default search action
Flavio Lombardi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c33]Maurantonio Caprolu, Roberto Di Pietro, Flavio Lombardi, Elia Onofri:
Characterizing Polkadot's Transactions Ecosystem: methodology, tools, and insights. DAPPS 2024: 51-60 - [i6]Maurantonio Caprolu, Roberto Di Pietro, Flavio Lombardi, Elia Onofri:
Characterizing Polkadot's Transactions Ecosystem: methodology, tools, and insights. CoRR abs/2404.10543 (2024) - 2023
- [j15]Mohammed Al-Sadi, Roberto Di Pietro, Flavio Lombardi, Matteo Signorini:
LENTO: Unpredictable Latency-based continuous authEntication for Network inTensive IoT envirOnments. Future Gener. Comput. Syst. 139: 151-166 (2023) - [j14]Lorena González-Manzano, José María de Fuentes, Flavio Lombardi, Cristina Ramos:
A technical characterization of APTs by leveraging public resources. Int. J. Inf. Sec. 22(6): 1567-1584 (2023) - [j13]David Lo Bascio, Flavio Lombardi:
Segment Routing v6 - Security Issues and Experimental Results. J. Ubiquitous Syst. Pervasive Networks 18(1): 15-21 (2023) - 2022
- [j12]Flavio Lombardi, Elia Onofri:
Some Results on Colored Network Contraction. J. Ubiquitous Syst. Pervasive Networks 17(2): 91-98 (2022) - [j11]Massimo Bernaschi, Alessandro Celestini, Marco Cianfriglia, Stefano Guarino, Flavio Lombardi, Enrico Mastrostefano:
Onion under Microscope: An in-depth analysis of the Tor Web. World Wide Web 25(3): 1287-1313 (2022) - [c32]David Lo Bascio, Flavio Lombardi:
On SRv6 Security. ANT/EDI40 2022: 406-412 - [c31]Flavio Lombardi, Elia Onofri:
Graph Contraction on Attribute-Based Coloring. ANT/EDI40 2022: 429-436 - [c30]Pratuat Amatya, Paola Stolfi, Flavio Lombardi, Paolo Tieri:
DruSiLa: an integrated, in-silico disease similarity-based approach for drug repurposing. BIBM 2022: 1879-1885 - 2021
- [i5]Massimo Bernaschi, Alessandro Celestini, Marco Cianfriglia, Stefano Guarino, Flavio Lombardi, Enrico Mastrostefano:
Onion under Microscope: An in-depth analysis of the Tor network. CoRR abs/2101.08194 (2021)
2010 – 2019
- 2019
- [j10]Marco Cianfriglia, Stefano Guarino, Massimo Bernaschi, Flavio Lombardi, Marco Pedicini:
Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search. J. Cryptogr. Eng. 9(4): 375-392 (2019) - [c29]Massimo Bernaschi, Alessandro Celestini, Stefano Guarino, Flavio Lombardi, Enrico Mastrostefano:
Analysing the tor web with high performance graph algorithms. CF 2019: 342 - [c28]Roberto Di Pietro, Leonardo Jero, Flavio Lombardi, Agusti Solanas:
GPU Algorithms for K-Anonymity in Microdata. CNS 2019: 1-9 - [c27]Maurantonio Caprolu, Roberto Di Pietro, Flavio Lombardi, Simone Raponi:
Edge Computing Perspectives: Architectures, Technologies, and Open Security Issues. EDGE 2019: 116-123 - [c26]Massimo Bernaschi, Alessandro Celestini, Stefano Guarino, Flavio Lombardi, Enrico Mastrostefano:
Spiders like Onions: on the Network of Tor Hidden Services. WWW 2019: 105-115 - 2018
- [c25]Roberto Di Pietro, Flavio Lombardi:
Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives. From Database to Cyber Security 2018: 166-185 - [c24]Stefano Guarino, Fabio Leuzzi, Flavio Lombardi, Enrico Mastrostefano:
Traffic Data Classification for Police Activity. ISMIS 2018: 169-178 - [i4]Roberto Di Pietro, Flavio Lombardi:
Virtualization Technologies and Cloud Security: advantages, issues, and perspectives. CoRR abs/1807.11016 (2018) - 2017
- [j9]Massimo Bernaschi, Alessandro Celestini, Stefano Guarino, Flavio Lombardi:
Exploring and Analyzing the Tor Hidden Services Graph. ACM Trans. Web 11(4): 24:1-24:26 (2017) - [c23]Marco Cianfriglia, Stefano Guarino, Massimo Bernaschi, Flavio Lombardi, Marco Pedicini:
A Novel GPU-Based Implementation of the Cube Attack - Preliminary Results Against Trivium. ACNS 2017: 184-207 - [c22]Vanesa Daza, Roberto Di Pietro, Flavio Lombardi, Matteo Signorini:
CoLLIDE: CLoud Latency-based IDEntification. EUSPN/ICTH 2017: 81-88 - [c21]Roberto Di Pietro, Federico Franzoni, Flavio Lombardi:
HyBIS: Advanced Introspection for Effective Windows Guest Protection. SEC 2017: 189-204 - [c20]Massimo Bernaschi, Alessandro Celestini, Stefano Guarino, Flavio Lombardi, Enrico Mastrostefano:
Unsupervised Classification of Routes and Plates from the Trap-2017 Dataset. TRAP 2017: 97-114 - [c19]Massimo Bernaschi, Alessandro Celestini, Stefano Guarino, Flavio Lombardi, Enrico Mastrostefano:
Traffic Data: Exploratory Data Analysis with Apache Accumulo. TRAP 2017: 129-143 - 2016
- [j8]Roberto Battistoni, Roberto Di Pietro, Flavio Lombardi:
CURE - Towards enforcing a reliable timeline for cloud forensics: Model, architecture, and experiments. Comput. Commun. 91-92: 29-43 (2016) - [j7]Vanesa Daza, Roberto Di Pietro, Flavio Lombardi, Matteo Signorini:
FRoDO: Fraud Resilient Device for Off-Line Micro-Payments. IEEE Trans. Dependable Secur. Comput. 13(2): 296-311 (2016) - [j6]Roberto Di Pietro, Flavio Lombardi, Antonio Villani:
CUDA Leaks: A Detailed Hack for CUDA and a (Partial) Fix. ACM Trans. Embed. Comput. Syst. 15(1): 15:1-15:25 (2016) - [j5]Guillermo Suarez-Tangil, Juan E. Tapiador, Flavio Lombardi, Roberto Di Pietro:
Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware. IEEE Trans. Mob. Comput. 15(4): 789-802 (2016) - [i3]Roberto Di Pietro, Federico Franzoni, Flavio Lombardi:
HyBIS: Windows Guest Protection through Advanced Memory Introspection. CoRR abs/1601.05851 (2016) - 2015
- [j4]Roberto Di Pietro, Flavio Lombardi, Fabio Martinelli, Daniele Sgandurra:
AntiCheetah: Trustworthy computing in an outsourced (cheating) environment. Future Gener. Comput. Syst. 48: 28-38 (2015) - [i2]Roberto Battistoni, Roberto Di Pietro, Flavio Lombardi:
CloRoFor: Cloud Robust Forensics. CoRR abs/1506.01739 (2015) - 2014
- [j3]Guillermo Suarez-Tangil, Juan E. Tapiador, Flavio Lombardi, Roberto Di Pietro:
Thwarting Obfuscated Malware via Differential Fault Analysis. Computer 47(6): 24-31 (2014) - [j2]Roberto Di Pietro, Flavio Lombardi, Matteo Signorini:
CloRExPa: Cloud resilience via execution path analysis. Future Gener. Comput. Syst. 32: 168-179 (2014) - [c18]Vanesa Daza, Roberto Di Pietro, Flavio Lombardi, Matteo Signorini:
SOLDI: Secure Off-Line Disposable CredIts to Secure Mobile Micro Payments. ICETE (Selected Papers) 2014: 340-362 - [c17]Vanesa Daza, Roberto Di Pietro, Flavio Lombardi, Matteo Signorini:
FORCE - Fully Off-line secuRe CrEdits for Mobile Micro Payments. SECRYPT 2014: 125-136 - 2013
- [c16]Roberto Di Pietro, Flavio Lombardi, Fabio Martinelli, Daniele Sgandurra:
CheR: Cheating Resilience in the Cloud via Smart Resource Allocation. FPS 2013: 339-352 - [c15]Roberto Di Pietro, Flavio Lombardi, Fabio Martinelli, Daniele Sgandurra:
AntiCheetah: An Autonomic Multi-round Approach for Reliable Computing. UIC/ATC 2013: 371-379 - [i1]Roberto Di Pietro, Flavio Lombardi, Antonio Villani:
CUDA Leaks: Information Leakage in GPU Architectures. CoRR abs/1305.7383 (2013) - 2011
- [j1]Flavio Lombardi, Roberto Di Pietro:
Secure virtualization for cloud computing. J. Netw. Comput. Appl. 34(4): 1113-1122 (2011) - 2010
- [c14]Flavio Lombardi, Roberto Di Pietro:
A Security Management Architecture for the Protection of Kernel Virtual Machines. CIT 2010: 948-953 - [c13]Flavio Lombardi, Roberto Di Pietro:
CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization. ICICS 2010: 92-106 - [c12]Flavio Lombardi, Roberto Di Pietro:
Transparent security for cloud. SAC 2010: 414-415 - [c11]Flavio Lombardi, Roberto Di Pietro, Claudio Soriente:
CReW: Cloud Resilience for Windows Guests through Monitored Virtualization. SRDS 2010: 338-342
2000 – 2009
- 2009
- [c10]Andrea Bei, Maurizio Lancia, Flavio Lombardi, Roberto Puccinelli:
Processes for software development within the Public Administration. WoSQ@ICSE 2009: 22-32 - [c9]Flavio Lombardi, Roberto Di Pietro:
KvmSec: a security extension for Linux kernel virtual machines. SAC 2009: 2029-2034 - 2007
- [c8]Maurizio Lancia, Roberto Puccinelli, Flavio Lombardi:
Feasibility and benefits of migrating towards JEE: a real life case. PPPJ 2007: 13-20 - 2006
- [c7]Silvio Salza, Yuri Di Carlo, Flavio Lombardi, Roberto Puccinelli:
Leveraging the Grid for the Autonomic Management of Complex Infrastructures. GCA 2006: 32-37 - 2005
- [c6]Edgardo Ambrosi, Marco Bianchi, Carlo Gaibisso, Giorgio Gambosi, Flavio Lombardi:
Transparent Java Threads Migration Protocol over Peer2Peer. ISPA 2005: 972-983 - [c5]Edgardo Ambrosi, Marco Bianchi, Carlo Gaibisso, Giorgio Gambosi, Flavio Lombardi:
Extending the UDDI API for service instance ranking. ISWS 2005: 104-110 - [c4]Carlo Gaibisso, Flavio Lombardi:
A Reliable Multicast Approach to Replica Management for Grids. Parallel and Distributed Computing and Networks 2005: 282-288 - [c3]Flavio Lombardi, Roberto Puccinelli:
Jet-Lag, Java Heterogeneous Log Analysis on the Grid: Architecture, Implementation and Performance Evaluation. Parallel and Distributed Computing and Networks 2005: 295-300 - 2004
- [b1]Flavio Lombardi:
Reliable secure multicast data transmission and applications. Sapienza University of Rome, Italy, 2004 - 2002
- [c2]Mauro Draoli, Carlo Gaibisso, Flavio Lombardi, A. Stentella Liberati:
A Java Architecture for Secure Reliable Multicast Data Transfer: Performance Evaluation. Communications, Internet, and Information Technology 2002: 142-147 - 2001
- [c1]Luca Becchetti, Mauro Draoli, Carlo Gaibisso, Flavio Lombardi:
A Java Implementation of a Reliable Multicast File Transfer Protocol: Design and Evaluation. IMSA 2001: 163-168
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 23:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint