Sabbioni Andrea, Mazzocca Carlo, Colajanni Michele, Montanari Rebecca, Corradi Antonio, A Fully Decentralized Architecture for Access Control Verification in Serverless Environments, in: 2022 IEEE Symposium on Computers and Communications (ISCC), 2022, pp. 1 - 6 (atti di: IEEE Symposium on Computers and Communications (ISCC), Rhodes Island, Greece, 30th June - 3rd July 2022) [Contribution to conference proceedings]
Carlo Mazzocca; Andrea Sabbioni; Rebecca Montanari; Michele Colajanni, Evaluating Tangle Distributed Ledger for Access Control Policy Distribution in Multi-region Cloud Environments, in: International Conference on the Quality of Information and Communications Technology, 2022, 1621 CCIS, pp. 296 - 306 (atti di: International Conference on the Quality of Information and Communications Technology, Talavera de la Reina, 12/09/2022 al 14/09/2022) [Contribution to conference proceedings]
Stabili D.; Romagnoli R.; Marchetti M.; Sinopoli B.; Colajanni M., Exploring the consequences of cyber attacks on Powertrain Cyber Physical Systems, in: Proceedings - 2022 International Conference on Control, Robotics and Informatics, ICCRI 2022, 2022, pp. 96 - 103 (atti di: 5th International Conference on Control, Robotics and Informatics, Danang, 2022) [Contribution to conference proceedings]
Magnanini F.; Ferretti L.; Colajanni M., Flexible and Survivable Single Sign-On, in: Lecture Notes in Computer Science, 2022, 13172 LNCS, pp. 182 - 197 (atti di: 13th International Symposium on Cyberspace Safety and Security, xxx, November 2021) [Contribution to conference proceedings]
Mazzocca C.; Romandini N.; Colajanni M.; Montanari R., FRAMH: A Federated Learning Risk-Based Authorization Middleware for Healthcare, «IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS», 2022, Early Access, pp. 1 - 12 [Scientific article]Open Access
Giovanni Apruzzese, Mauro Andreolini, Luca Ferretti, Mirco Marchetti, Michele Colajanni, Modeling realistic adversarial attacks against network intrusion detection systems, «DIGITAL THREATS», 2022, 3, pp. 1 - 19 [Scientific article]
Magnanini, F; Ferretti, L; Colajanni, M, Scalable, Confidential and Survivable Software Updates, «IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS», 2022, 33, pp. 176 - 191 [Scientific article]
Venturi A.; Apruzzese G.; Andreolini M.; Colajanni M.; Marchetti M., DReLAB - Deep REinforcement Learning Adversarial Botnet: A benchmark dataset for adversarial attacks against botnet Intrusion Detection Systems, «DATA IN BRIEF», 2021, 34, Article number: 106631 , pp. 1 - 12 [Scientific article]Open Access
Pierazzi F.; Cristalli S.; Bruschi D.; Colajanni M.; Marchetti M., Glyph: Efficient ML-Based Detection of Heap Spraying Attacks, «IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY», 2021, 16, pp. 740 - 755 [Scientific article]
Ferretti, L; Magnanini, F; Andreolini, M; Colajanni, M, Survivable zero trust for cloud computing environments, «COMPUTERS & SECURITY», 2021, 110, pp. 1 - 18 [Scientific article]
Faenza, Francesco; Canali, Claudia; Colajanni, Michele; Carbonaro, Antonella, The Digital Girls Response to Pandemic: Impacts of in Presence and Online Extracurricular Activities on Girls Future Academic Choices, «EDUCATION SCIENCES», 2021, 11, pp. 715 - 729 [Scientific article]Open Access
Fabio Pierazzi; Ghita Mezzour; Qian Han; Michele Colajanni; VS Subrahmanian, A Data-driven Characterization of Modern Android Spyware, «ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS», 2020, 11, pp. 1 - 38 [Scientific article]
Andreolini M.; Colacino V. G.; Colajanni M.; Marchetti M., A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises, «MOBILE NETWORKS AND APPLICATIONS», 2020, 25, pp. 236 - 247 [Scientific article]
Apruzzese G.; Andreolini M.; Marchetti M.; Venturi A.; Colajanni M., Deep Reinforcement Adversarial Learning against Botnet Evasion Attacks, «IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT», 2020, 17, Article number: 9226405 , pp. 1975 - 1987 [Scientific article]
APRUZZESE, GIOVANNI; Pierazzi, Fabio; Colajanni, Michele; Marchetti, Mirco, Detection and Threat Prioritization of Pivoting Attacks in Large Networks, «IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING», 2020, 8, pp. 404 - 415 [Scientific article]