Fabio Martinelli

Orcid: 0000-0001-6746-4967

Affiliations:
  • National Research Council, Italy


According to our database1, Fabio Martinelli authored at least 470 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Explainable Ransomware Detection with Deep Learning Techniques.
J. Comput. Virol. Hacking Tech., June, 2024

Picker Blinder: a framework for automatic injection of malicious inter-app communication.
J. Comput. Virol. Hacking Tech., June, 2024

Deep Convolutional Generative Adversarial Networks in Image-Based Android Malware Detection.
Comput., June, 2024

ICSOC 2020 special issue on service-oriented computing.
Computing, April, 2024

Alzheimer's Disease Evaluation Through Visual Explainability by Means of Convolutional Neural Networks.
Int. J. Neural Syst., February, 2024

Extreme Learning Machine for Biomedical Image Classification: A Multi-Case Study.
EAI Endorsed Trans. Pervasive Health Technol., 2024

A Proposal for Privacy-preserving Ransomware Detection by means of Federated Machine Learning.
ERCIM News, 2024

On the Adoption of Explainable Deep Learning for Image-Based Network Traffic Classification.
Proceedings of the 14th International Conference on Simulation and Modeling Methodologies, 2024

Leveraging Deep Learning for Intrusion Detection in IoT Through Visualized Network Data.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

An Edge Server Deployment Strategy for Multi-Objective Optimization in the Internet of Vehicles.
Proceedings of the IEEE Symposium on Computers and Communications, 2024

Reliable Leukemia diagnosis and localization through Explainable Deep Learning.
Proceedings of the Fifth International Conference on Intelligent Data Science Technologies and Applications, 2024

Cybersecurity-Related Tweet Classification by Explainable Deep Learning.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

An Approach for Privacy-Preserving Mobile Malware Detection Through Federated Machine Learning.
Proceedings of the 26th International Conference on Enterprise Information Systems, 2024

Spiral Drawing Test and Explainable Convolutional Neural Networks for Parkinson's Disease Detection.
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024

Evaluating the Impact of Generative Adversarial Network in Android Malware Detection.
Proceedings of the 19th International Conference on Evaluation of Novel Approaches to Software Engineering, 2024

Security Policy Generation and Verification through Large Language Models: A Proposal.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024

DroidDefender: An Image-based Android Antimalware Proof-of-Concept.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024

Detecting Retinal Fundus Image Synthesis by Means of Generative Adversarial Network.
Proceedings of the 17th International Joint Conference on Biomedical Engineering Systems and Technologies, 2024

SYNAPSE - An Integrated Cyber Security Risk & Resilience Management Platform, With Holistic Situational Awareness, Incident Response & Preparedness Capabilities: SYNAPSE.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Explainable Convolutional Neural Networks for Brain Cancer Detection and Localisation.
Sensors, September, 2023

Diabetic retinopathy detection and diagnosis by means of robust and explainable convolutional neural networks.
Neural Comput. Appl., August, 2023

A survey of human-computer interaction (HCI) & natural habits-based behavioural biometric modalities for user recognition schemes.
Pattern Recognit., July, 2023

A Privacy-Preserving Solution for Intelligent Transportation Systems: Private Driver DNA.
IEEE Trans. Intell. Transp. Syst., January, 2023

Nereus: Anonymous and Secure Ride-Hailing Service Based on Private Smart Contracts.
IEEE Trans. Dependable Secur. Comput., 2023

Water Meter Reading for Smart Grid Monitoring.
Sensors, 2023

A deep-learning approach to game bot identification via behavioural features analysis in complex massively-cooperative environments.
Int. J. Data Min. Model. Manag., 2023

Privacy-Preserving Data Sharing for Collaborative Analytics in Multi-Modal Transportation Systems.
ERCIM News, 2023

Cyber threat intelligence for critical infrastructure security.
Concurr. Comput. Pract. Exp., 2023

TriAD: A Deep Ensemble Network for Alzheimer Classification and Localization.
IEEE Access, 2023

Electric Vehicle Security and Privacy: A Comparative Analysis of Charging Methods.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

A Method for Robust and Explainable Image-Based Network Traffic Classification with Deep Learning.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Object Detection and Localisation in Thermal Images by means of UAV/Drone.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023

Damage Detection and Localisation using UAV/ Drone with Object Detection.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023

Explainable Deep Learning for Face Mask Detection.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023

Exploring Quantum Machine Learning for Explainable Malware Detection.
Proceedings of the International Joint Conference on Neural Networks, 2023

Benchmarking YOLO Models for Automatic Reading in Smart Metering Systems: A Performance Comparison Analysis.
Proceedings of the International Conference on Machine Learning and Applications, 2023

An Explainable Convolutional Neural Network for Dynamic Android Malware Detection.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

StegWare: A Novel Malware Model Exploiting Payload Steganography and Dynamic Compilation.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

A Fuzzy Deep Learning Network for Dynamic Mobile Malware Detection.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2023

Image-Based Malware Detection Through a Deep Neuro-Fuzzy Model.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2023

Evaluating Fuzzy Machine Learning for Smart Grid Instability Detection.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2023

μIPS: Software-Based Intrusion Prevention for Bare-Metal Embedded Systems.
Proceedings of the Computer Security - ESORICS 2023, 2023

A Driver Detection Method by Means of Explainable Deep Learning.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Data Poisoning Attacks over Diabetic Retinopathy Images Classification.
Proceedings of the IEEE International Conference on Big Data, 2023

A Proposal for Trustworthy Artificial Intelligence.
Proceedings of the IEEE International Conference on Big Data, 2023

Explainable Deep Learning for Smart Grid Stability Detection.
Proceedings of the IEEE International Conference on Big Data, 2023

Application of Secure Two-Party Computation in a Privacy-Preserving Android App.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

Obfuscated Mobile Malware Detection by Means of Dynamic Analysis and Explainable Deep Learning.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
2Faces: a new model of malware based on dynamic compiling and reflection.
J. Comput. Virol. Hacking Tech., 2022

Driver Identification Through Formal Methods.
IEEE Trans. Intell. Transp. Syst., 2022

RiderAuth: A cancelable touch-signature based rider authentication scheme for driverless taxis.
J. Inf. Secur. Appl., 2022

Privacy preserving data sharing and analysis for edge-based architectures.
Int. J. Inf. Sec., 2022

Fighting Cybercrime by Introducing Trustworthiness and Interpretability in Deep Learning Malware Detection.
ERCIM News, 2022

Exploiting If This Then That and Usage Control obligations for Smart Home security and management.
Concurr. Comput. Pract. Exp., 2022

Assessing Deep Learning Predictions in Image-Based Malware Detection with Activation Maps.
Proceedings of the Security and Trust Management - 18th International Workshop, 2022

A Real-time Method for CAN Bus Intrusion Detection by Means of Supervised Machine Learning.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

A Method for Road Accident Prevention in Smart Cities based on Deep Reinforcement Learning.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Generative adversarial networks for subdomain enumeration.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

Timed Automata Networks for SCADA Attacks Real-Time Mitigation.
Proceedings of the Intelligent Decision Technologies, 2022

A Method for Intrusion Detection in Smart Grid.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

Drone Audio recognition based on Machine Learning Techniques.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

High Grade Brain Cancer Segmentation by means of Deep Learning.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

A Model Checking-based Approach to Malicious Family Detection in iOS Environment.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

On the Resilience of Shallow Machine Learning Classification in Image-based Malware Detection.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

Explainable Retinopathy Diagnosis and Localisation by means of Class Activation Mapping.
Proceedings of the International Joint Conference on Neural Networks, 2022

Deep learning for blood cells classification and localisation.
Proceedings of the Fifteenth International Conference on Machine Vision, 2022

Continuous and Silent User Authentication Through Mouse Dynamics and Explainable Deep Learning.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

COVID-19 Detection from Cough Recording by means of Explainable Deep Learning.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

On the Influence of Image Settings in Deep Learning-based Malware Detection.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Designing Robust Deep Learning Classifiers for Image-based Malware Analysis.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Explainable Deep Learning Methodologies for Biomedical Images Classification.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Product Incremental Security Risk Assessment Using DevSecOps Practices.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

Emotion Recognition from Facial Expression using Explainable Deep Learning.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

Vulnerable Smart Contract Detection by Means of Model Checking.
Proceedings of the BSCI 2022: Proceedings of the 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2022

Blood Cells Counting and Localisation through Deep Learning Object Detection.
Proceedings of the IEEE International Conference on Big Data, 2022

Smart Grid monitoring through Deep Learning for Image-based Automatic Dial Meter Reading.
Proceedings of the IEEE International Conference on Big Data, 2022

Continuous and Silent User Authentication Through Mouse Dynamics and Explainable Deep Learning: A Proposal.
Proceedings of the IEEE International Conference on Big Data, 2022

Machine Learning for Uterine Cervix Screening.
Proceedings of the 22nd IEEE International Conference on Bioinformatics and Bioengineering, 2022

Deep Learning for Heartbeat Phonocardiogram Signals Explainable Classification.
Proceedings of the 22nd IEEE International Conference on Bioinformatics and Bioengineering, 2022

Explainable Deep Learning for Alzheimer Disease Classification and Localisation.
AII, 2022

Introducing Quantum Computing in Mobile Malware Detection.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021

Ask a(n)droid to tell you the odds: probabilistic security-by-contract for mobile devices.
Soft Comput., 2021

Using recurrent neural networks for continuous authentication through gait analysis.
Pattern Recognit. Lett., 2021

Privacy for 5G-Supported Vehicular Networks.
IEEE Open J. Commun. Soc., 2021

Cybsersecurity Issues in Robotics.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Dynamic Mobile Malware Detection through System Call-based Image representation.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Optimisation of cyber insurance coverage with selection of cost effective security controls.
Comput. Secur., 2021

Towards an interpretable deep learning model for mobile malware detection and family identification.
Comput. Secur., 2021

Mobile Family Detection through Audio Signals Classification.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Automated Intention Mining with Comparatively Fine-tuning BERT.
Proceedings of the NLPIR 2021: 5th International Conference on Natural Language Processing and Information Retrieval, Sanya, China, December 17, 2021

Detecting Call Indirection Obfuscation through Equivalence Checking in Android environment.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

Exploiting Supervised Machine Learning for Driver Detection in a Real-World Environment.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

Android Collusion Detection by means of Audio Signal Analysis with Machine Learning techniques.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

Vulnerability Evaluation of Android Malware Detectors against Adversarial Examples.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

Perturbation of Image-based Malware Detection with Smali level morphing techniques.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

A Proposal to Ensure Social Distancing with Deep Learning-based Object Detection.
Proceedings of the International Joint Conference on Neural Networks, 2021

A Semi-Automated Explainability-Driven Approach for Malware Analysis through Deep Learning.
Proceedings of the International Joint Conference on Neural Networks, 2021

Towards Collaborative Cyber Threat Intelligence for Security Management.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

Colluding Covert Channel for Malicious Information Exfiltration in Android Environment.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

A Machine-Learning-Based Framework for Supporting Malware Detection and Analysis.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021

A Neural-Network-Based Framework for Supporting Driver Classification and Analysis.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021

A Framework for Supporting Ransomware Detection and Prevention Based on Hybrid Analysis.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021

Handling Meta Attribute Information in Usage Control Policies (Short Paper).
Proceedings of the Emerging Technologies for Authorization and Authentication, 2021

Robust Malware Classification via Deep Graph Networks on Call Graph Topologies.
Proceedings of the 29th European Symposium on Artificial Neural Networks, 2021

SteælErgon: A Framework for Injecting Colluding Malicious Payload in Android Applications.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
LoSeRO: A Locality Sensitive Routing Protocol in Opportunistic Networks with Contact Profiles.
IEEE Trans. Mob. Comput., 2020

Model checking and machine learning techniques for <i>HummingBad</i> mobile malware detection and mitigation.
Simul. Model. Pract. Theory, 2020

D-BRIDEMAID: A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

Session-dependent Usage Control for Big Data.
J. Internet Serv. Inf. Secur., 2020

Visualizing the outcome of dynamic analysis of Android malware with VizMal.
J. Inf. Secur. Appl., 2020

Android Collusion: Detecting Malicious Applications Inter-Communication through SharedPreferences.
Inf., 2020

Digital Waste Disposal: an automated framework for analysis of spam emails.
Int. J. Inf. Sec., 2020

Timed Automata for Mobile Ransomware Detection.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2020

alurity, a toolbox for robot cybersecurity.
CoRR, 2020

Pushing Forward Security in Network Slicing by Leveraging Continuous Usage Control.
IEEE Commun. Mag., 2020

Human behavior characterization for driving style recognition in vehicle system.
Comput. Electr. Eng., 2020

Machine Learning for Driver Detection through CAN bus.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A Deep-Learning-Based Framework for Supporting Analysis and Detection of Attacks on CAN Buses.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020

Machine learning for coronavirus covid-19 detection from chest x-rays.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020

Deep learning for heart disease detection through cardiac sounds.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020

Evaluating Deep Learning Classification Reliability in Android Malware Family Detection.
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020

Image-based Malware Family Detection: An Assessment between Feature Extraction and Classification Techniques.
Proceedings of the 5th International Conference on Internet of Things, 2020

Enhanced Privacy and Data Protection using Natural Language Processing and Artificial Intelligence.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Malicious Collusion Detection in Mobile Environment by means of Model Checking.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Bank Credit Risk Management based on Data Mining Techniques.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

End to End Autorship Email Verification Framework for a Secure Communication.
Proceedings of the Information Systems Security and Privacy - 6th International Conference, 2020

Email Spoofing Attack Detection through an End to End Authorship Attribution System.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Android Run-time Permission Exploitation User Awareness by Means of Formal Methods.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Accidental Sensitive Data Leaks Prevention via Formal Verification.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

A Comparison Among Policy Editors for Attributed Based Access Control Model.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2020

Emotions and Interests of Evolving Twitter Bots.
Proceedings of the 2020 IEEE Conference on Evolving and Adaptive Intelligent Systems, 2020

Predicting Probability of Default Under IFRS 9 Through Data Mining Techniques.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

Code Reordering Obfuscation Technique Detection by Means of Weak Bisimulation.
Proceedings of the Advanced Information Networking and Applications, 2020

Colluding Android Apps Detection via Model Checking.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

Towards the Use of Generative Adversarial Neural Networks to Attack Online Resources.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

Improving security in industry 4.0 by extending OPC-UA with usage control.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

VisualDroid: automatic triage and detection of Android repackaged applications.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
LEILA: Formal Tool for Identifying Mobile Malicious Behaviour.
IEEE Trans. Software Eng., 2019

A "pay-how-you-drive" car insurance approach through cluster analysis.
Soft Comput., 2019

Upper triangular matrix walk: Cutoff for finitely many columns.
Random Struct. Algorithms, 2019

Model Checking Based Approach for Compliance Checking.
Inf. Technol. Control., 2019

A scheme for the sticky policy representation supporting secure cyber-threat intelligence analysis and sharing.
Inf. Comput. Secur., 2019

Dynamic malware detection and phylogeny analysis using process mining.
Int. J. Inf. Sec., 2019

Classification of ransomware families with machine learning based on N-gram of opcodes.
Future Gener. Comput. Syst., 2019

On the effectiveness of system API-related information for Android ransomware detection.
Comput. Secur., 2019

Real-Time SCADA Attack Detection by Means of Formal Methods.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

On the Statistical Detection of Adversarial Instances over Encrypted Data.
Proceedings of the Security and Trust Management - 15th International Workshop, 2019

A Privacy-Preserving Infrastructure for Driver's Reputation Aware Automotive Services.
Proceedings of the Socio-Technical Aspects in Security and Trust, 2019

Managing QoS in Smart Buildings Through Software Defined Network and Usage Control.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Obligation Management in Usage Control Systems.
Proceedings of the 27th Euromicro International Conference on Parallel, 2019

Wearable Devices for Human Activity Recognition and User Detection.
Proceedings of the 27th Euromicro International Conference on Parallel, 2019

Demonstration of secure slicing using ETSI MANO enhanced with Usage Control Capability.
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019

Energy Consumption Metrics for Mobile Device Dynamic Malware Detection.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

Model Checking for Data Anomaly Detection.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

Using IFTTT to Express and Enforce UCON Obligations.
Proceedings of the Information Security Practice and Experience, 2019

Formal Methods for Android Banking Malware Analysis and Detection.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

Enhancing Security in ETSI Open Source MANO with Usage Control Capability.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Social Network Polluting Contents Detection through Deep Learning Techniques.
Proceedings of the International Joint Conference on Neural Networks, 2019

Cascade Learning for Mobile Malware Families Detection through Quality and Android Metrics.
Proceedings of the International Joint Conference on Neural Networks, 2019

Keystroke Analysis for User Identification using Deep Neural Networks.
Proceedings of the International Joint Conference on Neural Networks, 2019

A machine-learning framework for supporting intelligent web-phishing detection and analysis.
Proceedings of the 23rd International Database Applications & Engineering Symposium, 2019

Model Checking to Detect the Hummingbad Malware.
Proceedings of the Intelligent Distributed Computing XIII, 2019

Privacy-Preserving LDA Classification over Horizontally Distributed Data.
Proceedings of the Intelligent Distributed Computing XIII, 2019

Spyware Detection using Temporal Logic.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

An Innovative Framework for Supporting Social Network Polluting-content Detection and Analysis.
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019

Distributed UCON in CoAP and MQTT Protocols.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Investigating Mobile Applications Quality in Official and Third-party Marketplaces.
Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering, 2019

Distributed Data Anonymization.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

Cyber Insurance and Time-to-Compromise: An Integrated Approach.
Proceedings of the International Conference on Cyber Situational Awareness, 2019

A Data Life Cycle Modeling Proposal by Means of Formal Methods.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

User Authentication through Keystroke Dynamics by means of Model Checking: A Proposal.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

A Model Checking based Proposal for Mobile Colluding Attack Detection.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

A Distributed Usage Control Framework for Industrial Internet of Things.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

2018
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention.
IEEE Trans. Dependable Secur. Comput., 2018

A tour of secure software engineering solutions for connected vehicles.
Softw. Qual. J., 2018

An exploratory study on the evolution of Android malware quality.
J. Softw. Evol. Process., 2018

Experimenting and assessing machine learning tools for detecting and analyzing malicious behaviors in complex environments.
J. Reliab. Intell. Environ., 2018

Evaluating model checking for cyber threats code obfuscation identification.
J. Parallel Distributed Comput., 2018

Risk analysis of Android applications: A user-centric solution.
Future Gener. Comput. Syst., 2018

R-PackDroid: Practical On-Device Detection of Android Ransomware.
CoRR, 2018

Safety Critical Systems Formal Verification Using Execution Traces.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018

Towards a Declarative Approach to Stateful and Stateless Usage Control for Data Protection.
Proceedings of the 14th International Conference on Web Information Systems and Technologies, 2018

A Declarative Data Protection Approach: From Human-Readable Policies to Automatic Enforcement.
Proceedings of the Web Information Systems and Technologies, 2018

CANDY: A Social Engineering Attack to Leak Information from Infotainment System.
Proceedings of the 87th IEEE Vehicular Technology Conference, 2018

Practical Location Validation in Participatory Sensing Through Mobile WiFi Hotspots.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Privacy Preserving Distributed Attribute Computation for Usage Control in the Internet of Things.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Privacy Preserving Distributed Computation of Private Attributes for Collaborative Privacy Aware Usage Control Systems.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

Improving Vehicle Safety Through a Fog Collaborative Infrastructure.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

Optimal Security Configuration for Cyber Insurance.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Walking Through the Deep: Gait Analysis for User Authentication Through Deep Learning.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Real-Time Driver Behaviour Characterization Through Rule-Based Machine Learning.
Proceedings of the Computer Safety, Reliability, and Security, 2018

Context-Awareness Mobile Devices for Traffic Incident Prevention.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018

A Secure Distributed Framework for Agglomerative Hierarchical Clustering Construction.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018

CARS: Context Aware Reputation Systems to Evaluate Vehicles' Behaviour.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018

Getmewhere: A Location-Based Privacy-Preserving Information Service.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018

Driver Identification: a Time Series Classification Approach.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

Applying Machine Learning Techniques to Detect and Analyze Web Phishing Attacks.
Proceedings of the 20th International Conference on Information Integration and Web-based Applications & Services, 2018

Enhancing Usage Control for Performance: A Proposal for Systems of Systems (Research Poster).
Proceedings of the 2018 International Conference on High Performance Computing & Simulation, 2018

Detecting and Analyzing Anomalies Across Historical Data Changes: A Data-Driven Approach.
Proceedings of the IEEE 30th International Conference on Tools with Artificial Intelligence, 2018

Privacy Preserving Collaborative Agglomerative Hierarchical Clustering Construction.
Proceedings of the Information Systems Security and Privacy - 4th International Conference, 2018

Cluster Analysis for Driver Aggressiveness Identification.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Who's Driving My Car? A Machine Learning based Approach to Driver Identification.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Identifying Insecure Features in Android Applications using Model Checking.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Secure Two-party Agglomerative Hierarchical Clustering Construction.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

VizMal: A Visualization Tool for Analyzing the Behavior of Android Malware.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Phylogenetic Analysis for Ransomware Detection and Classification into Families.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Applying Deep Learning Techniques to CAN Bus Attacks for Supporting Identification and Analysis Tasks.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

A Novel Structural-Entropy-based Classification Technique for Supporting Android Ransomware Detection and Analysis.
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018

An Ensemble Fuzzy Logic Approach to Game Bot Detection through Behavioural Features.
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018

Towards General Scheme for Data Sharing Agreements Empowering Privacy-Preserving Data Analysis of Structured CTI.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

Privacy Preserving Expectation Maximization (EM) Clustering Construction.
Proceedings of the Distributed Computing and Artificial Intelligence, 2018

Privacy Preserving Random Decision Tree Classification Over Horizontally and Vertically Partitioned Data.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Cyber Insurance and Security Interdependence: Friends or Foes?
Proceedings of the International Conference On Cyber Situational Awareness, 2018

POSTER: A Framework for Phylogenetic Analysis in Mobile Environment.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Too Long, did not Enforce: A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed Environments.
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018

Measuring Mobile Applications Quality and Security in Higher Education.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Improving Machine Learning Tools with Embeddings: Applications to Big Data Security.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Detection of Obfuscation Techniques in Android Applications.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Stateful Data Usage Control for Android Mobile Devices.
Int. J. Inf. Sec., 2017

Cyber-insurance survey.
Comput. Sci. Rev., 2017

Private mobility-cast for opportunistic networks.
Comput. Networks, 2017

A time series classification approach to game bot detection.
Proceedings of the 7th International Conference on Web Intelligence, Mining and Semantics, 2017

Privacy-Utility Feature Selection as a Privacy Mechanism in Collaborative Data Classification.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

Formal Methods Meet Mobile Code Obfuscation Identification of Code Reordering Technique.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

Implementing Usage Control in Internet of Things: A Smart Home Use Case.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Smart Parental Advisory: A Usage Control and Deep Learning-Based Framework for Dynamic Parental Control on Smart TV.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

Privacy Preserving Hierarchical Clustering over Multi-party Data Distribution.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Improving MQTT by Inclusion of Usage Control.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Mobile Silent and Continuous Authentication using Apps Sequence.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Try Walking in My Shoes, if You Can: Accurate Gait Recognition Through Deep Learning.
Proceedings of the Computer Safety, Reliability, and Security, 2017

R-PackDroid: API package-based characterization and detection of mobile ransomware.
Proceedings of the Symposium on Applied Computing, 2017

A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

Trade-off analysis of safety and security in CAN bus communication.
Proceedings of the 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems, 2017

Concurrent History-based Usage Control Policies.
Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017

A Quantitative Partial Model-Checking Function and Its Optimisation.
Proceedings of the LPAR-21, 2017

Evaluating Convolutional Neural Network for Effective Mobile Malware Detection.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017

Privacy preserving clustering over horizontal and vertical partitioned data.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Privacy-preserving text mining as a service.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

A Machine Learning Approach for Game Bot Detection Through Behavioural Features.
Proceedings of the Software Technologies - 12th International Joint Conference, 2017

Game Bot Detection in Online Role Player Game through Behavioural Features.
Proceedings of the 12th International Conference on Software Technologies, 2017

Model Checking for Mobile Android Malware Evolution.
Proceedings of the 5th IEEE/ACM International FME Workshop on Formal Methods in Software Engineering, 2017

Identifying Mobile Repackaged Applications through Formal Methods.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Efficient Detection of Conflicts in Data Sharing Agreements.
Proceedings of the Information Systems Security and Privacy, 2017

Analysis of Data Sharing Agreements.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Car hacking identification through fuzzy logic algorithms.
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017

A fuzzy-based process mining approach for dynamic malware detection.
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017

Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

Introducing Usage Control in MQTT.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

Privacy-Utility Feature Selection as a tool in Private Data Classification.
Proceedings of the Distributed Computing and Artificial Intelligence, 2017

Reputation Systems to Mitigate DoS Attack in Vehicular Network.
Proceedings of the Critical Information Infrastructures Security, 2017

Preventing the Drop in Security Investments for Non-competitive Cyber-Insurance Market.
Proceedings of the Risks and Security of Internet and Systems, 2017

BRIDEMAID: An Hybrid Tool for Accurate Detection of Android Malware.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

How Discover a Malware using Model Checking.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Tor traffic analysis and detection via machine learning techniques.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Malware and Formal Methods: Rigorous Approaches for detecting Malicious Behaviour.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Enhancing Video Surveillance with Usage Control and Privacy-Preserving Solutions.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

Usage Control on Cloud systems.
Future Gener. Comput. Syst., 2016

Cybersecurity - Introduction to the Special Theme.
ERCIM News, 2016

LVS: A WiFi-based system to tackle Location Spoofing in location-based services.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

Modeling Privacy Aware Information Sharing Systems: A Formal and General Approach.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

On Probabilistic Application Compliance.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Enforcement of U-XACML History-Based Usage Control Policy.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

A multi-criteria ranking of security countermeasures.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Enhancing Android permission through usage control: a BYOD use-case.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

LoSeRO: a locality sensitive routing protocol in opportunistic networks.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Automated adaptation via quantitative partial model checking.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Security by Insurance for Services.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of Android malware.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Towards a Usage Control Based Video Surveillance Framework.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

Exploiting Vehicles' Reputation to Mitigate DoS Attack.
Proceedings of the International Workshop on domAin specific Model-based AppRoaches to vErificaTion and validaTiOn, 2016

Data-Sluice: Fine-grained traffic control for Android application.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Privacy-Aware Data Sharing in a Tree-Based Categorical Clustering Algorithm.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

A Formal and Run-Time Framework for the Adaptation of Local Behaviours to Match a Global Property.
Proceedings of the Formal Aspects of Component Software - 13th International Conference, 2016

Practical Privacy-Preserving Medical Diagnosis Using Homomorphic Encryption.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

Collaborative Attribute Retrieval in Environment with Faulty Attribute Managers.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
A quality model for social networks populated with web services.
Serv. Oriented Comput. Appl., 2015

Probabilistic cost enforcement of security policies.
J. Comput. Secur., 2015

AntiCheetah: Trustworthy computing in an outsourced (cheating) environment.
Future Gener. Comput. Syst., 2015

Semiring-based Specification Approaches for Quantitative Security.
Proceedings of the Proceedings Thirteenth Workshop on Quantitative Aspects of Programming Languages and Systems, 2015

Dynamics of Lattice Triangulations on Thin Rectangles.
CoRR, 2015

Detection of repackaged mobile applications through a collaborative approach.
Concurr. Comput. Pract. Exp., 2015

Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015

Network security supported by arguments.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

Preserving QoI in participatory sensing by tackling location-spoofing through mobile WiFi hotspots.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015

Location-Based Routing for Opportunistic Networks.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

Sharing Data through Confidential Clouds: An Architectural Perspective.
Proceedings of the 1st IEEE/ACM International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, 2015

Privacy-Preserving Energy-Reading for Smart Meter.
Proceedings of the Inclusive Smart Cities and e-Health, 2015

Fast and Effective Clustering of Spam Emails Based on Structural Similarity.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

Business Reputation of Social Networks of Web Services.
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015

There are Two Sides to Every Question - Controller Versus Attacker.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

2014
On the Synthesis of Secure Services Composition.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

Investigating the Privacy versus Forwarding Accuracy Tradeoff in OpportunisticInterest-Casting.
IEEE Trans. Mob. Comput., 2014

Testing of PolPA-based usage control systems.
Softw. Qual. J., 2014

Automated Synthesis and Ranking of Secure BPMN Orchestrators.
Int. J. Secur. Softw. Eng., 2014

Using Incentives to Analyze Social Web Services' Behaviors.
Proceedings of the Web Information Systems Engineering - WISE 2014 Workshops, 2014

Stateful Usage Control for Android Mobile Devices.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

Architecture, Workflows, and Prototype for Stateful Data Usage Control in Cloud.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Determining the Probability of Smart Grid Attacks by Combining Attack Tree and Attack Graph Analysis.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

On Security Countermeasures Ranking through Threat Analysis.
Proceedings of the Computer Safety, Reliability, and Security, 2014

Privacy-preserving mobility-casting in opportunistic networks.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Evaluation of Risk for Complex Systems Using Attack Surface.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

Usage Control in Cloud Federations.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

Debating Cybersecurity or Securing a Debate? - (Position Paper).
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

Enforcing Mobile Application Security Through Probabilistic Contracts.
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014

Reputation-Based Composition of Social Web Services.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

An Improved Role-Based Access to Android Applications with JCHR.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Cost-Effective Enforcement of Access and Usage Control Policies Under Uncertainties.
IEEE Syst. J., 2013

Secure and Privacy-Aware Mobile Identity Management.
ERCIM News, 2013

Privacy-Preserving Interest-Cast for Android Smartphones.
ERCIM News, 2013

A Survey on Security for Mobile Devices.
IEEE Commun. Surv. Tutorials, 2013

Usage control in SIP-based multimedia delivery.
Comput. Secur., 2013

AntiCheetah: An Autonomic Multi-round Approach for Reliable Computing.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

Formal Analysis of Security Metrics with Defensive Actions.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Random lattice triangulations: structure and algorithms.
Proceedings of the Symposium on Theory of Computing Conference, 2013

Towards Attribute-Based Access Control Policy Engineering Using Risk.
Proceedings of the Risk Assessment and Risk-Driven Testing - First International Workshop, 2013

Remote Policy Enforcement for Trusted Application Execution in Mobile Environments.
Proceedings of the Trusted Systems - 5th International Conference, 2013

Towards Policy Engineering for Attribute-Based Access Control.
Proceedings of the Trusted Systems - 5th International Conference, 2013

Integration of Quantitative Methods for Risk Evaluation within Usage Control Policies.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

CheR: Cheating Resilience in the Cloud via Smart Resource Allocation.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Quantitative Evaluation of Enforcement Strategies - Position Paper.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Partial Model Checking for the Verification and Synthesis of Secure Service Compositions.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013

Classifying Android Malware through Subgraph Mining.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Introducing Probabilities in Contract-Based Approaches for Mobile Application Security.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

A collaborative framework for generating probabilistic contracts.
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013

Are photos on Social Networks really private?
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013

Multi-dimensional Secure Service Orchestration.
Proceedings of the Business Process Management Workshops, 2013

Towards enforcing on-the-fly policies in BYOD environments.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

How to grant less permissions to facebook applications.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

Probabilistic Contract Compliance for Mobile Applications.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
A framework for automatic generation of security controller.
Softw. Test. Verification Reliab., 2012

Synthesis of secure adaptors.
J. Log. Algebraic Methods Program., 2012

Modular plans for secure service composition.
J. Comput. Secur., 2012

Metric-Aware Secure Service Orchestration
Proceedings of the Proceedings Fifth Interaction and Concurrency Experience, 2012

A semiring-based framework for the deduction/abduction reasoning in access control with weighted credentials.
Comput. Math. Appl., 2012

Privacy-preserving interest-casting in opportunistic networks.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

A Prototype for Enforcing Usage Control Policies Based on XACML.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

Cost-Aware Runtime Enforcement of Security Policies.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

Broadcast Authentication for Resource Constrained Devices: A Major Pitfall and Some Solutions.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Continuous Authorizations in SIP with Usage Control.
Proceedings of the 20th Euromicro International Conference on Parallel, 2012

A tool for the synthesis of cryptographic orchestrators.
Proceedings of the Model-Driven Security Workshop, 2012

An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-cast.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

From Qualitative to Quantitative Enforcement of Security Policy.
Proceedings of the Computer Network Security, 2012

MADAM: A Multi-level Anomaly Detector for Android Malware.
Proceedings of the Computer Network Security, 2012

A Quantitative Approach for Inexact Enforcement of Security Policies.
Proceedings of the Information Security - 15th International Conference, 2012

A Multi-criteria-Based Evaluation of Android Applications.
Proceedings of the Trusted Systems, 4th International Conference, 2012

Testing of PolPA authorization systems.
Proceedings of the 7th International Workshop on Automation of Software Test, 2012

Usage control in cloud systems.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Towards Modelling Adaptive Attacker's Behaviour.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

Quantitative access control with partially-observable Markov decision processes.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

Priorities-Based Review Computation.
Proceedings of the Intelligent Web Services Meet Social Computing, 2012

A Formal Support for Collaborative Data Sharing.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
The Multistate Hard Core Model on a Regular Tree.
SIAM J. Discret. Math., 2011

Convergence to equilibrium of biased plane Partitions.
Random Struct. Algorithms, 2011

Secure service orchestration in open networks.
J. Syst. Archit., 2011

Formal Analysis of Security Metrics and Risk.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

IMS Session Management Based on Usage Control.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

Security and Trust.
Proceedings of the Formal Methods for Eternal Networked Software Systems, 2011

A General Method for Assessment of Security in Complex Services.
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011

Preserving security properties under refinement.
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011

Sharp Mixing Time Bounds for Sampling Random Surfaces.
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011

Engineering Secure Future Internet Services.
Proceedings of the Future Internet, 2011

A Distributed Authorization System with Mobile Usage Control Policies.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2011, 2011

Risk-Based Auto-delegation for Probabilistic Availability.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

Cost-effective Enforcement of UCON<sub>A</sub> Policies.
Proceedings of the CRiSIS 2011, 2011

2010
Access and Usage Control in Grid Systems.
Proceedings of the Handbook of Information and Communication Security, 2010

Special issue on security and trust management for dynamic coalitions.
Secur. Commun. Networks, 2010

Security-by-Contract-with-Trust for Mobile Devices.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

On usage control for GRID systems.
Future Gener. Comput. Syst., 2010

Parental Control for Mobile Devices.
ERCIM News, 2010

Usage control in computer security: A survey.
Comput. Sci. Rev., 2010

Runtime monitoring for next generation Java ME platform.
Comput. Secur., 2010

Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks.
Comput. Commun., 2010

Usage Control, Risk and Trust.
Proceedings of the Trust, 2010

Influence of Attribute Freshness on Decision Making in Usage Control.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010

Dependability in dynamic, evolving and heterogeneous systems: the connect approach.
Proceedings of the 2nd International Workshop on Software Engineering for Resilient Systems, 2010

Risk-Based Usage Control for Service Oriented Architecture.
Proceedings of the 18th Euromicro Conference on Parallel, 2010

Enforcing UCON Policies on the Enterprise Service Bus.
Proceedings of the On the Move to Meaningful Internet Systems, 2010

Formal approach to security metrics.: what does "more secure" mean for you?
Proceedings of the Software Architecture, 4th European Conference, 2010

Extending Security-by-Contract with Quantitative Trust on Mobile Devices.
Proceedings of the CISIS 2010, 2010

A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints.
Proceedings of the Autonomic and Trusted Computing - 7th International Conference, 2010

2009
Securing Java with Local Policies.
J. Object Technol., 2009

Enhancing grid security by fine-grained behavioral control and negotiation-based authorization.
Int. J. Inf. Sec., 2009

Mixing time for the solid-on-solid model.
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009

Detection of images with adult content for parental control on mobile devices?
Proceedings of the 6th International Conference on Mobile Technology, 2009

On Usage Control in Data Grids.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

A Proposal on Enhancing XACML with Continuous Usage Control Features.
Proceedings of the Grids, 2009

Idea: Action Refinement for Security Properties Enforcement.
Proceedings of the Engineering Secure Software and Systems, 2009

On Usage Control for GRID Services.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

Executable Specification of Cryptofraglets in Maude for Security Verification.
Proceedings of the Bioinspired Models of Network, Information, and Computing Systems, 2009

2008
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks.
J. Autom. Reason., 2008

Enhancing Java ME Security Support with Resource Usage Monitoring.
ERCIM News, 2008

Towards Information Flow Properties for Distributed Systems.
Proceedings of the 3rd International Workshop on Views On Designing Complex Architectures, 2008

Preface.
Proceedings of the 4th International Workshop on Security and Trust Management, 2008

Controlling Usage in Business Process Workflows through Fine-Grained Security Policies.
Proceedings of the Trust, 2008

Fine-Grained Continuous Usage Control of Service Based Grids - The GridTrust Approach.
Proceedings of the Towards a Service-Based Internet, 2008

A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device Application.
Proceedings of the Leveraging Applications of Formal Methods, 2008

A Runtime Monitoring Environment for Mobile Java.
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008

A Uniform Approach to Security and Fault-Tolerance Specification and Analysis.
Proceedings of the Architecting Dependable Systems VI, 2008

Mobile Implementation and Formal Verification of an e-Voting System.
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008

Enhancing Java ME Security Support with Resource Usage Monitoring.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Signed and Weighted Trust Credentials in Fraglets.
Proceedings of the 3rd International ICST Conference on Bio-Inspired Models of Network, 2008

A Semantic Foundation for Trust Management Languages with Weights: An Application to the RTFamily.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

Synthesis of Local Controller Programs for Enforcing Global Security Properties.
Proceedings of the The Third International Conference on Availability, 2008

Weighted Datalog and Levels of Trust.
Proceedings of the The Third International Conference on Availability, 2008

2007
Fast mixing for independent sets, colorings, and other models on trees.
Random Struct. Algorithms, 2007

Guest Editors' Preface.
Int. J. Inf. Sec., 2007

Formal Modelling and Verification in Service-Oriented Computing.
ERCIM News, 2007

Synthesis of Web Services Orchestrators in a Timed Setting.
Proceedings of the Web Services and Formal Methods, 4th International Workshop, 2007

A model for usage control in GRID systems.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

A model for usage control in GRID systems.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Fine Grained Access Control with Trust and Reputation Management for Globus.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Enhancing Java Security with History Based Access Control.
Proceedings of the Foundations of Security Analysis and Design IV, 2007

Extending the Globus Architecture with Role-Based Trust Management.
Proceedings of the Computer Aided Systems Theory, 2007

Access Control Mechanisms for Fraglets.
Proceedings of the 2nd International ICST Conference on Bio-Inspired Models of Network, 2007

2006
Formal analysis of some secure procedures for certificate delivery.
Softw. Test. Verification Reliab., 2006

A Uniform Framework for Security and Trust Modeling and Analysis with Crypto-CCS.
Proceedings of the First Workshop in Information and Computer Security, 2006

On Relating and Integrating Two Trust Management Frameworks.
Proceedings of the Second International Workshop on Views on Designing Complex Architectures, 2006

Through Modeling to Synthesis of Security Automata.
Proceedings of the Second International Workshop on Security and Trust Management, 2006

An Approach for the Specification, Verification and Synthesis of Secure Systems.
Proceedings of the Second International Workshop on Views on Designing Complex Architectures, 2006

A Fine-Grained and X.509-Based Access Control System for Globus.
Proceedings of the On the Move to Meaningful Internet Systems 2006: CoopIS, 2006

Fine-grained and History-based Access Control with Trust Management for Autonomic Grid Services.
Proceedings of the 2006 International Conference on Autonomic and Autonomous Systems (ICAS 2006), 2006

2005
Theoretical foundations of security analysis and design II.
Theor. Comput. Sci., 2005

Relating multiset rewriting and process algebras for security protocol analysis.
J. Comput. Secur., 2005

A Formalization of Credit and Responsibility Within the GNDC Schema.
Proceedings of the First International Workshop on Security and Trust Management, 2005

SEAS, a secure e-voting protocol: Design and implementation.
Comput. Secur., 2005

A Flexible Framework for Access Control Based on Ability Authentication.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January, 2005

Towards Continuous Usage Control on Grid Computational Services.
Proceedings of the Joint International Conference on Autonomic and Autonomous Systems 2005 / International Conference on Networking and Services 2005, 2005

Towards an Integrated Formal Analysis for Security and Trust.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2005

2004
A simple framework for real-time cryptographic protocol analysis with compositional proof rules.
Sci. Comput. Program., 2004

Automated analysis of timed security: a case study on web privacy.
Int. J. Inf. Sec., 2004

Preface.
Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models, 2004

Improving Grid Services Security with Fine Grain Policies.
Proceedings of the On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, 2004

Local Management of Credits and Debits in Mobile Ad Hoc Networks.
Proceedings of the Communications and Multimedia Security, 2004

2003
Analysis of security protocols as open systems.
Theor. Comput. Sci., 2003

A comparison of three authentication properties.
Theor. Comput. Sci., 2003

Real-time information flow analysis.
IEEE J. Sel. Areas Commun., 2003

Logical Specification and Analysis of Fault Tolerant Systems Through Partial Model Checking.
Proceedings of the International Workshop on Software Verification and Validation, 2003

Applying Generalized Non Deducibility on Compositions (GNDC) Approach in Dependability.
Proceedings of the Formal Methods for Security and Time: Proceedings of the MEFISTO Project 2003, 2003

Biometrics to Enhance Smartcard Security (Discussion).
Proceedings of the Security Protocols, 2003

Biometrics to Enhance Smartcard Security.
Proceedings of the Security Protocols, 2003

Symbolic Partial Model Checking for Security Analysis.
Proceedings of the Computer Network Security, 2003

Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols.
Proceedings of the Computer Network Security, 2003

Process Algebraic Frameworks for the Specification and Analysis of Cryptographic Protocols.
Proceedings of the Mathematical Foundations of Computer Science 2003, 2003

SEAS: A Secure E-Voting Applet System.
Proceedings of the Software Security, 2003

Compositional Verification of Secure Streamed Data: A Case Study with EMSS.
Proceedings of the Theoretical Computer Science, 8th Italian Conference, 2003

The Ising Model on Trees: Boundary Conditions and Mixing Time.
Proceedings of the 44th Symposium on Foundations of Computer Science (FOCS 2003), 2003

Formal Anaylsis of Some Timed Security Properties in Wireless Protocols.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2003

On Representing Biological Systems through Multiset Rewriting.
Proceedings of the Computer Aided Systems Theory, 2003

A Simple Language for Real-Time Cryptographic Protocol Analysis.
Proceedings of the Programming Languages and Systems, 2003

Compositional Verification of Integrity for Digital Stream Signature Protocols.
Proceedings of the 3rd International Conference on Application of Concurrency to System Design (ACSD 2003), 2003

2002
Symbolic Semantics and Analysis for Crypto-CCS with (Almost) Generic Inference Systems.
Proceedings of the Mathematical Foundations of Computer Science 2002, 2002

Automated Analysis of Some Security Mechanisms of SCEP.
Proceedings of the Information Security, 5th International Conference, 2002

About Compositional Analysis of Pi-Calculus Processes.
Proceedings of the Foundations of Information Technology in the Era of Networking and Mobile Computing, 2002

Classification of Security Properties - Part II: Network Security.
Proceedings of the Foundations of Security Analysis and Design II, 2002

2001
Formal Models of Timing Attacks on Web Privacy.
Proceedings of the Theory of Concurrency, Higher Order Languages and Types, 2001

Techniques for Security Checking: Non-Interference vs Control Flow Analysis.
Proceedings of the Theory of Concurrency, Higher Order Languages and Types, 2001

2000
Non Interference for the Analysis of Cryptographic Protocols.
Proceedings of the Automata, Languages and Programming, 27th International Colloquium, 2000

Information Flow Analysis in a Discrete-Time Process Algebra.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000

Message Authentication through Non Interference.
Proceedings of the Algebraic Methodology and Software Technology. 8th International Conference, 2000

1999
Secrecy in Security Protocols as Non Interference.
Proceedings of the Workshop on Secure Architectures and Information Flow 1999, 1999

Automatic Verification of Cryptographic Protocols through Compositional Analysis Techniques.
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 1999

A Uniform Approach for the Definition of Security Properties.
Proceedings of the FM'99 - Formal Methods, 1999

1998
An Improvement of Algorithms for Solving Interface Equations.
Inf. Process. Lett., 1998

Partial Model Checking and Theorem Proving for Ensuring Security Properties.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998


  Loading...