Search

Your search keyword '"Bella, Giampaolo"' showing total 479 results

Search Constraints

Start Over You searched for: Author "Bella, Giampaolo" Remove constraint Author: "Bella, Giampaolo"
479 results on '"Bella, Giampaolo"'

Search Results

1. Not Sure Your Car Withstands Cyberwarfare

2. The IoT Breaches your Household Again

3. Behind the (Digital Crime) Scenes: An MSC Model

4. Up-to-date Threat Modelling for Soft Privacy on Smart Cars

5. Smart Bulbs can be Hacked to Hack into your Household

6. An automated method for the ontological representation of security directives

7. A behaviouristic approach to representing processes and procedures in the OASIS 2 ontology

8. An Ontological Approach to Compliance Verification of the NIS 2 Directive

9. Towards Grammatical Tagging for the Legal Language of Cybersecurity

10. The Ontology for Agents, Systems and Integration of Services: OASIS version 2

11. A Threat Model for Soft Privacy on Smart Cars

12. How to Model Privacy Threats in the Automotive Domain

13. PETIoT: PEnetration Testing the Internet of Things

14. Evaluating the Fork-Awareness of Coverage-Guided Fuzzers

15. Forkfuzz: Leveraging the Fork-Awareness in Coverage-Guided Fuzzing

16. The VOCODES Kill Chain for Voice Controllable Devices

17. Up-to-Date Threat Modelling for Soft Privacy on Smart Cars

19. Multi-service Threats: Attacking and Protecting Network Printers and VoIP Phones alike

20. Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice Commands

21. Vulnerability Assessment and Penetration Testing on IP cameras

22. Interactional Freedom and Cybersecurity

23. Out to Explore the Cybersecurity Planet

24. Secure Routine: A Routine-Based Algorithm for Drivers Identification

25. Towards an Integrated Penetration Testing Environment for the CAN Protocol

26. Car drivers' privacy concerns and trust perceptions

27. VoIP Can Still Be Exploited -- Badly

28. Privacy and modern cars through a dual lens

29. CINNAMON: A Module for AUTOSAR Secure Onboard Communication

30. You Overtrust Your Printer

31. TOUCAN: A proTocol tO secUre Controller Area Network

32. Blockchains through ontologies: the case study of the Ethereum ERC721 standard in OASIS (Extended Version)

37. Semantic Representation as a Key Enabler for Blockchain-Based Commerce

42. A behaviouristic semantic approach to blockchain-based e-commerce

43. You Already Used Formal Methods but Did Not Know It

44. You Overtrust Your Printer

46. Towards an Integrated Penetration Testing Environment for the CAN Protocol

Catalog

Books, media, physical & digital resources