default search action
Dario Stabili
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Francesco Pollicino, Dario Stabili, Mirco Marchetti:
Performance Comparison of Timing-Based Anomaly Detectors for Controller Area Network: A Reproducible Study. ACM Trans. Cyber Phys. Syst. 8(2): 15 (2024) - [c17]Dario Stabili, Filip Valgimigli, Tobia Bocchi, Filippo Veronesi, Mirco Marchetti:
Implementing and testing RollJam on Software-Defined Radios. ITASEC 2024 - [c16]Andrea Venturi, Dimitri Gall, Dario Stabili, Mirco Marchetti:
Hardening Machine Learning based Network Intrusion Detection Systems with synthetic netflows. ITASEC 2024 - [c15]Dario Stabili, Filip Valgimigli, Edoardo Torrini, Mirco Marchetti:
HackCar: a test platform for attacks and defenses on a cost-contained automotive architecture. IV 2024: 1099-1105 - [c14]Dario Stabili, Tobia Bocchi, Filip Valgimigli, Mirco Marchetti:
Finding (and Exploiting) Vulnerabilities on IP Cameras: The Tenda CP3 Case Study. IWSEC 2024: 195-210 - [c13]Giovanni Gambigliani Zoccoli, Dario Stabili, Mirco Marchetti:
RealCAN: bringing real-time capabilities to canplayer. VTC Fall 2024: 1-7 - [i5]Andrea Venturi, Dario Stabili, Mirco Marchetti:
Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Neural Networks. CoRR abs/2403.11830 (2024) - [i4]Dario Stabili, Filip Valgimigli, Edoardo Torrini, Mirco Marchetti:
HackCar: a test platform for attacks and defenses on a cost-contained automotive architecture. CoRR abs/2405.05023 (2024) - [i3]Dario Stabili, Tobia Bocchi, Filip Valgimigli, Mirco Marchetti:
Finding (and exploiting) vulnerabilities on IP Cameras: the Tenda CP3 case study. CoRR abs/2406.15103 (2024) - 2023
- [j4]Dario Stabili, Raffaele Romagnoli, Mirco Marchetti, Bruno Sinopoli, Michele Colajanni:
A multidisciplinary detection system for cyber attacks on Powertrain Cyber Physical Systems. Future Gener. Comput. Syst. 144: 151-164 (2023) - [c12]Giovanni Gambigliani Zoccoli, Dario Stabili, Mirco Marchetti:
Are VANETs pseudonyms effective? An experimental evaluation of pseudonym tracking in adversarial scenario. VTC Fall 2023: 1-6 - [i2]Francesco Pollicino, Dario Stabili, Mirco Marchetti:
Performance comparison of timing-based anomaly detectors for Controller Area Network: a reproducible study. CoRR abs/2307.04561 (2023) - 2022
- [j3]Dario Stabili, Luca Ferretti, Mauro Andreolini, Mirco Marchetti:
DAGA: Detecting Attacks to In-Vehicle Networks via N-Gram Analysis. IEEE Trans. Veh. Technol. 71(11): 11540-11554 (2022) - [c11]Andrea Venturi, Dario Stabili, Francesco Pollicino, Emanuele Bianchi, Mirco Marchetti:
Comparison of Machine Learning-based anomaly detectors for Controller Area Network. NCA 2022: 81-88 - [c10]Gabriele Gambigliani Zoccoli, Francesco Pollicino, Dario Stabili, Mirco Marchetti:
SixPack v2: enhancing SixPack to avoid last generation misbehavior detectors in VANETs. NCA 2022: 243-249 - [c9]Francesco Pollicino, Dario Stabili, Mirco Marchetti:
On the effectiveness of BSM communications in V2V emergency scenarios. VTC Spring 2022: 1-5 - [i1]Dario Stabili, Raffaele Romagnoli, Mirco Marchetti, Bruno Sinopoli, Michele Colajanni:
Exploring the consequences of cyber attacks on Powertrain Cyber Physical Systems. CoRR abs/2202.00743 (2022) - 2021
- [j2]Francesco Pollicino, Dario Stabili, Luca Ferretti, Mirco Marchetti:
Hardware Limitations to Secure C-ITS: Experimental Evaluation and Solutions. IEEE Trans. Veh. Technol. 70(12): 12946-12959 (2021) - [c8]Dario Stabili, Francesco Pollicino, Alessio Rota:
A Benchmark Framework for CAN IDS. ITASEC 2021: 233-245 - [c7]Francesco Pollicino, Luca Ferretti, Dario Stabili, Mirco Marchetti:
Accountable and privacy-aware flexible car sharing and rental services. NCA 2021: 1-7 - [c6]Francesco Pollicino, Dario Stabili, Giampaolo Bella, Mirco Marchetti:
SixPack: Abusing ABS to avoid Misbehavior detection in VANETs. VTC Spring 2021: 1-6 - 2020
- [c5]Francesco Pollicino, Dario Stabili, Luca Ferretti, Mirco Marchetti:
An experimental analysis of ECQV implicit certificates performance in VANETs. VTC Fall 2020: 1-6
2010 – 2019
- 2019
- [j1]Mirco Marchetti, Dario Stabili:
READ: Reverse Engineering of Automotive Data Frames. IEEE Trans. Inf. Forensics Secur. 14(4): 1083-1097 (2019) - [c4]Dario Stabili, Mirco Marchetti:
Detection of Missing CAN Messages through Inter-Arrival Time Analysis. VTC Fall 2019: 1-7 - 2018
- [c3]Dario Stabili, Luca Ferretti, Mirco Marchetti:
Analyses of Secure Automotive Communication Protocols and Their Impact on Vehicles Life-Cycle. SMARTCOMP 2018: 452-457 - 2017
- [c2]Mirco Marchetti, Dario Stabili:
Anomaly detection of CAN bus messages through analysis of ID sequences. Intelligent Vehicles Symposium 2017: 1577-1583 - 2016
- [c1]Mirco Marchetti, Dario Stabili, Alessandro Guido, Michele Colajanni:
Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms. RTSI 2016: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint