Matteo Dell'Amico

Orcid: 0000-0003-3152-4993

According to our database1, Matteo Dell'Amico authored at least 54 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SBOM Generation Tools in the Python Ecosystem: an In-Detail Analysis.
CoRR, 2024

Sonic: Fast and Transferable Data Poisoning on Clustering Algorithms.
CoRR, 2024

2023
MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

An OS-agnostic Approach to Memory Forensics.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
The Supermarket Model With Known and Predicted Service Times.
IEEE Trans. Parallel Distributed Syst., 2022

Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
Unsupervised Detection and Clustering of Malicious TLS Flows.
CoRR, 2021

2020
Webs of Trust: Choosing Who to Trust on the Internet.
Proceedings of the Privacy Technologies and Policy - 8th Annual Privacy Forum, 2020

The Tangled Genealogy of IoT Malware.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
FISHDBC: Flexible, Incremental, Scalable, Hierarchical Density-Based Clustering for Arbitrary Data and Distance.
CoRR, 2019

Scheduling With Inexact Job Sizes: The Merits of Shortest Processing Time First.
CoRR, 2019

A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

Can I Opt Out Yet?: GDPR and the Global Illusion of Cookie Control.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Beyond Precision and Recall: Understanding Uses (and Misuses) of Similarity Hashes in Binary Analysis.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
HFSP: Bringing Size-Based Scheduling To Hadoop.
IEEE Trans. Cloud Comput., 2017

Scalable and flexible clustering solutions for mobile phone-based population indicators.
Int. J. Data Sci. Anal., 2017

RiskTeller: Predicting the Risk of Cyber Incidents.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Smoke Detector: Cross-Product Intrusion Detection With Weak Indicators.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

Lean On Me: Mining Internet Service Dependencies From Large-Scale DNS Data.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
PSBS: Practical Size-Based Scheduling.
IEEE Trans. Computers, 2016

NG-DBSCAN: Scalable Density-Based Clustering for Arbitrary Data.
Proc. VLDB Endow., 2016

Improving population estimation from mobile calls: A clustering approach.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

2015
On User Availability Prediction and Network Applications.
IEEE/ACM Trans. Netw., 2015

On Fair Size-Based Scheduling.
CoRR, 2015

Adaptive redundancy management for durable P2P backup.
Comput. Networks, 2015

Monte Carlo Strength Evaluation: Fast and Reliable Password Checking.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Scalable k-NN based text clustering.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

Efficient and Self-Balanced ROLLUP Aggregates for Large-Scale Data Summarization.
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015

2014
Revisiting Size-Based Scheduling with Estimated Job Sizes.
Proceedings of the IEEE 22nd International Symposium on Modelling, 2014

OS-Assisted Task Preemption for Hadoop.
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014

On the design space of MapReduce ROLLUP aggregates.
Proceedings of the Workshops of the EDBT/ICDT 2014 Joint Conference (EDBT/ICDT 2014), 2014

2013
HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems.
Inf. Secur. Tech. Rep., 2013

A Simulator for Data-Intensive Job Scheduling.
CoRR, 2013

Reference Monitors for Security and Interoperability in OAuth 2.0.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Trend makers and trend spotters in a mobile application.
Proceedings of the Computer Supported Cooperative Work, 2013

HFSP: Size-based scheduling for Hadoop.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013

2012
HiPoLDS: A Security Policy Language for Distributed Systems.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

Spotting trends: the wisdom of the few.
Proceedings of the Sixth ACM Conference on Recommender Systems, 2012

Redundancy management for P2P backup.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
Data transfer scheduling for P2P storage.
Proceedings of the 2011 IEEE International Conference on Peer-to-Peer Computing, 2011

An empirical study of availability in friend-to-friend storage systems.
Proceedings of the 2011 IEEE International Conference on Peer-to-Peer Computing, 2011

2010
Dependable filtering: Philosophy and realizations.
ACM Trans. Inf. Syst., 2010

Back To The Future: On Predicting User Uptime
CoRR, 2010

On Scheduling and Redundancy for P2P Backup
CoRR, 2010

Online Data Backup: A Peer-Assisted Approach.
Proceedings of the IEEE Tenth International Conference on Peer-to-Peer Computing, 2010

Password Strength: An Empirical Analysis.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype.
Proceedings of the Detection of Intrusions and Malware, 2010

2009
Measuring Password Strength: An Empirical Analysis
CoRR, 2009

2008
Neighbourhood maps: decentralized ranking in small-world P2P networks.
Concurr. Comput. Pract. Exp., 2008

SOFIA: Social Filtering for Robust Recommendations.
Proceedings of the Trust Management II, 2008

2007
Mapping Small Worlds.
Proceedings of the Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), 2007

2006
Neighbourhood maps: decentralised ranking in small-world P2P networks.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

DO-Casl: An Observer-Based Casl Extension for Dynamic Specifications.
Proceedings of the Algebraic Methodology and Software Technology, 2006

2005
Injecting Distribution in CASL.
Proceedings of the Foundations of Global Computing, 20.-25. February 2005, 2005


  Loading...