Luca Ferretti

Orcid: 0000-0001-5824-2297

According to our database1, Luca Ferretti authored at least 39 papers between 1994 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Timing side-channel attacks on USB devices using eBPF.
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024

Evaluating trainees in large cyber exercises.
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024

2023
A big data platform exploiting auditable tokenization to promote good practices inside local energy communities.
Future Gener. Comput. Syst., April, 2023

Practical Evaluation of Graph Neural Networks in Network Intrusion Detection.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023

How (not) to Index Order Revealing Encrypted Databases.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023

A Framework for Automating Security Assessments with Deductive Reasoning.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023

2022
DAGA: Detecting Attacks to In-Vehicle Networks via N-Gram Analysis.
IEEE Trans. Veh. Technol., 2022

Scalable, Confidential and Survivable Software Updates.
IEEE Trans. Parallel Distributed Syst., 2022

Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems.
DTRAP, 2022

WebDHT: browser-compatible distributed hash table for decentralized Web applications.
Proceedings of the 21st IEEE International Symposium on Network Computing and Applications, 2022

2021
Hardware Limitations to Secure C-ITS: Experimental Evaluation and Solutions.
IEEE Trans. Veh. Technol., 2021

OpenABM-Covid19 - An agent-based model for non-pharmaceutical interventions against COVID-19 including contact tracing.
PLoS Comput. Biol., 2021

Verifiable and auditable authorizations for smart industries and industrial Internet-of-Things.
J. Inf. Secur. Appl., 2021

Epidemiological and public health requirements for COVID-19 contact tracing apps and their evaluation.
CoRR, 2021

Survivable zero trust for cloud computing environments.
Comput. Secur., 2021

Accountable and privacy-aware flexible car sharing and rental services.
Proceedings of the 20th IEEE International Symposium on Network Computing and Applications, 2021

Flexible and Survivable Single Sign-On.
Proceedings of the Cyberspace Safety and Security - 13th International Symposium, 2021

2020
An experimental analysis of ECQV implicit certificates performance in VANETs.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

2019
Fog-based Secure Communications for Low-power IoT Devices.
ACM Trans. Internet Techn., 2019

Efficient License Management Based on Smart Contracts Between Software Vendors and Service Providers.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019

Authorization Transparency for Accountable Access to IoT Services.
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019

Addressing Adversarial Attacks Against Security Systems Based on Machine Learning.
Proceedings of the 11th International Conference on Cyber Conflict, 2019

2018
A symmetric cryptographic scheme for data integrity verification in cloud databases.
Inf. Sci., 2018

Analyses of Secure Automotive Communication Protocols and Their Impact on Vehicles Life-Cycle.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

On the effectiveness of machine and deep learning for cyber security.
Proceedings of the 10th International Conference on Cyber Conflict, 2018

2017
Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Guaranteeing Correctness of Bulk Operations in Outsourced Databases.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Implementation of Verified Set Operation Protocols Based on Bilinear Accumulators.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Enforcing Correct Behavior without Trust in Cloud Key-Value Databases.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases.
IEEE Trans. Parallel Distributed Syst., 2014

Scalable Architecture for Multi-User Encrypted SQL Operations on Cloud Database Services.
IEEE Trans. Cloud Comput., 2014

Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cloud Databases.
IEEE Trans. Cloud Comput., 2014

Efficient detection of unauthorized data modification in cloud databases.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

2013
Access Control Enforcement on Query-Aware Encrypted Cloud Databases.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
SNP calling by sequencing pooled samples.
BMC Bioinform., 2012

Supporting Security and Consistency for Cloud Database.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2011
Features and heterogeneities in growing network models
CoRR, 2011

2010
Preferential attachment in growing spatial networks
CoRR, 2010

1994
An Arm Exoskeleton System for Teleoperation and Virtual Environments Applications.
Proceedings of the 1994 International Conference on Robotics and Automation, 1994


  Loading...