Nicola Zannone
Technische Universiteit Eindhoven
H-index: 36
Europe-Netherlands
Top articles of Nicola Zannone
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
The applicability of a hybrid framework for automated phishing detection | Computers & Security | RJ van Geest G Cascavilla J Hulstijn N Zannone | 2024/4/1 |
Cognition in social engineering empirical research: a systematic literature review | Pavlo Burda Luca Allodi Nicola Zannone | 2024/1/29 | |
Understanding the stumbling blocks of Italian higher education system: A process mining approach | Expert Systems with Applications | Claudia Diamantini Laura Genga Alex Mircoli Domenico Potena Nicola Zannone | 2024/5/15 |
An Approach to Trade-off Privacy and Classification Accuracy in Machine Learning Processes | Loredana Caruccio Domenico Desiato Giuseppe Polese Genoveffa Tortora Nicola Zannone | 2023 | |
Privacy-Preserving Multi-Party Access Control for Third-Party UAV Services | Proceedings of the 28th ACM Symposium on Access Control Models and Technologies (SACMAT) | Dominik Roy George Savio Sciancalepore Nicola Zannone | 2023/5 |
HoneyICS: A High-interaction Physics-aware Honeynet for Industrial Control Systems | Marco Lucchese Francesco Lupia Massimo Merro Federica Paci Nicola Zannone | 2023/8/29 | |
Investigating the resolution of vulnerable dependencies with dependabot security updates | Hamid Mohayeji Andrei Agaronian Eleni Constantinou Nicola Zannone Alexander Serebrenik | 2023/5/15 | |
Towards Obfuscation of Programmable Logic Controllers | Vittoria Cozza Mila Dalla Preda Marco Lucchese Massimo Merro Nicola Zannone | 2023/8/29 | |
The Peculiar Case of Tailored Phishing against SMEs: Detection and Collective DefenseMechanisms at a Small IT Company | Pavlo Burda Abdul Malek Altawekji Luca Allodi Nicola Zannone | 2023/7/3 | |
The influence of human factors on the intention to report phishing emails | Ioana Andreea Marin Pavlo Burda Nicola Zannone Luca Allodi | 2023/4/19 | |
ICS Honeypot Interactions: A Latitudinal Study | Francesco Lupia Marco Lucchese Massimo Merro Nicola Zannone | 2023/12/15 | |
Impact Analysis of Coordinated Cyber-Physical Attacks via Statistical Model Checking: A Case Study | Ruggero Lanotte Massimo Merro Nicola Zannone | 2023/6/10 | |
2022 Computer Science–Editor’s Pick | Kaleem Siddiqi Roberto Therón Kostas Karpouzis Sven Schewe Nicola Zannone | 2023/4/6 | |
A comprehensive study on third-party user tracking in mobile applications | Federica Paci Jacopo Pizzoli Nicola Zannone | 2023/8/29 | |
Towards A High-interaction Physics-aware Honeynet for Industrial Control Systems | Marco Lucchese Massimo Merro Federica Paci Nicola Zannone | 2023/3/27 | |
Data Sharing in Social Networks | Clara Bertolissi Alba Martinez Anton Nicola Zannone | 2023/5/24 | |
Mitigating Privilege Misuse in Access Control through Anomaly Detection | Gelareh Hasel Mehri Inez L Wester Federica Paci Nicola Zannone | 2023/8/29 | |
Association Rule Mining Meets Regression Analysis: An Automated Approach to Unveil Systematic Biases in Decision-Making Processes | Journal of Cybersecurity and Privacy | Laura Genga Luca Allodi Nicola Zannone | 2022/3/21 |
Relog: a unified framework for relationship-based access control over graph databases | Stanley Clark Nikolay Yakovets George Fletcher Nicola Zannone | 2022/7/13 | |
Poster: A Flexible Relationship-Based Access Control Policy Generator | Stanley Clark Nikolay Yakovets George HL Fletcher Nicola Zannone | 2022/6/7 |