Publications

(2026). Towards a Secure Network Architecture for Social Robots. Proceedings of the Italian Conference on Cybersecurity (ITASEC) 2026.

(2025). SimProcess: High Fidelity Simulation of Noisy ICS Physical Processes. Proceedings of the 11th ACM Cyber-Physical System Security Workshop. Best paper award 🏆.

(2025). Towards Robust Stability Prediction in Smart Grids: GAN-based Approach under Data Constraints and Adversarial Challenges. Internet of Things.

(2025). Profiling Electric Vehicles via Early Charging Voltage Patterns. Proceedings of the International Conference on Availability, Reliability and Security (AI&CCPS Workshop 2025)..

(2025). CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN Bus Monitoring ECU Activations. ACNS 2025: International Conference on Applied Cryptography and Network Security.

(2025). CANLP: NLP-Based Intrusion Detection System for CAN. IEEE Transactions on Dependable and Secure Computing.

(2025). Can LLMs Classify CVEs? Investigating LLMs Capabilities in Computing CVSS Vectors. Proceedings of the 30th IEEE Symposium on Computers and Communications - International Workshop on Trusted Computing and Artificial Intelligence applied to Cybersecurity. (TrustAICyberSec 2025).

(2025). A Comparative Study of ICS Honeypot Deployments. Proceedings of the 6th International Workshop on Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2025.

(2024). When Authentication Is Not Enough: On the Security of Behavioral-Based Driver Authentication Systems. arXiv.

arXiv

(2024). EVScout2.0: Electric Vehicle Profiling through Charging Profile. ACM Transactions on Cyber-Physical Systems.

DOI

(2024). Can LLMs Understand Computer Networks? Towards a Virtual System Administrator. IEEE LCN 2024.

arXiv

(2024). Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs. ACM Transactions on Cyber-Physical Systems.

acm

(2024). CANLP: NLP-Based Intrusion Detection System for CAN. ACM SAC 2024.

(2023). If You're Scanning This, It's Too Late! A QR Code-Based Fuzzing Methodology to Identify Input Vulnerabilities in Mobile Apps. Applied Cryptography and Network Security Workshops.

DOI

(2022). Hyperloop: A Cybersecurity Perspective. ACSW Workshop (in conjuction with IEEE EuroS&P).

arXiv

(2022). EVExchange: A Relay Attack on~Electric Vehicle Charging System. Computer Security – ESORICS 2022.

DOI

(2021). MiniV2G: An Electric Vehicle Charging Emulator. Proceedings of the 7th ACM on Cyber-Physical System Security Workshop.

DOI

(2021). A Survey on Industrial Control System Testbeds and Datasets for Security Research. IEEE Communications Surveys & Tutorials.

DOI arXiv