Daniele Canavese
Daniele Canavese
Verified email at
Cited by
Cited by
Classification and analysis of communication protection policy anomalies
F Valenza, C Basile, D Canavese, A Lioy
IEEE/ACM Transactions on Networking 25 (5), 2601-2614, 2017
Detection of encrypted cryptomining malware connections with machine and deep learning
A Pastor, A Mozo, S Vakaruk, D Canavese, DR López, L Regano, ...
IEEE Access 8, 158036-158055, 2020
A meta-model for software protections and reverse engineering attacks
C Basile, D Canavese, L Regano, P Falcarin, B De Sutter
Journal of Systems and Software 150, 3-21, 2019
Assessing network authorization policies via reachability analysis
C Basile, D Canavese, C Pitscheider, A Lioy, F Valenza
Computers & Electrical Engineering 64, 110-131, 2017
Inter‐function anomaly analysis for correct SDN/NFV deployment
C Basile, D Canavese, A Lioy, C Pitscheider, F Valenza
International Journal of Network Management 26 (1), 25-43, 2016
Inter-technology conflict analysis for communication protection policies
C Basile, D Canavese, A Lioy, F Valenza
Risks and Security of Internet and Systems: 9th International Conference …, 2015
Estimating software obfuscation potency with artificial neural networks
D Canavese, L Regano, C Basile, A Viticchié
Security and Trust Management: 13th International Workshop, STM 2017, Oslo …, 2017
Toward a complete software stack to integrate quantum key distribution in a cloud environment
I Pedone, A Atzeni, D Canavese, A Lioy
IEEE Access 9, 115270-115291, 2021
Automatic discovery of software attacks via backward reasoning
C Basile, D Canavese, J d'Annoville, B De Sutter, F Valenza
2015 IEEE/ACM 1st International Workshop on Software Protection, 52-58, 2015
Towards optimally hiding protected assets in software applications
L Regano, D Canavese, C Basile, A Lioy
2017 IEEE International Conference on Software Quality, Reliability and …, 2017
Practical Autonomous Cyberhealth for resilient Micro, Small and Medium-sized Enterprises
E Mantas, D Papadopoulos, C Fernández, N Ortiz, M Compastié, ...
2021 IEEE International Mediterranean Conference on Communications and …, 2021
Towards automatic risk analysis and mitigation of software applications
L Regano, D Canavese, C Basile, A Viticchié, A Lioy
Information Security Theory and Practice: 10th IFIP WG 11.2 International …, 2016
Improved reachability analysis for security management
C Basile, D Canavese, A Lioy, C Pitscheider
2013 21st Euromicro International Conference on Parallel, Distributed, and …, 2013
A unified ontology for the virtualization domain
J Silvestro, D Canavese, E Cesena, P Smiraglia
On the Move to Meaningful Internet Systems: OTM 2011: Confederated …, 2011
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection
D Canavese, L Regano, C Basile, G Ciravegna, A Lioy
Computers & Electrical Engineering 97, 107621, 2022
Trusted computing technology and proposals for resolving cloud computing security problems
I Pedone, D Canavese, A Lioy
Cloud Computing Security, 373-386, 2020
Can a light typing discipline be compatible with an efficient implementation of finite fields inversion?
D Canavese, E Cesena, R Ouchary, M Pedicini, L Roversi
Foundational and Practical Aspects of Resource Analysis: Third International …, 2014
Data set and machine learning models for the classification of network traffic originators
D Canavese, L Regano, C Basile, G Ciravegna, A Lioy
Data in Brief 41, 107968, 2022
Light combinators for finite fields arithmetic
D Canavese, E Cesena, R Ouchary, M Pedicini, L Roversi
Science of Computer Programming 111, 365-394, 2015
Design, Implementation, and Automation of a Risk Management Approach for Man-at-the-End Software Protection
C Basile, B De Sutter, D Canavese, L Regano, B Coppens
arXiv preprint arXiv:2303.15033, 2023
The system can't perform the operation now. Try again later.
Articles 1–20