Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–17 of 17 results for author: Spognardi, A

Searching in archive cs. Search in all archives.
.
  1. Scalable and automated Evaluation of Blue Team cyber posture in Cyber Ranges

    Authors: Federica Bianchi, Enrico Bassetti, Angelo Spognardi

    Abstract: Cyber ranges are virtual training ranges that have emerged as indispensable environments for conducting secure exercises and simulating real or hypothetical scenarios. These complex computational infrastructures enable the simulation of attacks, facilitating the evaluation of defense tools and methodologies and developing novel countermeasures against threats. One of the main challenges of cyber r… ▽ More

    Submitted 28 December, 2023; originally announced December 2023.

  2. arXiv:2309.03547  [pdf, other

    cs.CR

    Security assessment of common open source MQTT brokers and clients

    Authors: Edoardo Di Paolo, Enrico Bassetti, Angelo Spognardi

    Abstract: Security and dependability of devices are paramount for the IoT ecosystem. Message Queuing Telemetry Transport protocol (MQTT) is the de facto standard and the most common alternative for those limited devices that cannot leverage HTTP. However, the MQTT protocol was designed with no security concern since initially designed for private networks of the oil and gas industry. Since MQTT is widely us… ▽ More

    Submitted 7 September, 2023; originally announced September 2023.

  3. arXiv:2309.03525  [pdf, other

    cs.CR cs.NI

    A New Model for Testing IPv6 Fragment Handling

    Authors: Edoardo Di Paolo, Enrico Bassetti, Angelo Spognardi

    Abstract: Since the origins of the Internet, various vulnerabilities exploiting the IP fragmentation process have plagued IPv4 protocol, many leading to a wide range of attacks. IPv6 modified the handling of fragmentations and introduced a specific extension header, not solving the related problems, as proved by extensive literature. One of the primary sources of problems has been the overlapping fragments,… ▽ More

    Submitted 26 September, 2023; v1 submitted 7 September, 2023; originally announced September 2023.

  4. arXiv:2304.07535  [pdf, other

    cs.SI cs.AI cs.CY cs.LG

    From Online Behaviours to Images: A Novel Approach to Social Bot Detection

    Authors: Edoardo Di Paolo, Marinella Petrocchi, Angelo Spognardi

    Abstract: Online Social Networks have revolutionized how we consume and share information, but they have also led to a proliferation of content not always reliable and accurate. One particular type of social accounts is known to promote unreputable content, hyperpartisan, and propagandistic information. They are automated accounts, commonly called bots. Focusing on Twitter accounts, we propose a novel appro… ▽ More

    Submitted 15 April, 2023; originally announced April 2023.

    Comments: Accepted @ICCS2023, 23th International Conference on Computational Science, 3-5 July, 2023. The present version is a preprint

  5. arXiv:2303.17251  [pdf, other

    cs.SI cs.AI cs.CY cs.LG

    Demystifying Misconceptions in Social Bots Research

    Authors: Stefano Cresci, Kai-Cheng Yang, Angelo Spognardi, Roberto Di Pietro, Filippo Menczer, Marinella Petrocchi

    Abstract: Research on social bots aims at advancing knowledge and providing solutions to one of the most debated forms of online manipulation. Yet, social bot research is plagued by widespread biases, hyped results, and misconceptions that set the stage for ambiguities, unrealistic expectations, and seemingly irreconcilable findings. Overcoming such issues is instrumental towards ensuring reliable solutions… ▽ More

    Submitted 27 March, 2024; v1 submitted 30 March, 2023; originally announced March 2023.

  6. arXiv:2111.12034  [pdf, other

    cs.LG cs.SI

    Adversarial machine learning for protecting against online manipulation

    Authors: Stefano Cresci, Marinella Petrocchi, Angelo Spognardi, Stefano Tognazzi

    Abstract: Adversarial examples are inputs to a machine learning system that result in an incorrect output from that system. Attacks launched through this type of input can cause severe consequences: for example, in the field of image recognition, a stop signal can be misclassified as a speed limit indication.However, adversarial examples also represent the fuel for a flurry of research directions in differe… ▽ More

    Submitted 23 November, 2021; originally announced November 2021.

    Comments: To appear on IEEE Internet Computing. `Accepted manuscript' version

  7. arXiv:1904.05132  [pdf, other

    cs.SI cs.CR

    Better Safe Than Sorry: An Adversarial Approach to Improve Social Bot Detection

    Authors: Stefano Cresci, Marinella Petrocchi, Angelo Spognardi, Stefano Tognazzi

    Abstract: The arm race between spambots and spambot-detectors is made of several cycles (or generations): a new wave of spambots is created (and new spam is spread), new spambot filters are derived and old spambots mutate (or evolve) to new species. Recently, with the diffusion of the adversarial learning approach, a new practice is emerging: to manipulate on purpose target samples in order to make stronger… ▽ More

    Submitted 10 April, 2019; originally announced April 2019.

    Comments: This is the pre-final version of a paper accepted @ 11th ACM Conference on Web Science, June 30-July 3, 2019, Boston, US

  8. A study on text-score disagreement in online reviews

    Authors: Michela Fazzolari, Vittoria Cozza, Marinella Petrocchi, Angelo Spognardi

    Abstract: In this paper, we focus on online reviews and employ artificial intelligence tools, taken from the cognitive computing field, to help understanding the relationships between the textual part of the review and the assigned numerical score. We move from the intuitions that 1) a set of textual reviews expressing different sentiments may feature the same score (and vice-versa); and 2) detecting and an… ▽ More

    Submitted 21 July, 2017; originally announced July 2017.

    Comments: This is the accepted version of the paper. The final version will be published in the Journal of Cognitive Computation, available at Springer via http://dx.doi.org/10.1007/s12559-017-9496-y

  9. Social Fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling

    Authors: Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi

    Abstract: Spambot detection in online social networks is a long-lasting challenge involving the study and design of detection techniques capable of efficiently identifying ever-evolving spammers. Recently, a new wave of social spambots has emerged, with advanced human-like characteristics that allow them to go undetected even by current state-of-the-art algorithms. In this paper, we show that efficient spam… ▽ More

    Submitted 13 March, 2017; originally announced March 2017.

    Journal ref: IEEE Transactions on Dependable and Secure Computing 15(4):561-576, 2018

  10. The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race

    Authors: Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi

    Abstract: Recent studies in social media spam and automation provide anecdotal argumentation of the rise of a new generation of spambots, so-called social spambots. Here, for the first time, we extensively study this novel phenomenon on Twitter and we provide quantitative evidence that a paradigm-shift exists in spambot design. First, we measure current Twitter's capabilities of detecting the new social spa… ▽ More

    Submitted 30 March, 2023; v1 submitted 11 January, 2017; originally announced January 2017.

    Comments: Post-print of the article published in the Proceedings of 26th WWW, 2017, Companion Volume (Web Science Track, Perth, Australia, 3-7 April, 2017)

    Journal ref: Proceedings of the 26th International Conference on World Wide Web Companion, 2017

  11. arXiv:1603.01987  [pdf, other

    cs.IR cs.CL

    A matter of words: NLP for quality evaluation of Wikipedia medical articles

    Authors: Vittoria Cozza, Marinella Petrocchi, Angelo Spognardi

    Abstract: Automatic quality evaluation of Web information is a task with many fields of applications and of great relevance, especially in critical domains like the medical one. We move from the intuition that the quality of content of medical Web documents is affected by features related with the specific domain. First, the usage of a specific vocabulary (Domain Informativeness); then, the adoption of spec… ▽ More

    Submitted 7 March, 2016; originally announced March 2016.

  12. arXiv:1602.00110  [pdf, other

    cs.SI cs.CR cs.LG

    DNA-inspired online behavioral modeling and its application to spambot detection

    Authors: Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi

    Abstract: We propose a strikingly novel, simple, and effective approach to model online user behavior: we extract and analyze digital DNA sequences from user online actions and we use Twitter as a benchmark to test our proposal. We obtain an incisive and compact DNA-inspired characterization of user actions. Then, we apply standard DNA analysis techniques to discriminate between genuine and spambot accounts… ▽ More

    Submitted 30 January, 2016; originally announced February 2016.

    ACM Class: H.2.8.d; I.2.4

    Journal ref: IEEE Intelligent Systems 31(5):58-64, 2016

  13. TRAP: using TaRgeted Ads to unveil Google personal Profiles

    Authors: Mauro Conti, Vittoria Cozza, Marinella Petrocchi, Angelo Spognardi

    Abstract: In the last decade, the advertisement market spread significantly in the web and mobile app system. Its effectiveness is also due thanks to the possibility to target the advertisement on the specific interests of the actual user, other than on the content of the website hosting the advertisement. In this scenario, became of great value services that collect and hence can provide information about… ▽ More

    Submitted 14 October, 2015; originally announced October 2015.

    Comments: 7th IEEE International Workshop on Information Forensics and Security (WIFS) 2015. 6 pages

  14. arXiv:1509.04098  [pdf, ps, other

    cs.SI cs.CR cs.LG

    Fame for sale: efficient detection of fake Twitter followers

    Authors: Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi

    Abstract: $\textit{Fake followers}… ▽ More

    Submitted 10 November, 2015; v1 submitted 14 September, 2015; originally announced September 2015.

    ACM Class: H.2.8

    Journal ref: Decision Support Systems, 80, 56-71, 2015

  15. Domain-specific queries and Web search personalization: some investigations

    Authors: Van Tien Hoang, Angelo Spognardi, Francesco Tiezzi, Marinella Petrocchi, Rocco De Nicola

    Abstract: Major search engines deploy personalized Web results to enhance users' experience, by showing them data supposed to be relevant to their interests. Even if this process may bring benefits to users while browsing, it also raises concerns on the selection of the search results. In particular, users may be unknowingly trapped by search engines in protective information bubbles, called "filter bubbles… ▽ More

    Submitted 16 August, 2015; originally announced August 2015.

    Comments: In Proceedings WWV 2015, arXiv:1508.03389

    Journal ref: EPTCS 188, 2015, pp. 51-58

  16. arXiv:1402.1940  [pdf, other

    cs.CR

    No NAT'd User left Behind: Fingerprinting Users behind NAT from NetFlow Records alone

    Authors: Nino Vincenzo Verde, Giuseppe Ateniese, Emanuele Gabrielli, Luigi Vincenzo Mancini, Angelo Spognardi

    Abstract: It is generally recognized that the traffic generated by an individual connected to a network acts as his biometric signature. Several tools exploit this fact to fingerprint and monitor users. Often, though, these tools assume to access the entire traffic, including IP addresses and payloads. This is not feasible on the grounds that both performance and privacy would be negatively affected. In rea… ▽ More

    Submitted 9 February, 2014; originally announced February 2014.

  17. arXiv:1306.4447  [pdf, ps, other

    cs.CR cs.LG stat.ML

    Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers

    Authors: Giuseppe Ateniese, Giovanni Felici, Luigi V. Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali

    Abstract: Machine Learning (ML) algorithms are used to train computers to perform a variety of complex tasks and improve with experience. Computers learn how to recognize patterns, make unintended decisions, or react to a dynamic environment. Certain trained machines may be more effective than others because they are based on more suitable ML algorithms or because they were trained through superior training… ▽ More

    Submitted 19 June, 2013; originally announced June 2013.