Pexy: The other side of exploit kits G De Maio, A Kapravelos, Y Shoshitaishvili, C Kruegel, G Vigna Detection of Intrusions and Malware, and Vulnerability Assessment: 11th …, 2014 | 46 | 2014 |
On the construction of a false digital alibi on the Android OS P Albano, A Castiglione, G Cattaneo, G De Maio, A De Santis 2011 Third International Conference on Intelligent Networking and …, 2011 | 43 | 2011 |
Secr3t: Secure end-to-end communication over 3g telecommunication networks A Castiglione, G Cattaneo, G De Maio, F Petagna 2011 Fifth International Conference on Innovative Mobile and Internet …, 2011 | 40 | 2011 |
Automated construction of a false digital alibi A De Santis, A Castiglione, G Cattaneo, G De Maio, M Ianulardo Availability, Reliability and Security for Business, Enterprise and Health …, 2011 | 34 | 2011 |
Security Issues and Attacks on the GSM Standard: a Review. G Cattaneo, G De Maio, UF Petrillo J. Univers. Comput. Sci. 19 (16), 2437-2452, 2013 | 33 | 2013 |
Automatic, selective and secure deletion of digital evidence A Castiglione, G Cattaneo, G De Maio, A De Santis 2011 International Conference on Broadband and Wireless Computing …, 2011 | 29 | 2011 |
The AVQ algorithm: watermarking and compression performances R Pizzolante, B Carpentieri, A Castiglione, G De Maio 2011 Third International Conference on Intelligent Networking and …, 2011 | 24 | 2011 |
The forensic analysis of a false digital alibi A Castiglione, G Cattaneo, G De Maio, A De Santis, G Costabile, ... 2012 Sixth International Conference on Innovative Mobile and Internet …, 2012 | 23 | 2012 |
A review of security attacks on the GSM standard G Cattaneo, G De Maio, P Faruolo, UF Petrillo Information and Communication Technology: International Conference, ICT …, 2013 | 17 | 2013 |
A novel methodology to acquire live big data evidence from the cloud A Castiglione, G Cattaneo, G De Maio, A De Santis, G Roscigno IEEE Transactions on Big Data 5 (4), 425-438, 2017 | 13 | 2017 |
Automated production of predetermined digital evidence A Castiglione, G Cattaneo, G De Maio, A De Santis IEEE Access 1, 216-231, 2013 | 13 | 2013 |
Forensically-sound methods to collect live network evidence A Castiglione, G Cattaneo, G De Maio, A De Santis 2013 IEEE 27th International Conference on Advanced Information Networking …, 2013 | 4 | 2013 |
On the evolution of digital evidence: novel approaches for cyber investigation G De Maio Universita degli studi di Salerno, 2014 | 2 | 2014 |
Using HTML5 to prevent detection of drive‐by‐download web malware A De Santis, G De Maio, UF Petrillo Security and Communication Networks 8 (7), 1237-1255, 2015 | | 2015 |
PExy G De Maio, A Kapravelos, Y Shoshitaishvili, C Kruegel, G Vigna | | |
On The Evolution of Digital Evidence: Novel Approaches for Cyber Investigation G Cattaneo, G De Maio, G Persiano | | |