BRUSCHI, DANILO MAURO

BRUSCHI, DANILO MAURO  

Dipartimento di Informatica Giovanni Degli Antoni  

Mostra records
Risultati 1 - 20 di 62 (tempo di esecuzione: 0.011 secondi).
Titolo Data di pubblicazione Autori Tipo File Abstract
The 3rd International Workshop on Software Engineering for Secure Systems SESS07--Dependable and Secure 1-gen-2007 Danilo BruschiMattia Monga + Book Part (author) -
A Framework for Behavior-Based Malware Analysis in the Cloud 1-gen-2009 L. MartignoniR. PaleariD. Bruschi Book Part (author) -
A mobility-transparent deterministic broadcast mechanism for Ad Hoc networks 1-dic-1999 D. Bruschi + Article (author) -
A protocol for anonymous and accurate e-polling 1-gen-2007 D. BruschiA. Lanzi + Book Part (author) -
A quantitative study of Public Key infrastructures 1-gen-2003 D. Bruschi + Article (author) -
Adding availability to log services of untrusted machines 1-dic-1999 A. AronaD. BruschiE. Rosti Book Part (author) -
AngeL : a tool to disarm computer systems 1-set-2001 D. BruschiE. Rosti Book Part (author) -
Bootkeeper: Validating software integrity properties on boot firmware images 1-mar-2019 Cristalli S.Bruschi D.Lanzi A. + Book Part (author) -
Conqueror : tamper-proof code execution on legacy systems 1-gen-2010 L. MartignoniR. PaleariD.M. Bruschi Book Part (author) -
Detecting (Absent) App-to-app authentication on cross-device short-distance channels 1-dic-2019 Cristalli S.Bruschi D.Lanzi A. + Book Part (author) -
Detecting Self-Mutating Malware Using Control-Flow Graph Matching 1-lug-2006 D.M. BruschiL. MartignoniM. Monga Book Part (author) -
Detection of intrusions and malware, and vulnerability assessment : 6th international conference, DIMVA 2009, Como, Italy, July 9-10, 2009 : proceedings 1-gen-2009 D. Bruschi + Book (editor) -
Disarming offense to facilitate defense 1-set-2000 D. BruschiE. Rosti Book Part (author) -
Diversified process replicae for defeating memory error exploits 1-apr-2007 D. BruschiA. Lanzi + Book Part (author) -
E-vote and PKI’s : a Need, a Bliss or a Curse? 1-gen-2003 D. BruschiG. PolettiE. Rosti Book Part (author) -
An efficient technique for preventing mimicry and impossible paths execution attacks 1-gen-2007 D. BruschiL. CavallaroA. Lanzi Book Part (author) -
FluXOR : detecting and monitoring fast-flux service networks 1-lug-2008 E. PasseriniR. PaleariL. MartignoniD.M. Bruschi Book Part (author) -
Formal Verification of ARP (Address Resolution Protocol) Through SMT-Based Model Checking : a case study 1-set-2017 D.M. BruschiS. GhilardiA. LanziE. Pagani + Book Part (author) -
A formal verification of ARPON - a tool for avoiding Man-in-the-Middle attacks in Ethernet networks 1-gen-2021 Bruschi D.Ghilardi S.Lanzi A.Pagani E. + Article (author) -
Generalized booleand hierarchies and boolean hierarchies over RP 1-ago-1989 A. BertoniD. Bruschi + Book Part (author) -