Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 16 di 16
Titolo Anno di pubblicazione Autori Unitn File
The dark side of vulnerability exploitation: a research proposal 1-gen-2012 Allodi, LucaMassacci, Fabio
A Preliminary Analysis of Vulnerability Scores for Attacks in Wild 1-gen-2012 Allodi, LucaMassacci, Fabio
MalwareLab: Experimentation with Cybercrime attack tools 1-gen-2013 Allodi, LucaMassacci, Fabio +
Internet-scale vulnerability risk assessment (Extended Abstract) Research proposal 1-gen-2013 Allodi, Luca
How CVSS is DOSsing your patching policy (and wasting your money) 1-gen-2013 Allodi, LucaMassacci, Fabio
Analysis of exploits in the wild. Or: do Cybersecurity Standards Make Sense? 1-gen-2013 Allodi, LucaMassacci, Fabio
Quantitative Assessment of Risk Reduction with Cybercrime Black Market Monitoring 1-gen-2013 Allodi, LucaShim, Woo HyunMassacci, Fabio
Crime pays if you are just an average hacker 1-gen-2013 Shim, Woo HyunAllodi, LucaMassacci, Fabio
Comparing vulnerability severity and exploits using case-control studies 1-gen-2014 Allodi, LucaMassacci, Fabio
Risk-Based Vulnerability Management. Exploiting the economic nature of the attacker to build sound and measurable vulnerability mitigation strategies. 1-gen-2015 Allodi, Luca
The Work-Averse Attacker Model 1-gen-2015 Massacci, FabioAllodi, Luca
The heavy tails of vulnerability exploitation 1-gen-2015 Allodi, Luca
Then and now: on the maturity of the cybercrime markets: the lesson that black-hat marketeers learned 1-gen-2016 Allodi, LucaMassacci, Fabio +
Estimating the assessment difficulty of CVSS environmental metrics: An experiment 1-gen-2017 Allodi L.Biagioni S.Crispo B.Labunets K.Massacci F.Medeiros Dos Santos, Wagner
Security Events and Vulnerability Data for Cybersecurity Risk Estimation 1-gen-2017 Allodi L.Massacci F.
An Experimental Approach for Estimating Cyber Risk: a Proposal Building upon Cyber Ranges and Capture the Flags 1-gen-2020 Di Tizio, GiorgioMassacci, FabioAllodi, LucaDashevskyi, Stanislav +
Mostrati risultati da 1 a 16 di 16
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile