Corrado Aaron Visaggio
Orcid: 0000-0002-0558-4450Affiliations:
- University of Sannio, Italy
According to our database1,
Corrado Aaron Visaggio
authored at least 131 papers
between 2002 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
2025
0
5
10
15
20
25
2
2
2
5
4
3
3
3
4
4
3
1
1
1
1
2
3
2
3
3
5
2
1
2
8
18
9
3
3
1
2
4
2
5
5
3
2
3
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2025
Int. J. Inf. Sec., February, 2025
Future Gener. Comput. Syst., 2025
2024
J. Softw. Evol. Process., July, 2024
Identifying safety-critical concerns in unmanned aerial vehicle software platforms with SALIENT.
SoftwareX, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Automated Identification and Qualitative Characterization of Safety Concerns Reported in UAV Software Platforms.
ACM Trans. Softw. Eng. Methodol., May, 2023
CoRR, 2023
2022
J. Comput. Virol. Hacking Tech., 2022
Inf. Softw. Technol., 2022
Future Gener. Comput. Syst., 2022
Proceedings of the IEEE International Conference on Software Analysis, 2022
An empirical investigation on the trade-off between smart contract readability and gas consumption.
Proceedings of the 30th IEEE/ACM International Conference on Program Comprehension, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
IEEE Trans. Software Eng., 2021
Investigating the criticality of user-reported issues through their relations with app rating.
J. Softw. Evol. Process., 2021
A systematic literature review of blockchain and smart contract development: Techniques, tools, and open challenges.
J. Syst. Softw., 2021
Comput. Secur., 2021
A Study on Misclassification of Software Vulnerabilities when using Deep Learning and Machine Learning Algorithms.
Proceedings of the Italian Conference on Cybersecurity, 2021
Automatic Classification of Vulnerabilities using Deep Learning and Machine Learning Algorithms.
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2021
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2021
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021
2020
Inf. Softw. Technol., 2020
CoRR, 2020
Investigating the vulnerability fixing process in OSS projects: Peculiarities and challenges.
Comput. Secur., 2020
Proceedings of the Testing Software and Systems, 2020
Proceedings of the Fourth Italian Conference on Cyber Security, 2020
2019
IEEE Trans. Software Eng., 2019
Summarizing vulnerabilities' descriptions to support experts during vulnerability assessment activities.
J. Syst. Softw., 2019
On the effectiveness of system API-related information for Android ransomware detection.
Comput. Secur., 2019
Proceedings of the 2019 Summer Simulation Conference, 2019
2018
J. Softw. Evol. Process., 2018
Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
J. Comput. Virol. Hacking Tech., 2017
Android apps and user feedback: a dataset for software evolution and quality improvement.
Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics, 2017
s2ipt: A Lightweight Network Intrusion Detection/Prevention System based on IPtables.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the Symposium on Applied Computing, 2017
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017
Proceedings of the 39th International Conference on Software Engineering, 2017
"Mirror, Mirror on the Wall, Who is the Fairest One of All?" - Machine Learning versus Model Checking: A Comparison between Two Static Techniques for Malware Family Identification.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
2016
J. Comput. Virol. Hacking Tech., 2016
An HMM and structural entropy based detector for Android malware: An empirical study.
Comput. Secur., 2016
Proceedings of the 25th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2016
What would users change in my app? summarizing app reviews for recommending software changes.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of Android malware.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the Product-Focused Software Process Improvement, 2016
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016
Proceedings of the 38th International Conference on Software Engineering, 2016
Proceedings of the 38th International Conference on Software Engineering, 2016
Proceedings of the 4th FME Workshop on Formal Methods in Software Engineering, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the E-Business and Telecommunications - 13th International Joint Conference, 2016
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2016
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016
Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile, 2015
Proceedings of the SECRYPT 2015, 2015
Proceedings of the Product-Focused Software Process Improvement, 2015
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015
How can i improve my app? Classifying user reviews for software maintenance and evolution.
Proceedings of the 2015 IEEE International Conference on Software Maintenance and Evolution, 2015
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
Evaluating Op-Code Frequency Histograms in Malware and Third-Party Mobile Applications.
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Static analysis for the detection of metamorphic computer viruses using repeated-instructions counting heuristics.
J. Comput. Virol. Hacking Tech., 2014
Inf. Secur. J. A Glob. Perspect., 2014
e Informatica Softw. Eng. J., 2014
Enhancing Online Discussion Forums with Topic-Driven Content Search and Assisted Posting.
Proceedings of the Knowledge Discovery, Knowledge Engineering and Knowledge Management, 2014
Enhancing Online Discussion Forums with a Topic-driven Navigational Paradigm - A Plugin for the Moodle Learning Management System.
Proceedings of the KDIR 2014 - Proceedings of the International Conference on Knowledge Discovery and Information Retrieval, Rome, Italy, 21, 2014
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014
2013
A Case Study of Automating User Experience-Oriented Performance Testing on Smartphones.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013
Proceedings of the 35th International Conference on Software Engineering, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
2010
A heuristic-based approach for detecting SQL-injection vulnerabilities in web applications.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2010
2009
A System for Managing Security Knowledge using Case Based Reasoning and Misuse Cases.
J. Univers. Comput. Sci., 2009
Managing Security Knowledge through Case based Reasoning.
Proceedings of the Security in Information Systems, 2009
A Test Framework for Assessing Effectiveness of the Data Privacy Policy's Implementation into Relational Databases.
Proceedings of the The Forth International Conference on Availability, 2009
2008
Comput. Stand. Interfaces, 2008
Are fit tables really talking?: a series of experiments to understand whether fit tables are useful during evolution tasks.
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008
Evaluation of BPMN Models Quality - A Family of Experiments.
Proceedings of the ENASE 2008, 2008
A System to Prevent Multi-users and Multi-sessions Attack to Breach Privacy Policies in a Trust-End Filter.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008
2007
Empir. Softw. Eng., 2007
A Three Layered Model to Implement Data Privacy Policies.
Proceedings of the Security in Information Systems, 2007
Proceedings of the First International Symposium on Empirical Software Engineering and Measurement, 2007
2006
Softw. Pract. Exp., 2006
J. Syst. Archit., 2006
Int. J. Softw. Eng. Knowl. Eng., 2006
WECAP: A Web Environment for Project Planning.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006
Proceedings of the Product-Focused Software Process Improvement, 2006
Investigando los beneficios de Pair Designing: un estudio empírico con profesionales.
Proceedings of the XI Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2006), 2006
Evaluating advantages of test driven development: a controlled experiment with professionals.
Proceedings of the 2006 International Symposium on Empirical Software Engineering (ISESE 2006), 2006
Proceedings of the 10th European Conference on Software Maintenance and Reengineering (CSMR 2006), 2006
2005
J. Softw. Maintenance Res. Pract., 2005
J. Syst. Softw., 2005
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2005
The Impact of Educational Background on Design Knowledge Sharing During Pair Programming: An Empirical Study.
Proceedings of the WM 2005: Professional Knowledge Management - Experiences and Visions, Contributions to the 3rd Conference Professional Knowledge Management, 2005
Confirming the influence of educational background in pair-design knowledge through experiments.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005
Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), 2005
Proceedings of the 9th European Conference on Software Maintenance and Reengineering (CSMR 2005), 2005
2004
Proceedings of the Product Focused Software Process Improvement, 2004
Proceedings of the 12th International Workshop on Program Comprehension (IWPC 2004), 2004
Proceedings of the 8th European Conference on Software Maintenance and Reengineering (CSMR 2004), 2004
2003
Lessons learned about distributed pair programming: what are the knowledge needs to address?
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003
Proceedings of the 7th European Conference on Software Maintenance and Reengineering (CSMR 2003), 2003
2002
Proceedings of the Product Focused Software Process Improvement, 2002
Proceedings of the 2002 International Symposium on Empirical Software Engineering (ISESE 2002), 2002
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002