BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Finland
1 × France
1 × Portugal
1 × South Korea
2 × Italy
3 × USA
Collaborated with:
C.Krügel R.A.Kemmerer F.Valeur A.Doupé E.Kirda A.Carzaniga G.P.Picco Y.Shoshitaishvili L.Invernizzi A.Zand X.Yan P.Payet N.Jovanovic Y.Fratantonio A.Machiry A.Bianchi D.Balzarotti G.Banks M.Cova V.Felmetsger W.K.Robertson
Talks about:
secur (4) detect (3) applic (3) character (2) analysi (2) system (2) intrus (2) design (2) scale (2) vote (2)

Person: Giovanni Vigna

DBLP DBLP: Vigna:Giovanni

Contributed to:

ESEC/FSE 20152015
SAC 20142014
SAC 20132013
ISSTA 20082008
SAC 20062006
ESEC/FSE 20032003
FME 20032003
ICSE 20032003
ICSE 19971997

Wrote 11 papers:

ESEC-FSE-2015-FratantonioMBKV #android #named
CLAPP: characterizing loops in Android applications (YF, AM, AB, CK, GV), pp. 687–697.
SAC-2014-ShoshitaishviliIDV #analysis #scalability #security #trade-off
Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security (YS, LI, AD, GV), pp. 1649–1656.
SAC-2014-ZandVYK #detection
Extracting probable command and control signatures for detecting botnets (AZ, GV, XY, CK), pp. 1657–1662.
SAC-2013-PayetDKV #analysis #execution #scalability
EARs in the wild: large-scale analysis of execution after redirect vulnerabilities (PP, AD, CK, GV), pp. 1792–1799.
ISSTA-2008-BalzarottiBCFKRVV #security #testing
Are your votes really counted?: testing the security of real-world electronic voting systems (DB, GB, MC, VF, RAK, WKR, FV, GV), pp. 237–248.
SAC-2006-KirdaKVJ #named
Noxes: a client-side solution for mitigating cross-site scripting attacks (EK, CK, GV, NJ), pp. 330–337.
SAC-2006-ValeurVKK #web
An anomaly-driven reverse proxy for web applications (FV, GV, CK, EK), pp. 361–368.
ESEC-FSE-2003-VignaVK #design #detection #implementation #product line
Designing and implementing a family of intrusion detection systems (GV, FV, RAK), pp. 88–97.
FME-2003-Vigna #security
A Topological Characterization of TCP/IP Security (GV), pp. 914–939.
ICSE-2003-KemmererV #detection #internet #security
Internet Security and Intrusion Detection (RAK, GV), pp. 748–749.
ICSE-1997-CarzanigaPV #design #distributed #mobile #paradigm
Designing Distributed Applications with Mobile Code Paradigms (AC, GPP, GV), pp. 22–32.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.