Cloud, Fog, and Dew Robotics: Architectures for next generation applications A Botta, L Gallo, G Ventre 2019 7th IEEE international conference on mobile cloud computing, services …, 2019 | 44 | 2019 |
2 Years in the anti-phishing group of a large company L Gallo, A Maiello, A Botta, G Ventre Computers & Security 105, 102259, 2021 | 14 | 2021 |
Identifying threats in a large company's inbox L Gallo, A Botta, G Ventre Proceedings of the 3rd ACM CoNEXT Workshop on Big DAta, Machine Learning and …, 2019 | 10 | 2019 |
Spark-based port and net scan detection A Affinito, A Botta, L Gallo, M Garofalo, G Ventre Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1172-1179, 2020 | 7 | 2020 |
The human factor in phishing: Collecting and analyzing user behavior when reading emails L Gallo, D Gentile, S Ruggiero, A Botta, G Ventre Computers & Security 139, 103671, 2024 | 2 | 2024 |
Investigating Gaze Behavior in Phishing Email Identification F Pietrantonio, A Botta, G Ventre, L Gallo, S Zinno, L Mancuso, R Presta 2023 7th Network Traffic Measurement and Analysis Conference (TMA), 1-4, 2023 | 2 | 2023 |
Lookin'Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors M D'Onghia, F Di Cesare, L Gallo, M Carminati, M Polino, S Zanero Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security …, 2023 | | 2023 |
Robots and Forensics: a focused survey S Zinno, S Rotbei, L Gallo, A Botta, G Ventre Available at SSRN 4530982, 0 | | |
Kernel-Based Virtual Machine L Gallo | | |