Travelled to:
1 × Finland
1 × France
1 × Portugal
1 × South Korea
2 × Italy
3 × USA
Collaborated with:
C.Krügel R.A.Kemmerer F.Valeur A.Doupé E.Kirda ∅ A.Carzaniga G.P.Picco Y.Shoshitaishvili L.Invernizzi A.Zand X.Yan P.Payet N.Jovanovic Y.Fratantonio A.Machiry A.Bianchi D.Balzarotti G.Banks M.Cova V.Felmetsger W.K.Robertson
Talks about:
secur (4) detect (3) applic (3) character (2) analysi (2) system (2) intrus (2) design (2) scale (2) vote (2)
Person: Giovanni Vigna
DBLP: Vigna:Giovanni
Contributed to:
Wrote 11 papers:
- ESEC-FSE-2015-FratantonioMBKV #android #named
- CLAPP: characterizing loops in Android applications (YF, AM, AB, CK, GV), pp. 687–697.
- SAC-2014-ShoshitaishviliIDV #analysis #scalability #security #trade-off
- Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security (YS, LI, AD, GV), pp. 1649–1656.
- SAC-2014-ZandVYK #detection
- Extracting probable command and control signatures for detecting botnets (AZ, GV, XY, CK), pp. 1657–1662.
- SAC-2013-PayetDKV #analysis #execution #scalability
- EARs in the wild: large-scale analysis of execution after redirect vulnerabilities (PP, AD, CK, GV), pp. 1792–1799.
- ISSTA-2008-BalzarottiBCFKRVV #security #testing
- Are your votes really counted?: testing the security of real-world electronic voting systems (DB, GB, MC, VF, RAK, WKR, FV, GV), pp. 237–248.
- SAC-2006-KirdaKVJ #named
- Noxes: a client-side solution for mitigating cross-site scripting attacks (EK, CK, GV, NJ), pp. 330–337.
- SAC-2006-ValeurVKK #web
- An anomaly-driven reverse proxy for web applications (FV, GV, CK, EK), pp. 361–368.
- ESEC-FSE-2003-VignaVK #design #detection #implementation #product line
- Designing and implementing a family of intrusion detection systems (GV, FV, RAK), pp. 88–97.
- FME-2003-Vigna #security
- A Topological Characterization of TCP/IP Security (GV), pp. 914–939.
- ICSE-2003-KemmererV #detection #internet #security
- Internet Security and Intrusion Detection (RAK, GV), pp. 748–749.
- ICSE-1997-CarzanigaPV #design #distributed #mobile #paradigm
- Designing Distributed Applications with Mobile Code Paradigms (AC, GPP, GV), pp. 22–32.