Enrico Russo
Enrico Russo
Verified email at - Homepage
Cited by
Cited by
Building next generation cyber ranges with crack
E Russo, G Costa, A Armando
Computers & Security 95, 101837, 2020
Scenario design and validation for next generation cyber ranges
E Russo, G Costa, A Armando
2018 IEEE 17th International Symposium on Network Computing and Applications …, 2018
Automating the generation of cyber range virtual scenarios with VSDL
G Costa, E Russo, A Armando
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2022
ZenHackAdemy: Ethical Hacking@ DIBRIS.
L Demetrio, G Lagorio, M Ribaudo, E Russo, A Valenza
CSEDU (1), 405-413, 2019
Training the maritime security operations centre teams
M Raimondi, G Longo, A Merlo, A Armando, E Russo
2022 IEEE International Conference on Cyber Security and Resilience (CSR …, 2022
Attacking (and defending) the maritime radar system
G Longo, E Russo, A Armando, A Merlo
IEEE Transactions on Information Forensics and Security, 2023
HArMoNICS: high-assurance microgrid network infrastructure case study
G Roascio, G Costa, E Baccelli, L Malina, R Matulevičius, M Momeu, ...
IEEE Access 10, 115372-115383, 2022
MaCySTe: a virtual testbed for maritime cybersecurity
G Longo, A Orlich, S Musante, A Merlo, E Russo
Available at SSRN 4374685, 0
Electronic Attacks as a Cyber False Flag against Maritime Radars Systems
G Longo, A Merlo, A Armando, E Russo
2023 IEEE 48th Conference on Local Computer Networks (LCN), 1-6, 2023
Lidite: a full-fledged and featherweight digital twin framework
E Russo, G Costa, G Longo, A Armando, A Merlo
IEEE Transactions on Dependable and Secure Computing, 2023
Enabling real-time remote monitoring of ships by lossless protocol transformations
G Longo, A Orlich, A Merlo, E Russo
IEEE Transactions on Intelligent Transportation Systems, 2023
Collision-avoidance capabilities reduction after a cyber-attack to the navigation sensors
G Longo, M Martelli, E Russo, R Zaccone
International Ship Control Systems Symposium, 2022
Enabling Next-Generation Cyber Ranges with Mobile Security Components
E Russo, L Verderame, A Merlo
IFIP International Conference on Testing Software and Systems, 150-165, 2020
Towards Policy-Driven Monitoring of Fog Applications
E Russo, L Verderame, A Merlo
2019 IEEE 28th International Conference on Enabling Technologies …, 2019
Damn Vulnerable Application Scanner.
G Costa, E Russo, A Valenza
ITASEC, 424-435, 2021
DIOXIN: runtime security policy enforcement of fog applications
E Russo, L Verderame, A Armando, A Merlo
International Journal of Grid and Utility Computing 12 (2), 126-138, 2021
The system can't perform the operation now. Try again later.
Articles 1–16