Search Results for author: Idilio Drago

Found 4 papers, 2 papers with code

Sound-skwatter (Did You Mean: Sound-squatter?) AI-powered Generator for Phishing Prevention

no code implementations10 Oct 2023 Rodolfo Valentim, Idilio Drago, Marco Mellia, Federico Cerutti

Sound-squatting is a phishing attack that tricks users into malicious resources by exploiting similarities in the pronunciation of words.

LogPrécis: Unleashing Language Models for Automated Malicious Log Analysis

1 code implementation17 Jul 2023 Matteo Boffa, Rodolfo Vieira Valentim, Luca Vassio, Danilo Giordano, Idilio Drago, Marco Mellia, Zied Ben Houidi

In this paper, we systematically study how to benefit from the state-of-the-art in LM to automatically analyze text-like Unix shell attack logs.

RL-IoT: Reinforcement Learning to Interact with IoT Devices

2 code implementations3 May 2021 Giulia Milan, Luca Vassio, Idilio Drago, Marco Mellia

RL-IoT paves the road for automatic interactions with poorly documented IoT protocols, thus enabling interoperable systems.

reinforcement-learning Reinforcement Learning (RL)

Measuring HTTP/3: Adoption and Performance

no code implementations24 Feb 2021 Martino Trevisan, Danilo Giordano, Idilio Drago, Ali Safari Khatouni

The third version of the Hypertext Transfer Protocol (HTTP) is currently in its final standardization phase by the IETF.

Networking and Internet Architecture

Cannot find the paper you are looking for? You can Submit a new open access paper.