Stefano Zanero
Orcid: 0000-0003-4710-5283Affiliations:
- Polytechnic University of Milan, Italy
According to our database1,
Stefano Zanero
authored at least 122 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on twitter.com
-
on orcid.org
-
on id.loc.gov
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Emerg. Top. Comput., 2024
Model Predictive Control with adaptive resilience for Denial-of-Service Attacks mitigation on a Regulated Dam.
CoRR, 2024
Evaluating the Impact of Privacy-Preserving Federated Learning on CAN Intrusion Detection.
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
You Might Have Known It Earlier: Analyzing the Role of Underground Forums in Threat Intelligence.
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
The Illusion of Randomness: An Empirical Analysis of Address Space Layout Randomization Implementations.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
ACM Trans. Priv. Secur., November, 2023
Comput. Secur., September, 2023
CANova: A hybrid intrusion detection framework based on automatic signal classification for CAN.
Comput. Secur., May, 2023
Quantum Eigenfaces: Linear Feature Mapping and Nearest Neighbor Classification with Outlier Detection.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2023
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Applied Data Science and Demo Track, 2023
The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis.
Proceedings of the Advances in Information and Computer Security, 2023
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023
Rainfuzz: Reinforcement-Learning Driven Heat-Maps for Boosting Coverage-Guided Fuzzing.
Proceedings of the 12th International Conference on Pattern Recognition Applications and Methods, 2023
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023
Evaluating the Robustness of Automotive Intrusion Detection Systems Against Evasion Attacks.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023
Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
GOLIATH: A Decentralized Framework for Data Collection in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2022
Quantum Mach. Intell., 2022
Comput. Secur., 2022
Comput. Secur., 2022
IEEE Access, 2022
Proceedings of the Italian Conference on Cybersecurity (ITASEC 2022), 2022
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
CANnolo: An Anomaly Detection System Based on LSTM Autoencoders for Controller Area Network.
IEEE Trans. Netw. Serv. Manag., 2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
2020
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
Proceedings of the 2nd International Conference on Industry 4.0 and Smart Manufacturing (ISM 2020), 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Security of controlled manufacturing systems in the connected factory: the case of industrial robots.
J. Comput. Virol. Hacking Tech., 2019
Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems.
CoRR, 2019
Proceedings of the 2019 IEEE Vehicular Networking Conference, 2019
CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network.
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019
Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots.
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019
2018
ACM Trans. Priv. Secur., 2018
Proceedings of the 2018 IEEE SENSORS, New Delhi, India, October 28-31, 2018, 2018
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
Proceedings of the 8th Software Security, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017
2016
Proceedings of the Security and Privacy in Communication Networks, 2016
XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners.
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
BankSealer: A decision support system for online banking fraud analysis and investigation.
Comput. Secur., 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
J. Comput. Virol. Hacking Tech., 2014
Why Offensive Security Needs Engineering Textbooks: Or, How to Avoid a Replay of "Crypto Wars" in Security Research.
login Usenix Mag., 2014
PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications.
CoRR, 2014
CoRR, 2014
Proceedings of the 23rd International World Wide Web Conference, 2014
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014
2013
IEEE Embed. Syst. Lett., 2013
CoRR, 2013
Proceedings of the 22nd International World Wide Web Conference, 2013
AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors.
Proceedings of the SPSM'13, 2013
A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives.
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012
Proceedings of the Advances in Digital Forensics VIII, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the 8th International Symposium on Visualization for Cyber Security, 2011
Proceedings of the Information Systems Security - 7th International Conference, 2011
Proceedings of the First SysSec Workshop 2011, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
IEEE Trans. Dependable Secur. Comput., 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the Decision and Game Theory for Security, 2010
2009
Inf. Fusion, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the Detection of Intrusions and Malware, 2009
2008
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Integrating Partial Models of Network Normality via Cooperative Negotiation: An Approach to Development of Multiagent Intrusion Detection Systems.
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2008
Proceedings of the First European Workshop on System Security, 2008
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008
2007
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007
2006
2005
Proceedings of the Trust Management, Third International Conference, 2005
Proceedings of the Image Analysis and Processing, 2005
Proceedings of the FIRB-Perf Workshop on Techniques, 2005
2004
Comput. Law Secur. Rev., 2004
Comput. Law Secur. Rev., 2004
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004
Proceedings of the 12th Euromicro Workshop on Parallel, 2004
Proceedings of the Computer and Information Sciences, 2004
2003
Proceedings of the Performance Tools and Applications to Networked Systems, 2003