| CARVIEW |
Select Language
HTTP/1.1 301 Moved Permanently
Server: nginx/1.18.0 (Ubuntu)
Date: Sun, 18 Jan 2026 07:36:15 GMT
Content-Type: text/html
Content-Length: 178
Location: https://ceur-ws.org/Vol-1816/
Connection: keep-alive
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Sun, 18 Jan 2026 07:36:16 GMT
Content-Type: text/html; charset=utf-8
Last-Modified: Tue, 29 Nov 2022 15:47:20 GMT
Transfer-Encoding: chunked
Connection: keep-alive
ETag: W/"63862988-7579"
Content-Encoding: gzip
CEUR-WS.org/Vol-1816 - First Italian Conference on Cybersecurity (ITASEC17)
ITASEC 2017
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17)
Edited byAlessandro Armando, Università di Genova and FBK, Italy
2017-03-13: submitted by Riccardo Focardi, metadata incl. bibliographic data published under Creative Commons CC0
2017-03-18: published on CEUR-WS.org |valid HTML5|
ITASEC 2017
Italian Conference on Cybersecurity
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17)
Venice, Italy, January 17 - 20, 2017.
Edited by
Alessandro Armando, Università di Genova and FBK, Italy
Roberto Baldoni, Università di Roma, Sapienza, Italy
Riccardo Focardi, Università Ca' Foscari, Venezia, Italy
Table of Contents
- Preface1-7
Alessandro Armando, Roberto Baldoni, Riccardo Focardi
Science and Technology Track
- An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures
to Software Block Ciphers8-18
Alessandro Barenghi, Gerardo Pelosi - Analysing Privacy Analyses19-28
Giampaolo Bella, Denis Butin, Hugo Jonker - A Proposal for the Secure Activation and Licensing of FPGA IP Cores29-37
Domenico Amelino, Mario Barbareschi, Alessandro Cilardo - Tracking Sensitive and Untrustworthy Data in IoT38-52
Chiara Bodei, Letterio Galletta - Risk Assessment of a Biometric Continuous Authentication Protocol for Internet Services53-65
Enrico Schiavone, Andrea Ceccarelli, Andrea Bondavalli - On the Interoperability of Capture Devices in Fingerprint Presentation Attacks Detection66-75
Luca Ghiani, Valerio Mura, Pierluigi Tuveri, Gian Luca Marcialis - A Software Architecture for Classifying Users in E-payment Systems76-85
Gianluigi Folino, Francesco Sergio Pisani - Hate Me, Hate Me Not: Hate Speech Detection on Facebook86-95
Fabio Del Vigna, Andrea Cimino, Felice Dell'Orletta, Marinella Petrocchi, Maurizio Tesconi - Detection of Malicious Scripting Code Through Discriminant and Adversary-Aware API
Analysis96-105
Davide Maiorca, Paolo Russu, Igino Corona, Battista Biggio, Giorgio Giacinto - Infinity-Norm Support Vector Machines Against Adversarial Label Contamination106-115
Ambra Demontis, Battista Biggio, Giorgio Fumera, Giorgio Giacinto, Fabio Roli - Network Anomaly Detection in Critical Infrastructure Based on Mininet Network Simulator116-125
Giuseppe Bernieri, Federica Pascucci, Javier Lopez - An Operational Framework for Incident Handling126-135
Giovanni Bottazzi, Giuseppe Francesco Italiano, Giuseppe Giulio Rutigliano - Devil in the Details: Assessing Automated Confidentiality Classifiers in the Context of NATO Documents136-145
Marc Richter, Konrad Wrona - Blockchain-Based Database to Ensure Data Integrity in Cloud Computing Environments146-155
Edoardo Gaetani, Leonardo Aniello, Roberto Baldoni, Federico Lombardi, Andrea Margheri, Vladimiro Sassone - Certificate Validation Through Public Ledgers and Blockchains156-165
Marco Baldi, Franco Chiaraluce, Emanuele Frontoni, Giuseppe Gottardi, Daniele Sciarroni, Luca Spalazzi
Fil Rouge Track
- Rules of (Digital) Evidence and Prosecution's Actual Needs. When the Law Falls Behind Technology166-174
Andrea Monti - How Does Cyber Crime Affect Firms? The Effect of Information Security Breaches on Stock Returns175-193
Maria Cristina Arcuri, Marina Brogi, Gino Gandolfi - Restructuring and Securing Italian Banks (in Italian)194-201
Mario Dal Co - Web-based Intelligence in Adaptive Security Models and Multidisciplinary Aspects of Activation and Analysis (in Italian)202-211
Giampiero Bonfiglio, Ludovica Coletta, Alessandra Teresa Coscarella, Martina Limonta, Panfilo Ventresca - The Hacking Team Case: Quis Custodiet Ipsos Custodes? Issues and Challenges for a More Efficient Partnership Between Private Industry and Intelligence Agencies (in Italian)212-221
Filippo Pierozzi
Demos Track
- Multilanguage Semantic Behavioural Algorithms to Discover Terrorist Related Online Contents222-231
Maurizio Mencarini, Gianluca Sensidoni - An Intelligence Platform based on OSINT tools and Open Source Technologies (in Italian)232-241
Mauro Brignoli, Luisa Franchina - Security Analysis of the OWASP Benchmark with Julia242-247
Pietro Ferrara, Elisa Burato, Fausto Spoto - MITIGATE: An Innovative Cyber-Security Maritime Supply Chain Risk Management System248-252
Armend Duzha, Panagiotis Gouvas, Monica Canepa - Cyber Threat Intelligence for Supporting the ATM Security Management 253-257
Antonella Chirichiello, Claudio Porretti, Antonio Berardi
We offer a BibTeX file for citing papers of this workshop from LaTeX.
2017-03-13: submitted by Riccardo Focardi, metadata incl. bibliographic data published under Creative Commons CC0
2017-03-18: published on CEUR-WS.org |valid HTML5|