With this function you can construct your weekly calendar of lessons, which is customized on the basis of the courses that you intend to follow. Warning: the personal schedule does not replace the presentation of the study plan! It's an informal tool that can help you better manage the organization of class attendance before the study plan presentation. After the study plan presentation we recommend you to use the Lecture timetable service in your Online Services.
To create your customized schedule follow these instructions:
- Click on the "Enable" link to proceed. You will be asked your surname and first name in order to determine your alphabetic grouping.
-
To add or remove courses from your personal schedule, use the small icons which are found next to the courses:
addition of the course
removal of the course
selection of the section of the Laboratory of Architecture (Note: the effective area in which the teaching will be carried out will be determined after the presentation of the Study Plans)
-
The sidebar on the left displays the number of lessons included in schedule.
There are also these commands:
View the schedule: allows the viewing of the weekly synoptic schedule
Delete the schedule: cancels the selections made
When you have finished the entry, you can print the calendar you have made.
Semester (Sem) | 1 | First Semester | 2 | Second Semester | A | Annual course | (1) | First Half-semester | (2) | Second Half-semester |
Language
|
|
Course completely offered in italian
|
|
Course completely offered in english
|
--
|
Not available
|
Note on the teaching activities
|
The calculation of the number of students enrolled only considers students enrolled in the academic year in question and does not include any possible students who may be attending but who are enrolled in previous academic years.
In case of structured courses taught by more professors, the number of students enrolled is related to the individual professor module, while the students opinion of the teaching is related to the course as a whole.
The data related to the last academic years (number of students enrolled and students opinion of the teaching) have not yet been defined.
|
|
Information on didactic, research and institutional assignments on this page are certified by the University; more information, prepared by the professor, are available on the personal web page and in the curriculum vitae indicated on this webpage.
Professor's office hours | Department | Floor | Office | Day | Timetable | Telephone | Fax | Notes |
---|
DEIB | -- | Laboratorio NECST | Wednesday | From 10:00 To 11:00 | 3564 | -- | Meeting dedicated to M.Sc. thesis development | DEIB | 1 | 131 | Wednesday | From 12:30 To 14:00 | 4017 | 3411 | Please send me an email to ask for a meeting |
| E-mail | stefano.zanero@polimi.it | Professor's personal website | https://zanero.faculty.polimi.it/ |
List of publications and reserach products for the year 2023 (Show all details | Hide all details) |
Type |
Title of the Publicaiton/Product |
Conference proceedings |
Advancing Fraud Detection Systems through Online Learning (Show >>)(Hide <<)
|
Author/s |
Paladini, T.; Bernasconi de Luca, M.; Carminati, M.; Polino, M.; Trovo', F.; Zanero, S. |
Title of the convention |
European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases |
Location of the convention |
Torino |
Title of the review |
--
|
Pages |
275 - 292 |
Item link |
http://hdl.handle.net/11311/1249461 |
|
CANdito: Improving Payload-Based Detection of Attacks on Controller Area Networks (Show >>)(Hide <<)
|
Author/s |
Longari, Stefano; Pozzoli, Carlo Alberto; Nichelini, Alessandro; Carminati, Michele; Zanero, Stefano |
Title of the convention |
International Symposium on Cyber Security, Cryptology, and Machine Learning |
Location of the convention |
Be'er Sheva, Israel |
Period of the convention |
29/06/2023-30/06/2023 |
Title of the review |
--
|
Pages |
135 - 150 |
Item link |
http://hdl.handle.net/11311/1242819 |
|
DJM-CYBER: A Joint Master in Advanced Cybersecurity (Show >>)(Hide <<)
|
Author/s |
Danidou, Yianna; Ricci, Sara; Skarmeta, Antonio; Hosek, Jiri; Zanero, Stefano; Lendak, Imre |
Title of the convention |
18th International Conference on Availability, Reliability and Security |
Location of the convention |
Benevento |
Period of the convention |
29/08/2023-01/09/2023 |
Title of the review |
--
|
Pages |
1 - 10 |
Item link |
http://hdl.handle.net/11311/1247917 |
|
Evaluating the Robustness of Automotive Intrusion Detection Systems Against Evasion Attacks (Show >>)(Hide <<)
|
Author/s |
Longari, Stefano; Noseda, Francesco; Carminati, Michele; Zanero, Stefano |
Title of the convention |
International Symposium on Cyber Security, Cryptology, and Machine Learning |
Location of the convention |
Be'er Sheva, Israel |
Period of the convention |
29/06/2023-30/06/2023 |
Title of the review |
--
|
Pages |
337 - 352 |
Item link |
http://hdl.handle.net/11311/1242818 |
|
HACK: a Holistic modeling Approach for Cubesat cyberattacKs (Show >>)(Hide <<)
|
Author/s |
Borgia, S.; Topputo, F.; Zanero, S. |
Title of the convention |
3rd International Congress of PhD Students in Aerospace Science and Engineering |
Location of the convention |
Bertinoro, Italy |
Period of the convention |
16-19 Apr. 2023 |
Title of the review |
--
|
Pages |
281 - 287 |
Item link |
http://hdl.handle.net/11311/1250821 |
|
HAMLET: A Transformer Based Approach for Money Laundering Detection (Show >>)(Hide <<)
|
Author/s |
Tatulli, Maria Paola; Paladini, Tommaso; D’Onghia, Mario; Carminati, Michele; Zanero, Stefano |
Title of the convention |
International Symposium on Cyber Security, Cryptology, and Machine Learning |
Location of the convention |
Be'er Sheva, Israel |
Period of the convention |
29/06/2023-30/06/2023 |
Title of the review |
--
|
Pages |
234 - 250 |
Item link |
http://hdl.handle.net/11311/1242817 |
|
Rainfuzz: Reinforcement-Learning Driven Heat-Maps for Boosting Coverage-Guided Fuzzing (Show >>)(Hide <<)
|
Author/s |
Binosi, Lorenzo; Rullo, Luca; Polino, Mario; Carminati, Michele; Zanero, Stefano |
Title of the convention |
12th International Conference on Pattern Recognition Applications and Methods - ICPRAM |
Location of the convention |
Lisbon, Portugal |
Title of the review |
--
|
Pages |
39 - 50 |
Item link |
http://hdl.handle.net/11311/1231171 |
|
Task Aware Intrusion Detection for Industrial Robots (Show >>)(Hide <<)
|
Author/s |
Avanzi, Davide; Longari, Stefano; Polino, Mario; Carminati, Michele; Zanchettin, ANDREA MARIA; Tanelli, Mara; Zanero, Stefano |
Title of the convention |
ITASEC 2023 |
Location of the convention |
Bari |
Title of the review |
--
|
Pages |
1 - 16 |
Item link |
http://hdl.handle.net/11311/1250783 |
|
The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis (Show >>)(Hide <<)
|
Author/s |
Remigio, Riccardo; Bertani, Alessandro; Polino, Mario; Carminati, Michele; Zanero, Stefano |
Title of the convention |
International Workshop on Security |
Location of the convention |
Yokohama, Japan (JP) |
Title of the review |
--
|
Pages |
16 - 35 |
Item link |
http://hdl.handle.net/11311/1249460 |
|
Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation (Show >>)(Hide <<)
|
Author/s |
Bertani, Alessandro; Bonelli, Marco; Binosi, Lorenzo; Carminati, Michele; Zanero, Stefano; Polino, Mario |
Title of the convention |
Detection of Intrusions and Malware, and Vulnerability Assessment |
Location of the convention |
Hamburg |
Title of the review |
--
|
Pages |
256 - 275 |
Item link |
http://hdl.handle.net/11311/1240698 |
|
Journal Articles |
A novel hybrid cybersecurity scheme against false data injection attacks in automated power systems (Show >>)(Hide <<)
|
Author/s |
Hussain, S.; Hussain, S. M. S.; Hemmati, M.; Iqbal, A.; Alammari, R.; Zanero, S.; Ragaini, E.; Gruosso, G. |
Title of the review |
PROTECTION AND CONTROL OF MODERN POWER SYSTEMS (ISSN: 2367-0983) |
Volume |
8 |
Brochure |
1 |
Pages |
1 - 15 |
Item link |
http://hdl.handle.net/11311/1247897 |
|
A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids (Show >>)(Hide <<)
|
Author/s |
Hussain, Shahbaz; Iqbal, Atif; Hussain, S M Suhail; Zanero, Stefano; Shikfa, Abdullatif; Ragaini, Enrico; Khan, Irfan; Alammari, Rashid |
Title of the review |
SCIENTIFIC REPORTS (ISSN: 2045-2322) |
Volume |
13 |
Brochure |
1 |
Pages |
1 - 13 |
Item link |
http://hdl.handle.net/11311/1230784 |
|
BINO: Automatic Recognition of Inline Binary Functions from Template Classes (Show >>)(Hide <<)
|
Author/s |
Binosi, Lorenzo; Polino, Mario; Carminati, Michele; Zanero, Stefano |
Title of the review |
COMPUTERS & SECURITY (ISSN: 0167-4048) |
Volume |
132 |
Brochure |
-- |
Pages |
1 - 16 |
Item link |
http://hdl.handle.net/11311/1239839 |
|
CANova: A hybrid intrusion detection framework based on automatic signal classification for CAN (Show >>)(Hide <<)
|
Author/s |
Nichelini, Alessandro; Pozzoli, Carlo Alberto; Longari, Stefano; Carminati, Michele; Zanero, Stefano |
Title of the review |
COMPUTERS & SECURITY (ISSN: 0167-4048) |
Volume |
128 |
Brochure |
-- |
Pages |
103 - 166 |
Item link |
http://hdl.handle.net/11311/1231170 |
|
|
CyFence: Securing Cyber-physical Controllers Via Trusted Execution Environment (Show >>)(Hide <<)
|
Author/s |
Longari, Stefano; Pozone, Alessandro; Leoni, Jessica; Polino, Mario; Carminati, Michele; Tanelli, Mara; Zanero, Stefano |
Title of the review |
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (ISSN: 2168-6750) |
Volume |
[Online 2023] |
Brochure |
-- |
Pages |
1 - 12 |
Item link |
http://hdl.handle.net/11311/1236323 |
|
Fraud Detection Under Siege: Practical Poisoning Attacks and Defense Strategies (Show >>)(Hide <<)
|
Author/s |
Paladini, Tommaso; Monti, Francesco; Polino, Mario; Carminati, Michele; Zanero, Stefano |
Title of the review |
ACM TRANSACTIONS ON PRIVACY AND SECURITY (ISSN: 2471-2566) |
Volume |
- |
Brochure |
-- |
Pages |
1 - 34 |
Item link |
http://hdl.handle.net/11311/1247877 |
|
List of publications and reserach products for the year 2022 (Show all details | Hide all details) |
Type |
Title of the Publicaiton/Product |
Patents |
COMPUTER-IMPLEMENTED REAL-TIME CONTROL SYSTEM FOR CONTROLLING A PHYSICAL SYSTEM OR DEVICE (Show >>)(Hide <<)
|
|
Conference proceedings |
A Natural Language Processing Approach for Financial Fraud Detection (Show >>)(Hide <<)
|
Author/s |
Fernàndez Rodrìguez, Javier; Papale, Michele; Carminati, Michele; Zanero, Stefano |
Title of the convention |
Italian Conference on Cybersecurity ITASEC 2022 |
Location of the convention |
Rome, Italy |
Period of the convention |
20/06/2022-23/06/2022 |
Title of the review |
--
|
Pages |
135 - 149 |
Item link |
http://hdl.handle.net/11311/1224432 |
|
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks (Show >>)(Hide <<)
|
Author/s |
de Faveri Tron, Alvise; Longari, Stefano; Carminati, Michele; Polino, Mario; Zanero, Stefano |
Title of the convention |
2022 ACM SIGSAC Conference on Computer and Communications Security |
Location of the convention |
Los Angeles CA |
Period of the convention |
07/11/2022-10/11/2022 |
Title of the review |
--
|
Pages |
711 - 723 |
Item link |
http://hdl.handle.net/11311/1223625 |
|
Journal Articles |
A Systematical and Longitudinal Study of Evasive Behaviors in Windows Malware (Show >>)(Hide <<)
|
Author/s |
Galloro, Nicola; Polino, Mario; Carminati, Michele; Continella, Andrea; Zanero, Stefano |
Title of the review |
COMPUTERS & SECURITY (ISSN: 0167-4048) |
Volume |
113 |
Brochure |
-- |
Pages |
1 - 50 |
Item link |
http://hdl.handle.net/11311/1190839 |
|
Amaretto: An Active Learning Framework for Money Laundering Detection (Show >>)(Hide <<)
|
Author/s |
Labanca, Danilo; Primerano, Luca; Markland-Montgomery, Marcus; Polino, Mario; Carminati, Michele; Zanero, Stefano |
Title of the review |
IEEE ACCESS (ISSN: 2169-3536) |
Volume |
10 |
Brochure |
-- |
Pages |
41720 - 41739 |
Item link |
http://hdl.handle.net/11311/1211875 |
|
Apícula: Static Detection of API Calls in Generic Streams of Bytes (Show >>)(Hide <<)
|
Author/s |
D’Onghia, Mario; Salvadore, Matteo; Nespoli, Benedetto Maria; Carminati, Michele; Polino, Mario; Zanero, Stefano |
Title of the review |
COMPUTERS & SECURITY (ISSN: 0167-4048) |
Volume |
119 |
Brochure |
-- |
Pages |
1 - 25 |
Item link |
http://hdl.handle.net/11311/1216855 |
|
Quantum algorithms for SVD-based data representation and analysis (Show >>)(Hide <<)
|
Author/s |
Bellante, Armando; Luongo, Alessandro; Zanero, Stefano |
Title of the review |
QUANTUM MACHINE INTELLIGENCE (ISSN: 2524-4906) |
Volume |
4 |
Brochure |
2 |
Pages |
1 - 23 |
Item link |
http://hdl.handle.net/11311/1219302 |
|
Quantum matching pursuit: A quantum algorithm for sparse representations (Show >>)(Hide <<)
|
Author/s |
Bellante, Armando; Zanero, Stefano |
Title of the review |
PHYSICAL REVIEW A (ISSN: 2469-9926) |
Volume |
105 |
Brochure |
2 |
Pages |
1 - 9 |
Item link |
http://hdl.handle.net/11311/1199660 |
|
List of publications and reserach products for the year 2021 (Show all details | Hide all details) |
Type |
Title of the Publicaiton/Product |
Patents |
Sistema di riconoscimento di manomissione del codice di un sistema di controllo mediante uso di processori con memoria trusted (Show >>)(Hide <<)
|
|
Conference proceedings |
A Novel Methodology to Validate and Evaluate Combined Cyber Attacks in Automated Power Systems Using Real Time Digital Simulation (Show >>)(Hide <<)
|
Author/s |
Hussain, Shahbaz; Hussain, S. M. Suhail; Iqbal, Atif; Zanero, Stefano; Ragaini, Enrico |
Title of the convention |
IEEE International Conference on Smart Technologies for Power, Energy and Control (STPEC) |
Location of the convention |
Bilaspur, India |
Period of the convention |
19/12/2021-22/12/2021 |
Title of the review |
--
|
Pages |
1 - 6 |
Item link |
http://hdl.handle.net/11311/1202717 |
|
A novel methodology to validate cyberattacks and evaluate their impact on power systems using real time digital simulation (Show >>)(Hide <<)
|
Author/s |
Hussain, S.; Iqbal, A.; Zanero, S.; Suhail Hussain, S. M.; Shikfa, A.; Ragaini, E.; Alammari, R.; Khan, I. |
Title of the convention |
2021 IEEE Texas Power and Energy Conference (TPEC) |
Location of the convention |
College Station (TX), USA |
Title of the review |
--
|
Pages |
1 - 6 |
Item link |
http://hdl.handle.net/11311/1167461 |
|
Smart Factory Security: A Case Study on a Modular Smart Manufacturing System (Show >>)(Hide <<)
|
Author/s |
Maggi, Federico; Balduzzi, Marco; Vosseler, Rainer; Rösler, Martin; Quadrini, Walter; Tavola, Giacomo; Pogliani, Marcello; Quarta, Davide; Zanero, Stefano |
Title of the convention |
International Conference on Industry 4.0 and Smart Manufacturing |
Location of the convention |
Virtual |
Period of the convention |
23/11/2020-25/11/2020 |
Title of the review |
PROCEDIA COMPUTER SCIENCE (ISSN: 1877-0509)
|
Pages |
666 - 675 |
Item link |
http://hdl.handle.net/11311/1162312 |
|
SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning (Show >>)(Hide <<)
|
Author/s |
Ruaro, Nicola; Zeng, Kyle; Dresel, Lukas; Polino, Mario; Bao, Tiffany; Continella, Andrea; Zanero, Stefano; Kruegel, Christopher; Vigna, Giovanni |
Title of the convention |
RAID '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses |
Location of the convention |
San Sebastian (Spain) |
Period of the convention |
06/10/2021-08/10/2021 |
Title of the review |
--
|
Pages |
456 - 468 |
Item link |
http://hdl.handle.net/11311/1187228 |
|
Journal Articles |
CANnolo: An Anomaly Detection System based on LSTM Autoencoders for Controller Area Network (Show >>)(Hide <<)
|
Author/s |
Longari, Stefano; Valcarcel, Daniel Humberto Nova; Zago, Mattia; Carminati, Michele; Zanero, Stefano |
Title of the review |
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (ISSN: 1932-4537) |
Volume |
18 |
Brochure |
2 |
Pages |
1913 - 1924 |
Item link |
http://hdl.handle.net/11311/1152605 |
|
GOLIATH: A Decentralized Framework for Data Collection in Intelligent Transportation Systems (Show >>)(Hide <<)
|
Author/s |
Maffiola, Davide; Longari, Stefano; Carminati, Michele; Tanelli, Mara; Zanero, Stefano |
Title of the review |
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (ISSN: 1524-9050) |
Volume |
23 |
Brochure |
8 |
Pages |
13372 - 13385 |
Item link |
http://hdl.handle.net/11311/1189373 |
|
List of publications and reserach products for the year 2020 (Show all details | Hide all details) |
Type |
Title of the Publicaiton/Product |
Patents |
DETECTING UNSECURE DATA FLOW IN AUTOMATION TASK PROGRAMS (Show >>)(Hide <<)
|
|
Conference proceedings |
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems (Show >>)(Hide <<)
|
Author/s |
Erba, Alessandro; Taormina, Riccardo; Galelli, Stefano; Pogliani, Marcello; Carminati, Michele; Zanero, Stefano; Tippenhauer, Nils Ole |
Title of the convention |
ACSAC '20: Annual Computer Security Applications Conference |
Location of the convention |
Austin, TX |
Title of the review |
--
|
Pages |
480 - 495 |
Item link |
http://hdl.handle.net/11311/1156194 |
|
Detecting Insecure Code Patterns in Industrial Robot Programs (Show >>)(Hide <<)
|
Author/s |
Pogliani, Marcello; Maggi, Federico; Balduzzi, Marco; Quarta, Davide; Zanero, Stefano |
Title of the convention |
ACM Asia Conference on Computer and Communications Security |
Location of the convention |
Taipei, Taiwan |
Period of the convention |
05/10/2020-09/10/2020 |
Title of the review |
--
|
Pages |
759 - 771 |
Item link |
http://hdl.handle.net/11311/1151650 |
|
Evasion Attacks against Banking Fraud Detection Systems (Show >>)(Hide <<)
|
Author/s |
Carminati, M.; Santini, L.; Polino, M.; Zanero, S. |
Title of the convention |
23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020) |
Location of the convention |
Virtual Conference |
Period of the convention |
14/10/2020 - 16/10/2020 |
Title of the review |
--
|
Pages |
285 - 300 |
Item link |
http://hdl.handle.net/11311/1148029 |
|
NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services (Show >>)(Hide <<)
|
Author/s |
Ferrari, Dario; Carminati, Michele; Polino, Mario; Zanero, Stefano |
Title of the convention |
ACSAC '20: Annual Computer Security Applications Conference |
Location of the convention |
Austin, TX |
Title of the review |
--
|
Pages |
567 - 581 |
Item link |
http://hdl.handle.net/11311/1156196 |
|
Journal Articles |
ReCAN – Dataset for reverse engineering of Controller Area Networks (Show >>)(Hide <<)
|
Author/s |
Zago, Mattia; Longari, Stefano; Tricarico, Andrea; Carminati, Michele; Pérez, Manuel Gil; Pérez, Gregorio Marínez; Zanero, Stefano |
Title of the review |
DATA IN BRIEF (ISSN: 2352-3409) |
Volume |
29 |
Brochure |
-- |
Pages |
1 - 15 |
Item link |
http://hdl.handle.net/11311/1130436 |
|
Remote monitoring of cardiac implanted electronic devices: legal requirements and ethical principles - ESC Regulatory Affairs Committee/EHRA joint task force report (Show >>)(Hide <<)
|
Author/s |
Nielsen, Jens Cosedis; Kautzner, Josef; Casado-Arroyo, Ruben; Burri, Haran; Callens, Stefaan; Cowie, Martin R; Dickstein, Kenneth; Drossart, Inga; Geneste, Ginger; Erkin, Zekeriya; Hyafil, Fabien; Kraus, Alexander; Kutyifa, Valentina; Marin, Eduard; Schulze, Christian; Slotwiner, David; Stein, Kenneth; Zanero, Stefano; Heidbuchel, Hein; Fraser, Alan G |
Title of the review |
EUROPACE (ISSN: 1099-5129) |
Volume |
22 |
Brochure |
11 |
Pages |
1742 - 1758 |
Item link |
http://hdl.handle.net/11311/1144067 |
|
List of publications and reserach products for the year 2019 (Show all details | Hide all details) |
Type |
Title of the Publicaiton/Product |
Poster |
Poster: Using Honeypots to Understand Attacks to Industrial Control Systems (Show >>)(Hide <<)
|
Author/s |
Pogliani, Marcello; Barlocco, Mattia; Pesatori, Mirko; Zanero, Stefano |
Title of the book |
IEEE Symposium on Security and Privacy |
Item link |
http://hdl.handle.net/11311/1099143 |
|
Conference proceedings |
A Secure-by-Design Framework for Automotive On-board Network Risk Analysis (Show >>)(Hide <<)
|
Author/s |
Longari, Stefano; Cannizzo, Andrea; Carminati, Michele; Zanero, Stefano |
Title of the convention |
IEEE Vehicular Networking Conference |
Location of the convention |
Los Angeles |
Title of the review |
--
|
Pages |
99 - 106 |
Item link |
http://hdl.handle.net/11311/1120902 |
|
Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots (Show >>)(Hide <<)
|
Author/s |
Ferretti, Pietro; Pogliani, Marcello; Zanero, Stefano |
Title of the convention |
ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC ’19) |
Location of the convention |
London, UK |
Period of the convention |
11/11/2019 |
Title of the review |
--
|
Pages |
51 - 61 |
Item link |
http://hdl.handle.net/11311/1100010 |
|
CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network (Show >>)(Hide <<)
|
Author/s |
Longari, Stefano; Penco, Matteo; Carminati, Michele; Zanero, Stefano |
Title of the convention |
ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC ’19) |
Location of the convention |
London |
Title of the review |
--
|
Pages |
1 - 12 |
Item link |
http://hdl.handle.net/11311/1104918 |
|
Journal Articles |
Security of controlled manufacturing systems in the connected factory: the case of industrial robots (Show >>)(Hide <<)
|
Author/s |
Pogliani, Marcello; Quarta, Davide; Polino, Mario; Vittone, Martino; Maggi, Federico; Zanero, Stefano |
Title of the review |
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (ISSN: 2274-2042) |
Volume |
15 |
Brochure |
3 |
Pages |
161 - 175 |
Item link |
http://hdl.handle.net/11311/1074997 |
|
|
|