Follow
Leonardo Regano
Leonardo Regano
Assistant Professor, Università di Cagliari
Verified email at unica.it
Title
Cited by
Cited by
Year
Detection of encrypted cryptomining malware connections with machine and deep learning
A Pastor, A Mozo, S Vakaruk, D Canavese, DR López, L Regano, ...
IEEE Access 8, 158036-158055, 2020
522020
Assessment of source code obfuscation techniques
A Viticchié, L Regano, M Torchiano, C Basile, M Ceccato, P Tonella, ...
2016 IEEE 16th international working conference on source code analysis and …, 2016
512016
A meta-model for software protections and reverse engineering attacks
C Basile, D Canavese, L Regano, P Falcarin, B De Sutter
Journal of Systems and Software 150, 3-21, 2019
322019
Estimating Software Obfuscation Potency with Artificial Neural Networks
D Canavese, L Regano, C Basile, A Viticchié
International Workshop on Security and Trust Management, 193-202, 2017
152017
Empirical assessment of the effort needed to attack programs protected with client/server code splitting
A Viticchie, L Regano, C Basile, M Torchiano, M Ceccato, P Tonella
Empirical Software Engineering 25, 1-48, 2020
122020
Privacy issues of ISPs in the modern web
AS Khatouni, M Trevisan, L Regano, A Viticchié
2017 8th IEEE Annual Information Technology, Electronics and Mobile …, 2017
102017
Towards optimally hiding protected assets in software applications
L Regano, D Canavese, C Basile, A Lioy
2017 IEEE International Conference on Software Quality, Reliability and …, 2017
102017
Towards automatic risk analysis and mitigation of software applications
L Regano, D Canavese, C Basile, A Viticchié, A Lioy
Information Security Theory and Practice: 10th IFIP WG 11.2 International …, 2016
72016
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection
D Canavese, L Regano, C Basile, G Ciravegna, A Lioy
Computers & Electrical Engineering 97, 107621, 2022
62022
An Expert System for Automatic Software Protection.
L Regano
Polytechnic University of Turin, Italy, 2019
52019
A model of capabilities of Network Security Functions
C Basile, D Canavese, L Regano, I Pedone, A Lioy
2022 IEEE 8th International Conference on Network Softwarization (NetSoft …, 2022
32022
Data set and machine learning models for the classification of network traffic originators
D Canavese, L Regano, C Basile, G Ciravegna, A Lioy
Data in Brief 41, 107968, 2022
32022
Software protection as a risk analysis process
D Canavese, L Regano, C Basile, B Coppens, B De Sutter
IEEE Transactions On Dependable And Secure Computing, 2020
22020
Security at the Edge for Resource-Limited IoT Devices
D Canavese, L Mannella, L Regano, C Basile
Sensors 24 (2), 590, 2024
12024
Design, implementation, and automation of a risk management approach for man-at-the-End software protection
C Basile, B De Sutter, D Canavese, L Regano, B Coppens
Computers & Security 132, 103321, 2023
12023
A Model for Automated Cybersecurity Threat Remediation and Sharing
F Settanni, L Regano, C Basile, A Lioy
2023 IEEE 9th International Conference on Network Softwarization (NetSoft …, 2023
12023
Smart intrusion detection systems based on machine learning
M Coscia
Politecnico di Torino, 2021
12021
A meta-model for software protections and reverse engineering attacks: an instance of the metamodel
C Basile, D Cavanese, L Regano, P Falcarin, B De Sutter
Journal of Systems and SoftwareUnder submission, 0
1
Computer-Aided Reverse Engineering of Protected Software
D Canavese, L Regano, A Lioy
International Workshop on Digital Sovereignty in Cyber Security: New …, 2022
2022
Towards intelligence driven automated incident response
F Settanni
Politecnico di Torino, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20