Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Why Charles Can Pen-test: an Evolutionary Approach to Vulnerability Testing., and . CoRR, (2020)<script>alert('Expect the Unexpected')</script>: Raising Cybersecurity Awareness by Hook or by Crook.. University of Genoa, Italy, (2021)base-search.net (ftunivgenova:oai:iris.unige.it:11567/1041466).Web security training at UniGe: an experience.. Programming, page 14:1-14:6. ACM, (2019)Semi-automatic generation of cybersecurity exercises: a preliminary proposal., and . EnSEmble@ESEC/SIGSOFT FSE, page 16-21. ACM, (2019)ZenHackAdemy: Ethical Hacking @ DIBRIS., , , , and . CSEDU (1), page 405-413. SciTePress, (2019)ModSec-Learn: Boosting ModSecurity with Machine Learning., , , , , , , , , and . CoRR, (2024)Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners., , and . RAID, page 17-29. USENIX Association, (2020)A NERD DOGMA: Introducing CTF to Non-expert Audience., , , and . SIGITE, page 413-418. ACM, (2020)WAF-A-MoLE: evading web application firewalls through adversarial machine learning., , , and . SAC, page 1745-1752. ACM, (2020)WAF-A-MoLE: An adversarial tool for assessing ML-based WAFs., , , and . SoftwareX, (2020)