Nino Vincenzo Verde
TitleCited byYear
Security in wireless ad-hoc networks–a survey
R Di Pietro, S Guarino, NV Verde, J Domingo-Ferrer
Computer Communications 51, 1-20, 2014
1302014
Analyzing android encrypted network traffic to identify user actions
M Conti, LV Mancini, R Spolaor, NV Verde
IEEE Transactions on Information Forensics and Security 11 (1), 114-125, 2015
1052015
A formal framework to elicit roles with business meaning in RBAC systems
A Colantonio, R Di Pietro, A Ocello, NV Verde
Proceedings of the 14th ACM symposium on Access control models and …, 2009
652009
Can't you hear me knocking: Identification of user actions on android apps via traffic analysis
M Conti, LV Mancini, R Spolaor, NV Verde
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
572015
Visual role mining: A picture is worth a thousand roles
A Colantonio, R Di Pietro, A Ocello, NV Verde
IEEE Transactions on Knowledge and Data Engineering 24 (6), 1120-1133, 2011
442011
No NAT'd user left behind: Fingerprinting users behind NAT from NetFlow records alone
NV Verde, G Ateniese, E Gabrielli, LV Mancini, A Spognardi
2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014
382014
A new role mining framework to elicit business roles and to mitigate enterprise risk
A Colantonio, R Di Pietro, A Ocello, NV Verde
Decision Support Systems 50 (4), 715-731, 2011
382011
Taming role mining complexity in RBAC
A Colantonio, R Di Pietro, A Ocello, NV Verde
Computers & Security 29 (5), 548-564, 2010
372010
Epidemic data survivability in unattended wireless sensor networks
R Di Pietro, NV Verde
Proceedings of the fourth ACM conference on Wireless network security, 11-22, 2011
272011
ABBA: Adaptive bicluster-based approach to impute missing values in binary matrices
A Colantonio, R Di Pietro, A Ocello, NV Verde
Proceedings of the 2010 ACM Symposium on Applied Computing, 1026-1033, 2010
262010
A business-driven decomposition methodology for role mining
A Colantonio, R Di Pietro, NV Verde
Computers & Security 31 (7), 844-855, 2012
222012
Role engineering: from theory to practice
NV Verde, J Vaidya, V Atluri, A Colantonio
Proceedings of the second ACM conference on Data and Application Security …, 2012
222012
On the fast fading Gaussian wiretap channel with statistical channel state information at the transmitter
PH Lin, E Jorswieck
IEEE Transactions on Information Forensics and Security 11 (1), 46-58, 2015
202015
Mining stable roles in RBAC
A Colantonio, R Di Pietro, A Ocello, NV Verde
IFIP International Information Security Conference, 259-269, 2009
202009
A probabilistic bound on the basic role mining problem and its applications
A Colantonio, R Di Pietro, A Ocello, NV Verde
IFIP International Information Security Conference, 376-386, 2009
192009
Bypassing censorship: A proven tool against the recent internet censorship in Turkey
A Di Florio, NV Verde, A Villani, D Vitali, LV Mancini
2014 IEEE International Symposium on Software Reliability Engineering …, 2014
152014
Introducing epidemic models for data survivability in unattended wireless sensor networks
R Di Pietro, NV Verde
2011 IEEE International Symposium on a World of Wireless, Mobile and …, 2011
132011
No place to hide that bytes won’t reveal: Sniffing location-based encrypted traffic to track a user’s position
G Ateniese, B Hitaj, LV Mancini, NV Verde, A Villani
International Conference on Network and System Security, 46-59, 2015
122015
Mining business-relevant RBAC states through decomposition
A Colantonio, R Di Pietro, A Ocello, NV Verde
IFIP International Information Security Conference, 19-30, 2010
112010
Track me if you can: Transparent obfuscation for location based services
R Di Pietro, R Mandati, NV Verde
2013 IEEE 14th International Symposium on" A World of Wireless, Mobile and …, 2013
92013
The system can't perform the operation now. Try again later.
Articles 1–20