Secure virtualization for cloud computing F Lombardi, R Di Pietro Journal of network and computer applications 34 (4), 1113-1122, 2011 | 619 | 2011 |
Edge computing perspectives: Architectures, technologies, and open security issues M Caprolu, R Di Pietro, F Lombardi, S Raponi 2019 IEEE International Conference on Edge Computing (EDGE), 116-123, 2019 | 239 | 2019 |
CUDA leaks: a detailed hack for CUDA and a (partial) fix RD Pietro, F Lombardi, A Villani ACM Transactions on Embedded Computing Systems (TECS) 15 (1), 1-25, 2016 | 76 | 2016 |
KvmSec: a security extension for Linux kernel virtual machines F Lombardi, R Di Pietro Proceedings of the 2009 ACM symposium on Applied Computing, 2029-2034, 2009 | 65 | 2009 |
Transparent security for cloud F Lombardi, R Di Pietro Proceedings of the 2010 ACM symposium on applied computing, 414-415, 2010 | 58 | 2010 |
CUDA leaks: Information leakage in GPU architectures R Di Pietro, F Lombardi, A Villani arXiv preprint arXiv:1305.7383, 2013 | 47 | 2013 |
Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware G Suarez-Tangil, JE Tapiador, F Lombardi, R Di Pietro IEEE Transactions on Mobile Computing 15 (4), 789-802, 2015 | 41 | 2015 |
Virtualization Technologies and Cloud Security: advantages, issues, and perspectives R Di Pietro, F Lombardi From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the …, 2018 | 36 | 2018 |
Exploring and analyzing the tor hidden services graph M Bernaschi, A Celestini, S Guarino, F Lombardi ACM Transactions on the Web (TWEB) 11 (4), 1-26, 2017 | 36 | 2017 |
Spiders like onions: on the network of tor hidden services M Bernaschi, A Celestini, S Guarino, F Lombardi, E Mastrostefano The World Wide Web Conference, 105-115, 2019 | 32 | 2019 |
CURE—Towards enforcing a reliable timeline for cloud forensics: Model, architecture, and experiments R Battistoni, R Di Pietro, F Lombardi Computer Communications 91, 29-43, 2016 | 26 | 2016 |
Thwarting obfuscated malware via differential fault analysis G Suarez-Tangil, JE Tapiador, F Lombardi, R Di Pietro Computer 47 (6), 24-31, 2014 | 26 | 2014 |
CloRExPa: Cloud resilience via execution path analysis R Di Pietro, F Lombardi, M Signorini Future Generation Computer Systems 32, 168-179, 2014 | 21 | 2014 |
Continued rise of the cloud Z Mahmood Springer, 2014 | 17 | 2014 |
FRoDO: Fraud resilient device for off-line micro-payments V Daza, R Di Pietro, F Lombardi, M Signorini IEEE Transactions on Dependable and Secure Computing 13 (2), 296-311, 2015 | 16 | 2015 |
Crew: Cloud resilience for windows guests through monitored virtualization F Lombardi, R Di Pietro, C Soriente 2010 29th IEEE Symposium on Reliable Distributed Systems, 338-342, 2010 | 15 | 2010 |
A security management architecture for the protection of kernel virtual machines F Lombardi, R Di Pietro 2010 10th IEEE International Conference on Computer and Information …, 2010 | 14 | 2010 |
CUDACS: securing the cloud with CUDA-enabled secure virtualization F Lombardi, R Di Pietro Information and Communications Security: 12th International Conference …, 2010 | 14 | 2010 |
Virtualization and Cloud Security: Benefits, Caveats, and Future Developments F Lombardi, R Di Pietro Cloud Computing - Challenges, Limitations and R&D Solutions, 237-256, 2014 | 13 | 2014 |
A technical characterization of APTs by leveraging public resources L González-Manzano, JM de Fuentes, F Lombardi, C Ramos International Journal of Information Security 22 (6), 1567-1584, 2023 | 11 | 2023 |