Follow
Luigi Gallo
Title
Cited by
Cited by
Year
Cloud, Fog, and Dew Robotics: Architectures for next generation applications
A Botta, L Gallo, G Ventre
2019 7th IEEE international conference on mobile cloud computing, services …, 2019
442019
2 Years in the anti-phishing group of a large company
L Gallo, A Maiello, A Botta, G Ventre
Computers & Security 105, 102259, 2021
142021
Identifying threats in a large company's inbox
L Gallo, A Botta, G Ventre
Proceedings of the 3rd ACM CoNEXT Workshop on Big DAta, Machine Learning and …, 2019
102019
Spark-based port and net scan detection
A Affinito, A Botta, L Gallo, M Garofalo, G Ventre
Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1172-1179, 2020
72020
Investigating Gaze Behavior in Phishing Email Identification
F Pietrantonio, A Botta, G Ventre, L Gallo, S Zinno, L Mancuso, R Presta
2023 7th Network Traffic Measurement and Analysis Conference (TMA), 1-4, 2023
22023
The human factor in phishing: Collecting and analyzing user behavior when reading emails
L Gallo, D Gentile, S Ruggiero, A Botta, G Ventre
Computers & Security 139, 103671, 2024
2024
Lookin'Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors
M D'Onghia, F Di Cesare, L Gallo, M Carminati, M Polino, S Zanero
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security …, 2023
2023
Robots and Forensics: a focused survey
S Zinno, S Rotbei, L Gallo, A Botta, G Ventre
Available at SSRN 4530982, 0
Kernel-Based Virtual Machine
L Gallo
The system can't perform the operation now. Try again later.
Articles 1–9