עקוב אחר
flavio lombardi
flavio lombardi
IAC - CNR
כתובת אימייל מאומתת בדומיין cnr.it
כותרת
צוטט על ידי
צוטט על ידי
שנה
Secure virtualization for cloud computing
F Lombardi, R Di Pietro
Journal of network and computer applications 34 (4), 1113-1122, 2011
6162011
Edge computing perspectives: Architectures, technologies, and open security issues
M Caprolu, R Di Pietro, F Lombardi, S Raponi
2019 IEEE International Conference on Edge Computing (EDGE), 116-123, 2019
2302019
CUDA leaks: a detailed hack for CUDA and a (partial) fix
RD Pietro, F Lombardi, A Villani
ACM Transactions on Embedded Computing Systems (TECS) 15 (1), 1-25, 2016
742016
KvmSec: a security extension for Linux kernel virtual machines
F Lombardi, R Di Pietro
Proceedings of the 2009 ACM symposium on Applied Computing, 2029-2034, 2009
642009
Transparent security for cloud
F Lombardi, R Di Pietro
Proceedings of the 2010 ACM symposium on applied computing, 414-415, 2010
582010
CUDA leaks: Information leakage in GPU architectures
R Di Pietro, F Lombardi, A Villani
arXiv preprint arXiv:1305.7383, 2013
452013
Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware
G Suarez-Tangil, JE Tapiador, F Lombardi, R Di Pietro
IEEE Transactions on Mobile Computing 15 (4), 789-802, 2015
412015
Exploring and analyzing the tor hidden services graph
M Bernaschi, A Celestini, S Guarino, F Lombardi
ACM Transactions on the Web (TWEB) 11 (4), 1-26, 2017
372017
Virtualization Technologies and Cloud Security: advantages, issues, and perspectives
R Di Pietro, F Lombardi
From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the …, 2018
342018
Spiders like onions: on the network of tor hidden services
M Bernaschi, A Celestini, S Guarino, F Lombardi, E Mastrostefano
The World Wide Web Conference, 105-115, 2019
322019
CURE—Towards enforcing a reliable timeline for cloud forensics: Model, architecture, and experiments
R Battistoni, R Di Pietro, F Lombardi
Computer Communications 91, 29-43, 2016
262016
Thwarting obfuscated malware via differential fault analysis
G Suarez-Tangil, JE Tapiador, F Lombardi, R Di Pietro
Computer 47 (6), 24-31, 2014
262014
CloRExPa: Cloud resilience via execution path analysis
R Di Pietro, F Lombardi, M Signorini
Future Generation Computer Systems 32, 168-179, 2014
212014
Continued rise of the cloud
Z Mahmood
Springer, 2014
172014
FRoDO: Fraud resilient device for off-line micro-payments
V Daza, R Di Pietro, F Lombardi, M Signorini
IEEE Transactions on Dependable and Secure Computing 13 (2), 296-311, 2015
162015
Crew: Cloud resilience for windows guests through monitored virtualization
F Lombardi, R Di Pietro, C Soriente
2010 29th IEEE Symposium on Reliable Distributed Systems, 338-342, 2010
152010
A security management architecture for the protection of kernel virtual machines
F Lombardi, R Di Pietro
2010 10th IEEE International Conference on Computer and Information …, 2010
142010
Virtualization and Cloud Security: Benefits, Caveats, and Future Developments
F Lombardi, R Di Pietro
Cloud Computing - Challenges, Limitations and R&D Solutions, 237-256, 2014
132014
CUDACS: securing the cloud with CUDA-enabled secure virtualization
F Lombardi, R Di Pietro
Information and Communications Security: 12th International Conference …, 2010
132010
Unsupervised Classification of Routes and Plates from the Trap-2017 Dataset
M Bernaschi, A Celestini, S Guarino, F Lombardi, E Mastrostefano
Traffic Mining Applied to Police Activities: Proceedings of the 1st Italian …, 2018
92018
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–20