Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

European Network for Cyber-security

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Publications

Trust Validation of Cloud IaaS: A Customer-centric Approach (opens in new window)

Author(s): Salman Manzoor, Ahmed Taha, Neeraj Suri
Published in: 2016 IEEE Trustcom/BigDataSE/ISPA, 2016, Page(s) 97-104, ISBN 978-1-5090-3205-1
Publisher: IEEE
DOI: 10.1109/TrustCom.2016.0051

A Trust-by-Design Framework for the Internet of Things (opens in new window)

Author(s): Davide Ferraris, Carmen Fernandez-Gago, Javier Lopez
Published in: 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2018, Page(s) 1-4, ISBN 978-1-5386-3662-6
Publisher: IEEE
DOI: 10.1109/ntms.2018.8328674

A Segregated Architecture for a Trust-based Network of Internet of Things (opens in new window)

Author(s): Davide Ferraris, Carmen Fernandez-Gago, Joshua Daniel, Javier Lopez
Published in: 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), 2019, Page(s) 1-6, ISBN 978-1-5386-5553-5
Publisher: IEEE
DOI: 10.1109/ccnc.2019.8651703

InfoLeak: Scheduling-Based Information Leakage (opens in new window)

Author(s): Tsvetoslava Vateva-Gurova, Salman Manzoor, Yennun Huang, Neeraj Suri
Published in: 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), 2018, Page(s) 44-53, ISBN 978-1-5386-5700-3
Publisher: IEEE
DOI: 10.1109/prdc.2018.00015

Threat Modeling and Analysis for the Cloud Ecosystem (opens in new window)

Author(s): Salman Manzoor, Heng Zhang, Neeraj Suri
Published in: 2018 IEEE International Conference on Cloud Engineering (IC2E), 2018, Page(s) 278-281, ISBN 978-1-5386-5008-0
Publisher: IEEE
DOI: 10.1109/ic2e.2018.00056

Monitoring Path Discovery for Supporting Indirect Monitoring of Cloud Services (opens in new window)

Author(s): Heng Zhang, Salman Manzoor, Neeraj Suri
Published in: 2018 IEEE International Conference on Cloud Engineering (IC2E), 2018, Page(s) 274-277, ISBN 978-1-5386-5008-0
Publisher: IEEE
DOI: 10.1109/ic2e.2018.00055

Enhancing Usage Control for Performance: A Proposal for Systems of Systems (Research Poster) (opens in new window)

Author(s): Vasileios Gkioulos, Athanasios Rizos, Christina Michailidou, Fabio Martinelli, Paolo Mori
Published in: 2018 International Conference on High Performance Computing & Simulation (HPCS), 2018, Page(s) 1061-1062, ISBN 978-1-5386-7879-4
Publisher: IEEE
DOI: 10.1109/hpcs.2018.00169

Managing QoS in Smart Buildings Through Software Defined Network and Usage Control (opens in new window)

Author(s): Fabio Martinelli, Christina Michailidou, Paolo Mori, Andrea Saracino
Published in: 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 2019, Page(s) 626-632, ISBN 978-1-5386-9151-9
Publisher: IEEE
DOI: 10.1109/percomw.2019.8730751

Cyber Insurance and Security Interdependence: Friends or Foes? (opens in new window)

Author(s): Ganbayar Uuganbayar, Artsiom Yautsiukhin, Fabio Martinelli
Published in: 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 2018, Page(s) 1-4, ISBN 978-1-5386-4565-9
Publisher: IEEE
DOI: 10.1109/cybersa.2018.8551447

Cyber Insurance and Time-to-Compromise: An Integrated Approach (opens in new window)

Author(s): Ganbayar Uuganbayar, Fabio Massacci, Artsiom Yautsiukhin, Fabio Martinelli
Published in: 2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 2019, Page(s) 1-8, ISBN 978-1-7281-0232-0
Publisher: IEEE
DOI: 10.1109/cybersa.2019.8899442

Too Long, did not Enforce - A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed Environments (opens in new window)

Author(s): Fabio Martinelli, Christina Michailidou, Paolo Mori, Andrea Saracino
Published in: Proceedings of the 4th ACM Workshop on Cyber-Physical System Security - CPSS '18, 2018, Page(s) 27-37, ISBN 9781-450357555
Publisher: ACM Press
DOI: 10.1145/3198458.3198463

Phylogenetic Analysis for Ransomware Detection and Classification into Families

Author(s): Fabio Martinelli, Francesco Mercaldo, Christina Michailidou, Andrea Saracino
Published in: 15th International Joint Conference on e-Business and Telecommunications (ICETE), SECRYPT 2018, 2018
Publisher: SCITEPRESS

Exploiting Digital DNA for the Analysis of Similarities in Twitter Behaviours (opens in new window)

Author(s): Stefano Cresci, Roberto di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi
Published in: 2017 IEEE International Conference on Data Science and Advanced Analytics (DSAA), 2017, Page(s) 686-695, ISBN 978-1-5090-5004-8
Publisher: IEEE
DOI: 10.1109/dsaa.2017.57

Six Things I Hate About You (in Italian) and Six Classification Strategies to More and More Effectively Find Them

Author(s): Tiziano Fagni, Leonardo Nizzoli, Marinella Petrocchi, Maurizio Tesconi
Published in: 2019
Publisher: CEUR

From Reaction to Proaction - Unexplored Ways to the Detection of Evolving Spambots (opens in new window)

Author(s): Stefano Cresci, Marinella Petrocchi, Angelo Spognardi, Stefano Tognazzi
Published in: Companion of the The Web Conference 2018 on The Web Conference 2018 - WWW '18, 2018, Page(s) 1469-1470, ISBN 9781-450356404
Publisher: ACM Press
DOI: 10.1145/3184558.3191595

Towards automatic translation of social network policies into controlled natural language (opens in new window)

Author(s): Irfan Khan Tanoli, Marinella Petrocchi, Rocco De Nicola
Published in: 2018 12th International Conference on Research Challenges in Information Science (RCIS), 2018, Page(s) 1-12, ISBN 978-1-5386-6517-6
Publisher: IEEE
DOI: 10.1109/rcis.2018.8406683

Mining Implicit Data Association from Tripadvisor Hotel Reviews

Author(s): Vittoria Cozza, Marinella Petrocchi, Angelo Spognardi
Published in: 2018
Publisher: CEUR

Contrasting Fake Reviews in TripAdvisor

Author(s): Francesco Buccafurri, Michela Fazzolari, Gianluca Lax, Marinella Petrocchi
Published in: SEBD 2018, 2018
Publisher: CEUR

Social Network Polluting Contents Detection through Deep Learning Techniques (opens in new window)

Author(s): Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Published in: 2019 International Joint Conference on Neural Networks (IJCNN), 2019, Page(s) 1-10, ISBN 978-1-7281-1985-4
Publisher: IEEE
DOI: 10.1109/ijcnn.2019.8852080

Cascade Learning for Mobile Malware Families Detection through Quality and Android Metrics (opens in new window)

Author(s): Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Published in: 2019 International Joint Conference on Neural Networks (IJCNN), 2019, Page(s) 1-10, ISBN 978-1-7281-1985-4
Publisher: IEEE
DOI: 10.1109/ijcnn.2019.8852268

Investigating Mobile Applications Quality in Official and Third-party Marketplaces (opens in new window)

Author(s): Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Published in: Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering, 2019, Page(s) 169-178, ISBN 978-989-758-375-9
Publisher: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0007757601690178

Wearable Devices for Human Activity Recognition and User Detection (opens in new window)

Author(s): Giovanni Capobianco, Umberto Di Giacomo, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Published in: 2019 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), 2019, Page(s) 365-372, ISBN 978-1-7281-1644-0
Publisher: IEEE
DOI: 10.1109/empdp.2019.8671636

Measuring Mobile Applications Quality and Security in Higher Education (opens in new window)

Author(s): Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Published in: 2018 IEEE International Conference on Big Data (Big Data), 2018, Page(s) 5319-5321, ISBN 978-1-5386-5035-6
Publisher: IEEE
DOI: 10.1109/bigdata.2018.8622339

A Data Life Cycle Modeling Proposal by Means of Formal Methods (opens in new window)

Author(s): Madalina G. Ciobanu, Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Published in: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security - Asia CCS '19, 2019, Page(s) 670-672, ISBN 9781-450367523
Publisher: ACM Press
DOI: 10.1145/3321705.3331003

Spyware Detection using Temporal Logic (opens in new window)

Author(s): Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Published in: Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019, Page(s) 690-699, ISBN 978-989-758-359-9
Publisher: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0007704806900699

Cluster Analysis for Driver Aggressiveness Identification (opens in new window)

Author(s): Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Albina Orlando, Antonella Santone
Published in: Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018, Page(s) 562-569, ISBN 978-989-758-282-0
Publisher: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006755205620569

Context-Awareness Mobile Devices for Traffic Incident Prevention (opens in new window)

Author(s): Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Albina Orlando, Antonella Santone
Published in: 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 2018, Page(s) 143-148, ISBN 978-1-5386-3227-7
Publisher: IEEE
DOI: 10.1109/percomw.2018.8480213

Who’s Driving My Car? A Machine Learning based Approach to Driver Identification (opens in new window)

Author(s): Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Albina Orlando, Antonella Santone
Published in: Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018, Page(s) 367-372, ISBN 978-989-758-282-0
Publisher: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006633403670372

VizMal: A Visualization Tool for Analyzing the Behavior of Android Malware (opens in new window)

Author(s): Alessandro Bacci, Fabio Martinelli, Eric Medvet, Francesco Mercaldo
Published in: Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018, Page(s) 517-525, ISBN 978-989-758-282-0
Publisher: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006665005170525

A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware (opens in new window)

Author(s): Mario Faiella, Antonio La Marra, Fabio Martinelli, Francesco Mercaldo, Andrea Saracino, Mina Sheikhalishahi
Published in: 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP), 2017, Page(s) 321-328, ISBN 978-1-5090-6058-0
Publisher: IEEE
DOI: 10.1109/pdp.2017.99

Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis (opens in new window)

Author(s): Alessandro Bacci, Alberto Bartoli, Fabio Martinelli, Eric Medvet, Francesco Mercaldo, Corrado Aaron Visaggio
Published in: Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018, Page(s) 379-385, ISBN 978-989-758-282-0
Publisher: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006642503790385

Improving Vehicle Safety Through a Fog Collaborative Infrastructure (opens in new window)

Author(s): Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci, Francesco Mercaldo
Published in: 2018 IEEE International Conference on Smart Computing (SMARTCOMP), 2018, Page(s) 446-451, ISBN 978-1-5386-4705-9
Publisher: IEEE
DOI: 10.1109/smartcomp.2018.00044

Identifying Insecure Features in Android Applications using Model Checking (opens in new window)

Author(s): Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone
Published in: Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018, Page(s) 589-596, ISBN 978-989-758-282-0
Publisher: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006758105890596

A fuzzy-based process mining approach for dynamic malware detection (opens in new window)

Author(s): Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Published in: 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 2017, Page(s) 1-8, ISBN 978-1-5090-6034-4
Publisher: IEEE
DOI: 10.1109/fuzz-ieee.2017.8015490

A time series classification approach to game bot detection (opens in new window)

Author(s): Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Published in: Proceedings of the 7th International Conference on Web Intelligence, Mining and Semantics - WIMS '17, 2017, Page(s) 1-11, ISBN 9781-450352253
Publisher: ACM Press
DOI: 10.1145/3102254.3102263

How Discover a Malware using Model Checking (opens in new window)

Author(s): Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Published in: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, 2017, Page(s) 902-904, ISBN 9781-450349444
Publisher: ACM Press
DOI: 10.1145/3052973.3055157

Game Bot Detection in Online Role Player Game through Behavioural Features (opens in new window)

Author(s): Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Published in: Proceedings of the 12th International Conference on Software Technologies, 2017, Page(s) 50-60, ISBN 978-989-758-262-2
Publisher: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006417000500060

Car hacking identification through fuzzy logic algorithms (opens in new window)

Author(s): Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Published in: 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 2017, Page(s) 1-7, ISBN 978-1-5090-6034-4
Publisher: IEEE
DOI: 10.1109/fuzz-ieee.2017.8015464

BRIDEMAID - An Hybrid Tool for Accurate Detection of Android Malware (opens in new window)

Author(s): Fabio Martinelli, Francesco Mercaldo, Andrea Saracino
Published in: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, 2017, Page(s) 899-901, ISBN 9781-450349444
Publisher: ACM Press
DOI: 10.1145/3052973.3055156

Formal Methods Meet Mobile Code Obfuscation Identification of Code Reordering Technique (opens in new window)

Author(s): Aniello Cimitile, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Published in: 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2017, Page(s) 263-268, ISBN 978-1-5386-1759-5
Publisher: IEEE
DOI: 10.1109/wetice.2017.23

Mobile Silent and Continuous Authentication using Apps Sequence (opens in new window)

Author(s): Gerardo Canfora, Giovanni Cappabianca, Pasquale Carangelo, Fabio Martinelli, Francesco Mercaldo, Ernesto Rosario Russo, Corrado Aaron Visaggio
Published in: Proceedings of the 14th International Joint Conference on e-Business and Telecommunications, 2017, Page(s) 79-91, ISBN 978-989-758-259-2
Publisher: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006424200790091

Model Checking for Mobile Android Malware Evolution (opens in new window)

Author(s): Aniello Cimitile, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Gigliola Vaglini
Published in: 2017 IEEE/ACM 5th International FME Workshop on Formal Methods in Software Engineering (FormaliSE), 2017, Page(s) 24-30, ISBN 978-1-5386-0422-9
Publisher: IEEE
DOI: 10.1109/formalise.2017.4

R-PackDroid - API package-based characterization and detection of mobile ransomware (opens in new window)

Author(s): Davide Maiorca, Francesco Mercaldo, Giorgio Giacinto, Corrado Aaron Visaggio, Fabio Martinelli
Published in: Proceedings of the Symposium on Applied Computing - SAC '17, 2017, Page(s) 1718-1723, ISBN 9781-450344869
Publisher: ACM Press
DOI: 10.1145/3019612.3019793

Identifying Mobile Repackaged Applications through Formal Methods (opens in new window)

Author(s): Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio
Published in: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Page(s) 673-682, ISBN 978-989-758-209-7
Publisher: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006287906730682

Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment (opens in new window)

Author(s): Aniello Cimitile, Fabio Martinelli, Francesco Mercaldo
Published in: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Page(s) 487-492, ISBN 978-989-758-209-7
Publisher: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006217304870492

Tor traffic analysis and detection via machine learning techniques (opens in new window)

Author(s): Alfredo Cuzzocrea, Fabio Martinelli, Francesco Mercaldo, Gianni Vercelli
Published in: 2017 IEEE International Conference on Big Data (Big Data), 2017, Page(s) 4474-4480, ISBN 978-1-5386-2715-0
Publisher: IEEE
DOI: 10.1109/bigdata.2017.8258487

Twinkle twinkle little DroidDream, How I wonder what you are? (opens in new window)

Author(s): Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
Published in: 2017 IEEE International Workshop on Metrology for AeroSpace (MetroAeroSpace), 2017, Page(s) 21-25, ISBN 978-1-5090-4234-0
Publisher: IEEE
DOI: 10.1109/metroaerospace.2017.7999579

An Analysis of Trust in Smart Home Devices

Author(s): Davide Ferraris, Daniel Bastos, Carmen Fernandez-Gago, Fadi El-Moussa, Javier Lopez
Published in: The 20th World Conference on Information Security Applications (WISA Workshop 2019), 2019
Publisher: Springer

A Perspective Study Towards Biometric-based Rider Authentication Schemes For Driverless Taxis (opens in new window)

Author(s): Sandeep Gupta, Bruno Crispo
Published in: 2019 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), 2019, Page(s) 1-6, ISBN 978-1-7281-3012-5
Publisher: IEEE
DOI: 10.1109/3ict.2019.8910310

An architecture for privacy-preserving sharing of CTI with 3 rd party analysis services (opens in new window)

Author(s): Fabio Giubilo, Ali Sajjad, Mark Shackleton, David W. Chadwick, Wenjun Fan, Rogerio de Lemos
Published in: 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), 2017, Page(s) 293-297, ISBN 978-1-908320-93-3
Publisher: IEEE
DOI: 10.23919/icitst.2017.8356404

Building Taxonomies based on Human-Machine Teaming - Cyber Security as an Example (opens in new window)

Author(s): Mohamad Imad Mahaini, Shujun Li, Rahime Belen Sağlam
Published in: Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19, 2019, Page(s) 1-9, ISBN 9781450371643
Publisher: ACM Press
DOI: 10.1145/3339252.3339282

Cloud for IoT - a Survey of Technologies and Security features of Public Cloud IoT solutions (opens in new window)

Author(s): D. Bastos
Published in: Living in the Internet of Things (IoT 2019), 2019, Page(s) 43 (6 pp.)-43 (6 pp.), ISBN 978-1-83953-089-0
Publisher: Institution of Engineering and Technology
DOI: 10.1049/cp.2019.0168

Distributed UCON in CoAP and MQTT Protocols

Author(s): Athanasios Rizos, Daniel Bastos, Andrea Saracino, Fabio Martinelli
Published in: 5th Workshop On The Security Of Industrial Control Systems & Of Cyber-Physical Systems (CyberICPS 2019), 2019
Publisher: Springer

DIALERAUTH - A Motion-assisted Touch-based Smartphone User Authentication Scheme (opens in new window)

Author(s): Attaullah Buriro, Bruno Crispo, Sandeep Gupta, Filippo Del Frari
Published in: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy - CODASPY '18, 2018, Page(s) 267-276, ISBN 9781-450356329
Publisher: ACM Press
DOI: 10.1145/3176258.3176318

Extended Reality in IoT scenarios: Concepts, Applications and Future Trends (opens in new window)

Author(s): Tiago Andrade, Daniel Bastos
Published in: 2019 5th Experiment International Conference (exp.at'19), 2019, Page(s) 107-112, ISBN 978-1-7281-3637-0
Publisher: IEEE
DOI: 10.1109/expat.2019.8876559

Enriching Threat Intelligence Platforms Capabilities (opens in new window)

Author(s): Mario Faiella, Gustavo Gonzalez-Granadillo, Ibéria Medeiros, Rui Azevedo, Susana Gonzalez-Zarzosa
Published in: Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019, Page(s) 37-48, ISBN 978-989-758-378-0
Publisher: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0007830400370048

Enhancing Information Sharing and Visualization Capabilities in Security Data Analytic Platforms (opens in new window)

Author(s): Gustavo Gonzalez-Granadillo, Mario Faiella, Iberia Medeiros, Rui Azevedo, Susana Gonzalez-Zarzosa
Published in: 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), 2019, Page(s) 1-8, ISBN 978-1-7281-3030-9
Publisher: IEEE
DOI: 10.1109/dsn-w.2019.00009

GDPR Privacy Implication for the Internet of Things

Author(s): Daniel Bastos, Fabio Giubilo, Mark Shackleton, Fadi El-Moussa
Published in: 4th Annual IoT Security Foundation Conference, 2018
Publisher: Conference Proceedings

Risks of Sharing Cyber Incident Information (opens in new window)

Author(s): Adham Albakri, Eerke Boiten, Rogério De Lemos
Published in: Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES 2018, 2018, Page(s) 1-10, ISBN 9781-450364485
Publisher: ACM Press
DOI: 10.1145/3230833.3233284

Towards an Enhanced Security Data Analytic Platform (opens in new window)

Author(s): Gustavo Gonzalez-Granadillo, Susana Gonzalez-Zarzosa, Mario Faiella
Published in: Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018, Page(s) 619-624, ISBN 978-989-758-319-3
Publisher: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006831106190624

SmartHandle - A Novel Behavioral Biometric-based Authentication Scheme for Smart Lock Systems (opens in new window)

Author(s): Sandeep Gupta, Attaullah Buriro, Bruno Crispo
Published in: Proceedings of the 2019 3rd International Conference on Biometric Engineering and Applications - ICBEA 2019, 2019, Page(s) 15-22, ISBN 9781-450363051
Publisher: ACM Press
DOI: 10.1145/3345336.3345344

Internet of Things: A Survey of Technologies and Security Risks in Smart Home and City Environments (opens in new window)

Author(s): D. Bastos, M. Shackleton, F. El-Moussa
Published in: Living in the Internet of Things: Cybersecurity of the IoT - 2018, 2018, Page(s) 30 (7 pp.)-30 (7 pp.), ISBN 978-1-78561-843-7
Publisher: Institution of Engineering and Technology
DOI: 10.1049/cp.2018.0030

From MinX to MinC: semantics-driven decompilation of recursive datatypes (opens in new window)

Author(s): Ed Robbins, Andy King, Tom Schrijvers
Published in: Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages - POPL 2016, 2016, Page(s) 191-203, ISBN 9781-450335492
Publisher: ACM Press
DOI: 10.1145/2837614.2837633

Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication (opens in new window)

Author(s): Attaullah Buriro, Bruno Crispo, Filippo Delfrari, Konrad Wrona
Published in: 2016 IEEE Security and Privacy Workshops (SPW), 2016, Page(s) 276-285, ISBN 978-1-5090-3690-5
Publisher: IEEE
DOI: 10.1109/spw.2016.20

Exploiting Vehicles’ Reputation to Mitigate DoS Attack (opens in new window)

Author(s): Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci
Published in: Proceedings of the International Workshop on domAin specific Model-based AppRoaches to vErificaTion and validaTiOn, 2016, Page(s) 75-82, ISBN 978-989-758-166-3
Publisher: SCITEPRESS - Science and and Technology Publications
DOI: 10.5220/0005844500750082

Concurrent History-based Usage Control Policies (opens in new window)

Author(s): Fabio Martinelli, Ilaria Matteucci, Paolo Mori, Andrea Saracino
Published in: Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017, Page(s) 657-666, ISBN 978-989-758-210-3
Publisher: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006232506570666

Security by Insurance for Services (opens in new window)

Author(s): Fabio Martinelli, Artsiom Yautsiukhin
Published in: 2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), 2016, Page(s) 344-351, ISBN 978-1-5090-3713-1
Publisher: IEEE
DOI: 10.1109/qrs-c.2016.53

AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces (opens in new window)

Author(s): Salman Manzoor, Jesus Luna and Neeraj Suri
Published in: Proc. of IEEE Services Computing (SCC), 2017, 2017, Page(s) 499-502
Publisher: IEEE
DOI: 10.1109/SCC.2017.74

SLA-based Service Selection for Multi-Cloud Environments (opens in new window)

Author(s): Ahmed Taha, Salman Manzoor and Neeraj Suri
Published in: Proc. of IEEE EDGE Computing (EGDE), 2017, 2017, Page(s) 65-72
Publisher: IEEE
DOI: 10.1109/IEEE.EDGE.2017.17

Mobile biometrics: Towards a comprehensive evaluation methodology (opens in new window)

Author(s): Attaullah Buriro, Zahid Akhtar, Bruno Crispo, Sandeep Gupta
Published in: 2017 International Carnahan Conference on Security Technology (ICCST), 2017, Page(s) 1-6, ISBN 978-1-5386-1585-0
Publisher: IEEE
DOI: 10.1109/ccst.2017.8167859

Evaluation of Motion-based Touch-typing Biometrics in Online Financial Environments

Author(s): Attaullah Buriro, Sandeep Gupta, and Bruno Crispo
Published in: BIOSIG 2017, 2017
Publisher: IEEE

A model specification for the design of trust negotiations (opens in new window)

Author(s): Martin Kolar, Carmen Fernandez-Gago, Javier Lopez
Published in: Computers & Security, Issue 84, 2019, Page(s) 288-300, ISSN 0167-4048
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2019.03.024

TrUStAPIS: a trust requirements elicitation method for IoT (opens in new window)

Author(s): Davide Ferraris, Carmen Fernandez-Gago
Published in: International Journal of Information Security, 2019, ISSN 1615-5262
Publisher: Springer Verlag
DOI: 10.1007/s10207-019-00438-x

Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges (opens in new window)

Author(s): Rodrigo Roman, Javier Lopez, Masahiro Mambo
Published in: Future Generation Computer Systems, Issue 78, 2018, Page(s) 680-698, ISSN 0167-739X
Publisher: Elsevier BV
DOI: 10.1016/j.future.2016.11.009

A Cyber-Physical Systems-Based Checkpoint Model for Structural Controllability (opens in new window)

Author(s): Cristina Alcaraz, Javier Lopez
Published in: IEEE Systems Journal, Issue 12/4, 2018, Page(s) 3543-3554, ISSN 1932-8184
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/jsyst.2017.2740719

Modelling privacy-aware trust negotiations (opens in new window)

Author(s): Ruben Rios, Carmen Fernandez-Gago, Javier Lopez
Published in: Computers & Security, Issue 77, 2018, Page(s) 773-789, ISSN 0167-4048
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2017.09.015

Resilient interconnection in cyber-physical control systems (opens in new window)

Author(s): Cristina Alcaraz, Javier Lopez, Kim-Kwang Raymond Choo
Published in: Computers & Security, Issue 71, 2017, Page(s) 2-14, ISSN 0167-4048
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2017.03.004

Resilient industrial control systems based on multiple redundancy (opens in new window)

Author(s): Cristina Alcaraz
Published in: International Journal of Critical Infrastructures, Issue 13/2/3, 2017, Page(s) 278, ISSN 1475-3219
Publisher: Inderscience Publishers
DOI: 10.1504/ijcis.2017.10009287

A scheme for the sticky policy representation supporting secure cyber-threat intelligence analysis and sharing (opens in new window)

Author(s): Oleksii Osliak, Andrea Saracino, Fabio Martinelli
Published in: Information & Computer Security, Issue 26/5, 2019, Page(s) 687-710, ISSN 2056-4961
Publisher: Emerald Publishing Limited
DOI: 10.1108/ics-01-2019-0011

On the capability of evolved spambots to evade detection via genetic engineering (opens in new window)

Author(s): Stefano Cresci, Marinella Petrocchi, Angelo Spognardi, Stefano Tognazzi
Published in: Online Social Networks and Media, Issue 9, 2019, Page(s) 1-16, ISSN 2468-6964
Publisher: ScienceDirect
DOI: 10.1016/j.osnem.2018.10.005

A Study on Text-Score Disagreement in Online Reviews (opens in new window)

Author(s): Michela Fazzolari, Vittoria Cozza, Marinella Petrocchi, Angelo Spognardi
Published in: Cognitive Computation, Issue 9/5, 2017, Page(s) 689-701, ISSN 1866-9956
Publisher: Springer Verlag
DOI: 10.1007/s12559-017-9496-y

Social fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling (opens in new window)

Author(s): Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi
Published in: IEEE Transactions on Dependable and Secure Computing, 2018, Page(s) 1-1, ISSN 1545-5971
Publisher: IEEE Computer Society
DOI: 10.1109/tdsc.2017.2681672

Risk analysis of Android applications: A user-centric solution (opens in new window)

Author(s): Gianluca Dini, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Andrea Saracino, Daniele Sgandurra
Published in: Future Generation Computer Systems, Issue 80, 2018, Page(s) 505-518, ISSN 0167-739X
Publisher: Elsevier BV
DOI: 10.1016/j.future.2016.05.035

On the effectiveness of system API-related information for Android ransomware detection (opens in new window)

Author(s): Michele Scalas, Davide Maiorca, Francesco Mercaldo, Corrado Aaron Visaggio, Fabio Martinelli, Giorgio Giacinto
Published in: Computers & Security, Issue 86, 2019, Page(s) 168-182, ISSN 0167-4048
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2019.06.004

Dynamic malware detection and phylogeny analysis using process mining (opens in new window)

Author(s): Mario Luca Bernardi, Marta Cimitile, Damiano Distante, Fabio Martinelli, Francesco Mercaldo
Published in: International Journal of Information Security, Issue 18/3, 2019, Page(s) 257-284, ISSN 1615-5262
Publisher: Springer Verlag
DOI: 10.1007/s10207-018-0415-3

A “pay-how-you-drive” car insurance approach through cluster analysis (opens in new window)

Author(s): Maria Francesca Carfora, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Albina Orlando, Antonella Santone, Gigliola Vaglini
Published in: Soft Computing, Issue May 2019, Volume 23, Issue 9, 2018, Page(s) 2863–2875, ISSN 1432-7643
Publisher: Springer Verlag
DOI: 10.1007/s00500-018-3274-y

An exploratory study on the evolution of Android malware quality (opens in new window)

Author(s): Francesco Mercaldo, Andrea Di Sorbo, Corrado Aaron Visaggio, Aniello Cimitile, Fabio Martinelli
Published in: Journal of Software: Evolution and Process, Issue 30/11, 2018, Page(s) e1978, ISSN 2047-7473
Publisher: Wiley Publisher
DOI: 10.1002/smr.1978

Driver and Path Detection through Time-Series Classification (opens in new window)

Author(s): Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
Published in: Journal of Advanced Transportation, Issue 2018, 2018, Page(s) 1-20, ISSN 0197-6729
Publisher: Institute for Transportation, Inc.
DOI: 10.1155/2018/1758731

LEILA: formaL tool for idEntifying mobIle maLicious behAviour (opens in new window)

Author(s): Gerardo Canfora, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio
Published in: IEEE Transactions on Software Engineering, 2018, Page(s) 1-1, ISSN 0098-5589
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tse.2018.2834344

Evaluating model checking for cyber threats code obfuscation identification (opens in new window)

Author(s): Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Arun Kumar Sangaiah, Aniello Cimitile
Published in: Journal of Parallel and Distributed Computing, Issue 119, 2018, Page(s) 203-218, ISSN 0743-7315
Publisher: Academic Press
DOI: 10.1016/j.jpdc.2018.04.008

Talos: no more ransomware victims with formal methods (opens in new window)

Author(s): Aniello Cimitile, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio
Published in: International Journal of Information Security, Issue 17/6, 2018, Page(s) 719-738, ISSN 1615-5262
Publisher: Springer Verlag
DOI: 10.1007/s10207-017-0398-5

Human behavior characterization for driving style recognition in vehicle system (opens in new window)

Author(s): Fabio Martinelli, Francesco Mercaldo, Albina Orlando, Vittoria Nardone, Antonella Santone, Arun Kumar Sangaiah
Published in: Computers & Electrical Engineering, 2018, ISSN 0045-7906
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.compeleceng.2017.12.050

Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access (opens in new window)

Author(s): Sandeep Gupta, Attaullah Buriro, Bruno Crispo
Published in: Mobile Information Systems, Issue 2018, 2018, Page(s) 1-16, ISSN 1574-017X
Publisher: IOS Press
DOI: 10.1155/2018/2649598

DriverAuth: A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms (opens in new window)

Author(s): Sandeep Gupta, Attaullah Buriro, Bruno Crispo
Published in: Computers & Security, Issue 83, 2019, Page(s) 122-139, ISSN 0167-4048
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2019.01.007

DriverAuth: Behavioral biometric-based driver authentication mechanism for on-demand ride and ridesharing infrastructure (opens in new window)

Author(s): Sandeep Gupta, Attaullah Buriro, Bruno Crispo
Published in: ICT Express, Issue 5/1, 2019, Page(s) 16-20, ISSN 2405-9595
Publisher: ICT Express
DOI: 10.1016/j.icte.2018.01.010

Mac-A-Mal: macOS malware analysis framework resistant to anti evasion techniques (opens in new window)

Author(s): Duy-Phuc Pham, Duc-Ly Vu, Fabio Massacci
Published in: Journal of Computer Virology and Hacking Techniques, 2019, ISSN 2263-8733
Publisher: Springer
DOI: 10.1007/s11416-019-00335-w

Usage Control on Cloud systems (opens in new window)

Author(s): Enrico Carniani, Davide D’Arenzo, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori
Published in: Future Generation Computer Systems, Issue 63, 2016, Page(s) 37-55, ISSN 0167-739X
Publisher: Elsevier BV
DOI: 10.1016/j.future.2016.04.010

Cyber-insurance survey (opens in new window)

Author(s): Angelica Marotta, Fabio Martinelli, Stefano Nanni, Albina Orlando, Artsiom Yautsiukhin
Published in: Computer Science Review, Issue 24, 2017, Page(s) 35-61, ISSN 1574-0137
Publisher: Elsevier BV
DOI: 10.1016/j.cosrev.2017.01.001

Stateful Data Usage Control for Android Mobile Devices (opens in new window)

Author(s): Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori, Andrea Saracino
Published in: International Journal of Information Security, Issue 16/4, 2017, Page(s) 345-369, ISSN 1615-5262
Publisher: Springer Verlag
DOI: 10.1007/s10207-016-0336-y

Policy Languages and Their Suitability for Trust Negotiation (opens in new window)

Author(s): Martin Kolar, Carmen Fernandez-Gago, Javier Lopez
Published in: Data and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16–18, 2018, Proceedings, Issue 10980, 2018, Page(s) 69-84, ISBN 978-3-319-95728-9
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-95729-6_5

Selecting Privacy Solutions to Prioritise Control in Smart Metering Systems (opens in new window)

Author(s): Juan E. Rubio, Cristina Alcaraz, Javier Lopez
Published in: Critical Information Infrastructures Security, Issue 10242, 2017, Page(s) 176-188, ISBN 978-3-319-71367-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-71368-7_15

Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level (opens in new window)

Author(s): Tsvetoslava Vateva-Gurova, Salman Manzoor, Ruben Trapero, Neeraj Suri
Published in: Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers, Issue 11398, 2019, Page(s) 27-38, ISBN 978-3-030-12084-9
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-12085-6_3

Threat Modeling the Cloud: An Ontology Based Approach (opens in new window)

Author(s): Salman Manzoor, Tsvetoslava Vateva-Gurova, Ruben Trapero, Neeraj Suri
Published in: Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers, Issue 11398, 2019, Page(s) 61-72, ISBN 978-3-030-12084-9
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-12085-6_6

Using IFTTT to Express and Enforce UCON Obligations (opens in new window)

Author(s): Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino
Published in: Information Security Practice and Experience - 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings, Issue 11879, 2019, Page(s) 213-231, ISBN 978-3-030-34338-5
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-34339-2_12

Enhancing Usage Control for Performance: An Architecture for Systems of Systems (opens in new window)

Author(s): Vasileios Gkioulos, Athanasios Rizos, Christina Michailidou, Paolo Mori, Andrea Saracino
Published in: Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers, Issue 11387, 2019, Page(s) 69-84, ISBN 978-3-030-12785-5
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-12786-2_5

Optimal Security Configuration for Cyber Insurance (opens in new window)

Author(s): Fabio Martinelli, Ganbayar Uuganbayar, Artsiom Yautsiukhin
Published in: ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings, Issue 529, 2018, Page(s) 187-200, ISBN 978-3-319-99827-5
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-99828-2_14

Improving MQTT by Inclusion of Usage Control (opens in new window)

Author(s): Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino
Published in: Security, Privacy, and Anonymity in Computation, Communication, and Storage, Issue 10656, 2017, Page(s) 545-560, ISBN 978-3-319-72388-4
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-72389-1_43

Towards General Scheme for Data Sharing Agreements Empowering Privacy-Preserving Data Analysis of Structured CTI (opens in new window)

Author(s): Fabio Martinelli, Oleksii Osliak, Andrea Saracino
Published in: Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers, Issue 11387, 2019, Page(s) 192-212, ISBN 978-3-030-12785-5
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-12786-2_12

Mining Worse and Better Opinions (opens in new window)

Author(s): Michela Fazzolari, Marinella Petrocchi, Alessandro Tommasi, Cesare Zavattari
Published in: Web Engineering, Issue 10360, 2017, Page(s) 494-506, ISBN 978-3-319-60130-4
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-60131-1_35

Transparency in Keyword Faceted Search: An Investigation on Google Shopping (opens in new window)

Author(s): Vittoria Cozza, Van Tien Hoang, Marinella Petrocchi, Rocco De Nicola
Published in: Digital Libraries: Supporting Open Science - 15th Italian Research Conference on Digital Libraries, IRCDL 2019, Pisa, Italy, January 31 – February 1, 2019, Proceedings, Issue 988, 2019, Page(s) 29-43, ISBN 978-3-030-11225-7
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-11226-4_3

Cyber Risk Management: A New Challenge for Actuarial Mathematics (opens in new window)

Author(s): Maria Francesca Carfora, Fabio Martinelli, Francesco Mercaldo, Albina Orlando, Artsiom Yautsiukhin
Published in: Mathematical and Statistical Methods for Actuarial Sciences and Finance - MAF 2018, 2018, Page(s) 199-202, ISBN 978-3-319-89823-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-89824-7_36

Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection (opens in new window)

Author(s): Alberto Ferrante, Miroslaw Malek, Fabio Martinelli, Francesco Mercaldo, Jelena Milosevic
Published in: Foundations and Practice of Security, Issue 10723, 2018, Page(s) 242-258, ISBN 978-3-319-75649-3
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-75650-9_16

A Risk-Driven Model to Minimize the Effects of Human Factors on Smart Devices (opens in new window)

Author(s): Sandeep Gupta, Attaullah Buriro, Bruno Crispo
Published in: Emerging Technologies for Authorization and Authentication - Second International Workshop, ETAA 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings, Issue 11967, 2020, Page(s) 156-170, ISBN 978-3-030-39748-7
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-39749-4_10

Sharing Cyber Threat Intelligence Under the General Data Protection Regulation (opens in new window)

Author(s): Adham Albakri, Eerke Boiten, Rogério De Lemos
Published in: Privacy Technologies and Policy - 7th Annual Privacy Forum, APF 2019, Rome, Italy, June 13–14, 2019, Proceedings, Issue 11498, 2019, Page(s) 28-41, ISBN 978-3-030-21751-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-21752-5_3

SnapAuth: A Gesture-Based Unobtrusive Smartwatch User Authentication Scheme (opens in new window)

Author(s): Attaullah Buriro, Bruno Crispo, Mojtaba Eskandri, Sandeep Gupta, Athar Mahboob, Rutger Van Acker
Published in: Emerging Technologies for Authorization and Authentication - First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedings, Issue 11263, 2018, Page(s) 30-37, ISBN 978-3-030-04371-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-04372-8_3

A Formal and Run-Time Framework for the Adaptation of Local Behaviours to Match a Global Property (opens in new window)

Author(s): Stefano Bistarelli, Fabio Martinelli, Ilaria Matteucci, Francesco Santini
Published in: Formal Aspects of Component Software - 13th International Conference, FACS 2016, Besançon, France, October 19-21, 2016, Revised Selected Papers, Issue 10231, 2017, Page(s) 134-152, ISBN 978-3-319-57665-7
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-57666-4_9

Enforcement of U-XACML History-Based Usage Control Policy (opens in new window)

Author(s): Fabio Martinelli, Ilaria Matteucci, Paolo Mori, Andrea Saracino
Published in: Security and Trust Management - 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings, Issue 9871, 2016, Page(s) 64-81, ISBN 978-3-319-46597-5
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-46598-2_5

Preventing the Drop in Security Investments for Non-competitive Cyber-Insurance Market (opens in new window)

Author(s): Fabio Martinelli, Albina Orlando, Ganbayar Uuganbayar, Artsiom Yautsiukhin
Published in: Risks and Security of Internet and Systems, Issue 10694, 2018, Page(s) 159-174, ISBN 978-3-319-76686-7
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-76687-4_11

Introducing Usage Control in MQTT (opens in new window)

Author(s): Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino
Published in: Computer Security, Issue 10683, 2018, Page(s) 35-43, ISBN 978-3-319-72816-2
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-72817-9_3

Estimating the Assessment Difficulty of CVSS Environmental Metrics: An Experiment (opens in new window)

Author(s): Luca Allodi, Silvio Biagioni, Bruno Crispo, Katsiaryna Labunets, Fabio Massacci, Wagner Santos
Published in: Future Data and Security Engineering, Issue 10646, 2017, Page(s) 23-39, ISBN 978-3-319-70003-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-70004-5_2

Mal2Image- Hybrid Image Transformation for Malware Detection-paper

Author(s): Ly Vu Duc, Trong-Kha Nguyen, Tam. V. Nguyen , Phung. H. Phu, Fabio Massacci
Published in: International Symposium on Engineering Secure Software and Systems, 2018, 2018
Publisher: Springer

Towards Explainable Machine Learning in Intrusion Detection Systems

Author(s): Chau D.M. Pham, Duc-Ly Vu, Fabio Massacci, Tran Khanh Dang, Sandro Etalle, Davide Fauri
Published in: International Symposium on Engineering Secure Software and Systems, 2018, 2018
Publisher: Springer

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0