Matteo Dell'Amico
Matteo Dell'Amico
Verified email at - Homepage
Cited by
Cited by
Password strength: An empirical analysis
M Dell'Amico, P Michiardi, Y Roudier
2010 Proceedings IEEE INFOCOM, 1-9, 2010
Monte Carlo strength evaluation: Fast and reliable password checking
M Dell'Amico, M Filippone
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Can i opt out yet? GDPR and the global illusion of cookie control
I Sanchez-Rola, M Dell'Amico, P Kotzias, D Balzarotti, L Bilge, PA Vervier, ...
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
NG-DBSCAN: scalable density-based clustering for arbitrary data
A Lulli, M Dell'Amico, P Michiardi, L Ricci
Proceedings of the VLDB Endowment 10 (3), 157-168, 2016
Online data backup: A peer-assisted approach
L Toka, M Dell'Amico, P Michiardi
2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P), 1-10, 2010
An empirical study of availability in friend-to-friend storage systems
R Sharma, A Datta, M Dell'Amico, P Michiardi
P2P 2011, 2011
Riskteller: Predicting the risk of cyber incidents
L Bilge, Y Han, M Dell'Amico
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
HFSP: size-based scheduling for Hadoop
M Pastorelli, A Barbuzzi, D Carra, M Dell'Amico, P Michiardi
2013 IEEE International Conference on Big Data, 51-59, 2013
Take a deep breath: a stealthy, resilient and cost-effective botnet using skype
A Nappa, A Fattori, M Balduzzi, M Dell’Amico, L Cavallaro
International Conference on Detection of Intrusions and Malware, and …, 2010
HFSP: bringing size-based scheduling to Hadoop
M Pastorelli, D Carra, M Dell'Amico, P Michiardi
IEEE Transactions on Cloud Computing 5 (1), 43-56, 2015
Sofia: Social filtering for robust recommendations
M Dell'Amico, L Capra
Trust Management II, 135-150, 2008
Revisiting size-based scheduling with estimated job sizes
M Dell'Amico, D Carra, M Pastorelli, P Michiardi
2014 IEEE 22nd International Symposium on Modelling, Analysis & Simulation …, 2014
A measurement of mixing time in social networks
M Dellamico, Y Roudier
Proceedings of the 5th International Workshop on Security and Trust …, 2009
PSBS: Practical size-based scheduling
M Dell'Amico, D Carra, P Michiardi
IEEE Transactions on Computers 65 (7), 2199-2212, 2015
Data transfer scheduling for p2p storage
L Toka, M Dell'Amico, P Michiardi
2011 IEEE International Conference on Peer-to-Peer Computing, 132-141, 2011
Hipolds: A hierarchical security policy language for distributed systems
M Dell'Amico, G Serme, MS Idrees, AS de Oliveira, Y Roudier
Information Security Technical Report 17 (3), 81-92, 2013
Systems and methods for providing integrated security management
K Roundy, M Dell'Amico, C Gates, M Hart, S Miskovic
US Patent 10,242,187, 2019
Beyond precision and recall: understanding uses (and misuses) of similarity hashes in binary analysis
F Pagani, M Dell'Amico, D Balzarotti
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
Scalable k-NN based text clustering
A Lulli, T Debatty, M Dell'Amico, P Michiardi, L Ricci
2015 IEEE International Conference on Big Data (Big Data), 958-963, 2015
Highly clustered networks with preferential attachment to close nodes
M Dell'Amico
Proceedings of the European Conference on Complex Systems, 2006
The system can't perform the operation now. Try again later.
Articles 1–20