Automatic mapping of unstructured cyber threat intelligence: an experimental study:(practical experience report) V Orbinato, M Barbaraci, R Natella, D Cotroneo 2022 IEEE 33rd International Symposium on Software Reliability Engineering …, 2022 | 28 | 2022 |
EVIL: Exploiting Software via Natural Language P Liguori, E Al-Hossami, V Orbinato, R Natella, S Shaikh, D Cotroneo, ... 2021 IEEE 32nd International Symposium on Software Reliability Engineering …, 2021 | 22 | 2021 |
Secure software development and testing: A model-based methodology V Casola, A De Benedictis, C Mazzocca, V Orbinato Computers & Security 137, 103639, 2024 | 17 | 2024 |
A next-generation platform for Cyber Range-as-a-Service V Orbinato 2021 IEEE 32nd International Symposium on Software Reliability Engineering …, 2021 | 8 | 2021 |
Laccolith: Hypervisor-Based Adversary Emulation with Anti-Detection V Orbinato, MC Feliciano, D Cotroneo, R Natella IEEE Transactions on Dependable and Secure Computing, 2024 | 3 | 2024 |
The Power of Words: Generating PowerShell Attacks from Natural Language P Liguori, C Marescalco, R Natella, V Orbinato, L Pianese 18th USENIX WOOT Conference on Offensive Technologies, 2024 | 2 | 2024 |
RailRED: a Node-RED-based framework for modeling Train Control Management Systems A Rizzardi, R Della Corte, JF Cevallos Moreno, V Orbinato, S De Vivo, ... 20th International Conference on Wireless and Mobile Computing, Networking …, 0 | 1* | |
Can Neural Decompilation Assist Vulnerability Prediction on Binary Code? D Cotroneo, FC Grasso, R Natella, V Orbinato arXiv preprint arXiv:2412.07538, 2024 | | 2024 |
Message from the ReSAISE Co-Chairs P Liguori, A Mastropaolo, V Orbinato | | |