Flavio Lombardi

Orcid: 0000-0003-0723-7847

According to our database1, Flavio Lombardi authored at least 53 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Characterizing Polkadot's Transactions Ecosystem: methodology, tools, and insights.
CoRR, 2024

2023
A technical characterization of APTs by leveraging public resources.
Int. J. Inf. Sec., December, 2023

Segment Routing v6 - Security Issues and Experimental Results.
J. Ubiquitous Syst. Pervasive Networks, 2023

LENTO: Unpredictable Latency-based continuous authEntication for Network inTensive IoT envirOnments.
Future Gener. Comput. Syst., 2023

2022
Onion under Microscope: An in-depth analysis of the Tor Web.
World Wide Web, 2022

Some Results on Colored Network Contraction.
J. Ubiquitous Syst. Pervasive Networks, 2022

DruSiLa: an integrated, in-silico disease similarity-based approach for drug repurposing.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

Graph Contraction on Attribute-Based Coloring.
Proceedings of the 13th International Conference on Ambient Systems, 2022

On SRv6 Security.
Proceedings of the 13th International Conference on Ambient Systems, 2022

2021
Onion under Microscope: An in-depth analysis of the Tor network.
CoRR, 2021

2019
Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search.
J. Cryptogr. Eng., 2019

Spiders like Onions: on the Network of Tor Hidden Services.
Proceedings of the World Wide Web Conference, 2019

Edge Computing Perspectives: Architectures, Technologies, and Open Security Issues.
Proceedings of the 3rd IEEE International Conference on Edge Computing, 2019

GPU Algorithms for K-Anonymity in Microdata.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Analysing the tor web with high performance graph algorithms.
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019

2018
Traffic Data Classification for Police Activity.
Proceedings of the Foundations of Intelligent Systems - 24th International Symposium, 2018

Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives.
Proceedings of the From Database to Cyber Security, 2018

2017
Exploring and Analyzing the Tor Hidden Services Graph.
ACM Trans. Web, 2017

Traffic Data: Exploratory Data Analysis with Apache Accumulo.
Proceedings of the Traffic Mining Applied to Police Activities, 2017

Unsupervised Classification of Routes and Plates from the Trap-2017 Dataset.
Proceedings of the Traffic Mining Applied to Police Activities, 2017

HyBIS: Advanced Introspection for Effective Windows Guest Protection.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

CoLLIDE: CLoud Latency-based IDEntification.
Proceedings of the 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2017) / The 7th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2017) / Affiliated Workshops, 2017

A Novel GPU-Based Implementation of the Cube Attack - Preliminary Results Against Trivium.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware.
IEEE Trans. Mob. Comput., 2016

CUDA Leaks: A Detailed Hack for CUDA and a (Partial) Fix.
ACM Trans. Embed. Comput. Syst., 2016

FRoDO: Fraud Resilient Device for Off-Line Micro-Payments.
IEEE Trans. Dependable Secur. Comput., 2016

HyBIS: Windows Guest Protection through Advanced Memory Introspection.
CoRR, 2016

CURE - Towards enforcing a reliable timeline for cloud forensics: Model, architecture, and experiments.
Comput. Commun., 2016

2015
AntiCheetah: Trustworthy computing in an outsourced (cheating) environment.
Future Gener. Comput. Syst., 2015

CloRoFor: Cloud Robust Forensics.
CoRR, 2015

2014
CloRExPa: Cloud resilience via execution path analysis.
Future Gener. Comput. Syst., 2014

Thwarting Obfuscated Malware via Differential Fault Analysis.
Computer, 2014

FORCE - Fully Off-line secuRe CrEdits for Mobile Micro Payments.
Proceedings of the SECRYPT 2014, 2014

SOLDI: Secure Off-Line Disposable CredIts to Secure Mobile Micro Payments.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

2013
CUDA Leaks: Information Leakage in GPU Architectures.
CoRR, 2013

AntiCheetah: An Autonomic Multi-round Approach for Reliable Computing.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

CheR: Cheating Resilience in the Cloud via Smart Resource Allocation.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

2011
Secure virtualization for cloud computing.
J. Netw. Comput. Appl., 2011

2010
CReW: Cloud Resilience for Windows Guests through Monitored Virtualization.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

Transparent security for cloud.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

A Security Management Architecture for the Protection of Kernel Virtual Machines.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
KvmSec: a security extension for Linux kernel virtual machines.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Processes for software development within the Public Administration.
Proceedings of the 2009 ICSE Workshop on Software Quality, 2009

2007
Feasibility and benefits of migrating towards JEE: a real life case.
Proceedings of the 5th International Symposium on Principles and Practice of Programming in Java, 2007

2006
Leveraging the Grid for the Autonomic Management of Complex Infrastructures.
Proceedings of the 2006 International Conference on Grid Computing & Applications, 2006

2005
Jet-Lag, Java Heterogeneous Log Analysis on the Grid: Architecture, Implementation and Performance Evaluation.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2005

A Reliable Multicast Approach to Replica Management for Grids.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2005

Extending the UDDI API for service instance ranking.
Proceedings of The 2005 International Symposium on Web Services and Applications, 2005

Transparent Java Threads Migration Protocol over Peer2Peer.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

2004
Reliable secure multicast data transmission and applications.
PhD thesis, 2004

2002
A Java Architecture for Secure Reliable Multicast Data Transfer: Performance Evaluation.
Proceedings of the IASTED International Conference on Communications, 2002

2001
A Java Implementation of a Reliable Multicast File Transfer Protocol: Design and Evaluation.
Proceedings of the Fifth IASTED International Conference Internet and Multimedia Systems and Applications (IMSA 2001), 2001


  Loading...