| CARVIEW |
Select Language
HTTP/1.1 301 Moved Permanently
Server: nginx/1.18.0 (Ubuntu)
Date: Sun, 18 Jan 2026 20:51:43 GMT
Content-Type: text/html
Content-Length: 178
Location: https://ceur-ws.org/Vol-2058/
Connection: keep-alive
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Sun, 18 Jan 2026 20:51:44 GMT
Content-Type: text/html; charset=utf-8
Last-Modified: Tue, 29 Nov 2022 15:47:19 GMT
Transfer-Encoding: chunked
Connection: keep-alive
ETag: W/"63862987-45de"
Content-Encoding: gzip
CEUR-WS.org/Vol-2058 - Second Italian Conference on Cyber Security (ITASEC)
ITASEC 2018
Proceedings of the Second Italian Conference on Cyber Security
Edited byElena Ferrari, Università degli Studi dell’Insubria, Italy
2018-01-30: submitted by Pietro Colombo, metadata incl. bibliographic data published under Creative Commons CC0
2018-01-31: published on CEUR-WS.org |valid HTML5|
ITASEC 2018
Italian Conference on Cyber Security
Proceedings of the Second Italian Conference on Cyber Security
Milan, Italy, February 6th to 9th, 2018.
Edited by
Elena Ferrari, Università degli Studi dell’Insubria, Italy
Marco Baldi, Università Politecnica delle Marche, Italy
Roberto Baldoni, già Sapienza Università di Roma, Italy
Table of Contents
- Preface
Elena Ferrari, Marco Baldi, Roberto Baldoni
Session 1: Science and Technology Track
- Dr Cookie and Mr Token - Web Session Implementations and How to Live with Them
Stefano Calzavara, Alvise Rabitti, Michele Bugliesi - Performance of Botnet Detection by Neural Networks in Software-Defined Networks
Ivan Letteri, Massimo Del Rosso, Pasquale Caianiello, Dajana Cassioli - Extending Domain Name Monitoring. Identifying Potentially Malicious Domains Using
Hash Signatures of DOM Elements
Andrea Bernardini - Data Leakage in Java Applets with Exception Mechanism
Cinzia Bernardeschi, Paolo Masci, Anotnella Santone - PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain
Stefano De Angelis, Leonardo Aniello, Roberto Baldoni, Federico Lombardi, Andrea Margheri, Vladimiro Sassone - Malware Detection through Low-level Features and Stacked Denoising Autoencoders
Alessandra De Paola, Salvatore Favaloro, Salvatore Gaglio, Giuseppe Lo Re, Marco Morana - Preventing Ransomware Attacks Through File System Filter Drivers
Giovanni Bottazzi, Giuseppe F. Italiano, Domenico Spera - Understanding the Twitter User Networks of Viruses and Ransomware Attacks
Michelangelo Puliga, Guido Caldarelli, Alessandro Chessa, Rocco De Nicola - Static Analysis for GDPR Compliance
Pietro Ferrara, Fausto Spoto - A Distributed Cyber-security Framework for Heterogeneous Environments
Raffaele Bolla, Paolo Maria Comi, Matteo Repetto
Session 2: Demo
- Cross-Cloud Management of Sensitive Data via Blockchain: a Payslip Calculation Use
Case
Luca Nicoletti, Andrea Margheri, Federico Lombardi, Vladimiro Sassone, Francesco Paolo Schiavo - Visualizing Bitcoin Flows of Ransomware: WannaCry One Week Later
Stefano Bistarelli, Matteo Parroccini, Francesco Santini - MAD-IOS: Dynamic App Vulnerability Analysis in Non-jailbroken Devices
Alfonso Solimeo, Luca Capacci, Stefano Taino, Rebecca Montanari - Enforcing Security in IoT and Home Networks
Luca Deri, Arianna Del Soldato - Firewall Management With FireWall Synthesizer
Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Mauro Tempesta, Lorenzo Veronese
We offer a BibTeX file for citing papers of this workshop from LaTeX.
2018-01-30: submitted by Pietro Colombo, metadata incl. bibliographic data published under Creative Commons CC0
2018-01-31: published on CEUR-WS.org |valid HTML5|