Common Vulnerability Scoring System (CVSS) v3. Burda, P., Allodi, L., & Zannone, N. (2024). https://canvas.instructure.com/eportfolios/3769540/entries/13670383 in social engineering empirical research: a systematic literature review. ACM Transactions on Computer-Human Interaction, 31(2), 1-55. PDF. Campobasso, M. and Allodi, L. (2023), Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale. In Proceedings of USENIX Security 2023. Preprint. Marin, I. and Burda, P. and Zannone, N. and Allodi, L. (2023), The Influence of Human Factors on the Intention to Report Phishing Emails In Proceedings of the 2023 ACM CHI Conference on Human Factors in Computing Systems. Allodi, L., Massacci, F., Williams, J. The Work-Averse Cyber Attacker Model: Theory and Evidence From Two Million Attack Signatures. 2021) Risk Analysis. Open Access, doi:10.1111/risa.13732. Martin Rosso, Michele Campobasso, Ganduulga Gankhuyag, Luca Allodi. SAIBERSOC: Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers. In Proceedings of the 36th Annual Computer Security Applications Conference (ACSAC 2020). Distinguished Paper with Artifacts Award.

Amber van der Heijden, Luca Allodi. Cognitive Triaging of Phishing Attacks. In Proceedings of Usenix Security 2019 Preprint. Burda, P., Allodi, L., & Zannone, N. (2024). Cognition in social engineering empirical research: a systematic literature review. ACM Transactions on Computer-Human Interaction, 31(2), 1-55. PDF. Genga, L., Allodi, L., & Zannone, N. (2022). Association Rule Mining Meets Regression Analysis: An Automated Approach to Unveil Systematic Biases in Decision-Making Processes. Journal of Cybersecurity and Privacy, 2(1), 191-219. Publisher. Allodi, L., Massacci, F., Williams, J. The Work-Averse Cyber Attacker Model: Theory and Evidence From Two Million Attack Signatures. 2021) Risk Analysis. Open Access, doi:10.1111/risa.13732. Allodi, L., Cremonini, M., Massacci, F. et al. Measuring the accuracy of software vulnerability assessments: experiments with students and professionals. Allodi, L. and Massacci, F. (2017), Security Events and Vulnerability Data for Cybersecurity Risk Estimation. Risk Analysis, 37: 1606-1627. doi:10.1111/risa.12864 Pre pub version. Luca Allodi, Marco Corradin, Fabio Massacci.

Then and Now: On The Maturity of the Cybercrime Markets. The lesson black-hat marketeers learned. IEEE Transactions on Emerging Topics in Computing, 4(1):35-46, Jan 2016. Prepub version. Luca Allodi, Fabio Massacci. Comparing vulnerability severity and exploits using case-control studies. ACM Transactions on Information and System Security (TISSEC). 17, 1, Article 1 (August 2014), 20 pages. Winnona DeSombre, James Shires, JD Work, Robert Morgus, Patrick Howell O’Neill, Luca Allodi, and Trey Herr. Countering cyber proliferation: Zeroing in on Access-as-a-Service. Atlantic Council, 2021. Available on the Atlantic Council’s website. Winnona DeSombre, Michele Campobasso, Luca Allodi, Dr. James Shires, JD Work, Robert Morgus, Patrick Howell O’Neill, and Dr. Trey Herr. A primer on the proliferation of offensive cyber capabilities. Atlantic Council, 2021. Available on the Atlantic Council’s website. Kersten, L. et al. A Security Alert Investigation Tool Supporting Tier 1 Analysts In Contextualizing and Understanding Network Security Events. Burda, P., Allodi, L., Serebrenik, A., & Zannone, N. (2024, August). ‘Protect and Fight ****’: A Case Study on User Motivations to Report Phishing Emails.

In European Symposium on Usable Security. Burda, P., Kokkini, M. E., Allodi, L., & Zannone, N. (2024, July). The (Relative) Impact of Email Cues on the Perceived Threat of Phishing Attacks: A User Perspective on Phishing Deceptiveness. In 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 67-84). IEEE. Publisher link. Rosso, M., Allodi, L., Zambon, E., & den Hartog, J. (2024, July). A Methodology to Measure the “Cost” of CPS Attacks: Not all CPS Networks are Created Equal. In 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 112-129). IEEE. Publisher link. Kempinski, S., Sciancalepore, S., Zambon, E., & Allodi, L. (2024, July). Attacking Operational Technology Without Specialized Knowledge: The Unspecialized OT Threat Actor Profile. In 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 146-159). IEEE. Publisher link. Burda, P., Altawekji, A. M., Allodi, L., & Zannone, N. (2023, July). The Peculiar Case of Tailored Phishing against SMEs: Detection and Collective DefenseMechanisms at a Small IT Company.
Common Vulnerability Scoring System (CVSS) v3. Burda, P., Allodi, L., & Zannone, N. (2024). https://canvas.instructure.com/eportfolios/3769540/entries/13670383 in social engineering empirical research: a systematic literature review. ACM Transactions on Computer-Human Interaction, 31(2), 1-55. PDF. Campobasso, M. and Allodi, L. (2023), Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale. In Proceedings of USENIX Security 2023. Preprint. Marin, I. and Burda, P. and Zannone, N. and Allodi, L. (2023), The Influence of Human Factors on the Intention to Report Phishing Emails In Proceedings of the 2023 ACM CHI Conference on Human Factors in Computing Systems. Allodi, L., Massacci, F., Williams, J. The Work-Averse Cyber Attacker Model: Theory and Evidence From Two Million Attack Signatures. 2021) Risk Analysis. Open Access, doi:10.1111/risa.13732. Martin Rosso, Michele Campobasso, Ganduulga Gankhuyag, Luca Allodi. SAIBERSOC: Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers. In Proceedings of the 36th Annual Computer Security Applications Conference (ACSAC 2020). Distinguished Paper with Artifacts Award. Amber van der Heijden, Luca Allodi. Cognitive Triaging of Phishing Attacks. In Proceedings of Usenix Security 2019 Preprint. Burda, P., Allodi, L., & Zannone, N. (2024). Cognition in social engineering empirical research: a systematic literature review. ACM Transactions on Computer-Human Interaction, 31(2), 1-55. PDF. Genga, L., Allodi, L., & Zannone, N. (2022). Association Rule Mining Meets Regression Analysis: An Automated Approach to Unveil Systematic Biases in Decision-Making Processes. Journal of Cybersecurity and Privacy, 2(1), 191-219. Publisher. Allodi, L., Massacci, F., Williams, J. The Work-Averse Cyber Attacker Model: Theory and Evidence From Two Million Attack Signatures. 2021) Risk Analysis. Open Access, doi:10.1111/risa.13732. Allodi, L., Cremonini, M., Massacci, F. et al. Measuring the accuracy of software vulnerability assessments: experiments with students and professionals. Allodi, L. and Massacci, F. (2017), Security Events and Vulnerability Data for Cybersecurity Risk Estimation. Risk Analysis, 37: 1606-1627. doi:10.1111/risa.12864 Pre pub version. Luca Allodi, Marco Corradin, Fabio Massacci. Then and Now: On The Maturity of the Cybercrime Markets. The lesson black-hat marketeers learned. IEEE Transactions on Emerging Topics in Computing, 4(1):35-46, Jan 2016. Prepub version. Luca Allodi, Fabio Massacci. Comparing vulnerability severity and exploits using case-control studies. ACM Transactions on Information and System Security (TISSEC). 17, 1, Article 1 (August 2014), 20 pages. Winnona DeSombre, James Shires, JD Work, Robert Morgus, Patrick Howell O’Neill, Luca Allodi, and Trey Herr. Countering cyber proliferation: Zeroing in on Access-as-a-Service. Atlantic Council, 2021. Available on the Atlantic Council’s website. Winnona DeSombre, Michele Campobasso, Luca Allodi, Dr. James Shires, JD Work, Robert Morgus, Patrick Howell O’Neill, and Dr. Trey Herr. A primer on the proliferation of offensive cyber capabilities. Atlantic Council, 2021. Available on the Atlantic Council’s website. Kersten, L. et al. A Security Alert Investigation Tool Supporting Tier 1 Analysts In Contextualizing and Understanding Network Security Events. Burda, P., Allodi, L., Serebrenik, A., & Zannone, N. (2024, August). ‘Protect and Fight Back’: A Case Study on User Motivations to Report Phishing Emails. In European Symposium on Usable Security. Burda, P., Kokkini, M. E., Allodi, L., & Zannone, N. (2024, July). The (Relative) Impact of Email Cues on the Perceived Threat of Phishing Attacks: A User Perspective on Phishing Deceptiveness. In 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 67-84). IEEE. Publisher link. Rosso, M., Allodi, L., Zambon, E., & den Hartog, J. (2024, July). A Methodology to Measure the “Cost” of CPS Attacks: Not all CPS Networks are Created Equal. In 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 112-129). IEEE. Publisher link. Kempinski, S., Sciancalepore, S., Zambon, E., & Allodi, L. (2024, July). Attacking Operational Technology Without Specialized Knowledge: The Unspecialized OT Threat Actor Profile. In 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 146-159). IEEE. Publisher link. Burda, P., Altawekji, A. M., Allodi, L., & Zannone, N. (2023, July). The Peculiar Case of Tailored Phishing against SMEs: Detection and Collective DefenseMechanisms at a Small IT Company.
0 Commentarios 0 Acciones 232 Views 0 Vista previa
Patrocinados