Including insider threats into risk management through Bayesian threat graph networks

Authors:  N. d’Ambrosio, G. Perrone, S. P. Romano

Published to: Computers and Security, 2023

Container-based Virtualization for Ethical Hacking with HOUDINI

Authors:  D. Capone, A. Delicato, G. Perrone, S. P. Romano

Published to: ITASEC23

A Software-Defined Approach for Mitigating Insider and External Threats via Moving Target Defense

Authors:  N. d’Ambrosio, E. Melluso, G. Perrone, S. P. Romano

Published to: 2023 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2023 – Proceedings, 2023

Reinforced WAVSEP: a Benchmarking Platform for Web Application Vulnerability Scanners

Authors:  L.Urbano, G. Perrone, S. P. Romano

Published to: International Conference on Electrical, Computer, and Energy Technologies, ICECET 2022

ThePhish: an Automated Open-Source Phishing Email Analysis Platform

Authors:  E. Galdi, G. Perrone, S. P. Romano

Published to: ITASEC22

Dockerized Android: a container-based platform to build mobile Android scenarios for Cyber Ranges

Authors:  D. Capone, F. Caturano, A. Delicato, G. Perrone, S. P. Romano

Published to: 2022 International Conference on Electrical, Computer and Energy Technologies (ICECET)

On-demand deployment and orchestration of Cyber Ranges in the Cloud

Authors:  A.P. Luise, G. Perrone, C. Perrotta, S.P. Romano

Published to: ITASEC21

Discovering reflected Cross-Site Scripting vulnerabilities using a Multiobjective Reinforcement Learning environment

Authors:  F. Caturano, G. Perrone, S. P. Romano

Published to: Computers & Security (2020)

Hacking Goals: A Goal-Centric Attack Classification Framework

Authors:  F. Caturano, G. Perrone, S. P. Romano

Published to: 28th 32th IFIP International Conference on Testing Software and System IEEE (ICTSS 2020)

Capturing flags in a dynamically deployed microservices-based heterogeneous environment

Authors:  F. Caturano, G. Perrone, S. P. Romano

Published to: 13th IEEE Principles, Systems and Applications of IP Telecommunications (IPTComm2020)

The Docker Security Playground: A hands-on approach to the study of network security

Authors:  G. Perrone, S. P. Romano

Published to: Principles, Systems and Applications of IP Telecommunications, (IPTComm 2017)

Leveraging AI to optimize website structure discovery during Penetration Testing

Authors:  D. Antonelli, R. Cascella, G. Perrone, S.P. Romano, A. Schiano

Published to: IEEE Transactions on Network and Service Management (arxiv)