Follow
Matteo Dell'Amico
Title
Cited by
Cited by
Year
Password strength: An empirical analysis
M Dell'Amico, P Michiardi, Y Roudier
2010 Proceedings IEEE INFOCOM, 1-9, 2010
4002010
Can I opt out yet? GDPR and the global illusion of cookie control
I Sanchez-Rola, M Dell'Amico, P Kotzias, D Balzarotti, L Bilge, PA Vervier, ...
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
2702019
Monte Carlo strength evaluation: Fast and reliable password checking
M Dell'Amico, M Filippone
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
1222015
Riskteller: Predicting the risk of cyber incidents
L Bilge, Y Han, M Dell'Amico
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
1142017
NG-DBSCAN: scalable density-based clustering for arbitrary data
A Lulli, M Dell'Amico, P Michiardi, L Ricci
Proceedings of the VLDB Endowment 10 (3), 157-168, 2016
962016
The tangled genealogy of IoT malware
E Cozzi, PA Vervier, M Dell'Amico, Y Shen, L Bilge, D Balzarotti
Proceedings of the 36th Annual Computer Security Applications Conference, 1-16, 2020
902020
Online data backup: A peer-assisted approach
L Toka, M Dell'Amico, P Michiardi
2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P), 1-10, 2010
672010
An empirical study of availability in friend-to-friend storage systems
R Sharma, A Datta, M Dell'Amico, P Michiardi
P2P 2011, 2011
652011
HFSP: size-based scheduling for Hadoop
M Pastorelli, A Barbuzzi, D Carra, M Dell'Amico, P Michiardi
2013 IEEE International Conference on Big Data, 51-59, 2013
552013
Take a deep breath: a stealthy, resilient and cost-effective botnet using Skype
A Nappa, A Fattori, M Balduzzi, M Dell’Amico, L Cavallaro
International Conference on Detection of Intrusions and Malware, and …, 2010
542010
Beyond precision and recall: understanding uses (and misuses) of similarity hashes in binary analysis
F Pagani, M Dell'Amico, D Balzarotti
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
512018
HFSP: bringing size-based scheduling to hadoop
M Pastorelli, D Carra, M Dell'Amico, P Michiardi
IEEE Transactions on Cloud Computing 5 (1), 43-56, 2015
502015
Sofia: Social filtering for robust recommendations
M Dell'Amico, L Capra
Trust Management II, 135-150, 2008
432008
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships
I Sanchez-Rola, M Dell'Amico, D Balzarotti, PA Vervier, L Bilge
IEEE Security and Privacy 2021, 2021
372021
Revisiting size-based scheduling with estimated job sizes
M Dell'Amico, D Carra, M Pastorelli, P Michiardi
2014 IEEE 22nd International Symposium on Modelling, Analysis & Simulation …, 2014
352014
Systems and methods for providing integrated security management
K Roundy, M Dell'Amico, C Gates, M Hart, S Miskovic
US Patent 10,242,187, 2019
332019
Lean on me: Mining internet service dependencies from large-scale DNS data
M Dell'Amico, L Bilge, A Kayyoor, P Efstathopoulos, PA Vervier
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
322017
PSBS: Practical size-based scheduling
M Dell'Amico, D Carra, P Michiardi
IEEE Transactions on Computers 65 (7), 2199-2212, 2015
312015
Systems and methods for evaluating infection risks based on profiled user behaviors
HAN Yufei, L Yumer, PA Vervier, M Dell'Amico
US Patent 10,116,680, 2018
292018
Data transfer scheduling for p2p storage
L Toka, M Dell'Amico, P Michiardi
2011 IEEE International Conference on Peer-to-Peer Computing, 132-141, 2011
282011
The system can't perform the operation now. Try again later.
Articles 1–20