Man-in-the-Middle Attack to the HTTPS Protocol F Callegati, W Cerroni, M Ramilli IEEE Security & Privacy 7 (1), 78-81, 2009 | 552 | 2009 |
Return-oriented programming M Prandini, M Ramilli IEEE Security & Privacy 10 (6), 84-87, 2012 | 171 | 2012 |
Decentralized detection of network attacks through P2P data clustering of SNMP data W Cerroni, G Moro, R Pasolini, M Ramilli Computers & Security 52, 1-16, 2015 | 36 | 2015 |
Multi-stage delivery of malware M Ramilli, M Bishop 2010 5th International Conference on Malicious and Unwanted Software, 91-97, 2010 | 35 | 2010 |
Multiprocess malware M Ramilli, M Bishop, S Sun 2011 6th international conference on malicious and unwanted software, 8-13, 2011 | 34 | 2011 |
Towards a practical and effective security testing methodology M Prandini, M Ramilli The IEEE symposium on Computers and Communications, 320-325, 2010 | 32 | 2010 |
Splitting the HTTPS stream to attack secure web connections M Prandini, M Ramilli, W Cerroni, F Callegati IEEE Security & Privacy 8 (6), 80-84, 2010 | 30 | 2010 |
Peer-to-peer data mining classifiers for decentralized detection of network attacks W Cerroni, G Moro, T Pirini, M Ramilli Proceedings of the Twenty-Fourth Australasian Database Conference-Volume 137 …, 2013 | 29 | 2013 |
Raising risk awareness on the adoption of Web 2.0 technologies in decision making processes M Prandini, M Ramilli Future Internet 4 (3), 700-718, 2012 | 23 | 2012 |
Malware training sets: a machine learning dataset for everyone M Ramilli Marco Ramilli Web Corner, 2016 | 16 | 2016 |
Always the same, never the same M Ramilli, M Prandini IEEE Security & Privacy 8 (2), 73-75, 2010 | 15 | 2010 |
Frightened by links F Callegati, M Ramilli IEEE Security & Privacy 7 (6), 72-76, 2009 | 14 | 2009 |
Exploring information security issues in public sector inter-organizational collaboration AF van Veenstra, M Ramilli Electronic Government: 10th IFIP WG 8.5 International Conference, EGOV 2011 …, 2011 | 12 | 2011 |
Taking the Best of Both Worlds: a Comparison and Integration of the US and EU Approaches to E-voting Systems Evaluation M Prandini, M Ramilli 2011 44th Hawaii International Conference on System Sciences, 1-10, 2011 | 10 | 2011 |
Network attack detection based on peer-to-peer clustering of SNMP data W Cerroni, G Monti, G Moro, M Ramilli Quality of Service in Heterogeneous Networks: 6th International ICST …, 2009 | 10 | 2009 |
A model for e-voting systems evaluation based on international standards: Definition and experimental validation M Prandini, M Ramilli e-Service Journal: A Journal of Electronic Services in the Public and …, 2012 | 9 | 2012 |
Security considerations about the adoption of web 2.0 technologies in sensitive e-government processes M Prandini, M Ramilli Proceedings of the 5th International Conference on Theory and Practice of …, 2011 | 8 | 2011 |
An integrated application of security testing methodologies to e-voting systems M Ramilli, M Prandini Electronic Participation: Second IFIP WG 8.5 International Conference, ePart …, 2010 | 8 | 2010 |
Internet voting: fatally torn between conflicting goals? M Prandini, M Ramilli Proceedings of the 6th International Conference on Theory and Practice of …, 2012 | 7 | 2012 |
Comment spam injection made easy M Ramilli, M Prandini 2009 6th IEEE Consumer Communications and Networking Conference, 1-5, 2009 | 5 | 2009 |