no code implementations • 8 Oct 2015 • Luis Muñoz-González, Daniele Sgandurra, Martín Barrère, Emil Lupu
Attack graphs are a powerful tool for security risk assessment by analysing network vulnerabilities and the paths attackers can use to compromise network resources.
no code implementations • 22 Jun 2016 • Luis Muñoz-González, Daniele Sgandurra, Andrea Paudice, Emil C. Lupu
We compare sequential and parallel versions of Loopy Belief Propagation with exact inference techniques for both static and dynamic analysis, showing the advantages of approximate inference techniques to scale to larger attack graphs.
no code implementations • 11 Feb 2018 • Jiawei Su, Danilo Vasconcellos Vargas, Sanjiva Prasad, Daniele Sgandurra, Yaokai Feng, Kouichi Sakurai
The Internet of Things (IoT) is an extension of the traditional Internet, which allows a very large number of smart devices, such as home appliances, network cameras, sensors and controllers to connect to one another to share information and improve user experiences.
no code implementations • 15 Jan 2021 • Jason Gray, Daniele Sgandurra, Lorenzo Cavallaro
Attributing a piece of malware to its creator typically requires threat intelligence.
Cryptography and Security