Alternating-time dynamic logic
2010-01-01 Troquard, N; Walther, D
Dependability evaluation of middleware technology for large-scale distributed caching
2020-01-01 Cotroneo, D.; Natella, R.; Rosiello, S.
ProFIPy: Programmable Software Fault Injection as-a-Service
2020-01-01 Cotroneo, D.; De Simone, L.; Liguori, P.; Natella, R.
EVIL: Exploiting Software via Natural Language
2021-01-01 Liguori, P.; Al-Hossami, E.; Orbinato, V.; Natella, R.; Shaikh, S.; Cotroneo, D.; Cukic, B.
ProFuzzBench: A benchmark for stateful protocol fuzzing
2021-01-01 Natella, R.; Pham, V. -T.
Shellcode_IA32: A Dataset for Automatic Shellcode Generation
2021-01-01 Liguori, Pietro; Al-Hossami, Erfan; Cotroneo, Domenico; Natella, Roberto; Cukic, Bojan; Shaikh, Samira
Towards Runtime Verification via Event Stream Processing in Cloud Computing Infrastructures
2021-01-01 Cotroneo, D.; De Simone, L.; Liguori, P.; Natella, R.; Scibelli, A.
Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study
2022-01-01 Orbinato, Vittorio; Barbaraci, Mariarosaria; Natella, Roberto; Cotroneo, Domenico
On Temporal Isolation Assessment in Virtualized Railway Signaling as a Service Systems
2022-01-01 Cotroneo, Domenico; De Simone, Luigi; Natella, Roberto
SlowCoach: Mutating Code to Simulate Performance Bugs
2022-01-01 Chen, Yiqun; Schwahn, Oliver; Natella, Roberto; Bradbury, Matthew; Suri, Neeraj
Can NMT Understand Me? Towards Perturbation-based Evaluation of NMT Models for Code Generation
2022-01-01 Liguori, Pietro; Improta, Cristina; De Vivo, Simona; Natella, Roberto; Cukic, Bojan; Cotroneo, Domenico
Performability Assessment of Containerized Multi-Tenant IMS through Multidimensional UGF
2022-01-01 De Simone, Luigi; Di Mauro, Mario; Longo, Maurizio; Natella, Roberto; Postiglione, Fabio
IFCM: An improved Fuzzy C-means clustering method to handle Class Overlap on Aging-related Software Bug Prediction
2023-01-01 Zhang, C.; Feng, S.; Xie, W.; Zhao, D.; Xiang, J.; Pietrantuono, R.; Natella, R.; Cotroneo, D.
The Power of Words: Generating PowerShell Attacks from Natural Language
2024-01-01 Liguori, Pietro; Marescalco, Christian; Natella, Roberto; Orbinato, Vittorio; Pianese, Luciano
Securing an Application Layer Gateway: An Industrial Case Study
2024-01-01 Cesarano, C.; Natella, R.
Vulnerabilities in AI Code Generators: Exploring Targeted Data Poisoning Attacks
2024-01-01 Cotroneo, D.; Improta, C.; Liguori, P.; Natella, R.
Enhancing AI-based Generation of Software Exploits with Contextual Information
2024-01-01 Liguori, Pietro; Improta, Cristina; Natella, Roberto; Cukic, Bojan; Cotroneo, Domenico
Creation and Use of a Representative Dataset for Advanced Persistent Threats Detection
2025-01-01 Puccetti, Tommaso; De Vivo, Simona; Zhang, Davide; Liguori, Pietro; Natella, Roberto; Ceccarelli, Andrea
Security-by-Design at the Telco Edge with OSS: Challenges and Lessons Learned
2025-01-01 Cesarano, Carmine; Foggia, Alessio; Roscigno, Gianluca; Andreani, Luca; Natella, Roberto
KubeFence: Security Hardening of the Kubernetes Attack Surface
2025-01-01 Cesarano, Carmine; Natella, Roberto
| Titolo | Data di pubblicazione | Autore(i) | File |
|---|---|---|---|
| Alternating-time dynamic logic | 1-gen-2010 | Troquard, N; Walther, D | |
| Dependability evaluation of middleware technology for large-scale distributed caching | 1-gen-2020 | Cotroneo, D.; Natella, R.; Rosiello, S. | |
| ProFIPy: Programmable Software Fault Injection as-a-Service | 1-gen-2020 | Cotroneo, D.; De Simone, L.; Liguori, P.; Natella, R. | |
| EVIL: Exploiting Software via Natural Language | 1-gen-2021 | Liguori, P.; Al-Hossami, E.; Orbinato, V.; Natella, R.; Shaikh, S.; Cotroneo, D.; Cukic, B. | |
| ProFuzzBench: A benchmark for stateful protocol fuzzing | 1-gen-2021 | Natella, R.; Pham, V. -T. | |
| Shellcode_IA32: A Dataset for Automatic Shellcode Generation | 1-gen-2021 | Liguori, Pietro; Al-Hossami, Erfan; Cotroneo, Domenico; Natella, Roberto; Cukic, Bojan; Shaikh, Samira | |
| Towards Runtime Verification via Event Stream Processing in Cloud Computing Infrastructures | 1-gen-2021 | Cotroneo, D.; De Simone, L.; Liguori, P.; Natella, R.; Scibelli, A. | |
| Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study | 1-gen-2022 | Orbinato, Vittorio; Barbaraci, Mariarosaria; Natella, Roberto; Cotroneo, Domenico | |
| On Temporal Isolation Assessment in Virtualized Railway Signaling as a Service Systems | 1-gen-2022 | Cotroneo, Domenico; De Simone, Luigi; Natella, Roberto | |
| SlowCoach: Mutating Code to Simulate Performance Bugs | 1-gen-2022 | Chen, Yiqun; Schwahn, Oliver; Natella, Roberto; Bradbury, Matthew; Suri, Neeraj | |
| Can NMT Understand Me? Towards Perturbation-based Evaluation of NMT Models for Code Generation | 1-gen-2022 | Liguori, Pietro; Improta, Cristina; De Vivo, Simona; Natella, Roberto; Cukic, Bojan; Cotroneo, Domenico | |
| Performability Assessment of Containerized Multi-Tenant IMS through Multidimensional UGF | 1-gen-2022 | De Simone, Luigi; Di Mauro, Mario; Longo, Maurizio; Natella, Roberto; Postiglione, Fabio | |
| IFCM: An improved Fuzzy C-means clustering method to handle Class Overlap on Aging-related Software Bug Prediction | 1-gen-2023 | Zhang, C.; Feng, S.; Xie, W.; Zhao, D.; Xiang, J.; Pietrantuono, R.; Natella, R.; Cotroneo, D. | |
| The Power of Words: Generating PowerShell Attacks from Natural Language | 1-gen-2024 | Liguori, Pietro; Marescalco, Christian; Natella, Roberto; Orbinato, Vittorio; Pianese, Luciano | |
| Securing an Application Layer Gateway: An Industrial Case Study | 1-gen-2024 | Cesarano, C.; Natella, R. | |
| Vulnerabilities in AI Code Generators: Exploring Targeted Data Poisoning Attacks | 1-gen-2024 | Cotroneo, D.; Improta, C.; Liguori, P.; Natella, R. | |
| Enhancing AI-based Generation of Software Exploits with Contextual Information | 1-gen-2024 | Liguori, Pietro; Improta, Cristina; Natella, Roberto; Cukic, Bojan; Cotroneo, Domenico | |
| Creation and Use of a Representative Dataset for Advanced Persistent Threats Detection | 1-gen-2025 | Puccetti, Tommaso; De Vivo, Simona; Zhang, Davide; Liguori, Pietro; Natella, Roberto; Ceccarelli, Andrea | |
| Security-by-Design at the Telco Edge with OSS: Challenges and Lessons Learned | 1-gen-2025 | Cesarano, Carmine; Foggia, Alessio; Roscigno, Gianluca; Andreani, Luca; Natella, Roberto | |
| KubeFence: Security Hardening of the Kubernetes Attack Surface | 1-gen-2025 | Cesarano, Carmine; Natella, Roberto |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile
Scopri
Tipologia
- 4 Contributo in Atti di Convegno ...1329
Data di pubblicazione
- In corso di stampa1
- 2020 - 2026441
- 2010 - 2019622
- 2000 - 2009219
- 1990 - 199941
- 1982 - 19895
Editore
- Springer87
- IEEE Computer Society42
- IEEE36
- Institute of Electrical and Elect...28
- Springer Verlag20
- ACM17
- Association for Computing Machine...16
- Springer-Verlag15
- CEUR-WS12
- AAAI Press11
Rivista
- LECTURE NOTES IN COMPUTER SCIENCE39
- JOURNAL OF PHYSICS. CONFERENCE SE...31
- JOURNAL OF LOW TEMPERATURE PHYSICS16
- POS PROCEEDINGS OF SCIENCE14
- ELECTRONIC PROCEEDINGS IN THEORET...12
- IL NUOVO CIMENTO C5
- JOURNAL OF PHYSICS. CONFERENCE SE...5
- LEIBNIZ INTERNATIONAL PROCEEDINGS...5
- ELECTRONIC NOTES IN THEORETICAL C...4
- IJCAI4
Serie
- LECTURE NOTES IN ARTIFICIAL INTEL...37
- LECTURE NOTES IN COMPUTER SCIENCE36
- LEIBNIZ INTERNATIONAL PROCEEDINGS...22
- AIP CONFERENCE PROCEEDINGS9
- LECTURE NOTES IN BUSINESS INFORMA...7
- ADVANCES IN NEURAL INFORMATION PR...6
- CEUR WORKSHOP PROCEEDINGS5
- FRONTIERS IN ARTIFICIAL INTELLIGE...4
- LECTURE NOTES IN COMPUTER SCIENCE4
- PROCEEDINGS OF THE ... AAAI CONFE...4
Keyword
- Software27
- Computer Science (all)26
- Theoretical Computer Science18
- Algorithmic Game Theory7
- Modeling and Simulation6
- Reliability and Quality6
- Risk6
- Safety6
- Computer Networks and Communications5
- Model Driven Engineering5
Lingua
- eng776
- ita12
- und7
- slv1
Accesso al fulltext
- no fulltext1128
- open97
- reserved94
- partially open10