Bessonov, K., Gadaleta, F., & Van Steen, K. (2017). Integration of Gene Expression and Methylation to unravel Biological Networks in Glioblastoma Patients. Genetic Epidemiology. doi:10.1002/gepi.22028 Peer Reviewed verified by ORBi |
Van Lishout, F., Gadaleta, F., Moore, J. H., Wehenkel, L., & Van Steen, K. (20 November 2015). gammaMAXT: a fast multiple-testing correction algorithm. BioData Mining, 8 (36). doi:10.1186/s13040-015-0069-x Peer Reviewed verified by ORBi |
Van Lishout, F., Gadaleta, F., Moore, J. H., Wehenkel, L., & Van Steen, K. (2014). gammaMAXT: a fast multiple-testing correction algorithm. In ERCIM 2014 Abstract Book (pp. 47). Peer reviewed |
Gadaleta, F., & Van Steen, K. (2014). Discovering main genetic interactions with LABNet LAsso-based network inference. PLoS ONE, 9 (11), 110451. doi:10.1371/journal.pone.0110451 Peer Reviewed verified by ORBi |
Gadaleta, F. (2013). Virtualisation-Based Security Countermeasures in Software Runtime Systems [Doctoral thesis, KU Leuven - Katholieke Universiteit Leuven]. ORBi-University of Liège. https://orbi.uliege.be/handle/2268/172363 |
Gadaleta, F., Strackx, R., Nikiforakis, N., Piessens, F., Joosen, W., Bellini, M., Brunst, P. W., & Jähnke, J. (2012). On the effectiveness of virtualization-based security. In IT Security, Freiburg (Germany), 07-10 May 2012. Max Planck Institute. Peer reviewed |
Gadaleta, F., Nikiforakis, N., Mühlberg, J. T., & Joosen, W. (2012). Hyperforce: hypervisor-enforced execution of security-critical code. In IFIP Advances in Information and Communication Technology. doi:10.1007/978-3-642-30436-1_11 Peer reviewed |
Gadaleta, F., Nikiforakis, N., Younan, Y., & Joosen, W. (2011). Hello rootKitty: A lightweight invariance-enforcing framework. In ISC Information Security Conference, Xi'an China, 2011. Springer. Peer reviewed |
Nikiforakis, N., Gadaleta, F., Younan, Y., & Joosen, W. (2010). On the privacy of file sharing services. (CW585). Department of Computer Science, K.U.Leuven. |
Gadaleta, F., Younan, Y., Joosen, W., Massacci, F., Wallach, D., & Zannone, N. (2010). Bubble: a Javascript engine level countermeasure against heap-spraying attacks. In Bubble: a Javascript engine level countermeasure against heap-spraying attacks. Springer Berlin. doi:10.1007/978-3-642-11747-3_1 Peer reviewed |
Gadaleta, F., Younan, Y., Jacobs, B., Joosen, W., De Neve, E., & Beosier, N. (2009). Instruction-level countermeasures against stack-based buffer overflow attacks. In VDTS '09 Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems. Francesco Gadaleta. Peer reviewed |