Daniele Sgandurra
Orcid: 0000-0001-5238-8068Affiliations:
- Huawei, Munich, Germany
- Royal Holloway - University of London, UK
According to our database1,
Daniele Sgandurra
authored at least 74 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
ACM Comput. Surv., August, 2024
EFACTLS: Effective Active TLS Fingerprinting for Large-Scale Server Deployment Characterization.
IEEE Trans. Netw. Serv. Manag., June, 2024
2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
2022
Proceedings of the 6th Network Traffic Measurement and Analysis Conference, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Cut-and-Mouse and Ghost Control: Exploiting Antivirus Software with Synthesized Inputs.
DTRAP, 2021
Identifying Authorship Style in Malicious Binaries: Techniques, Challenges & Datasets.
CoRR, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage.
Comput. J., 2020
Proceedings of the 17th IEEE Symposium on Visualization for Cyber Security, VizSec 2020, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
Proceedings of the Third Central European Cybersecurity Conference, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention.
IEEE Trans. Dependable Secur. Comput., 2018
Future Gener. Comput. Syst., 2018
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018
A Logic-Based Reasoner for Discovering Authentication Vulnerabilities Between Interconnected Accounts.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
2017
ACM Trans. Priv. Secur., 2017
J. Sensors, 2017
Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
A new security middleware architecture based on fog computing and cloud to support IoT constrained devices.
Proceedings of the 1st International Conference on Internet of Things and Machine Learning, 2017
2016
ACM Comput. Surv., 2016
Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection.
CoRR, 2016
Proceedings of the Data and Applications Security and Privacy XXX, 2016
2015
Future Gener. Comput. Syst., 2015
Concurr. Comput. Pract. Exp., 2015
Proceedings of the 23rd Euromicro International Conference on Parallel, 2015
Proceedings of the 1st IEEE/ACM International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, 2015
2014
Proceedings of the 22nd Euromicro International Conference on Parallel, 2014
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014
Addressing privacy issues in location-based collaborative and distributed environments.
Proceedings of the 2014 International Conference on Collaboration Technologies and Systems, 2014
2013
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Trusted Systems - 5th International Conference, 2013
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
Introducing Probabilities in Contract-Based Approaches for Mobile Application Security.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013
Proceedings of the 9th International Conference on Information Assurance and Security, 2013
Proceedings of the 9th International Conference on Information Assurance and Security, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Proceedings of the Computer Network Security, 2012
Proceedings of the Trusted Systems, 4th International Conference, 2012
2011
Proceedings of the 13th European Workshop on Dependable Computing, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010, 2010
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010
2009
Reliab. Eng. Syst. Saf., 2009
Proceedings of the Trusted Computing, 2009
Proceedings of the 17th Euromicro International Conference on Parallel, 2009
Proceedings of the Critical Infrastructure Protection III, 2009
Proceedings of the first ACM Cloud Computing Security Workshop, 2009
Securing Health Information Infrastructures through Overlays.
Proceedings of the Second International Conference on Health Informatics, 2009
2008
Proceedings of the 3rd International Workshop on Views On Designing Complex Architectures, 2008
Virtual interacting network community: exploiting multi-core architectures to increase security.
Proceedings of the 5th Conference on Computing Frontiers, 2008
Proceedings of the Resilient Networks and Services, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
Proceedings of the Fourth International IEEE Security in Storage Workshop, 2007
Proceedings of the Critical Information Infrastructures Security, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007