flavio lombardi
flavio lombardi
IAC - CNR
Подтвержден адрес электронной почты в домене cnr.it
Название
Процитировано
Процитировано
Год
Secure virtualization for cloud computing
F Lombardi, R Di Pietro
Journal of network and computer applications 34 (4), 1113-1122, 2011
5132011
KvmSec: a security extension for Linux kernel virtual machines
F Lombardi, R Di Pietro
Proceedings of the 2009 ACM symposium on Applied Computing, 2029-2034, 2009
612009
Transparent security for cloud
F Lombardi, R Di Pietro
Proceedings of the 2010 ACM symposium on applied computing, 414-415, 2010
522010
Transparent security for cloud
F Lombardi, R Di Pietro
Proceedings of the 2010 ACM symposium on applied computing, 414-415, 2010
522010
Edge computing perspectives: architectures, technologies, and open security issues
M Caprolu, R Di Pietro, F Lombardi, S Raponi
2019 IEEE International Conference on Edge Computing (EDGE), 116-123, 2019
482019
CUDA leaks: a detailed hack for CUDA and a (partial) fix
RD Pietro, F Lombardi, A Villani
ACM Transactions on Embedded Computing Systems (TECS) 15 (1), 1-25, 2016
462016
CUDA leaks: Information leakage in GPU architectures
R Di Pietro, F Lombardi, A Villani
arXiv preprint arXiv:1305.7383, 2013
402013
Cloud computing security: foundations and challenges
JR Vacca
CRC Press, 2016
272016
Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware
G Suarez-Tangil, JE Tapiador, F Lombardi, R Di Pietro
IEEE Transactions on Mobile Computing 15 (4), 789-802, 2015
252015
Thwarting obfuscated malware via differential fault analysis
G Suarez-Tangil, JE Tapiador, F Lombardi, R Di Pietro
Computer 47 (6), 24-31, 2014
242014
CloRExPa: Cloud resilience via execution path analysis
R Di Pietro, F Lombardi, M Signorini
Future Generation Computer Systems 32, 168-179, 2014
192014
Continued rise of the cloud
Z Mahmood
Springer, 2014
172014
Continued rise of the cloud
Z Mahmood
Springer, 2014
172014
CReW: Cloud resilience for Windows guests through monitored virtualization
F Lombardi, R Di Pietro, C Soriente
2010 29th IEEE Symposium on Reliable Distributed Systems, 338-342, 2010
152010
Exploring and analyzing the tor hidden services graph
M Bernaschi, A Celestini, S Guarino, F Lombardi
ACM Transactions on the Web (TWEB) 11 (4), 1-26, 2017
142017
FRoDO: Fraud resilient device for off-line micro-payments
V Daza, R Di Pietro, F Lombardi, M Signorini
IEEE Transactions on Dependable and Secure Computing 13 (2), 296-311, 2015
132015
CURE—Towards enforcing a reliable timeline for cloud forensics: Model, architecture, and experiments
R Battistoni, R Di Pietro, F Lombardi
Computer Communications 91, 29-43, 2016
112016
CUDACS: securing the cloud with CUDA-enabled secure virtualization
F Lombardi, R Di Pietro
International Conference on Information and Communications Security, 92-106, 2010
112010
A security management architecture for the protection of kernel virtual machines
F Lombardi, R Di Pietro
2010 10th IEEE International Conference on Computer and Information …, 2010
112010
Virtualization Technologies and Cloud Security: advantages, issues, and perspectives
R Di Pietro, F Lombardi
From Database to Cyber Security, 166-185, 2018
102018
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20