Antonio Nappa

Orcid: 0000-0002-9469-4925

According to our database1, Antonio Nappa authored at least 24 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Probabilistic Bayesian Neural Networks for olive phenology prediction in precision agriculture.
Ecol. Informatics, 2024

Adaptation of Diffusion Models for Remote Sensing Imagery.
Proceedings of the IGARSS 2024, 2024

An Autoencoder-Based Approach for Anomaly Detection of Machining Processes Using Acoustic Emission Signals.
Proceedings of the Engineering Applications of Neural Networks, 2024

2022
Scramblesuit: An effective timing side-channels framework for malware sandbox evasion.
J. Comput. Secur., 2022

2021
Blocklist Babel: On the Transparency and Dynamics of Open Source Blocklisting.
IEEE Trans. Netw. Serv. Manag., 2021

ZKSENSE: A Friction-less Privacy-Preserving Human Attestation Mechanism for Mobile Devices.
Proc. Priv. Enhancing Technol., 2021

POW-HOW: An enduring timing side-channel to evadeonline malware sandboxes.
CoRR, 2021

Deja-Vu: A Glimpse on Radioactive Soft-Error Consequences on Classical and Quantum Computations.
CoRR, 2021

VPN-Zero: A Privacy-Preserving Decentralized Virtual Private Network.
Proceedings of the IFIP Networking Conference, 2021

PoW-How: An Enduring Timing Side-Channel to Evade Online Malware Sandboxes.
Proceedings of the Computer Security - ESORICS 2021, 2021

2019
ZKSENSE: a Privacy-Preserving Mechanism for Bot Detection in Mobile Devices.
CoRR, 2019

VPN0: A Privacy-Preserving Decentralized Virtual Private Network.
CoRR, 2019

2016
Defending against cybercrime: advances in the detection of malicious servers and the analysis of client-side vulnerabilities.
PhD thesis, 2016

RevProbe: detecting silent reverse proxies in malicious server infrastructures.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
The MALICIA dataset: identification and analysis of drive-by download operations.
Int. J. Inf. Sec., 2015

Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

2014
CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

WhoWas: A Platform for Measuring Web Deployments on IaaS Clouds.
Proceedings of the 2014 Internet Measurement Conference, 2014

AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Driving in the Cloud: An Analysis of Drive-by Download Operations and Abuse Reporting.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013

2012
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities.
Proceedings of the International Symposium on Software Testing and Analysis, 2012


2010
Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype.
Proceedings of the Detection of Intrusions and Malware, 2010


  Loading...