default search action
Marco Balduzzi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j1]Marcello Meschini, Giorgio Di Tizio, Marco Balduzzi, Fabio Massacci:
A Case-Control Study to Measure Behavioral Risks of Malware Encounters in Organizations. IEEE Trans. Inf. Forensics Secur. 19: 9419-9432 (2024) - 2023
- [c23]Marco Balduzzi, Francesco Sortino, Fabio Castello, Leandro Pierguidi:
A Security Analysis of CNC Machines in Industry 4.0. DIMVA 2023: 132-152 - 2022
- [c22]Marco Balduzzi, Francesco Sortino, Fabio Castello, Leandro Pierguidi:
An Empirical Evaluation of CNC Machines in Industry 4.0 (Short Paper). CRITIS 2022: 56-62 - 2020
- [c21]Marcello Pogliani, Federico Maggi, Marco Balduzzi, Davide Quarta, Stefano Zanero:
Detecting Insecure Code Patterns in Industrial Robot Programs. AsiaCCS 2020: 759-771 - [c20]Federico Maggi, Marco Balduzzi, Rainer Vosseler, Martin Rösler, Walter Quadrini, Giacomo Tavola, Marcello Pogliani, Davide Quarta, Stefano Zanero:
Smart Factory Security: A Case Study on a Modular Smart Manufacturing System. ISM 2020: 666-675
2010 – 2019
- 2019
- [c19]Federico Maggi, Marco Balduzzi, Jonathan Andersson, Philippe Lin, Stephen Hilt, Akira Urano, Rainer Vosseler:
A Security Evaluation of Industrial Radio Remote Controllers. DIMVA 2019: 133-153 - 2018
- [c18]Federico Maggi, Marco Balduzzi, Ryan Flores, Lion Gu, Vincenzo Ciancaglini:
Investigating Web Defacement Campaigns at Large. AsiaCCS 2018: 443-456 - 2017
- [c17]Babak Rahbarinia, Marco Balduzzi, Roberto Perdisci:
Exploring the Long Tail of (Malicious) Software Downloads. DSN 2017: 391-402 - [c16]Onur Catakoglu, Marco Balduzzi, Davide Balzarotti:
Attacks landscape in the dark side of the web. SAC 2017: 1739-1746 - 2016
- [c15]Marco Balduzzi, Payas Gupta, Lion Gu, Debin Gao, Mustaque Ahamad:
MobiPot: Understanding Mobile Telephony Threats with Honeycards. AsiaCCS 2016: 723-734 - [c14]Babak Rahbarinia, Marco Balduzzi, Roberto Perdisci:
Real-Time Detection of Malware Downloads via Large-Scale URL->File->Machine Graph Mining. AsiaCCS 2016: 783-794 - [c13]Onur Catakoglu, Marco Balduzzi, Davide Balzarotti:
Automatic Extraction of Indicators of Compromise for Web Applications. WWW 2016: 333-343 - 2014
- [c12]Marco Balduzzi, Alessandro Pasta, Kyle Wilhoit:
A security evaluation of AIS automated identification system. ACSAC 2014: 436-445 - [c11]Nick Nikiforakis, Marco Balduzzi, Lieven Desmet, Frank Piessens, Wouter Joosen:
Soundsquatting: Uncovering the Use of Homophones in Domain Squatting. ISC 2014: 291-308 - 2013
- [c10]Marco Balduzzi, Vincenzo Ciangaglini, Robert McArdle:
Targeted attacks detection with SPuNge. PST 2013: 185-194 - [c9]Andrei Costin, Jelena Isacenkova, Marco Balduzzi, Aurélien Francillon, Davide Balzarotti:
The role of phone numbers in understanding cyber-crime schemes. PST 2013: 213-220 - 2012
- [c8]Marco Balduzzi, Jonas Zaddach, Davide Balzarotti, Engin Kirda, Sergio Loureiro:
A security analysis of amazon's elastic compute cloud service. SAC 2012: 1427-1434 - 2011
- [c7]Danesh Irani, Marco Balduzzi, Davide Balzarotti, Engin Kirda, Calton Pu:
Reverse Social Engineering Attacks in Online Social Networks. DIMVA 2011: 55-74 - [c6]Nick Nikiforakis, Marco Balduzzi, Steven Van Acker, Wouter Joosen, Davide Balzarotti:
Exposing the Lack of Privacy in File Hosting Services. LEET 2011 - [c5]Marco Balduzzi, Carmen Torrano Gimenez, Davide Balzarotti, Engin Kirda:
Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications. NDSS 2011 - [c4]Leyla Bilge, Engin Kirda, Christopher Kruegel, Marco Balduzzi:
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis. NDSS 2011 - 2010
- [b1]Marco Balduzzi:
Security by virtualization - A novel antivirus for personal computers. VDM 2010, ISBN 978-3-639-25624-6, pp. 1-95 - [c3]Marco Balduzzi, Manuel Egele, Engin Kirda, Davide Balzarotti, Christopher Kruegel:
A solution for the automated detection of clickjacking attacks. AsiaCCS 2010: 135-144 - [c2]Antonio Nappa, Aristide Fattori, Marco Balduzzi, Matteo Dell'Amico, Lorenzo Cavallaro:
Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype. DIMVA 2010: 81-100 - [c1]Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, Christopher Kruegel:
Abusing Social Networks for Automated User Profiling. RAID 2010: 422-441
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint