Including insider threats into risk management through Bayesian threat graph networks
Authors: N. d’Ambrosio, G. Perrone, S. P. Romano
Published to: Computers and Security, 2023
Container-based Virtualization for Ethical Hacking with HOUDINI
Authors: D. Capone, A. Delicato, G. Perrone, S. P. Romano
Published to: ITASEC23
A Software-Defined Approach for Mitigating Insider and External Threats via Moving Target Defense
Authors: N. d’Ambrosio, E. Melluso, G. Perrone, S. P. Romano
Published to: 2023 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2023 – Proceedings, 2023
Reinforced WAVSEP: a Benchmarking Platform for Web Application Vulnerability Scanners
Authors: L.Urbano, G. Perrone, S. P. Romano
Published to: International Conference on Electrical, Computer, and Energy Technologies, ICECET 2022
ThePhish: an Automated Open-Source Phishing Email Analysis Platform
Authors: E. Galdi, G. Perrone, S. P. Romano
Published to: ITASEC22
Dockerized Android: a container-based platform to build mobile Android scenarios for Cyber Ranges
Authors: D. Capone, F. Caturano, A. Delicato, G. Perrone, S. P. Romano
Published to: 2022 International Conference on Electrical, Computer and Energy Technologies (ICECET)
On-demand deployment and orchestration of Cyber Ranges in the Cloud
Authors: A.P. Luise, G. Perrone, C. Perrotta, S.P. Romano
Published to: ITASEC21
Discovering reflected Cross-Site Scripting vulnerabilities using a Multiobjective Reinforcement Learning environment
Authors: F. Caturano, G. Perrone, S. P. Romano
Published to: Computers & Security (2020)
Hacking Goals: A Goal-Centric Attack Classification Framework
Authors: F. Caturano, G. Perrone, S. P. Romano
Published to: 28th 32th IFIP International Conference on Testing Software and System IEEE (ICTSS 2020)
Capturing flags in a dynamically deployed microservices-based heterogeneous environment
Authors: F. Caturano, G. Perrone, S. P. Romano
Published to: 13th IEEE Principles, Systems and Applications of IP Telecommunications (IPTComm2020)
The Docker Security Playground: A hands-on approach to the study of network security
Authors: G. Perrone, S. P. Romano
Published to: Principles, Systems and Applications of IP Telecommunications, (IPTComm 2017)
Leveraging AI to optimize website structure discovery during Penetration Testing
Authors: D. Antonelli, R. Cascella, G. Perrone, S.P. Romano, A. Schiano
Published to: IEEE Transactions on Network and Service Management (arxiv)