Follow
Andrea Continella
Andrea Continella
Associate Professor at University of Twente
Verified email at utwente.nl - Homepage
Title
Cited by
Year
A retrospective analysis of user exposure to (illicit) cryptocurrency mining on the web
R Holz, D Perino, M Varvello, J Amann, A Continella, N Evans, ...
arXiv preprint arXiv:2004.13239, 2020
62020
A Systematical and longitudinal study of evasive behaviors in windows malware
N Galloro, M Polino, M Carminati, A Continella, S Zanero
Computers & security 113, 102550, 2022
502022
An i/o request packet (irp) driven effective ransomware detection scheme using artificial neural network
MA Ayub, A Continella, A Siraj
2020 IEEE 21st International Conference on Information Reuse and Integration …, 2020
222020
Aot-attack on things: A security analysis of iot firmware updates
M Ibrahim, A Continella, A Bianchi
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 1047-1064, 2023
132023
Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms
D Meng, M Guerriero, A Machiry, H Aghakhani, P Bose, A Continella, ...
Proceedings of the ACM ASIA Conference on Computer and Communications …, 2021
22021
COLUMBUS: Android App Testing Through Systematic Callback Exploration
P Bose, D Das, S Vasan, S Mariani, I Grishchenko, A Continella, ...
Proceedings of the International Conference on Software Engineering (ICSE), 2023
42023
Contextualizing system calls in containers for anomaly-based intrusion detection
A El Khairi, M Caselli, C Knierim, A Peter, A Continella
Proceedings of the 2022 on Cloud Computing Security Workshop, 9-21, 2022
122022
Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis
Q Grundy, K Chiu, F Held, A Continella, L Bero, R Holz
bmj 364, 2019
1772019
DEEPCASE: Semi-Supervised Contextual Analysis of Security Events
T van Ede, H Aghakhani, N Spahn, R Bortolameotti, M Cova, A Continella, ...
In Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2022
672022
Defending from Financially-Motivated Software Abuses
A Continella
Politecnico di Milano, 2018
2018
Detecting Anomalous Misconfigurations in AWS Identity and Access Management Policies
T van Ede, N Khasuntsev, B Steen, A Continella
Proceedings of the 2022 on Cloud Computing Security Workshop, 63-74, 2022
32022
Detecting webinjects through live memory inspection
N Mariani, A Continella, M Pogliani, M Carminati, F Maggi, S Zanero
38th IEEE Symposium on Security and Privacy 2017, 2017
2017
DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices
N Redini, A Continella, D Das, G De Pasquale, N Spahn, A Machiry, ...
IEEE Symposium on Security & Privacy (S&P), 2021
682021
Divak: Non-invasive Characterization of Out-of-Bounds Write Vulnerabilities
L Hafkemeyer, J Starink, A Continella
International Conference on Detection of Intrusions and Malware, and …, 2023
2023
ERAFL: Efficient Resource Allocation for Federated Learning Training in Smart Homes
T Rezaei, S Bayhan, A Continella, R Van Rijswijk-Deij
NOMS 2024-2024 IEEE Network Operations and Management Symposium, 1-5, 2024
2024
Federated Lab (FedLab): An Open-source Distributed Platform for Internet of Things (IoT) Research and Experimentation
M Meijer, GT Petrucci, M Schotsman, L Morgese, T van Ede, A Continella, ...
IEEE World Forum on IoT (WF-IoT), 2022
12022
FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic
T van Ede, R Bortolameotti, A Continella, J Ren, DJ Dubois, M Lindorfer, ...
Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), 2020
2082020
GASOLINE: a Cytoscape app for multiple local alignment of PPI networks
G Micale, A Continella, A Ferro, R Giugno, A Pulvirenti
F1000Research 3, 2014
132014
GASOLINE: a Cytoscape app for multiple local alignment of PPI networks [version 2; peer review: 2
G Micale, A Continella, A Ferro, R Giugno, A Pulvirenti
networks [version 2; peer review: 2 approved, 1 approved with reservations …, 2014
2014
GroupDroid: Automatically Grouping Mobile Malware by Extracting Code Similarities
N Marastoni, A Continella, D Quarta, S Zanero, M Dalla Preda
Software Security, Protection, and Reverse Engineering Workshop, 2017
292017
The system can't perform the operation now. Try again later.
Articles 1–20