Skip to main content

European Network for Cyber-security

Deliverables

Intermediate results of WP3

Intermediate results of WP3

Final results of WP4

Final results of WP4

Final results of WP5

Final results of WP5

Progress report

Progress report

Intermediate results of WP5

Intermediate results of WP5

Supervisory Board of the network

Supervisory Board of the network

Final results of WP3

Final results of WP3

Intermediate training activities report

Intermediate training activities report

Ethics

submit report when necessary

Intermediate results of WP4

Intermediate results of WP4

Draft periodic report

Draft periodic report

Intermediate dissemination and exploitation report

Intermediate dissemination and exploitation report

Final training activities report

Final training activities report

Final dissemination and exploitation report

Final dissemination and exploitation report

Mid Term review meeting

Mid Term review meeting

Searching for OpenAIRE data...

Publications

Trust Validation of Cloud IaaS: A Customer-centric Approach

Author(s): Salman Manzoor, Ahmed Taha, Neeraj Suri
Published in: 2016 IEEE Trustcom/BigDataSE/ISPA, 2016, Page(s) 97-104
DOI: 10.1109/TrustCom.2016.0051

A Trust-by-Design Framework for the Internet of Things

Author(s): Davide Ferraris, Carmen Fernandez-Gago, Javier Lopez
Published in: 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2018, Page(s) 1-4
DOI: 10.1109/ntms.2018.8328674

A Segregated Architecture for a Trust-based Network of Internet of Things

Author(s): Davide Ferraris, Carmen Fernandez-Gago, Joshua Daniel, Javier Lopez
Published in: 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), 2019, Page(s) 1-6
DOI: 10.1109/ccnc.2019.8651703

InfoLeak: Scheduling-Based Information Leakage

Author(s): Tsvetoslava Vateva-Gurova, Salman Manzoor, Yennun Huang, Neeraj Suri
Published in: 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), 2018, Page(s) 44-53
DOI: 10.1109/prdc.2018.00015

Threat Modeling and Analysis for the Cloud Ecosystem

Author(s): Salman Manzoor, Heng Zhang, Neeraj Suri
Published in: 2018 IEEE International Conference on Cloud Engineering (IC2E), 2018, Page(s) 278-281
DOI: 10.1109/ic2e.2018.00056

Monitoring Path Discovery for Supporting Indirect Monitoring of Cloud Services

Author(s): Heng Zhang, Salman Manzoor, Neeraj Suri
Published in: 2018 IEEE International Conference on Cloud Engineering (IC2E), 2018, Page(s) 274-277
DOI: 10.1109/ic2e.2018.00055

Enhancing Usage Control for Performance: A Proposal for Systems of Systems (Research Poster)

Author(s): Vasileios Gkioulos, Athanasios Rizos, Christina Michailidou, Fabio Martinelli, Paolo Mori
Published in: 2018 International Conference on High Performance Computing & Simulation (HPCS), 2018, Page(s) 1061-1062
DOI: 10.1109/hpcs.2018.00169

Managing QoS in Smart Buildings Through Software Defined Network and Usage Control

Author(s): Fabio Martinelli, Christina Michailidou, Paolo Mori, Andrea Saracino
Published in: 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 2019, Page(s) 626-632
DOI: 10.1109/percomw.2019.8730751

Cyber Insurance and Security Interdependence: Friends or Foes?

Author(s): Ganbayar Uuganbayar, Artsiom Yautsiukhin, Fabio Martinelli
Published in: 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 2018, Page(s) 1-4
DOI: 10.1109/cybersa.2018.8551447

Cyber Insurance and Time-to-Compromise: An Integrated Approach

Author(s): Ganbayar Uuganbayar, Fabio Massacci, Artsiom Yautsiukhin, Fabio Martinelli
Published in: 2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 2019, Page(s) 1-8
DOI: 10.1109/cybersa.2019.8899442

Too Long, did not Enforce - A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed Environments

Author(s): Fabio Martinelli, Christina Michailidou, Paolo Mori, Andrea Saracino
Published in: Proceedings of the 4th ACM Workshop on Cyber-Physical System Security - CPSS '18, 2018, Page(s) 27-37
DOI: 10.1145/3198458.3198463

Phylogenetic Analysis for Ransomware Detection and Classification into Families

Author(s): Fabio Martinelli, Francesco Mercaldo, Christina Michailidou, Andrea Saracino
Published in: 15th International Joint Conference on e-Business and Telecommunications (ICETE), SECRYPT 2018, 2018

Exploiting Digital DNA for the Analysis of Similarities in Twitter Behaviours

Author(s): Stefano Cresci, Roberto di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi
Published in: 2017 IEEE International Conference on Data Science and Advanced Analytics (DSAA), 2017, Page(s) 686-695
DOI: 10.1109/dsaa.2017.57

Six Things I Hate About You (in Italian) and Six Classification Strategies to More and More Effectively Find Them

Author(s): Tiziano Fagni, Leonardo Nizzoli, Marinella Petrocchi, Maurizio Tesconi
Published in: 2019

From Reaction to Proaction - Unexplored Ways to the Detection of Evolving Spambots

Author(s): Stefano Cresci, Marinella Petrocchi, Angelo Spognardi, Stefano Tognazzi
Published in: Companion of the The Web Conference 2018 on The Web Conference 2018 - WWW '18, 2018, Page(s) 1469-1470
DOI: 10.1145/3184558.3191595

Towards automatic translation of social network policies into controlled natural language

Author(s): Irfan Khan Tanoli, Marinella Petrocchi, Rocco De Nicola
Published in: 2018 12th International Conference on Research Challenges in Information Science (RCIS), 2018, Page(s) 1-12
DOI: 10.1109/rcis.2018.8406683

Mining Implicit Data Association from Tripadvisor Hotel Reviews

Author(s): Vittoria Cozza, Marinella Petrocchi, Angelo Spognardi
Published in: 2018

Contrasting Fake Reviews in TripAdvisor

Author(s): Francesco Buccafurri, Michela Fazzolari, Gianluca Lax, Marinella Petrocchi
Published in: SEBD 2018, 2018

Social Network Polluting Contents Detection through Deep Learning Techniques

Author(s): Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Published in: 2019 International Joint Conference on Neural Networks (IJCNN), 2019, Page(s) 1-10
DOI: 10.1109/ijcnn.2019.8852080

Cascade Learning for Mobile Malware Families Detection through Quality and Android Metrics

Author(s): Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Published in: 2019 International Joint Conference on Neural Networks (IJCNN), 2019, Page(s) 1-10
DOI: 10.1109/ijcnn.2019.8852268

Investigating Mobile Applications Quality in Official and Third-party Marketplaces

Author(s): Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Published in: Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering, 2019, Page(s) 169-178
DOI: 10.5220/0007757601690178

Wearable Devices for Human Activity Recognition and User Detection

Author(s): Giovanni Capobianco, Umberto Di Giacomo, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Published in: 2019 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), 2019, Page(s) 365-372
DOI: 10.1109/empdp.2019.8671636

Measuring Mobile Applications Quality and Security in Higher Education

Author(s): Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Published in: 2018 IEEE International Conference on Big Data (Big Data), 2018, Page(s) 5319-5321
DOI: 10.1109/bigdata.2018.8622339

A Data Life Cycle Modeling Proposal by Means of Formal Methods

Author(s): Madalina G. Ciobanu, Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Published in: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security - Asia CCS '19, 2019, Page(s) 670-672
DOI: 10.1145/3321705.3331003

Spyware Detection using Temporal Logic

Author(s): Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Published in: Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019, Page(s) 690-699
DOI: 10.5220/0007704806900699

Cluster Analysis for Driver Aggressiveness Identification

Author(s): Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Albina Orlando, Antonella Santone
Published in: Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018, Page(s) 562-569
DOI: 10.5220/0006755205620569

Context-Awareness Mobile Devices for Traffic Incident Prevention

Author(s): Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Albina Orlando, Antonella Santone
Published in: 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 2018, Page(s) 143-148
DOI: 10.1109/percomw.2018.8480213

Who’s Driving My Car? A Machine Learning based Approach to Driver Identification

Author(s): Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Albina Orlando, Antonella Santone
Published in: Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018, Page(s) 367-372
DOI: 10.5220/0006633403670372

VizMal: A Visualization Tool for Analyzing the Behavior of Android Malware

Author(s): Alessandro Bacci, Fabio Martinelli, Eric Medvet, Francesco Mercaldo
Published in: Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018, Page(s) 517-525
DOI: 10.5220/0006665005170525

A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware

Author(s): Mario Faiella, Antonio La Marra, Fabio Martinelli, Francesco Mercaldo, Andrea Saracino, Mina Sheikhalishahi
Published in: 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP), 2017, Page(s) 321-328
DOI: 10.1109/pdp.2017.99

Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis

Author(s): Alessandro Bacci, Alberto Bartoli, Fabio Martinelli, Eric Medvet, Francesco Mercaldo, Corrado Aaron Visaggio
Published in: Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018, Page(s) 379-385
DOI: 10.5220/0006642503790385

Improving Vehicle Safety Through a Fog Collaborative Infrastructure

Author(s): Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci, Francesco Mercaldo
Published in: 2018 IEEE International Conference on Smart Computing (SMARTCOMP), 2018, Page(s) 446-451
DOI: 10.1109/smartcomp.2018.00044

Identifying Insecure Features in Android Applications using Model Checking

Author(s): Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone
Published in: Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018, Page(s) 589-596
DOI: 10.5220/0006758105890596

A fuzzy-based process mining approach for dynamic malware detection

Author(s): Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Published in: 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 2017, Page(s) 1-8
DOI: 10.1109/fuzz-ieee.2017.8015490

A time series classification approach to game bot detection

Author(s): Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Published in: Proceedings of the 7th International Conference on Web Intelligence, Mining and Semantics - WIMS '17, 2017, Page(s) 1-11
DOI: 10.1145/3102254.3102263

How Discover a Malware using Model Checking

Author(s): Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Published in: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, 2017, Page(s) 902-904
DOI: 10.1145/3052973.3055157

Game Bot Detection in Online Role Player Game through Behavioural Features

Author(s): Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Published in: Proceedings of the 12th International Conference on Software Technologies, 2017, Page(s) 50-60
DOI: 10.5220/0006417000500060

Car hacking identification through fuzzy logic algorithms

Author(s): Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Published in: 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 2017, Page(s) 1-7
DOI: 10.1109/fuzz-ieee.2017.8015464

BRIDEMAID - An Hybrid Tool for Accurate Detection of Android Malware

Author(s): Fabio Martinelli, Francesco Mercaldo, Andrea Saracino
Published in: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, 2017, Page(s) 899-901
DOI: 10.1145/3052973.3055156

Formal Methods Meet Mobile Code Obfuscation Identification of Code Reordering Technique

Author(s): Aniello Cimitile, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Published in: 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2017, Page(s) 263-268
DOI: 10.1109/wetice.2017.23

Mobile Silent and Continuous Authentication using Apps Sequence

Author(s): Gerardo Canfora, Giovanni Cappabianca, Pasquale Carangelo, Fabio Martinelli, Francesco Mercaldo, Ernesto Rosario Russo, Corrado Aaron Visaggio
Published in: Proceedings of the 14th International Joint Conference on e-Business and Telecommunications, 2017, Page(s) 79-91
DOI: 10.5220/0006424200790091

Model Checking for Mobile Android Malware Evolution

Author(s): Aniello Cimitile, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Gigliola Vaglini
Published in: 2017 IEEE/ACM 5th International FME Workshop on Formal Methods in Software Engineering (FormaliSE), 2017, Page(s) 24-30
DOI: 10.1109/formalise.2017.4

R-PackDroid - API package-based characterization and detection of mobile ransomware

Author(s): Davide Maiorca, Francesco Mercaldo, Giorgio Giacinto, Corrado Aaron Visaggio, Fabio Martinelli
Published in: Proceedings of the Symposium on Applied Computing - SAC '17, 2017, Page(s) 1718-1723
DOI: 10.1145/3019612.3019793

Identifying Mobile Repackaged Applications through Formal Methods

Author(s): Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio
Published in: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Page(s) 673-682
DOI: 10.5220/0006287906730682

Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment

Author(s): Aniello Cimitile, Fabio Martinelli, Francesco Mercaldo
Published in: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Page(s) 487-492
DOI: 10.5220/0006217304870492

Tor traffic analysis and detection via machine learning techniques

Author(s): Alfredo Cuzzocrea, Fabio Martinelli, Francesco Mercaldo, Gianni Vercelli
Published in: 2017 IEEE International Conference on Big Data (Big Data), 2017, Page(s) 4474-4480
DOI: 10.1109/bigdata.2017.8258487

Twinkle twinkle little DroidDream, How I wonder what you are?

Author(s): Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Published in: 2017 IEEE International Workshop on Metrology for AeroSpace (MetroAeroSpace), 2017, Page(s) 21-25
DOI: 10.1109/metroaerospace.2017.7999579

An Analysis of Trust in Smart Home Devices

Author(s): Davide Ferraris, Daniel Bastos, Carmen Fernandez-Gago, Fadi El-Moussa, Javier Lopez
Published in: The 20th World Conference on Information Security Applications (WISA Workshop 2019), 2019

A Perspective Study Towards Biometric-based Rider Authentication Schemes For Driverless Taxis

Author(s): Sandeep Gupta, Bruno Crispo
Published in: 2019 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), 2019, Page(s) 1-6
DOI: 10.1109/3ict.2019.8910310

An architecture for privacy-preserving sharing of CTI with 3 rd party analysis services

Author(s): Fabio Giubilo, Ali Sajjad, Mark Shackleton, David W. Chadwick, Wenjun Fan, Rogerio de Lemos
Published in: 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), 2017, Page(s) 293-297
DOI: 10.23919/icitst.2017.8356404

Building Taxonomies based on Human-Machine Teaming - Cyber Security as an Example

Author(s): Mohamad Imad Mahaini, Shujun Li, Rahime Belen Sağlam
Published in: Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19, 2019, Page(s) 1-9
DOI: 10.1145/3339252.3339282

Cloud for IoT - a Survey of Technologies and Security features of Public Cloud IoT solutions

Author(s): D. Bastos
Published in: Living in the Internet of Things (IoT 2019), 2019, Page(s) 43 (6 pp.)-43 (6 pp.)
DOI: 10.1049/cp.2019.0168

Distributed UCON in CoAP and MQTT Protocols

Author(s): Athanasios Rizos, Daniel Bastos, Andrea Saracino, Fabio Martinelli
Published in: 5th Workshop On The Security Of Industrial Control Systems & Of Cyber-Physical Systems (CyberICPS 2019), 2019

DIALERAUTH - A Motion-assisted Touch-based Smartphone User Authentication Scheme

Author(s): Attaullah Buriro, Bruno Crispo, Sandeep Gupta, Filippo Del Frari
Published in: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy - CODASPY '18, 2018, Page(s) 267-276
DOI: 10.1145/3176258.3176318

Extended Reality in IoT scenarios: Concepts, Applications and Future Trends

Author(s): Tiago Andrade, Daniel Bastos
Published in: 2019 5th Experiment International Conference (exp.at'19), 2019, Page(s) 107-112
DOI: 10.1109/expat.2019.8876559

Enriching Threat Intelligence Platforms Capabilities

Author(s): Mario Faiella, Gustavo Gonzalez-Granadillo, Ibéria Medeiros, Rui Azevedo, Susana Gonzalez-Zarzosa
Published in: Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019, Page(s) 37-48
DOI: 10.5220/0007830400370048

Enhancing Information Sharing and Visualization Capabilities in Security Data Analytic Platforms

Author(s): Gustavo Gonzalez-Granadillo, Mario Faiella, Iberia Medeiros, Rui Azevedo, Susana Gonzalez-Zarzosa
Published in: 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), 2019, Page(s) 1-8
DOI: 10.1109/dsn-w.2019.00009

GDPR Privacy Implication for the Internet of Things

Author(s): Daniel Bastos, Fabio Giubilo, Mark Shackleton, Fadi El-Moussa
Published in: 4th Annual IoT Security Foundation Conference, 2018

Risks of Sharing Cyber Incident Information

Author(s): Adham Albakri, Eerke Boiten, Rogério De Lemos
Published in: Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES 2018, 2018, Page(s) 1-10
DOI: 10.1145/3230833.3233284

Towards an Enhanced Security Data Analytic Platform

Author(s): Gustavo Gonzalez-Granadillo, Susana Gonzalez-Zarzosa, Mario Faiella
Published in: Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018, Page(s) 619-624
DOI: 10.5220/0006831106190624

SmartHandle - A Novel Behavioral Biometric-based Authentication Scheme for Smart Lock Systems

Author(s): Sandeep Gupta, Attaullah Buriro, Bruno Crispo
Published in: Proceedings of the 2019 3rd International Conference on Biometric Engineering and Applications - ICBEA 2019, 2019, Page(s) 15-22
DOI: 10.1145/3345336.3345344

Internet of Things: A Survey of Technologies and Security Risks in Smart Home and City Environments

Author(s): D. Bastos, M. Shackleton, F. El-Moussa
Published in: Living in the Internet of Things: Cybersecurity of the IoT - 2018, 2018, Page(s) 30 (7 pp.)-30 (7 pp.)
DOI: 10.1049/cp.2018.0030

From MinX to MinC: semantics-driven decompilation of recursive datatypes

Author(s): Ed Robbins, Andy King, Tom Schrijvers
Published in: Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages - POPL 2016, 2016, Page(s) 191-203
DOI: 10.1145/2837614.2837633

Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication

Author(s): Attaullah Buriro, Bruno Crispo, Filippo Delfrari, Konrad Wrona
Published in: 2016 IEEE Security and Privacy Workshops (SPW), 2016, Page(s) 276-285
DOI: 10.1109/spw.2016.20

Exploiting Vehicles’ Reputation to Mitigate DoS Attack

Author(s): Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci
Published in: Proceedings of the International Workshop on domAin specific Model-based AppRoaches to vErificaTion and validaTiOn, 2016, Page(s) 75-82
DOI: 10.5220/0005844500750082

Concurrent History-based Usage Control Policies

Author(s): Fabio Martinelli, Ilaria Matteucci, Paolo Mori, Andrea Saracino
Published in: Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017, Page(s) 657-666
DOI: 10.5220/0006232506570666

Security by Insurance for Services

Author(s): Fabio Martinelli, Artsiom Yautsiukhin
Published in: 2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), 2016, Page(s) 344-351
DOI: 10.1109/qrs-c.2016.53

AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces

Author(s): Salman Manzoor, Jesus Luna and Neeraj Suri
Published in: Proc. of IEEE Services Computing (SCC), 2017, 2017, Page(s) 499-502
DOI: 10.1109/SCC.2017.74

SLA-based Service Selection for Multi-Cloud Environments

Author(s): Ahmed Taha, Salman Manzoor and Neeraj Suri
Published in: Proc. of IEEE EDGE Computing (EGDE), 2017, 2017, Page(s) 65-72
DOI: 10.1109/IEEE.EDGE.2017.17

Mobile biometrics: Towards a comprehensive evaluation methodology

Author(s): Attaullah Buriro, Zahid Akhtar, Bruno Crispo, Sandeep Gupta
Published in: 2017 International Carnahan Conference on Security Technology (ICCST), 2017, Page(s) 1-6
DOI: 10.1109/ccst.2017.8167859

Evaluation of Motion-based Touch-typing Biometrics in Online Financial Environments

Author(s): Attaullah Buriro, Sandeep Gupta, and Bruno Crispo
Published in: BIOSIG 2017, 2017

A model specification for the design of trust negotiations

Author(s): Martin Kolar, Carmen Fernandez-Gago, Javier Lopez
Published in: Computers & Security, Issue 84, 2019, Page(s) 288-300, ISSN 0167-4048
DOI: 10.1016/j.cose.2019.03.024

TrUStAPIS: a trust requirements elicitation method for IoT

Author(s): Davide Ferraris, Carmen Fernandez-Gago
Published in: International Journal of Information Security, 2019, ISSN 1615-5262
DOI: 10.1007/s10207-019-00438-x

Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges

Author(s): Rodrigo Roman, Javier Lopez, Masahiro Mambo
Published in: Future Generation Computer Systems, Issue 78, 2018, Page(s) 680-698, ISSN 0167-739X
DOI: 10.1016/j.future.2016.11.009

A Cyber-Physical Systems-Based Checkpoint Model for Structural Controllability

Author(s): Cristina Alcaraz, Javier Lopez
Published in: IEEE Systems Journal, Issue 12/4, 2018, Page(s) 3543-3554, ISSN 1932-8184
DOI: 10.1109/jsyst.2017.2740719

Modelling privacy-aware trust negotiations

Author(s): Ruben Rios, Carmen Fernandez-Gago, Javier Lopez
Published in: Computers & Security, Issue 77, 2018, Page(s) 773-789, ISSN 0167-4048
DOI: 10.1016/j.cose.2017.09.015

Resilient interconnection in cyber-physical control systems

Author(s): Cristina Alcaraz, Javier Lopez, Kim-Kwang Raymond Choo
Published in: Computers & Security, Issue 71, 2017, Page(s) 2-14, ISSN 0167-4048
DOI: 10.1016/j.cose.2017.03.004

Resilient industrial control systems based on multiple redundancy

Author(s): Cristina Alcaraz
Published in: International Journal of Critical Infrastructures, Issue 13/2/3, 2017, Page(s) 278, ISSN 1475-3219
DOI: 10.1504/ijcis.2017.10009287

A scheme for the sticky policy representation supporting secure cyber-threat intelligence analysis and sharing

Author(s): Oleksii Osliak, Andrea Saracino, Fabio Martinelli
Published in: Information & Computer Security, Issue 26/5, 2019, Page(s) 687-710, ISSN 2056-4961
DOI: 10.1108/ics-01-2019-0011

On the capability of evolved spambots to evade detection via genetic engineering

Author(s): Stefano Cresci, Marinella Petrocchi, Angelo Spognardi, Stefano Tognazzi
Published in: Online Social Networks and Media, Issue 9, 2019, Page(s) 1-16, ISSN 2468-6964
DOI: 10.1016/j.osnem.2018.10.005

A Study on Text-Score Disagreement in Online Reviews

Author(s): Michela Fazzolari, Vittoria Cozza, Marinella Petrocchi, Angelo Spognardi
Published in: Cognitive Computation, Issue 9/5, 2017, Page(s) 689-701, ISSN 1866-9956
DOI: 10.1007/s12559-017-9496-y

Social fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling

Author(s): Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi
Published in: IEEE Transactions on Dependable and Secure Computing, 2018, Page(s) 1-1, ISSN 1545-5971
DOI: 10.1109/tdsc.2017.2681672

Risk analysis of Android applications: A user-centric solution

Author(s): Gianluca Dini, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Andrea Saracino, Daniele Sgandurra
Published in: Future Generation Computer Systems, Issue 80, 2018, Page(s) 505-518, ISSN 0167-739X
DOI: 10.1016/j.future.2016.05.035

On the effectiveness of system API-related information for Android ransomware detection

Author(s): Michele Scalas, Davide Maiorca, Francesco Mercaldo, Corrado Aaron Visaggio, Fabio Martinelli, Giorgio Giacinto
Published in: Computers & Security, Issue 86, 2019, Page(s) 168-182, ISSN 0167-4048
DOI: 10.1016/j.cose.2019.06.004

Dynamic malware detection and phylogeny analysis using process mining

Author(s): Mario Luca Bernardi, Marta Cimitile, Damiano Distante, Fabio Martinelli, Francesco Mercaldo
Published in: International Journal of Information Security, Issue 18/3, 2019, Page(s) 257-284, ISSN 1615-5262
DOI: 10.1007/s10207-018-0415-3

A “pay-how-you-drive” car insurance approach through cluster analysis

Author(s): Maria Francesca Carfora, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Albina Orlando, Antonella Santone, Gigliola Vaglini
Published in: Soft Computing, Issue May 2019, Volume 23, Issue 9, 2018, Page(s) 2863–2875, ISSN 1432-7643
DOI: 10.1007/s00500-018-3274-y

An exploratory study on the evolution of Android malware quality

Author(s): Francesco Mercaldo, Andrea Di Sorbo, Corrado Aaron Visaggio, Aniello Cimitile, Fabio Martinelli
Published in: Journal of Software: Evolution and Process, Issue 30/11, 2018, Page(s) e1978, ISSN 2047-7473
DOI: 10.1002/smr.1978

Driver and Path Detection through Time-Series Classification

Author(s): Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Published in: Journal of Advanced Transportation, Issue 2018, 2018, Page(s) 1-20, ISSN 0197-6729
DOI: 10.1155/2018/1758731

LEILA: formaL tool for idEntifying mobIle maLicious behAviour

Author(s): Gerardo Canfora, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio
Published in: IEEE Transactions on Software Engineering, 2018, Page(s) 1-1, ISSN 0098-5589
DOI: 10.1109/tse.2018.2834344

Evaluating model checking for cyber threats code obfuscation identification

Author(s): Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Arun Kumar Sangaiah, Aniello Cimitile
Published in: Journal of Parallel and Distributed Computing, Issue 119, 2018, Page(s) 203-218, ISSN 0743-7315
DOI: 10.1016/j.jpdc.2018.04.008

Talos: no more ransomware victims with formal methods

Author(s): Aniello Cimitile, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio
Published in: International Journal of Information Security, Issue 17/6, 2018, Page(s) 719-738, ISSN 1615-5262
DOI: 10.1007/s10207-017-0398-5

Human behavior characterization for driving style recognition in vehicle system

Author(s): Fabio Martinelli, Francesco Mercaldo, Albina Orlando, Vittoria Nardone, Antonella Santone, Arun Kumar Sangaiah
Published in: Computers & Electrical Engineering, 2018, ISSN 0045-7906
DOI: 10.1016/j.compeleceng.2017.12.050

Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access

Author(s): Sandeep Gupta, Attaullah Buriro, Bruno Crispo
Published in: Mobile Information Systems, Issue 2018, 2018, Page(s) 1-16, ISSN 1574-017X
DOI: 10.1155/2018/2649598

DriverAuth: A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms

Author(s): Sandeep Gupta, Attaullah Buriro, Bruno Crispo
Published in: Computers & Security, Issue 83, 2019, Page(s) 122-139, ISSN 0167-4048
DOI: 10.1016/j.cose.2019.01.007

DriverAuth: Behavioral biometric-based driver authentication mechanism for on-demand ride and ridesharing infrastructure

Author(s): Sandeep Gupta, Attaullah Buriro, Bruno Crispo
Published in: ICT Express, Issue 5/1, 2019, Page(s) 16-20, ISSN 2405-9595
DOI: 10.1016/j.icte.2018.01.010

Mac-A-Mal: macOS malware analysis framework resistant to anti evasion techniques

Author(s): Duy-Phuc Pham, Duc-Ly Vu, Fabio Massacci
Published in: Journal of Computer Virology and Hacking Techniques, 2019, ISSN 2263-8733
DOI: 10.1007/s11416-019-00335-w

Usage Control on Cloud systems

Author(s): Enrico Carniani, Davide D’Arenzo, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori
Published in: Future Generation Computer Systems, Issue 63, 2016, Page(s) 37-55, ISSN 0167-739X
DOI: 10.1016/j.future.2016.04.010

Cyber-insurance survey

Author(s): Angelica Marotta, Fabio Martinelli, Stefano Nanni, Albina Orlando, Artsiom Yautsiukhin
Published in: Computer Science Review, Issue 24, 2017, Page(s) 35-61, ISSN 1574-0137
DOI: 10.1016/j.cosrev.2017.01.001

Stateful Data Usage Control for Android Mobile Devices

Author(s): Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori, Andrea Saracino
Published in: International Journal of Information Security, Issue 16/4, 2017, Page(s) 345-369, ISSN 1615-5262
DOI: 10.1007/s10207-016-0336-y

Policy Languages and Their Suitability for Trust Negotiation

Author(s): Martin Kolar, Carmen Fernandez-Gago, Javier Lopez
Published in: Data and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16–18, 2018, Proceedings, Issue 10980, 2018, Page(s) 69-84
DOI: 10.1007/978-3-319-95729-6_5

Selecting Privacy Solutions to Prioritise Control in Smart Metering Systems

Author(s): Juan E. Rubio, Cristina Alcaraz, Javier Lopez
Published in: Critical Information Infrastructures Security, Issue 10242, 2017, Page(s) 176-188
DOI: 10.1007/978-3-319-71368-7_15

Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level

Author(s): Tsvetoslava Vateva-Gurova, Salman Manzoor, Ruben Trapero, Neeraj Suri
Published in: Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers, Issue 11398, 2019, Page(s) 27-38
DOI: 10.1007/978-3-030-12085-6_3

Threat Modeling the Cloud: An Ontology Based Approach

Author(s): Salman Manzoor, Tsvetoslava Vateva-Gurova, Ruben Trapero, Neeraj Suri
Published in: Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers, Issue 11398, 2019, Page(s) 61-72
DOI: 10.1007/978-3-030-12085-6_6

Using IFTTT to Express and Enforce UCON Obligations

Author(s): Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino
Published in: Information Security Practice and Experience - 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings, Issue 11879, 2019, Page(s) 213-231
DOI: 10.1007/978-3-030-34339-2_12

Enhancing Usage Control for Performance: An Architecture for Systems of Systems

Author(s): Vasileios Gkioulos, Athanasios Rizos, Christina Michailidou, Paolo Mori, Andrea Saracino
Published in: Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers, Issue 11387, 2019, Page(s) 69-84
DOI: 10.1007/978-3-030-12786-2_5

Optimal Security Configuration for Cyber Insurance

Author(s): Fabio Martinelli, Ganbayar Uuganbayar, Artsiom Yautsiukhin
Published in: ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings, Issue 529, 2018, Page(s) 187-200
DOI: 10.1007/978-3-319-99828-2_14

Improving MQTT by Inclusion of Usage Control

Author(s): Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino
Published in: Security, Privacy, and Anonymity in Computation, Communication, and Storage, Issue 10656, 2017, Page(s) 545-560
DOI: 10.1007/978-3-319-72389-1_43

Towards General Scheme for Data Sharing Agreements Empowering Privacy-Preserving Data Analysis of Structured CTI

Author(s): Fabio Martinelli, Oleksii Osliak, Andrea Saracino
Published in: Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers, Issue 11387, 2019, Page(s) 192-212
DOI: 10.1007/978-3-030-12786-2_12

Mining Worse and Better Opinions

Author(s): Michela Fazzolari, Marinella Petrocchi, Alessandro Tommasi, Cesare Zavattari
Published in: Web Engineering, Issue 10360, 2017, Page(s) 494-506
DOI: 10.1007/978-3-319-60131-1_35

Transparency in Keyword Faceted Search: An Investigation on Google Shopping

Author(s): Vittoria Cozza, Van Tien Hoang, Marinella Petrocchi, Rocco De Nicola
Published in: Digital Libraries: Supporting Open Science - 15th Italian Research Conference on Digital Libraries, IRCDL 2019, Pisa, Italy, January 31 – February 1, 2019, Proceedings, Issue 988, 2019, Page(s) 29-43
DOI: 10.1007/978-3-030-11226-4_3

Cyber Risk Management: A New Challenge for Actuarial Mathematics

Author(s): Maria Francesca Carfora, Fabio Martinelli, Francesco Mercaldo, Albina Orlando, Artsiom Yautsiukhin
Published in: Mathematical and Statistical Methods for Actuarial Sciences and Finance - MAF 2018, 2018, Page(s) 199-202
DOI: 10.1007/978-3-319-89824-7_36

Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection

Author(s): Alberto Ferrante, Miroslaw Malek, Fabio Martinelli, Francesco Mercaldo, Jelena Milosevic
Published in: Foundations and Practice of Security, Issue 10723, 2018, Page(s) 242-258
DOI: 10.1007/978-3-319-75650-9_16

A Risk-Driven Model to Minimize the Effects of Human Factors on Smart Devices

Author(s): Sandeep Gupta, Attaullah Buriro, Bruno Crispo
Published in: Emerging Technologies for Authorization and Authentication - Second International Workshop, ETAA 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings, Issue 11967, 2020, Page(s) 156-170
DOI: 10.1007/978-3-030-39749-4_10

Sharing Cyber Threat Intelligence Under the General Data Protection Regulation

Author(s): Adham Albakri, Eerke Boiten, Rogério De Lemos
Published in: Privacy Technologies and Policy - 7th Annual Privacy Forum, APF 2019, Rome, Italy, June 13–14, 2019, Proceedings, Issue 11498, 2019, Page(s) 28-41
DOI: 10.1007/978-3-030-21752-5_3

SnapAuth: A Gesture-Based Unobtrusive Smartwatch User Authentication Scheme

Author(s): Attaullah Buriro, Bruno Crispo, Mojtaba Eskandri, Sandeep Gupta, Athar Mahboob, Rutger Van Acker
Published in: Emerging Technologies for Authorization and Authentication - First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedings, Issue 11263, 2018, Page(s) 30-37
DOI: 10.1007/978-3-030-04372-8_3

A Formal and Run-Time Framework for the Adaptation of Local Behaviours to Match a Global Property

Author(s): Stefano Bistarelli, Fabio Martinelli, Ilaria Matteucci, Francesco Santini
Published in: Formal Aspects of Component Software - 13th International Conference, FACS 2016, Besançon, France, October 19-21, 2016, Revised Selected Papers, Issue 10231, 2017, Page(s) 134-152
DOI: 10.1007/978-3-319-57666-4_9

Enforcement of U-XACML History-Based Usage Control Policy

Author(s): Fabio Martinelli, Ilaria Matteucci, Paolo Mori, Andrea Saracino
Published in: Security and Trust Management - 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings, Issue 9871, 2016, Page(s) 64-81
DOI: 10.1007/978-3-319-46598-2_5

Preventing the Drop in Security Investments for Non-competitive Cyber-Insurance Market

Author(s): Fabio Martinelli, Albina Orlando, Ganbayar Uuganbayar, Artsiom Yautsiukhin
Published in: Risks and Security of Internet and Systems, Issue 10694, 2018, Page(s) 159-174
DOI: 10.1007/978-3-319-76687-4_11

Introducing Usage Control in MQTT

Author(s): Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino
Published in: Computer Security, Issue 10683, 2018, Page(s) 35-43
DOI: 10.1007/978-3-319-72817-9_3

Estimating the Assessment Difficulty of CVSS Environmental Metrics: An Experiment

Author(s): Luca Allodi, Silvio Biagioni, Bruno Crispo, Katsiaryna Labunets, Fabio Massacci, Wagner Santos
Published in: Future Data and Security Engineering, Issue 10646, 2017, Page(s) 23-39
DOI: 10.1007/978-3-319-70004-5_2

Mal2Image- Hybrid Image Transformation for Malware Detection-paper

Author(s): Ly Vu Duc, Trong-Kha Nguyen, Tam. V. Nguyen , Phung. H. Phu, Fabio Massacci
Published in: International Symposium on Engineering Secure Software and Systems, 2018, 2018

Towards Explainable Machine Learning in Intrusion Detection Systems

Author(s): Chau D.M. Pham, Duc-Ly Vu, Fabio Massacci, Tran Khanh Dang, Sandro Etalle, Davide Fauri
Published in: International Symposium on Engineering Secure Software and Systems, 2018, 2018