publication venue for Software Vulnerability Detection under Poisoning Attacks using CNN-based Image Processing 2024 A technical characterization of APTs by leveraging public resources. 1-18. 2023 Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus. 22:1445-1480. 2023 After you, please: browser extensions order attacks and countermeasures. 19:623-638. 2020 Supervised machine learning using encrypted training data. 17:365-377. 2018 A pairing-based cryptographic approach for data security in the Cloud. 17:441-461. 2017 Bayesian Rational Exchange. 7:85-100. 2008