What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Massimiliano Albanese
Google Scholar
ORCID:
0000-0002-2675-5810
22
publications in security and cryptology related venues
Year
Venue
Title
2023
journals/compsec
A framework for designing vulnerability metrics.
Massimiliano Albanese
Ibifubara Iganibo
Olutola Adebiyi
2022
conf/esorics
A Formal Model for Credential Hopping Attacks.
Massimiliano Albanese
Karin Johnsgard
Vipin Swarup
2020
conf/cns
A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses.
Luan Huy Pham
Massimiliano Albanese
Ritu Chadha
Cho-Yu Jason Chiang
Sridhar Venkatesan
Charles A. Kamhoua
Nandi Leslie
2020
conf/cns
SCIBORG: Secure Configurations for the IoT Based on optimization and Reasoning on Graphs.
Hamed Soroush
Massimiliano Albanese
Milad Asgari Mehrabadi
Ibifubara Iganibo
Marc Mosko
Jason H. Gao
David J. Fritz
Shantanu Rane
Eric Bier
2018
conf/ccs
MTD 2018: 5th ACM Workshop on Moving Target Defense (MTD).
Massimiliano Albanese
Dijiang Huang
2017
conf/ccs
Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning.
Sridhar Venkatesan
Massimiliano Albanese
Ankit Shah
Rajesh Ganesan
Sushil Jajodia
2017
conf/ccs
Performance Modeling of Moving Target Defenses.
Warren Connell
Daniel A. Menascé
Massimiliano Albanese
2017
conf/sec
A Framework for Moving Target Defense Quantification.
Warren Connell
Massimiliano Albanese
Sridhar Venkatesan
2016
journals/tifs
Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks.
Mengyuan Zhang
Lingyu Wang
Sushil Jajodia
Anoop Singhal
Massimiliano Albanese
2016
conf/ccs
A Moving Target Defense Approach to Disrupting Stealthy Botnets.
Sridhar Venkatesan
Massimiliano Albanese
George Cybenko
Sushil Jajodia
2016
conf/ccs
Moving Target Defense against DDoS Attacks: An Empirical Game-Theoretic Analysis.
Mason Wright
Sridhar Venkatesan
Massimiliano Albanese
Michael P. Wellman
2016
conf/cns
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures.
Sridhar Venkatesan
Massimiliano Albanese
Kareem Amin
Sushil Jajodia
Mason Wright
2016
conf/cns
A quantitative risk assessment framework for adaptive Intrusion Detection in the cloud.
Luan Huy Pham
Massimiliano Albanese
Sridhar Venkatesan
2015
conf/cns
A deception based approach for defeating OS and service fingerprinting.
Massimiliano Albanese
Ermanno Battista
Sushil Jajodia
2015
conf/cns
Disrupting stealthy botnets through strategic placement of detectors.
Sridhar Venkatesan
Massimiliano Albanese
Sushil Jajodia
2014
conf/esorics
Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks.
Lingyu Wang
Mengyuan Zhang
Sushil Jajodia
Anoop Singhal
Massimiliano Albanese
2014
conf/cns
Manipulating the attacker's view of a system's attack surface.
Massimiliano Albanese
Ermanno Battista
Sushil Jajodia
Valentina Casola
2013
conf/cns
A moving target defense mechanism for MANETs based on identity virtualization.
Massimiliano Albanese
Alessandra De Benedictis
Sushil Jajodia
Kun Sun
2013
conf/dsn
Reliable mission deployment in vulnerable distributed systems.
Massimiliano Albanese
Sushil Jajodia
Ravi Jhawar
Vincenzo Piuri
2012
conf/esorics
A Probabilistic Framework for Localization of Attackers in MANETs.
Massimiliano Albanese
Alessandra De Benedictis
Sushil Jajodia
Paulo Shakarian
2012
conf/dsn
Time-efficient and cost-effective network hardening using attack graphs.
Massimiliano Albanese
Sushil Jajodia
Steven Noel
2011
conf/esorics
Scalable Analysis of Attack Scenarios.
Massimiliano Albanese
Sushil Jajodia
Andrea Pugliese
V. S. Subrahmanian
Coauthors
Alessandra De Benedictis
(2)
Andrea Pugliese
(1)
Ankit Shah
(1)
Anoop Singhal
(2)
Charles A. Kamhoua
(1)
Cho-Yu Jason Chiang
(1)
Daniel A. Menascé
(1)
David J. Fritz
(1)
Dijiang Huang
(1)
Eric Bier
(1)
Ermanno Battista
(2)
George Cybenko
(1)
Hamed Soroush
(1)
Ibifubara Iganibo
(2)
Jason H. Gao
(1)
Kareem Amin
(1)
Karin Johnsgard
(1)
Kun Sun
(1)
Lingyu Wang
(2)
Luan Huy Pham
(2)
Marc Mosko
(1)
Mason Wright
(2)
Massimiliano Albanese
(22)
Mengyuan Zhang
(2)
Michael P. Wellman
(1)
Milad Asgari Mehrabadi
(1)
Nandi Leslie
(1)
Olutola Adebiyi
(1)
Paulo Shakarian
(1)
Rajesh Ganesan
(1)
Ravi Jhawar
(1)
Ritu Chadha
(1)
Shantanu Rane
(1)
Sridhar Venkatesan
(8)
Steven Noel
(1)
Sushil Jajodia
(13)
V. S. Subrahmanian
(1)
Valentina Casola
(1)
Vincenzo Piuri
(1)
Vipin Swarup
(1)
Warren Connell
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to