Discovering reflected cross-site scripting vulnerabilities using a multiobjective reinforcement learning environment F Caturano, G Perrone, SP Romano Computers & Security 103, 102204, 2021 | 40 | 2021 |
The Docker Security Playground: A hands-on approach to the study of network security G Perrone, SP Romano 2017 Principles, Systems and Applications of IP Telecommunications (IPTComm …, 2017 | 25 | 2017 |
An automated approach to Web Offensive Security N Auricchio, A Cappuccio, F Caturano, G Perrone, SP Romano Computer Communications, 2022 | 15 | 2022 |
Including insider threats into risk management through Bayesian threat graph networks N d'Ambrosio, G Perrone, SP Romano Computers & Security 133, 103410, 2023 | 14 | 2023 |
“Dirclustering”: a semantic clustering approach to optimize website structure discovery during penetration testing D Antonelli, R Cascella, A Schiano, G Perrone, SP Romano Journal of Computer Virology and Hacking Techniques 20 (4), 565-577, 2024 | 11 | 2024 |
Reinforced wavsep: a benchmarking platform for web application vulnerability scanners L Urbano, G Perrone, SP Romano 2022 International Conference on Electrical, Computer and Energy …, 2022 | 8 | 2022 |
Capturing flags in a dynamically deployed microservices-based heterogeneous environment F Caturano, G Perrone, SP Romano 2020 principles, systems and applications of IP telecommunications (iPTComm …, 2020 | 7 | 2020 |
Exploitwp2docker: a platform for automating the generation of vulnerable wordpress environments for cyber ranges F Caturano, N d’Ambrosio, G Perrone, L Previdente, SP Romano 2022 International Conference on Electrical, Computer and Energy …, 2022 | 5 | 2022 |
Hacking goals: A goal-centric attack classification framework F Caturano, G Perrone, SP Romano Testing Software and Systems: 32nd IFIP WG 6.1 International Conference …, 2020 | 4 | 2020 |
A software-defined approach for mitigating insider and external threats via moving target defense N d'Ambrosio, E Melluso, G Perrone, SP Romano 2023 IEEE Conference on Network Function Virtualization and Software Defined …, 2023 | 3 | 2023 |
ThePhish: an Automated Open-Source Phishing Email Analysis Platform. E Galdi, G Perrone, SP Romano ITASEC, 76-101, 2022 | 3 | 2022 |
On-demand Deployment and Orchestration of Cyber Ranges in the Cloud. AP Luise, G Perrone, C Perrotta, SP Romano ITASEC, 80-91, 2021 | 3 | 2021 |
WebAssembly and Security: a review G Perrone, SP Romano Computer Science Review 56, 100728, 2025 | 2 | 2025 |
Sniping at web applications to discover input-handling vulnerabilities C Brandi, G Perrone, SP Romano Journal of Computer Virology and Hacking Techniques 20 (4), 641-667, 2024 | 2 | 2024 |
Dockerized Android: a container-based platform to build mobile Android scenarios for Cyber Ranges D Capone, F Caturano, A Delicato, G Perrone, SP Romano 2022 International Conference on Electrical, Computer and Energy …, 2022 | 2 | 2022 |
A cyber-resilient open architecture for drone control N d’Ambrosio, G Perrone, SP Romano, A Urraro Computers & Security 150, 104205, 2025 | 1 | 2025 |
Scass: Breaking into Scada Systems Security G Perrone, N d’Ambrosio, G Capodagli, SP Romano Available at SSRN 4750612, 2024 | 1 | 2024 |
A Cyber-Resilient Open Architecture for Drone Control SP Romano, N d’Ambrosio, G Perrone, A Urraro Available at SSRN 4903757, 0 | 1 | |
Unleashing Exploit-Db Data for the Automated Exploitation of Intentionally Vulnerable Docker Containers G Perrone, SP Romano, N d’Ambrosio, V Pacchiano Available at SSRN 4779063, 0 | 1 | |
SCASS: Breaking into SCADA Systems Security N d’Ambrosio, G Capodagli, G Perrone, SP Romano Computers & Security 151, 104315, 2025 | | 2025 |