Kite attack: reshaping the cube attack for a flexible GPU-based maxterm searchArticolo in rivista |
Exploring and analyzing the tor hidden services graphArticolo in rivista |
Thwarting Obfuscated Malware via Differential Fault AnalysisArticolo in rivista |
CheR: Cheating resilience in the cloud via smart resource allocationArticolo in rivista |