Luca Allodi
Titel
Zitiert von
Zitiert von
Jahr
Comparing Vulnerability Severity and Exploits Using Case-Control Studies
L Allodi, F Massacci
ACM Transactions on Information and System Security 17 (1), 2014
1042014
A preliminary analysis of vulnerability scores for attacks in wild: the ekits and sym datasets
L Allodi, F Massacci
Proceedings of the 2012 ACM Workshop on Building analysis datasets and …, 2012
602012
Security events and vulnerability data for cybersecurity risk estimation
L Allodi, F Massacci
Risk Analysis 37 (8), 1606-1627, 2017
522017
Economic Factors of Vulnerability Trade and Exploitation
L Allodi
ACM SIGSAC Conference on Computer and Communications Security (CCS '17 …, 2017
492017
Then and now: On the maturity of the cybercrime markets the lesson that black-hat marketeers learned
L Allodi, M Corradin, F Massacci
IEEE Transactions on Emerging Topics in Computing 4 (1), 35-46, 2015
452015
Malwarelab: Experimentation with cybercrime attack tools
L Allodi, V Kotov, F Massacci
6th Workshop on Cyber Security Experimentation and Test ({CSET} 13), 2013
342013
Quantitative assessment of risk reduction with cybercrime black market monitoring
L Allodi, W Shim, F Massacci
2013 IEEE Security and Privacy Workshops, 165-172, 2013
332013
The work-averse cyber attacker model: Theory and evidence from two million attack signatures
L Allodi, F Massacci, JM Williams
Available at SSRN 2862299, 2017
22*2017
The heavy tails of vulnerability exploitation
L Allodi
International Symposium on Engineering Secure Software and Systems, 133-148, 2015
222015
How CVSS is DOSsing your patching policy (and wasting your money).
L Allodi, F Massacci
blackhat USA 2013, 27 July-1 August 2013, Las Vegas, USA, 2013
14*2013
Cognitive Triaging of Phishing Attacks
A van der Heijden, L Allodi
28th USENIX Security Symposium, 1309--1326, 2019
122019
Crime pays if you are just an average hacker
W Shim, L Allodi, F Massacci
2012 International Conference on Cyber Security, 62-68, 2012
102012
A bug bounty perspective on the disclosure of web vulnerabilities
J Ruohonen, L Allodi
arXiv preprint arXiv:1805.09850, 2018
82018
Identifying relevant information cues for vulnerability assessment using CVSS
L Allodi, S Banescu, H Femmer, K Beckers
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
82018
Economic incentives on DNSSEC deployment: Time to move from quantity to quality
T Le, R van Rijswijk-Deij, L Allodi, N Zannone
NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-9, 2018
72018
Towards realistic threat modeling: attack commodification, irrelevant vulnerabilities, and unrealistic assumptions
L Allodi, S Etalle
Proceedings of the 2017 Workshop on Automated Decision Making for Active …, 2017
72017
Attack potential in impact and complexity
L Allodi, F Massacci
Proceedings of the 12th International Conference on Availability …, 2017
72017
Modifying trust dynamics through cooperation and defection in evolving social networks
L Allodi, L Chiodi, M Cremonini
International Conference on Trust and Trustworthy Computing, 131-145, 2011
72011
The asymmetric diffusion of trust between communities: simulations in dynamic social networks
L Allodi, L Chiodi, M Cremonini
Proceedings of the 2011 Winter Simulation Conference (WSC), 3141-3152, 2011
62011
The need for new antiphishing measures against spear-phishing attacks
L Allodi, T Chotza, E Panina, N Zannone
IEEE Security & Privacy 18 (2), 23-34, 2019
52019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20