Follow
Marco Ramilli
Marco Ramilli
Yoroi
Verified email at yoroi.company - Homepage
Title
Cited by
Cited by
Year
Man-in-the-Middle Attack to the HTTPS Protocol
F Callegati, W Cerroni, M Ramilli
IEEE Security & Privacy 7 (1), 78-81, 2009
5522009
Return-oriented programming
M Prandini, M Ramilli
IEEE Security & Privacy 10 (6), 84-87, 2012
1712012
Decentralized detection of network attacks through P2P data clustering of SNMP data
W Cerroni, G Moro, R Pasolini, M Ramilli
Computers & Security 52, 1-16, 2015
362015
Multi-stage delivery of malware
M Ramilli, M Bishop
2010 5th International Conference on Malicious and Unwanted Software, 91-97, 2010
352010
Multiprocess malware
M Ramilli, M Bishop, S Sun
2011 6th international conference on malicious and unwanted software, 8-13, 2011
342011
Towards a practical and effective security testing methodology
M Prandini, M Ramilli
The IEEE symposium on Computers and Communications, 320-325, 2010
322010
Splitting the HTTPS stream to attack secure web connections
M Prandini, M Ramilli, W Cerroni, F Callegati
IEEE Security & Privacy 8 (6), 80-84, 2010
302010
Peer-to-peer data mining classifiers for decentralized detection of network attacks
W Cerroni, G Moro, T Pirini, M Ramilli
Proceedings of the Twenty-Fourth Australasian Database Conference-Volume 137 …, 2013
292013
Raising risk awareness on the adoption of Web 2.0 technologies in decision making processes
M Prandini, M Ramilli
Future Internet 4 (3), 700-718, 2012
232012
Malware training sets: a machine learning dataset for everyone
M Ramilli
Marco Ramilli Web Corner, 2016
162016
Always the same, never the same
M Ramilli, M Prandini
IEEE Security & Privacy 8 (2), 73-75, 2010
152010
Frightened by links
F Callegati, M Ramilli
IEEE Security & Privacy 7 (6), 72-76, 2009
142009
Exploring information security issues in public sector inter-organizational collaboration
AF van Veenstra, M Ramilli
Electronic Government: 10th IFIP WG 8.5 International Conference, EGOV 2011 …, 2011
122011
Taking the Best of Both Worlds: a Comparison and Integration of the US and EU Approaches to E-voting Systems Evaluation
M Prandini, M Ramilli
2011 44th Hawaii International Conference on System Sciences, 1-10, 2011
102011
Network attack detection based on peer-to-peer clustering of SNMP data
W Cerroni, G Monti, G Moro, M Ramilli
Quality of Service in Heterogeneous Networks: 6th International ICST …, 2009
102009
A model for e-voting systems evaluation based on international standards: Definition and experimental validation
M Prandini, M Ramilli
e-Service Journal: A Journal of Electronic Services in the Public and …, 2012
92012
Security considerations about the adoption of web 2.0 technologies in sensitive e-government processes
M Prandini, M Ramilli
Proceedings of the 5th International Conference on Theory and Practice of …, 2011
82011
An integrated application of security testing methodologies to e-voting systems
M Ramilli, M Prandini
Electronic Participation: Second IFIP WG 8.5 International Conference, ePart …, 2010
82010
Internet voting: fatally torn between conflicting goals?
M Prandini, M Ramilli
Proceedings of the 6th International Conference on Theory and Practice of …, 2012
72012
Comment spam injection made easy
M Ramilli, M Prandini
2009 6th IEEE Consumer Communications and Networking Conference, 1-5, 2009
52009
The system can't perform the operation now. Try again later.
Articles 1–20