MEDIA
Company Profile
Download the Company Profile BV TECH.
Communication
Contact the communications office: comunicazionebvtech@bvtech.com
Publications
FROG: a Firewall Rule Order Generator for faster packet filtering
Authors: Antonio Coscia, Antonio Maci, Nicola Tamma
Magazine: Computer Networks Volume 257
BV TECH + MIT: Employing Board Cyber-Risk Management Collaborative Game Under Condition Of Uncertainty
Authors: Tony Delvecchio and Giancarlo De Bernardis, Sander Zeijlemaker and Michael Siegel
Journal: Springer – Communications in Computer and Information Science
PROGESI: a PROxy Grammar to Enhance web application firewall for SQL Injection prevention.
Authors: Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo
Magazine: IEEE Access
SINNER: A Reward-Sensitive Algorithm for Imbalanced Malware Classification Using Neural Networks with Experience Replay
Authors: Antonio Coscia, Andrea Iannacone, Antonio Maci, Alessandro Stamerra
Magazine: Volume 15, Issue 8
A comprehensive investigation of clustering algorithms for User and Entity Behavior Analytics
Authors: Pierpaolo Artioli, Antonio Maci, Alessio Magrì
Magazine: Big Data, 09 May 2024 Sec. Cybersecurity and Privacy
Volume 7 – 2024
Deep Q-Networks for Imbalanced Multi-Class Malware Classification.
Authors: Antonio Maci; Giuseppe Urbano, Antonio Coscia
Journal: Proceedings of the 10th International Conference on Information Systems Security and Privacy ICISSP – Volume 1
Revolutionizing Board Cyber-Risk Management Using Collaborative Gaming.
Authors: Tony Delvecchio, Sander Zeijlemaker, Giancarlo De Bernardis, Michael Siegel
Journal: Proceedings of the 10th International Conference on Information Systems Security and Privacy ICISSP – Volume 1
Deep Reinforcement Learning-based Malicious URL Detection with Feature Selection
Authors: Antonio Maci, Nicola Tamma, Antonio Coscia
Magazine: 2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC)
Automatic decision tree based NIDPS ruleset generation for DoS/DDoS attacks
Authors: Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo
Journal: Journal of Information Security and Applications
A Reinforcement-Learning-based Agent to Discover Safety-Critical States in Smart Grid Environments.
Authors: Alessandro Santorsola, Antonio Maci, Piero Delvecchio, Antonio Coscia
Magazine: 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME)
An innovative two-stage algorithm to optimize Firewall rule ordering
Authors: Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo
Magazine: Computers Security
YAMME: a YAra-byte-signatures Metamorphic Mutation Engine.
Authors: Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo
Journal: IEEE Transactions on Information Forensics and Security
Unbalanced Web Phishing Classification through Deep Reinforcement Learning.
Authors: Antonio Maci, Alessandro Santorsola, Antonio Coscia, Andrea Iannacone
Magazine: Computers, Volume 12, Issue 6
A novel genetic algorithm approach for firewall policy
optimization
Authors: Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Donato Impedovo, Antonio Maci
Magazine: CEUR-WS.org/Paper 17
A study on malware detection and classification using the analysis of API calls sequences through shallow learning and recurrent neural networks
Authors: Angelo Cannarile, Francesco Carrera, Stefano Galantucci, Andrea Iannacone, Giuseppe Pirlo
Magazine: CEUR-WS.org/Paper 9
Reinforcement Learning Agents for Simulating Normal and Malicious Actions in Cyber Range Scenarios
Authors: Alessandro Santorsola, Aldo Migliau, Sabino Caporusso
Magazine: CEUR-WS.org/Paper 1
How to align cyber risk management with business needs
Authors: Sander Zeijlemaker, Michael Siegel, Daniel Goldsmith, Shaharyar Khan
Site: World Economic Forum
Comparing Deep Learning and Shallow Learning Techniques for API Calls Malware Prediction: A Study
Authors: Angelo Cannarile,Vincenzo Dentamaro,Stefano Galantucci, Andrea Iannacone,Donato Impedovo, Giuseppe Pirlo
Magazine: Appl. Sci., Volume 12, Issue 3
Combining Unsupervised Approaches for Near Real-Time Network Traffic Anomaly Detection
Authors: Francesco Carrera,Vincenzo Dentamaro,Stefano Galantucci, Andrea Iannacone,Donato Impedovo, Giuseppe Pirlo
Magazine: Appl. Sci., Volume 12, Issue 3
Cyber Range for Industrial Control Systems (CR-ICS) for Simulating Attack Scenarios.
Authors: Shaharyar Khan, Alberto Volpatto, Geet Kalra, Jonathan Esteban, Tommaso Pescanoce, Sabino Caporusso, Michael Siegel
Magazine: CEUR-WS.org/Paper 21
News
The “FROG” research report was published in volume 257 – 2/2025 of Computer Networks
12/12/2024
The 20 research reports produced to date within the activities provided for by the “Cybersecurity and SOC Product Suite” Programme Contract, published in scientific journals or presented at national and international conferences, have been exceeded.
The research report “FROG: a Firewall Rule Order Generator for faster packet filtering” has been accepted for Publication
2/12/2024
The research report “”FROG: a Firewall Rule Order Generator for faster packet filtering,” by colleagues Antonio Coscia, Antonio Maci and Nicola Tamma, has been accepted for publication in Computer Networks
Research report presentation at the 4th IEEE International Conference on AI in Cybersecurity
21/11/2024
The research report “MAGICIAN: Malware classification Approach through Generation Image using Conditional and wassersteIn generative Adversarial Network variants” has been accepted for presentation at the “4th IEEE International Conference on AI in Cybersecurity (ICAIC).”
BV TECH at the “10th Anniversary Meeting” of the CAMS consortium
29/10/2024
Michael Siegel outlined the main results of collaborative activities with BV TECH related to the integration of industrial control system modeling capabilities within the Cyber Range and the creation of a “serious gaming” platform aimed at improving understanding of the dynamics related to cybersecurity investments.
BV TECH, one of the research reports is among the most cited on MDPI
26/07/2024
The research paper “Comparing Deep Learning and Shallow Learning Techniques for API Calls Malware Prediction: A Study” by colleague Andrea Iannacone (with collaboration from the University of Bari) is among the most cited papers in the journal.
Research report presentation at “IEEE 2024”
25/07/2024
During the “IEEE 2024,” Alessandro Santorsola of the Grottaglie Cyber Lab presented the research report “Effect of Indoor Radio Propagation on Physical Layer Security Secrecy Key Generation”
BV TECH, a special mention from MDPI
05/07/2024
The article “Combining Unsupervised Approaches for Near Real-Time Network Traffic Anomaly Detection” by colleague Andrea Iannacone, with collaboration from theUniversity of Bari, was among the most cited articles in the journal.
BV TECH: two seminars organized at Uniba
03/06/2024
the research group of the CyberLab BV TECH in Grottaglie held two seminars at the University of Bari “Aldo Moro” on 5/28/2024 to illustrate the results of some of the research activities carried out.
BV TECH at the 3rd Annual CAMS Cybersecurity Innovation Symposium (CCIS)
22/05/2024
As part of the activities to disseminate the results of the research activities carried out by BV TECH within the Program Contract, BV TECH participated in the “3rd Annual CAMS Cybersecurity Innovation Symposium,” organized by the CAMS consortium, of which BV TECH is Founding Member, which was held in Cambridge, MA on May 15, 2024.
BV TECH in the CAMS newsletter
22/05/2024
The presentation of the research report “Revolutionizing Board Cyber-risk Management Using Collaborative Gaming,” conducted jointly with MIT, is also now in the newsletter “Cybersecurity” No.54 – Q1 2024 of the CAMS consortium of which BV TECH is Founding Member.
Gottaglie’s CyberLab at the Politecnico di Bari
20/05/2024
As part of the dissemination of the results of the research activities carried out by BV TECH within the Program Contract, on May 17, 2024, colleagues from the CyberLab in Grottaglie presented some of their achievements to students in the master’s degree programs in Computer Engineering and Telecommunications Engineering at Bari Polytechnic University.
BV TECH at ITASEC24, presented a new research report
17/04/2024
As part of the Scientific & Technical Session “AI for Cybersecurity,” the research report “Account Hijacking Detection with KATANA, a K-means Approach for Targeted user behavior ANAlysis” was presented, carried out as part of the research activities under the Program Contract “Cybersecurity Product Suite and SOC.”
10th International Conference on Information Systems Security and Privacy
20/03/2024
At the “10th International Conference on Information Systems Security and Privacy” – ICISSP 2024, BV TECH presented two research reports, carried out as part of the research activities under the Program Contract “Cybersecurity and SOC Product Suite.”
BV TECH At “International Conference on AI in Cybersecurity” – ICAIC-2024
10/03/2024
BV TECH presented the research report “Deep Reinforcement Learning-based Malicious URL Detection with Feature Selection”, carried out as part of the activities provided for by the Program Contract “Suite products Cybersecurity and SOC”.
BV TECH will be at the 10th edition of ICISSP 2024
01/02/2024
Two research reports developed under the Program Contract activities and with the collaboration of the Massachusetts Institute of Technology will be presented at the conference:
– “Deep Q-Networks for Imbalanced Multi-class Malware Classification.”
– “Revolutionizing board cyber-risk management using collaborative gaming.”
BV TECH at the University of Bari
18/12/2023
Our colleagues from the CyberLab in Grottaglie presented their work to the students of the master’s degree program in Computer Science, In the context of the dissemination actions of the results of the research activities carried out by BV TECH within the Program Contract,
BV TECH took part at the third edition of ICECCME
19/12/2023
BV TECH presented the results of scientific research developed as part of the activities under the Program Contract.
BV TECH presents the “ICTALIA” Project.
06/12/2023
The launch of the cybersecurity platform.
BV TECH meets the students of the University of Bari “Aldo Moro”
30/05/2023
At the University of Bari “Aldo Moro” was held a seminar entitled “IoC Analysis: Assessment of threats shared through the MISP platform”.
BV TECH: using advanced cybersecurity strategies based on AI techniques
25/05/2023
Presented one of the research topics addressed as part of project activities to students in the Master of Science in Computer Science program at the University of Bari “Aldo Moro.”
Sabino Caporusso at the microphones of ITASEC23
06/05/2023
BV TECH’s commitment to the evolution of national cybersecurity.
ITASEC23: BV TECH talks about its technologies aimed to support the defense of critical national infrastructure
06/05/2023
BV TECH is again platinum sponsor at ITASEC, the nation’s leading IT security conference.
Events
Cyberchallenge 2024
29/06/2024 – 30/06/2024
Turin
Cybersecurity for Digital Transformation
16/12/2021
Bari – Conference Room Cruise Terminal Port of Bari
ITASEC21
7/04/2021 – 9/04/2021
Rome
GROTTAGLIE:
Corso Europa, 3
74023 Grottaglie (TA)
Tel.: +39.02.8596171
Fax: +39.02.89093321
RUTIGLIANO:
S.P. 84 Adelfia-Rutigliano, C.da Caggiano
70018 Rutigliano (BA)
Tel.: +39.02.8596171
Fax: +39.02.89093321
Project funded by the European Regional Development Fund Puglia POR Puglia 2014 - 2020 - Axis I - Specific Objective 1a - Action 1.1 (R&D), and with the support of the University of Bari and the Massachusetts Institute of Technology (MIT).