications Technology,
 
?
13

MAVLink Protocol for Unmanned Aerial Vehicle: Vulnerabiliti..:

, In: 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech),
 
?
14

Risk Analysis Automation Process in IT Security for Cloud A..:

, In: Communications in Computer and Information Science; Cloud Computing and Services Science,
 
1-15