Secure virtualization for cloud computing F Lombardi, R Di Pietro Journal of network and computer applications 34 (4), 1113-1122, 2011 | 596 | 2011 |
Edge computing perspectives: Architectures, technologies, and open security issues M Caprolu, R Di Pietro, F Lombardi, S Raponi 2019 IEEE International Conference on Edge Computing (EDGE), 116-123, 2019 | 202 | 2019 |
CUDA leaks: a detailed hack for CUDA and a (partial) fix RD Pietro, F Lombardi, A Villani ACM Transactions on Embedded Computing Systems (TECS) 15 (1), 1-25, 2016 | 71 | 2016 |
KvmSec: a security extension for Linux kernel virtual machines F Lombardi, R Di Pietro Proceedings of the 2009 ACM symposium on Applied Computing, 2029-2034, 2009 | 63 | 2009 |
Transparent security for cloud F Lombardi, R Di Pietro Proceedings of the 2010 ACM symposium on applied computing, 414-415, 2010 | 58 | 2010 |
CUDA leaks: Information leakage in GPU architectures R Di Pietro, F Lombardi, A Villani arXiv preprint arXiv:1305.7383, 2013 | 43 | 2013 |
Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware G Suarez-Tangil, JE Tapiador, F Lombardi, R Di Pietro IEEE Transactions on Mobile Computing 15 (4), 789-802, 2015 | 39 | 2015 |
Exploring and analyzing the tor hidden services graph M Bernaschi, A Celestini, S Guarino, F Lombardi ACM Transactions on the Web (TWEB) 11 (4), 1-26, 2017 | 35 | 2017 |
Virtualization Technologies and Cloud Security: advantages, issues, and perspectives R Di Pietro, F Lombardi From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the …, 2018 | 32 | 2018 |
Spiders like onions: on the network of tor hidden services M Bernaschi, A Celestini, S Guarino, F Lombardi, E Mastrostefano The World Wide Web Conference, 105-115, 2019 | 29 | 2019 |
Thwarting obfuscated malware via differential fault analysis G Suarez-Tangil, JE Tapiador, F Lombardi, R Di Pietro Computer 47 (6), 24-31, 2014 | 27 | 2014 |
CURE—Towards enforcing a reliable timeline for cloud forensics: Model, architecture, and experiments R Battistoni, R Di Pietro, F Lombardi Computer Communications 91, 29-43, 2016 | 23 | 2016 |
CloRExPa: Cloud resilience via execution path analysis R Di Pietro, F Lombardi, M Signorini Future Generation Computer Systems 32, 168-179, 2014 | 21 | 2014 |
Continued rise of the cloud Z Mahmood Springer, 2014 | 17 | 2014 |
FRoDO: Fraud resilient device for off-line micro-payments V Daza, R Di Pietro, F Lombardi, M Signorini IEEE Transactions on Dependable and Secure Computing 13 (2), 296-311, 2015 | 14 | 2015 |
Virtualization and Cloud Security: Benefits, Caveats, and Future Developments F Lombardi, R Di Pietro Cloud Computing - Challenges, Limitations and R&D Solutions, 237-256, 2014 | 14 | 2014 |
Crew: Cloud resilience for windows guests through monitored virtualization F Lombardi, R Di Pietro, C Soriente 2010 29th IEEE Symposium on Reliable Distributed Systems, 338-342, 2010 | 14 | 2010 |
A security management architecture for the protection of kernel virtual machines F Lombardi, R Di Pietro 2010 10th IEEE International Conference on Computer and Information …, 2010 | 13 | 2010 |
CUDACS: securing the cloud with CUDA-enabled secure virtualization F Lombardi, R Di Pietro Information and Communications Security: 12th International Conference …, 2010 | 13 | 2010 |
Extending the UDDI API for service instance ranking. E Ambrosi, M Bianchi, C Gaibisso, G Gambosi, F Lombardi ISWS, 104-110, 2005 | 9 | 2005 |