Mirco Marchetti

Orcid: 0000-0002-7408-6906

According to our database1, Mirco Marchetti authored at least 79 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Performance Comparison of Timing-Based Anomaly Detectors for Controller Area Network: A Reproducible Study.
ACM Trans. Cyber Phys. Syst., April, 2024

Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Neural Networks.
CoRR, 2024

Assessing generalizability of Deep Reinforcement Learning algorithms for Automated Vulnerability Assessment and Penetration Testing.
Array, 2024

RealCAN: bringing real-time capabilities to canplayer.
Proceedings of the 100th IEEE Vehicular Technology Conference, 2024

Finding (and Exploiting) Vulnerabilities on IP Cameras: The Tenda CP3 Case Study.
Proceedings of the Advances in Information and Computer Security, 2024

HackCar: a test platform for attacks and defenses on a cost-contained automotive architecture.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2024

Hardening Machine Learning based Network Intrusion Detection Systems with synthetic netflows.
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024

Implementing and testing RollJam on Software-Defined Radios.
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024

Evaluating trainees in large cyber exercises.
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024

2023
A multidisciplinary detection system for cyber attacks on Powertrain Cyber Physical Systems.
Future Gener. Comput. Syst., July, 2023

Are VANETs pseudonyms effective? An experimental evaluation of pseudonym tracking in adversarial scenario.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

Decentralized position detection for moving vehicles.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

ARGANIDS: a novel Network Intrusion Detection System based on adversarially Regularized Graph Autoencoder.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

Practical Evaluation of Graph Neural Networks in Network Intrusion Detection.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023

How (not) to Index Order Revealing Encrypted Databases.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023

A Framework for Automating Security Assessments with Deductive Reasoning.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023

2022
DAGA: Detecting Attacks to In-Vehicle Networks via N-Gram Analysis.
IEEE Trans. Veh. Technol., 2022

Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems.
DTRAP, 2022

Exploring the consequences of cyber attacks on Powertrain Cyber Physical Systems.
CoRR, 2022

On the effectiveness of BSM communications in V2V emergency scenarios.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022

SixPack v2: enhancing SixPack to avoid last generation misbehavior detectors in VANETs.
Proceedings of the 21st IEEE International Symposium on Network Computing and Applications, 2022

Robustness Evaluation of Network Intrusion Detection Systems based on Sequential Machine Learning.
Proceedings of the 21st IEEE International Symposium on Network Computing and Applications, 2022

Comparison of Machine Learning-based anomaly detectors for Controller Area Network.
Proceedings of the 21st IEEE International Symposium on Network Computing and Applications, 2022

2021
Hardware Limitations to Secure C-ITS: Experimental Evaluation and Solutions.
IEEE Trans. Veh. Technol., 2021

Glyph: Efficient ML-Based Detection of Heap Spraying Attacks.
IEEE Trans. Inf. Forensics Secur., 2021

SixPack: Abusing ABS to avoid Misbehavior detection in VANETs.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

Towards the COSCA framework for "COnseptualing Secure CArs".
Proceedings of the Open Identity Summit 2021, Copenhagen, Denmark, June 1-2, 2021., 2021

Analysis, prevention and detection of ransomware attacks on Industrial Control Systems.
Proceedings of the 20th IEEE International Symposium on Network Computing and Applications, 2021

Accountable and privacy-aware flexible car sharing and rental services.
Proceedings of the 20th IEEE International Symposium on Network Computing and Applications, 2021

2020
Deep Reinforcement Adversarial Learning Against Botnet Evasion Attacks.
IEEE Trans. Netw. Serv. Manag., 2020

Hardening Random Forest Cyber Detectors Against Adversarial Attacks.
IEEE Trans. Emerg. Top. Comput. Intell., 2020

Detection and Threat Prioritization of Pivoting Attacks in Large Networks.
IEEE Trans. Emerg. Top. Comput., 2020

AppCon: Mitigating Evasion Attacks to ML Cyber Detectors.
Symmetry, 2020

A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises.
Mob. Networks Appl., 2020

An experimental analysis of ECQV implicit certificates performance in VANETs.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

2019
Fog-based Secure Communications for Low-power IoT Devices.
ACM Trans. Internet Techn., 2019

READ: Reverse Engineering of Automotive Data Frames.
IEEE Trans. Inf. Forensics Secur., 2019

Detection of Missing CAN Messages through Inter-Arrival Time Analysis.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Evaluating the effectiveness of Adversarial Attacks against Botnet Detectors.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019

Addressing Adversarial Attacks Against Security Systems Based on Machine Learning.
Proceedings of the 11th International Conference on Cyber Conflict, 2019

2018
A symmetric cryptographic scheme for data integrity verification in cloud databases.
Inf. Sci., 2018

Analyses of Secure Automotive Communication Protocols and Their Impact on Vehicles Life-Cycle.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

On the effectiveness of machine and deep learning for cyber security.
Proceedings of the 10th International Conference on Cyber Conflict, 2018

2017
Identifying malicious hosts involved in periodic communications.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Anomaly detection of CAN bus messages through analysis of ID sequences.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2017

Scalable architecture for online prioritisation of cyber threats.
Proceedings of the 9th International Conference on Cyber Conflict, 2017

Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Exploratory security analytics for anomaly detection.
Comput. Secur., 2016

Analysis of high volumes of network traffic for Advanced Persistent Threat detection.
Comput. Networks, 2016

Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms.
Proceedings of the 2nd IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2016

Guaranteeing Correctness of Bulk Operations in Outsourced Databases.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Countering Advanced Persistent Threats through security intelligence and big data analytics.
Proceedings of the 8th International Conference on Cyber Conflict, 2016

Implementation of Verified Set Operation Protocols Based on Bilinear Accumulators.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
A collaborative framework for intrusion detection in mobile networks.
Inf. Sci., 2015

The Network Perspective of Cloud Security.
Proceedings of the Fourth IEEE Symposium on Network Cloud Computing and Applications, 2015

Supporting sense-making and decision-making through time evolution analysis of open sources.
Proceedings of the 7th International Conference on Cyber Conflict: Architectures in Cyberspace, 2015

Enforcing Correct Behavior without Trust in Cloud Key-Value Databases.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases.
IEEE Trans. Parallel Distributed Syst., 2014

Scalable Architecture for Multi-User Encrypted SQL Operations on Cloud Database Services.
IEEE Trans. Cloud Comput., 2014

Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cloud Databases.
IEEE Trans. Cloud Comput., 2014

Efficient detection of unauthorized data modification in cloud databases.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

2013
Access Control Enforcement on Query-Aware Encrypted Cloud Databases.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
Supporting Security and Consistency for Cloud Database.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

Collaborative Attack Detection Using Distributed Hash Tables.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

Cyber Attacks on Financial Critical Infrastructures.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

2011
Defeating NIDS evasion in Mobile IPv6 networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Multistep Attack Detection and Alert Correlation in Intrusion Detection Systems.
Proceedings of the Information Security and Assurance - International Conference, 2011

The Problem of NIDS Evasion in Mobile Networks.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Identification of correlated network intrusion alerts.
Proceedings of the Third International Workshop on Cyberspace Safety and Security, 2011

2010
Selective and Early Threat Detection in Large Networked Systems.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults.
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, 2009

Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale.
Proceedings of the Information Security, 12th International Conference, 2009

Defending financial infrastructures through early warning systems: the intelligence cloud approach.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

2008
Collaborative architecture for malware detection and analysis.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

FlightPath: Obedience vs. Choice in Cooperative Services.
Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation, 2008

Adaptive traffic filtering for efficient and secure IP-mobility.
Proceedings of the Q2SWinet'08, 2008

BFT: the time is now.
Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware, 2008

2007
Dynamic load balancing for network intrusion detection systems based on distributed architectures.
Proceedings of the Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), 12, 2007

Enhancing interoperability and stateful analysis of cooperative network intrusion detection systems.
Proceedings of the 2007 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2007


  Loading...