עקוב אחר
Luca Allodi
כותרת
צוטט על ידי
צוטט על ידי
שנה
Comparing Vulnerability Severity and Exploits Using Case-Control Studies
L Allodi, F Massacci
ACM Transactions on Information and System Security 17 (1), 2014
2182014
Security events and vulnerability data for cybersecurity risk estimation
L Allodi, F Massacci
Risk Analysis 37 (8), 1606-1627, 2017
1392017
Economic Factors of Vulnerability Trade and Exploitation
L Allodi
ACM SIGSAC Conference on Computer and Communications Security (CCS '17 …, 2017
1212017
Cognitive Triaging of Phishing Attacks
A van der Heijden, L Allodi
28th USENIX Security Symposium, 1309--1326, 2019
1032019
A preliminary analysis of vulnerability scores for attacks in wild: The ekits and sym datasets
L Allodi, F Massacci
Proceedings of the 2012 ACM Workshop on Building analysis datasets and …, 2012
922012
The need for new antiphishing measures against spear-phishing attacks
L Allodi, T Chotza, E Panina, N Zannone
IEEE Security & Privacy 18 (2), 23-34, 2019
712019
Then and now: On the maturity of the cybercrime markets the lesson that black-hat marketeers learned
L Allodi, M Corradin, F Massacci
IEEE Transactions on Emerging Topics in Computing 4 (1), 35-46, 2015
652015
The work‐averse cyberattacker model: theory and evidence from two million attack signatures
L Allodi, F Massacci, J Williams
Risk Analysis 42 (8), 1623-1642, 2022
56*2022
Measuring the accuracy of software vulnerability assessments: experiments with students and professionals
L Allodi, M Cremonini, F Massacci, W Shim
Empirical Software Engineering 25, 1063-1094, 2020
54*2020
Impersonation-as-a-service: Characterizing the emerging criminal infrastructure for user impersonation at scale
M Campobasso, L Allodi
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
492020
Don’t forget the human: a crowdsourced approach to automate response and containment against spear phishing attacks
P Burda, L Allodi, N Zannone
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
402020
Identifying relevant information cues for vulnerability assessment using CVSS
L Allodi, S Banescu, H Femmer, K Beckers
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
402018
{MalwareLab}: Experimentation with Cybercrime Attack Tools
L Allodi, V Kotov, F Massacci
6th Workshop on Cyber Security Experimentation and Test (CSET 13), 2013
402013
Quantitative assessment of risk reduction with cybercrime black market monitoring
L Allodi, W Shim, F Massacci
2013 IEEE Security and Privacy Workshops, 165-172, 2013
382013
A bug bounty perspective on the disclosure of web vulnerabilities
J Ruohonen, L Allodi
arXiv preprint arXiv:1805.09850, 2018
352018
Testing the effectiveness of tailored phishing techniques in industry and academia: a field experiment
P Burda, T Chotza, L Allodi, N Zannone
Proceedings of the 15th International Conference on Availability …, 2020
342020
The heavy tails of vulnerability exploitation
L Allodi
International Symposium on Engineering Secure Software and Systems, 133-148, 2015
312015
Combining text and visual features to improve the identification of cloned webpages for early phishing detection
B Van Dooremaal, P Burda, L Allodi, N Zannone
Proceedings of the 16th International Conference on Availability …, 2021
292021
Estimating the assessment difficulty of CVSS environmental metrics: an experiment
L Allodi, S Biagioni, B Crispo, K Labunets, F Massacci, W Santos
Future Data and Security Engineering: 4th International Conference, FDSE …, 2017
222017
The influence of human factors on the intention to report phishing emails
IA Marin, P Burda, N Zannone, L Allodi
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems …, 2023
202023
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–20