Follow
Nino Vincenzo Verde
Title
Cited by
Cited by
Year
Analyzing android encrypted network traffic to identify user actions
M Conti, LV Mancini, R Spolaor, NV Verde
IEEE Transactions on Information Forensics and Security 11 (1), 114-125, 2015
2942015
Security in wireless ad-hoc networks–a survey
R Di Pietro, S Guarino, NV Verde, J Domingo-Ferrer
Computer Communications 51, 1-20, 2014
2012014
Can't you hear me knocking: Identification of user actions on android apps via traffic analysis
M Conti, LV Mancini, R Spolaor, NV Verde
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
1442015
A formal framework to elicit roles with business meaning in RBAC systems
A Colantonio, R Di Pietro, A Ocello, NV Verde
Proceedings of the 14th ACM symposium on Access control models and …, 2009
782009
No NAT'd user left behind: Fingerprinting users behind NAT from NetFlow records alone
NV Verde, G Ateniese, E Gabrielli, LV Mancini, A Spognardi
2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014
692014
Visual role mining: A picture is worth a thousand roles
A Colantonio, R Di Pietro, A Ocello, NV Verde
IEEE Transactions on Knowledge and Data Engineering 24 (6), 1120-1133, 2011
662011
Taming role mining complexity in RBAC
A Colantonio, R Di Pietro, A Ocello, NV Verde
Computers & Security 29 (5), 548-564, 2010
522010
A new role mining framework to elicit business roles and to mitigate enterprise risk
A Colantonio, R Di Pietro, A Ocello, NV Verde
Decision Support Systems 50 (4), 715-731, 2011
482011
A business-driven decomposition methodology for role mining
A Colantonio, R Di Pietro, NV Verde
Computers & Security 31 (7), 844-855, 2012
342012
Role engineering: from theory to practice
NV Verde, J Vaidya, V Atluri, A Colantonio
Proceedings of the second ACM conference on Data and Application Security …, 2012
312012
Epidemic data survivability in unattended wireless sensor networks
R Di Pietro, NV Verde
Proceedings of the fourth ACM conference on Wireless network security, 11-22, 2011
312011
ABBA: Adaptive bicluster-based approach to impute missing values in binary matrices
A Colantonio, R Di Pietro, A Ocello, NV Verde
Proceedings of the 2010 ACM Symposium on Applied Computing, 1026-1033, 2010
302010
Mining stable roles in RBAC
A Colantonio, R Di Pietro, A Ocello, NV Verde
IFIP International Information Security Conference, 259-269, 2009
302009
A probabilistic bound on the basic role mining problem and its applications
A Colantonio, R Di Pietro, A Ocello, NV Verde
Emerging Challenges for Security, Privacy and Trust: 24th IFIP TC 11 …, 2009
272009
No place to hide that bytes won’t reveal: Sniffing location-based encrypted traffic to track a user’s position
G Ateniese, B Hitaj, LV Mancini, NV Verde, A Villani
Network and System Security: 9th International Conference, NSS 2015, New …, 2015
232015
Introducing epidemic models for data survivability in unattended wireless sensor networks
R Di Pietro, NV Verde
2011 IEEE International symposium on a world of wireless, mobile and …, 2011
232011
Bypassing censorship: A proven tool against the recent internet censorship in Turkey
A Di Florio, NV Verde, A Villani, D Vitali, LV Mancini
2014 IEEE International Symposium on Software Reliability Engineering …, 2014
212014
Mining business-relevant RBAC states through decomposition
A Colantonio, R Di Pietro, A Ocello, NV Verde
IFIP International Information Security Conference, 19-30, 2010
192010
Track me if you can: Transparent obfuscation for location based services
R Di Pietro, R Mandati, NV Verde
2013 IEEE 14th International Symposium on" A World of Wireless, Mobile and …, 2013
152013
Evaluating the risk of adopting RBAC roles
A Colantonio, R Di Pietro, A Ocello, NV Verde
IFIP Annual Conference on Data and Applications Security and Privacy, 303-310, 2010
122010
The system can't perform the operation now. Try again later.
Articles 1–20