Federico Maggi
Orcid: 0000-0003-1073-8036Affiliations:
- Politecnico di Milano, Milan, Italy
According to our database1,
Federico Maggi
authored at least 68 papers
between 2007 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
-
on maggi.cc
On csauthors.net:
Bibliography
2022
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022
2021
RFQuack: A Universal Hardware-Software Toolkit for Wireless Protocol (Security) Analysis and Research.
CoRR, 2021
2020
A simple pre-factor for contaminant biodegradation potential and its application to pesticides risk assessment.
Math. Comput. Simul., 2020
Math. Comput. Simul., 2020
Proceedings of the 2nd International Conference on Industry 4.0 and Smart Manufacturing (ISM 2020), 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
Security of controlled manufacturing systems in the connected factory: the case of industrial robots.
J. Comput. Virol. Hacking Tech., 2019
BRTSim, a general-purpose computational solver for hydrological, biogeochemical, and ecosystem dynamics.
CoRR, 2019
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
2018
ACM Trans. Priv. Secur., 2018
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology.
J. Comput. Virol. Hacking Tech., 2017
Proc. Priv. Enhancing Technol., 2017
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
2016
Proceedings of the Security and Privacy in Communication Networks, 2016
XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners.
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
BankSealer: A decision support system for online banking fraud analysis and investigation.
Comput. Secur., 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
J. Comput. Virol. Hacking Tech., 2014
PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications.
CoRR, 2014
CoRR, 2014
Proceedings of the 23rd International World Wide Web Conference, 2014
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014
2013
IEEE Embed. Syst. Lett., 2013
CoRR, 2013
Proceedings of the 22nd International World Wide Web Conference, 2013
AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors.
Proceedings of the SPSM'13, 2013
A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives.
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the 8th International Symposium on Visualization for Cyber Security, 2011
Proceedings of the Information Systems Security - 7th International Conference, 2011
Proceedings of the First SysSec Workshop 2011, 2011
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
2010
IEEE Trans. Dependable Secur. Comput., 2010
Proceedings of the Network and Distributed System Security Symposium, 2010
Proceedings of the Decision and Game Theory for Security, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Inf. Fusion, 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Detection of Intrusions and Malware, 2009
2007
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007