Mirco Marchetti
Cited by
Cited by
Making Byzantine fault tolerant systems tolerate Byzantine faults
A Clement, E Wong, L Alvisi, M Dahlin, M Marchetti
Proceedings of the 6th USENIX symposium on Networked systems design and …, 2009
On the effectiveness of machine and deep learning for cyber security
G Apruzzese, M Colajanni, L Ferretti, A Guido, M Marchetti
2018 10th international conference on cyber Conflict (CyCon), 371-390, 2018
Anomaly detection of CAN bus messages through analysis of ID sequences
M Marchetti, D Stabili
2017 IEEE Intelligent Vehicles Symposium (IV), 1577-1583, 2017
Analysis of high volumes of network traffic for advanced persistent threat detection
M Marchetti, F Pierazzi, M Colajanni, A Guido
Computer Networks 109, 127-141, 2016
Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms
M Marchetti, D Stabili, A Guido, M Colajanni
2016 IEEE 2nd International Forum on Research and Technologies for Society …, 2016
Distributed, concurrent, and independent access to encrypted cloud databases
L Ferretti, M Colajanni, M Marchetti
IEEE transactions on parallel and distributed systems 25 (2), 437-446, 2013
FlightPath: Obedience vs. Choice in Cooperative Services.
HC Li, A Clement, M Marchetti, M Kapritsos, L Robison, L Alvisi, M Dahlin
OSDI 8, 355-368, 2008
READ: Reverse engineering of automotive data frames
M Marchetti, D Stabili
IEEE Transactions on Information Forensics and Security 14 (4), 1083-1097, 2018
Detecting attacks to internal vehicle networks through Hamming distance
D Stabili, M Marchetti, M Colajanni
2017 AEIT International Annual Conference, 1-6, 2017
Addressing adversarial attacks against security systems based on machine learning
G Apruzzese, M Colajanni, L Ferretti, M Marchetti
2019 11th international conference on cyber conflict (CyCon) 900, 1-18, 2019
Supporting security and consistency for cloud database
L Ferretti, M Colajanni, M Marchetti
Cyberspace Safety and Security: 4th International Symposium, CSS 2012 …, 2012
A parallel architecture for stateful intrusion detection in high traffic networks
M Colajanni, M Marchetti
Proc. of the IEEE/IST Workshop on” Monitoring, attack detection and …, 2006
Countering Advanced Persistent Threats through security intelligence and big data analytics
M Marchetti, F Pierazzi, A Guido, M Colajanni
2016 8th International Conference on Cyber Conflict (CyCon), 243-261, 2016
Deep reinforcement adversarial learning against botnet evasion attacks
G Apruzzese, M Andreolini, M Marchetti, A Venturi, M Colajanni
IEEE Transactions on Network and Service Management 17 (4), 1975-1987, 2020
Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems
G Apruzzese, M Andreolini, L Ferretti, M Marchetti, M Colajanni
Digital Threats: Research and Practice, 2021
BFT: The time is now
A Clement, M Marchetti, E Wong, L Alvisi, M Dahlin
Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and …, 2008
Evaluating the effectiveness of adversarial attacks against botnet detectors
G Apruzzese, M Colajanni, M Marchetti
2019 IEEE 18th International Symposium on Network Computing and Applications …, 2019
A symmetric cryptographic scheme for data integrity verification in cloud databases
L Ferretti, M Marchetti, M Andreolini, M Colajanni
Information Sciences 422, 497-515, 2018
Scalable architecture for multi-user encrypted SQL operations on cloud database services
L Ferretti, F Pierazzi, M Colajanni, M Marchetti
IEEE Transactions on Cloud computing 2 (4), 448-458, 2014
Detection and threat prioritization of pivoting attacks in large networks
G Apruzzese, F Pierazzi, M Colajanni, M Marchetti
IEEE transactions on emerging topics in computing 8 (2), 404-415, 2017
The system can't perform the operation now. Try again later.
Articles 1–20