@comment{It is strongly recommended to use BibLaTeX for these entries} @inproceedings{ArmandoEtAl:ITASEC17, title = {Preface}, author = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, pages = {1--7}, url = {http://ceur-ws.org/Vol-1816/#paper-01}, crossref = {ITASEC17}, } @inproceedings{BarenghiPelosi:ITASEC17, title = {An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers}, author = {Alessandro Barenghi and Gerardo Pelosi}, pages = {8--18}, url = {http://ceur-ws.org/Vol-1816/#paper-02}, crossref = {ITASEC17}, } @inproceedings{BellaEtAl:ITASEC17, title = {Analysing Privacy Analyses}, author = {Giampaolo Bella and Denis Butin and Hugo Jonker}, pages = {19--28}, url = {http://ceur-ws.org/Vol-1816/#paper-03}, crossref = {ITASEC17}, } @inproceedings{AmelinoEtAl:ITASEC17, title = {A proposal for the secure activation and licensing of FPGA IP cores}, author = {Domenico Amelino and Mario Barbareschi and Alessandro Cilardo}, pages = {29--37}, url = {http://ceur-ws.org/Vol-1816/#paper-04}, crossref = {ITASEC17}, } @inproceedings{BodeiGalletta:ITASEC17, title = {Tracking sensitive and untrustworthy data in IoT}, author = {Chiara Bodei and Letterio Galletta}, pages = {38--52}, url = {http://ceur-ws.org/Vol-1816/#paper-05}, crossref = {ITASEC17}, } @inproceedings{SchiavoneEtAl:ITASEC17, title = {Risk Assessment of a Biometric Continuous Authentication Protocol for Internet Services}, author = {Enrico Schiavone and Andrea Ceccarelli and Andrea Bondavalli}, pages = {53--65}, url = {http://ceur-ws.org/Vol-1816/#paper-06}, crossref = {ITASEC17}, } @inproceedings{GhianiEtAl:ITASEC17, title = {On the interoperability of capture devices in fingerprint presentation attacks detection}, author = {Luca Ghiani and Valerio Mura and Pierluigi Tuveri and Gian Luca Marcialis}, pages = {66--75}, url = {http://ceur-ws.org/Vol-1816/#paper-07}, crossref = {ITASEC17}, } @inproceedings{FolinoPisani:ITASEC17, title = {A Software Architecture for Classifying Users in E-payment Systems.}, author = {Gianluigi Folino and Francesco Sergio Pisani}, pages = {76--85}, url = {http://ceur-ws.org/Vol-1816/#paper-08}, crossref = {ITASEC17}, } @inproceedings{VignaEtAl:ITASEC17, title = {Hate me, hate me not: Hate speech detection on Facebook}, author = {Fabio {Del Vigna} and Andrea Cimino and Felice Dell'Orletta and Marinella Petrocchi and Maurizio Tesconi}, pages = {86--95}, url = {http://ceur-ws.org/Vol-1816/#paper-09}, crossref = {ITASEC17}, } @inproceedings{MaiorcaEtAl:ITASEC17, title = {Detection of Malicious Scripting Code through Discriminant and Adversary-Aware API Analysis}, author = {Davide Maiorca and Paolo Russu and Igino Corona and Battista Biggio and Giorgio Giacinto}, pages = {96--105}, url = {http://ceur-ws.org/Vol-1816/#paper-10}, crossref = {ITASEC17}, } @inproceedings{DemontisEtAl:ITASEC17, title = {Infinity-norm Support Vector Machines against Adversarial Label Contamination}, author = {Ambra Demontis and Battista Biggio and Giorgio Fumera and Giorgio Giacinto and Fabio Roli}, pages = {106--115}, url = {http://ceur-ws.org/Vol-1816/#paper-11}, crossref = {ITASEC17}, } @inproceedings{BernieriEtAl:ITASEC17, title = {Network Anomaly Detection in Critical Infrastructure Based on Mininet Network Simulator}, author = {Giuseppe Bernieri and Federica Pascucci and Javier Lopez}, pages = {116--125}, url = {http://ceur-ws.org/Vol-1816/#paper-12}, crossref = {ITASEC17}, } @inproceedings{BottazziEtAl:ITASEC17, title = {An operational framework for incident handling}, author = {Giovanni Bottazzi and Giuseppe Francesco Italiano and Giuseppe Giulio Rutigliano}, pages = {126--135}, url = {http://ceur-ws.org/Vol-1816/#paper-13}, crossref = {ITASEC17}, } @inproceedings{RichterWrona:ITASEC17, title = {Devil in the details: Assessing automated condentiality classiers of NATO documents}, author = {Marc Richter and Konrad Wrona}, pages = {136--145}, url = {http://ceur-ws.org/Vol-1816/#paper-14}, crossref = {ITASEC17}, } @inproceedings{GaetaniEtAl:ITASEC17, title = {Blockchain-based Database to Ensure Data Integrity in Cloud Computing Environments}, author = {Edoardo Gaetani and Leonardo Aniello and Roberto Baldoni and Federico Lombardi and Andrea Margheri and Vladimiro Sassone}, pages = {146--155}, url = {http://ceur-ws.org/Vol-1816/#paper-15}, crossref = {ITASEC17}, } @inproceedings{BaldiEtAl:ITASEC17, title = {Certificate Validation through Public Ledgers and Blockchains}, author = {Marco Baldi and Franco Chiaraluce and Emanuele Frontoni and Giuseppe Gottardi and Daniele Sciarroni and Luca Spalazzi}, pages = {156--165}, url = {http://ceur-ws.org/Vol-1816/#paper-16}, crossref = {ITASEC17}, } @inproceedings{Monti:ITASEC17, title = {Rules of (digital) evidence and prosecution's actual needs. When the law falls behind technology}, author = {Andrea Monti}, pages = {166--174}, url = {http://ceur-ws.org/Vol-1816/#paper-17}, crossref = {ITASEC17}, } @inproceedings{ArcuriEtAl:ITASEC17, title = {How does cyber crime affect firms? The effect of information security breaches on stock returns}, author = {Maria Cristina Arcuri and Marina Brogi and Gino Gandolfi}, pages = {175--193}, url = {http://ceur-ws.org/Vol-1816/#paper-18}, crossref = {ITASEC17}, } @inproceedings{Co:ITASEC17, title = {La ristrutturazione delle banche italiane e la sicurezza}, author = {Mario {Dal Co}}, pages = {194--201}, url = {http://ceur-ws.org/Vol-1816/#paper-19}, crossref = {ITASEC17}, } @inproceedings{BonfiglioEtAl:ITASEC17, title = {La Web-based Intelligence nei modelli adattativi di sicurezza e gli aspetti multidisciplinari di attivazione ed analisi}, author = {Giampiero Bonfiglio and Ludovica Coletta and Alessandra Teresa Coscarella and Martina Limonta and Panfilo Ventresca}, pages = {202--211}, url = {http://ceur-ws.org/Vol-1816/#paper-20}, crossref = {ITASEC17}, } @inproceedings{Pierozzi:ITASEC17, title = {IL CASO HACKING TEAM: QUIS CUSTODIET IPSOS CUSTODES? Problematiche e sfide per una piĂ¹ efficiente partnership tra settore privato e agenzie d’intelligence nella cybersecurity}, author = {Filippo Pierozzi}, pages = {212--221}, url = {http://ceur-ws.org/Vol-1816/#paper-21}, crossref = {ITASEC17}, } @inproceedings{MencariniSensidoni:ITASEC17, title = {Multilanguage Semantic Behavioural Algorithms to discover terrorist related online contents}, author = {Maurizio Mencarini and Gianluca Sensidoni}, pages = {222--231}, url = {http://ceur-ws.org/Vol-1816/#paper-22}, crossref = {ITASEC17}, } @inproceedings{BrignoliFranchina:ITASEC17, title = {Progetto di Piattaforma di Intelligence con strumenti OSINT e tecnologie Open Source}, author = {Mauro Brignoli and Luisa Franchina}, pages = {232--241}, url = {http://ceur-ws.org/Vol-1816/#paper-23}, crossref = {ITASEC17}, } @inproceedings{FerraraEtAl:ITASEC17, title = {Security Analysis of the OWASP Benchmark with Julia}, author = {Pietro Ferrara and Elisa Burato and Fausto Spoto}, pages = {242--247}, url = {http://ceur-ws.org/Vol-1816/#paper-24}, crossref = {ITASEC17}, } @inproceedings{DuzhaEtAl:ITASEC17, title = {MITIGATE: An Innovative Cyber-Security Maritime Supply Chain Risk Management System}, author = {Armend Duzha and Panagiotis Gouvas and Monica Canepa}, pages = {248--252}, url = {http://ceur-ws.org/Vol-1816/#paper-25}, crossref = {ITASEC17}, } @inproceedings{ChirichielloEtAl:ITASEC17, title = {Cyber Threat Intelligence for Supporting the ATM Security Management }, author = {Antonella Chirichiello and Claudio Porretti and Antonio Berardi}, pages = {253--257}, url = {http://ceur-ws.org/Vol-1816/#paper-26}, crossref = {ITASEC17}, } @proceedings{ITASEC17, booktitle = {First Italian Conference on Cybersecurity (ITASEC17)}, title = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17)}, year = 2017, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, number = 1816, series = {CEUR Workshop Proceedings}, address = {Aachen}, issn = {1613-0073}, url = {http://ceur-ws.org/Vol-1816/}, venue = {Venice, Italy}, eventdate = {2017-01-17/2017-01-20}, }