What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Luca Allodi
Google Scholar
30
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurosp
An Experimental Design to Investigate Attacker Actions on an Access-as-a-Service 'Criminal' Platform.
Roy Ricaldi
Yasen Yalamov
Michele Campobasso
Luca Allodi
Hannah Kool
Asier Moneva
Eric Rutger Leukfeldt
2025
conf/eurosp
On the Effect of Ruleset Tuning and Data Imbalance on Explainable Network Security Alert Classifications: A Case-Study on DeepCASE.
Koen T. W. Teuwen
Sam Baggen
Emmanuele Zambon
Luca Allodi
2025
conf/asiaccs
POSTER: SuriCap - A Measurement Platform to Study and Evaluate Intrusion Detection Rule Engineering.
Koen T. W. Teuwen
Emmanuele Zambon
Luca Allodi
2025
conf/asiaccs
Ruling the Unruly: Designing Effective, Low-Noise Network Intrusion Detection Rules for Security Operations Centers.
Koen T. W. Teuwen
Tom Mulders
Emmanuele Zambon
Luca Allodi
2025
conf/asiaccs
The Impact of Emerging Phishing Threats: Assessing Quishing and LLM-generated Phishing Emails against Organizations.
Marie Weinz
Nicola Zannone
Luca Allodi
Giovanni Apruzzese
2024
conf/eurosp
The (Relative) Impact of Email Cues on the Perceived Threat of Phishing Attacks: A User Perspective on Phishing Deceptiveness.
Pavlo Burda
Maria Eleni Kokkini
Luca Allodi
Nicola Zannone
2024
conf/eurosp
A Methodology to Measure the "Cost" of CPS Attacks: Not all CPS Networks are Created Equal.
Martin Rosso
Luca Allodi
Emmanuele Zambon
Jerry den Hartog
2024
conf/eurosp
Attacking Operational Technology Without Specialized Knowledge: The Unspecialized OT Threat Actor Profile.
Stash Kempinski
Savio Sciancalepore
Emmanuele Zambon
Luca Allodi
2024
conf/acsac
A Security Alert Investigation Tool Supporting Tier 1 Analysts in Contextualizing and Understanding Network Security Events.
Leon Kersten
Santiago Darré
Tom Mulders
Emmanuele Zambon
Marco Caselli
Chris Snijders
Luca Allodi
2023
conf/uss
Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale.
Michele Campobasso
Luca Allodi
2023
conf/soups
'Give Me Structure': Synthesis and Evaluation of a (Network) Threat Analysis Process Supporting Tier 1 Investigations in a Security Operation Center.
Leon Kersten
Tom Mulders
Emmanuele Zambon
Chris Snijders
Luca Allodi
2023
conf/eurosp
The Peculiar Case of Tailored Phishing against SMEs: Detection and Collective DefenseMechanisms at a Small IT Company.
Pavlo Burda
Abdul Malek Altawekji
Luca Allodi
Nicola Zannone
2022
conf/eurosp
Investigating the Effect of Phishing Believability on Phishing Reporting.
Leon Kersten
Pavlo Burda
Luca Allodi
Nicola Zannone
2022
conf/eurosp
Characterizing Building Automation System Attacks and Attackers.
Martino Tommasini
Martin Rosso
Emmanuele Zambon
Luca Allodi
Jerry den Hartog
2022
conf/acsac
Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles.
Luca Morgese Zangrandi
Thijs van Ede
Tim M. Booij
Savio Sciancalepore
Luca Allodi
Andrea Continella
2021
conf/eurosp
Dissecting Social Engineering Attacks Through the Lenses of Cognition.
Pavlo Burda
Luca Allodi
Nicola Zannone
2021
conf/eurosp
Modelling Disruptive APTs targeting Critical Infrastructure using Military Theory.
Yoram J. Meijaard
Peter-Paul Meiler
Luca Allodi
2020
conf/ccs
Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale.
Michele Campobasso
Luca Allodi
2020
conf/eurosp
An Experimental Approach for Estimating Cyber Risk: a Proposal Building upon Cyber Ranges and Capture the Flags.
Giorgio Di Tizio
Fabio Massacci
Luca Allodi
Stanislav Dashevskyi
Jelena Mirkovic
2020
conf/eurosp
WACCO 2020: the 2nd Workshop on Attackers and Cybercrime Operations Co-held with IEEE European Symposium on Security and Privacy 2020.
Luca Allodi
Alice Hutchings
Fabio Massacci
Sergio Pastrana
Marie Vasek
2020
conf/eurosp
Don't Forget the Human: a Crowdsourced Approach to Automate Response and Containment Against Spear Phishing Attacks.
Pavlo Burda
Luca Allodi
Nicola Zannone
2020
conf/iciss
A Toolkit for Security Awareness Training Against Targeted Phishing.
Simone Pirocca
Luca Allodi
Nicola Zannone
2020
conf/acsac
SAIBERSOC: Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers.
Martin Rosso
Michele Campobasso
Ganduulga Gankhuyag
Luca Allodi
2019
conf/ccs
Unveiling Systematic Biases in Decisional Processes: An Application to Discrimination Discovery.
Laura Genga
Luca Allodi
Nicola Zannone
2019
conf/uss
Cognitive Triaging of Phishing Attacks.
Amber van der Heijden
Luca Allodi
2019
conf/eurosp
CARONTE: Crawling Adversarial Resources Over Non-Trusted, High-Profile Environments.
Michele Campobasso
Pavlo Burda
Luca Allodi
2017
conf/ccs
Economic Factors of Vulnerability Trade and Exploitation.
Luca Allodi
2013
conf/uss
MalwareLab: Experimentation with Cybercrime Attack Tools.
Luca Allodi
Vadim Kotov
Fabio Massacci
2013
conf/sp
Quantitative Assessment of Risk Reduction with Cybercrime Black Market Monitoring.
Luca Allodi
Woohyun Shim
Fabio Massacci
2012
conf/ccs
A preliminary analysis of vulnerability scores for attacks in wild: the ekits and sym datasets.
Luca Allodi
Fabio Massacci
Coauthors
Abdul Malek Altawekji
(1)
Alice Hutchings
(1)
Amber van der Heijden
(1)
Andrea Continella
(1)
Asier Moneva
(1)
Chris Snijders
(2)
Emmanuele Zambon
(8)
Eric Rutger Leukfeldt
(1)
Fabio Massacci
(5)
Ganduulga Gankhuyag
(1)
Giorgio Di Tizio
(1)
Giovanni Apruzzese
(1)
Hannah Kool
(1)
Jelena Mirkovic
(1)
Jerry den Hartog
(2)
Koen T. W. Teuwen
(3)
Laura Genga
(1)
Leon Kersten
(3)
Luca Allodi
(30)
Luca Morgese Zangrandi
(1)
Marco Caselli
(1)
Maria Eleni Kokkini
(1)
Marie Vasek
(1)
Marie Weinz
(1)
Martin Rosso
(3)
Martino Tommasini
(1)
Michele Campobasso
(5)
Nicola Zannone
(8)
Pavlo Burda
(6)
Peter-Paul Meiler
(1)
Roy Ricaldi
(1)
Sam Baggen
(1)
Santiago Darré
(1)
Savio Sciancalepore
(2)
Sergio Pastrana
(1)
Simone Pirocca
(1)
Stanislav Dashevskyi
(1)
Stash Kempinski
(1)
Thijs van Ede
(1)
Tim M. Booij
(1)
Tom Mulders
(3)
Vadim Kotov
(1)
Woohyun Shim
(1)
Yasen Yalamov
(1)
Yoram J. Meijaard
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to