User profiles for Giovanni Salzillo
Giovanni SalzilloPhD Student at Department of Industrial and Information Engineering, Università della … Verified email at unicampania.it Cited by 173 |
ESSecA: An automated expert system for threat modelling and penetration testing for IoT ecosystems
Despite the growing spread of Internet of Things (IoT) ecosystems, their security assessment
is still an open issue. Identifying threats, vulnerabilities, and attacks is a costly and time-…
is still an open issue. Identifying threats, vulnerabilities, and attacks is a costly and time-…
Automated threat modelling and risk analysis in e-Government using BPMN
Recent progress integrates security requirements into BPMN, enhancing its framework.
Extensions aim to seamlessly embed security concepts, yet the inherent ambiguity of security …
Extensions aim to seamlessly embed security concepts, yet the inherent ambiguity of security …
Evaluation of driver drowsiness based on real-time face analysis
G Salzillo, C Natale, GB Fioccola… - 2020 IEEE international …, 2020 - ieeexplore.ieee.org
Driving a car is a complex and potentially risky activity in people's everyday life, and it requires
the full involvement of physiological and cognitive resources. Any loss of these resources …
the full involvement of physiological and cognitive resources. Any loss of these resources …
MetaSEnD: A security enabled development life cycle meta-model
The growing adoption of IT infrastructures determined a high heterogeneity of software
systems. As matter of fact, the software is prone to vulnerabilities and cybersecurity problems, …
systems. As matter of fact, the software is prone to vulnerabilities and cybersecurity problems, …
[PDF][PDF] Security in IoT Pairing & Authentication protocols, a Threat Model, a Case Study Analysis.
The Internet of Things has changed the way we interact with the environment around us in
our daily life, and it is increasingly common to find more than one IoT device in our home. …
our daily life, and it is increasingly common to find more than one IoT device in our home. …
GDPR compliance through standard security controls: An automated approach
…, M Rak, P Cantiello, G Salzillo - Journal of High …, 2024 - journals.sagepub.com
Since 2018, the enactment of the General Data Protection Regulation (GDPR) has bestowed
distinct privileges upon each person while imposing protocols to safeguard personal …
distinct privileges upon each person while imposing protocols to safeguard personal …
[PDF][PDF] Systematic IoT Penetration Testing: Alexa Case Study.
M Rak, G Salzillo, C Romeo - ITASEC, 2020 - academia.edu
The Internet of Things paradigm arises many issues in terms of privacy and security. Systems
that are commonly configured by personnel with limited experience manage incredible …
that are commonly configured by personnel with limited experience manage incredible …
Threat modeling based penetration testing: the open energy monitor case study
Currently, the widespread diffusion of intelligent objects connected to the Internet and
continuously interacting with people is a fact. However, such a paradigm has a side effect in terms …
continuously interacting with people is a fact. However, such a paradigm has a side effect in terms …
Threat modeling of edge-based IoT applications
The Multi-access Edge Computing (MEC) computing model provides on-demand cloud
resources and services to the edge of the network, to offer storage and computing capacity, …
resources and services to the edge of the network, to offer storage and computing capacity, …
A cloud SecDevOps methodology: from design to testing
DevOps is becoming one of the most popular software development methodologies, especially
for cloud-based applications. In spite of its popularity, it is still difficult to integrate non-…
for cloud-based applications. In spite of its popularity, it is still difficult to integrate non-…