Giovanni Salzillo

Orcid: 0000-0001-6491-9655

According to our database1, Giovanni Salzillo authored at least 14 papers between 2020 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
GDPR compliance through standard security controls: An automated approach.
J. High Speed Networks, 2024

2023
Automated threat modelling and risk analysis in e-Government using BPMN.
Connect. Sci., December, 2023

2022
ESSecA: An automated expert system for threat modelling and penetration testing for IoT ecosystems.
Comput. Electr. Eng., 2022

Automated Threat Modeling Approaches: Comparison of Open Source Tools.
Proceedings of the Quality of Information and Communications Technology, 2022

MetaSEnD: A Security Enabled Development Life Cycle Meta-Model.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Threat Modeling of Edge-Based IoT Applications.
Proceedings of the Quality of Information and Communications Technology, 2021

Security in IoT Pairing & Authentication protocols, a Threat Model, a Case Study Analysis.
Proceedings of the Italian Conference on Cybersecurity, 2021

Towards HybridgeCAN, a hybrid bridged CAN platform for automotive security testing.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

Risk Analysis Automation Process in IT Security for Cloud Applications.
Proceedings of the Cloud Computing and Services Science - 11th International Conference, 2021

2020
Evaluation of Driver Drowsiness based on Real-Time Face Analysis.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020

Threat Modeling based Penetration Testing: The Open Energy Monitor Case study.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

A Cloud SecDevOps Methodology: From Design to Testing.
Proceedings of the Quality of Information and Communications Technology, 2020

Systematic IoT Penetration Testing: Alexa Case Study.
Proceedings of the Fourth Italian Conference on Cyber Security, 2020

A (in)Secure-by-Design IoT Protocol: the ESP Touch Protocol and a Case Study Analysis from the Real Market.
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020


  Loading...