Andrea Saracino
Orcid: 0000-0001-8149-9322
According to our database1,
Andrea Saracino
authored at least 85 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Using the ACE framework to enforce access and usage control with notifications of revoked access rights.
Int. J. Inf. Sec., October, 2024
MoRSE: Bridging the Gap in Cybersecurity Expertise with Retrieval Augmented Generation.
CoRR, 2024
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
Further Insights: Balancing Privacy, Explainability, and Utility in Machine Learning-based Tabular Data Analysis.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Concurr. Comput. Pract. Exp., 2023
The Explainability-Privacy-Utility Trade-Off for Machine Learning-Based Tabular Data Analysis.
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Privacy-Preserving Analysis for Remote Video Anomaly Detection in Real Life Environments.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
Int. J. Inf. Sec., 2022
IEEE Secur. Priv., 2022
Exploiting If This Then That and Usage Control obligations for Smart Home security and management.
Concurr. Comput. Pract. Exp., 2022
Proceedings of the IEEE Symposium on Computers and Communications, 2022
Proceedings of the IEEE Symposium on Computers and Communications, 2022
2021
Ask a(n)droid to tell you the odds: probabilistic security-by-contract for mobile devices.
Soft Comput., 2021
Pattern Recognit. Lett., 2021
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
2020
RESPOnSE - A Framework for Enforcing Risk-Aware Security Policies in Constrained Dynamic Environments.
Sensors, 2020
D-BRIDEMAID: A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020
Int. J. Inf. Sec., 2020
IEEE Commun. Mag., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Information Systems Security and Privacy - 6th International Conference, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Multi-level Distributed Intrusion Detection System for an IoT based Smart Home Environment.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
A scheme for the sticky policy representation supporting secure cyber-threat intelligence analysis and sharing.
Inf. Comput. Secur., 2019
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019
Proceedings of the 27th Euromicro International Conference on Parallel, 2019
Demonstration of secure slicing using ETSI MANO enhanced with Usage Control Capability.
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019
Proceedings of the Information Security Practice and Experience, 2019
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019
2018
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention.
IEEE Trans. Dependable Secur. Comput., 2018
Future Gener. Comput. Syst., 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Privacy Preserving Distributed Attribute Computation for Usage Control in the Internet of Things.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Privacy Preserving Distributed Computation of Private Attributes for Collaborative Privacy Aware Usage Control Systems.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018
Walking Through the Deep: Gait Analysis for User Authentication Through Deep Learning.
Proceedings of the ICT Systems Security and Privacy Protection, 2018
Phylogenetic Analysis for Ransomware Detection and Classification into Families.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018
Towards General Scheme for Data Sharing Agreements Empowering Privacy-Preserving Data Analysis of Structured CTI.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Too Long, did not Enforce: A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed Environments.
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018
2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Smart Parental Advisory: A Usage Control and Deep Learning-Based Framework for Dynamic Parental Control on Smart TV.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Try Walking in My Shoes, if You Can: Accurate Gait Recognition Through Deep Learning.
Proceedings of the Computer Safety, Reliability, and Security, 2017
Proceedings of the 25th Euromicro International Conference on Parallel, 2017
Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
ERCIM News, 2016
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Security and Trust Management - 12th International Workshop, 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of Android malware.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the IEEE Symposium on Computers and Communication, 2016
MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Concurr. Comput. Pract. Exp., 2015
Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015
Preserving QoI in participatory sensing by tackling location-spoofing through mobile WiFi hotspots.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015
2014
Proceedings of the Security and Trust Management - 10th International Workshop, 2014
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014
Addressing privacy issues in location-based collaborative and distributed environments.
Proceedings of the 2014 International Conference on Collaboration Technologies and Systems, 2014
2013
Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Trusted Systems - 5th International Conference, 2013
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
Introducing Probabilities in Contract-Based Approaches for Mobile Application Security.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013
Proceedings of the 9th International Conference on Information Assurance and Security, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Proceedings of the Computer Network Security, 2012
Proceedings of the Trusted Systems, 4th International Conference, 2012