The SCEAS System
Navigation Menu

Search the dblp DataBase


Davide Balzarotti: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Giovanni Vigna, William K. Robertson, Davide Balzarotti
    Testing network-based intrusion detection signatures using mutant exploits. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:21-30 [Conf]
  2. Davide Balzarotti, Carlo Ghezzi, Mattia Monga
    Freeing Cooperation from Servers Tyranny. [Citation Graph (0, 0)][DBLP]
    NETWORKING Workshops, 2002, pp:235-246 [Conf]
  3. Gian Pietro Picco, Davide Balzarotti, Paolo Costa
    LighTS: a lightweight, customizable tuple space supporting context-aware applications. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:413-419 [Conf]
  4. Davide Balzarotti, Carlo Ghezzi, Mattia Monga
    Supporting configuration management for virtual workgroups ini a peer-to-peer setting. [Citation Graph (0, 0)][DBLP]
    SEKE, 2002, pp:507-511 [Conf]
  5. Davide Balzarotti, Carlo Ghezzi, Mattia Monga
    Supporting Cooperative Software Processes in a Decentralized and Nomadic World. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2006, v:36, n:6, pp:1098-1109 [Journal]
  6. Marco Cova, Davide Balzarotti, Viktoria Felmetsger, Giovanni Vigna
    Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:63-86 [Conf]

  7. Improving Signature Testing through Dynamic Data Flow Analysis. [Citation Graph (, )][DBLP]

  8. Multi-module vulnerability analysis of web-based applications. [Citation Graph (, )][DBLP]

  9. A solution for the automated detection of clickjacking attacks. [Citation Graph (, )][DBLP]

  10. Are your votes really counted?: testing the security of real-world electronic voting systems. [Citation Graph (, )][DBLP]

  11. Abusing Social Networks for Automated User Profiling. [Citation Graph (, )][DBLP]

  12. Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. [Citation Graph (, )][DBLP]

  13. ClearShot: Eavesdropping on Keyboard Input from Video. [Citation Graph (, )][DBLP]

  14. All your contacts are belong to us: automated identity theft attacks on social networks. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002