51![In The Works Elisabeth Altenburg Davide Bevilacqua Laurien Bachmann Rico Hentschel Florian Kofler In The Works Elisabeth Altenburg Davide Bevilacqua Laurien Bachmann Rico Hentschel Florian Kofler](https://www.pdfsearch.io/img/44fb32a338cb5d530c03f1b07e71edcc.jpg) | Add to Reading ListSource URL: ay5ay.w4yserver.atLanguage: German - Date: 2018-04-10 01:50:59
|
---|
52![ROPMEMU: A Framework for the Analysis of Complex Code-Reuse Attacks Mariano
Graziano,
Davide
Balzarotti,
Alain
Zidouemba
Cisco
Systems,
Inc.
ROPMEMU: A Framework for the Analysis of Complex Code-Reuse Attacks Mariano
Graziano,
Davide
Balzarotti,
Alain
Zidouemba
Cisco
Systems,
Inc.](https://www.pdfsearch.io/img/da8cf52cc786a4898dd7ebc56c14b842.jpg) | Add to Reading ListSource URL: s3.amazonaws.com- Date: 2017-04-06 17:15:24
|
---|
53![Environmental Bisimulations for Higher-Order Languages Davide Sangiorgi University of Bologna Abstract Environmental Bisimulations for Higher-Order Languages Davide Sangiorgi University of Bologna Abstract](https://www.pdfsearch.io/img/e693565c5aa029ea2743c4ccc09681a6.jpg) | Add to Reading ListSource URL: www-kb.is.s.u-tokyo.ac.jpLanguage: English - Date: 2007-08-16 22:48:54
|
---|
54![The Role of Cloud Services in Malicious Software: Trends and Insights Xiao Han1,2 , Nizar Kheir1 , and Davide Balzarotti2 1 Orange Labs, Issy Les Moulineaux, France The Role of Cloud Services in Malicious Software: Trends and Insights Xiao Han1,2 , Nizar Kheir1 , and Davide Balzarotti2 1 Orange Labs, Issy Les Moulineaux, France](https://www.pdfsearch.io/img/2a0da1f64113588bf35b46e49f8ce276.jpg) | Add to Reading ListSource URL: s3.eurecom.frLanguage: English - Date: 2018-08-14 16:06:29
|
---|
55![Noname manuscript No. (will be inserted by the editor) Innovative methods of correlation and orbit determination for space debris Davide Farnocchia · Giacomo Tommei · Noname manuscript No. (will be inserted by the editor) Innovative methods of correlation and orbit determination for space debris Davide Farnocchia · Giacomo Tommei ·](https://www.pdfsearch.io/img/59854e82f7ba75392f273730bc6fb13d.jpg) | Add to Reading ListSource URL: copernico.dm.unipi.itLanguage: English - Date: 2009-10-30 12:24:57
|
---|
56![Misleading Metrics: On Evaluating ML for Malware with Confidence Roberto Jordaney, Zhi Wang, Davide Papini, Ilia Nouretdinov, Kumar Sharad, and Lorenzo Cavallaro s2lab.isg.rhul.ac.uk – s2lab.isg.rhul.ac.uk/projects/ce/ Misleading Metrics: On Evaluating ML for Malware with Confidence Roberto Jordaney, Zhi Wang, Davide Papini, Ilia Nouretdinov, Kumar Sharad, and Lorenzo Cavallaro s2lab.isg.rhul.ac.uk – s2lab.isg.rhul.ac.uk/projects/ce/](https://www.pdfsearch.io/img/fb962411b9fc9af500b7abc15a04cbc7.jpg) | Add to Reading ListSource URL: ksharad.comLanguage: English - Date: 2018-05-17 15:33:25
|
---|
57![On the Effectiveness of Risk Prediction Based on Users Browsing Behavior Davide Canali*, Leyla Bilge, Davide Balzarotti EURECOM Software and System Security Group, France Symantec Research Labs, France On the Effectiveness of Risk Prediction Based on Users Browsing Behavior Davide Canali*, Leyla Bilge, Davide Balzarotti EURECOM Software and System Security Group, France Symantec Research Labs, France](https://www.pdfsearch.io/img/cc9185830804bfabb1861b153a84347f.jpg) | Add to Reading ListSource URL: s3.eurecom.frLanguage: English - Date: 2018-08-14 16:06:28
|
---|
58![Int J Comput Vis:74–85 DOIs11263Point-RANSAC Structure from Motion for Vehicle-Mounted Cameras by Exploiting Non-holonomic Constraints Davide Scaramuzza Int J Comput Vis:74–85 DOIs11263Point-RANSAC Structure from Motion for Vehicle-Mounted Cameras by Exploiting Non-holonomic Constraints Davide Scaramuzza](https://www.pdfsearch.io/img/44db58cd372d1044ebe17f33801e0c5b.jpg) | Add to Reading ListSource URL: rpg.ifi.uzh.chLanguage: English - Date: 2014-03-21 05:15:21
|
---|
59![An Empirical Analysis of Input Validation Mechanisms in Web Applications and Languages Theodoor Scholte Davide Balzarotti An Empirical Analysis of Input Validation Mechanisms in Web Applications and Languages Theodoor Scholte Davide Balzarotti](https://www.pdfsearch.io/img/a6639a816d061c489f161db7de147c37.jpg) | Add to Reading ListSource URL: seclab.ccs.neu.eduLanguage: English - Date: 2018-08-14 16:50:48
|
---|
60![A Large-Scale Analysis of the Security of Embedded Firmwares Andrei Costin, Jonas Zaddach, Aur´elien Francillon and Davide Balzarotti EURECOM Sophia Antipolis France {name.surname}@eurecom.fr A Large-Scale Analysis of the Security of Embedded Firmwares Andrei Costin, Jonas Zaddach, Aur´elien Francillon and Davide Balzarotti EURECOM Sophia Antipolis France {name.surname}@eurecom.fr](https://www.pdfsearch.io/img/fd74a723962b4f1ccf82a1d5f795eb8e.jpg) | Add to Reading ListSource URL: s3.eurecom.frLanguage: English - Date: 2018-08-14 16:06:31
|
---|