Nino Vincenzo Verde
Orcid: 0000-0002-2379-6414
According to our database1,
Nino Vincenzo Verde
authored at least 27 papers
between 2009 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
2010
2012
2014
2016
2018
2020
2022
0
1
2
3
4
5
1
1
1
1
2
2
1
2
2
2
2
2
2
3
3
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation.
Proceedings of the IEEE International Conference on Big Data, 2023
STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2016
IEEE Trans. Inf. Forensics Secur., 2016
2015
No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track User Position.
CoRR, 2015
No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position.
Proceedings of the Network and System Security - 9th International Conference, 2015
Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
2014
Bypassing Censorship: A Proven Tool against the Recent Internet Censorship in Turkey.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014
No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014
2013
Epidemic theory and data survivability in unattended wireless sensor networks: Models and gaps.
Pervasive Mob. Comput., 2013
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013
MASS: An efficient and secure broadcast authentication scheme for resource constrained devices.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
2012
IEEE Trans. Knowl. Data Eng., 2012
Broadcast Authentication for Resource Constrained Devices: A Major Pitfall and Some Solutions.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
2011
A new role mining framework to elicit business roles and to mitigate enterprise risk.
Decis. Support Syst., 2011
Cross-border co-operation and education in digital investigations: A European perspective.
Digit. Investig., 2011
Introducing epidemic models for data survivability in Unattended Wireless Sensor Networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011
2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
2009
Proceedings of the Emerging Challenges for Security, 2009
Proceedings of the Emerging Challenges for Security, 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009