Search

Your search keyword '"Vigna, Giovanni"' showing total 742 results

Search Constraints

Start Over You searched for: Author "Vigna, Giovanni" Remove constraint Author: "Vigna, Giovanni"
742 results on '"Vigna, Giovanni"'

Search Results

1. Remote Keylogging Attacks in Multi-user VR Applications

2. Exploiting Unfair Advantages: Investigating Opportunistic Trading in the NFT Market

3. Invisible Image Watermarks Are Provably Removable Using Generative AI

4. Token-Level Fuzzing

5. Columbus: Android App Testing Through Systematic Callback Exploration

6. Unveiling the Risks of NFT Promotion Scams

7. TrojanPuzzle: Covertly Poisoning Code-Suggestion Models

8. Understanding Security Issues in the NFT Ecosystem

10. Toward a Secure Crowdsourced Location Tracking System

11. SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds

12. VenoMave: Targeted Poisoning Against Speech Recognition

13. Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability

14. Neurlux: Dynamic Malware Analysis Without Feature Engineering

15. BootKeeper: Validating Software Integrity Properties on Boot Firmware Images

21. Hybrid Pruning: Towards Precise Pointer and Taint Analysis

22. Detecting Deceptive Reviews using Generative Adversarial Networks

23. Peer to Peer Hate: Hate Speech Instigators and Their Targets

26. POISED: Spotting Twitter Spam Off the Beaten Paths

27. Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance

28. Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks

29. Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones

30. In rDNS We Trust: Revisiting a Common Data-Source's Reliability

31. Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates

32. On the Security of Application Installers and Online Software Repositories

34. Something From Nothing (There): Collecting Global IPv6 Datasets From DNS

35. Towards Detecting Compromised Accounts on Social Networks

36. BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation

37. Long-term efficacy of lipoprotein apheresis and lomitapide in the treatment of homozygous familial hypercholesterolemia (HoFH): a cross-national retrospective survey

38. Drops for Stuff: An Analysis of Reshipping Mule Scams

39. Meerkat: Detecting Website Defacements through Image-based Object Recognition

40. GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM

42. Protecting Web-based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel

43. Protecting Web Single Sign-on against Relying Party Impersonation Attacks through a Bi-directional Secure Channel with Authentication

44. Ten Years of iCTF: The Good, The Bad, and The Ugly

45. Relevant Change Detection: Framework for the Precise Extraction of Modified and Novel Web-based Content as a Filtering Technique for Analysis Engines

48. Delta: Automatic Identification of Unknown Web-based Infection Campaigns

50. Evaluation of the performance of Dutch Lipid Clinic Network score in an Italian FH population: The LIPIGEN study

Catalog

Books, media, physical & digital resources