Fabio Martinelli
Orcid: 0000-0001-6746-4967Affiliations:
- National Research Council, Italy
According to our database1,
Fabio Martinelli
authored at least 470 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on iit.cnr.it
On csauthors.net:
Bibliography
2024
J. Comput. Virol. Hacking Tech., June, 2024
Picker Blinder: a framework for automatic injection of malicious inter-app communication.
J. Comput. Virol. Hacking Tech., June, 2024
Deep Convolutional Generative Adversarial Networks in Image-Based Android Malware Detection.
Comput., June, 2024
Alzheimer's Disease Evaluation Through Visual Explainability by Means of Convolutional Neural Networks.
Int. J. Neural Syst., February, 2024
EAI Endorsed Trans. Pervasive Health Technol., 2024
A Proposal for Privacy-preserving Ransomware Detection by means of Federated Machine Learning.
ERCIM News, 2024
On the Adoption of Explainable Deep Learning for Image-Based Network Traffic Classification.
Proceedings of the 14th International Conference on Simulation and Modeling Methodologies, 2024
Leveraging Deep Learning for Intrusion Detection in IoT Through Visualized Network Data.
Proceedings of the 21st International Conference on Security and Cryptography, 2024
An Edge Server Deployment Strategy for Multi-Objective Optimization in the Internet of Vehicles.
Proceedings of the IEEE Symposium on Computers and Communications, 2024
Proceedings of the Fifth International Conference on Intelligent Data Science Technologies and Applications, 2024
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
An Approach for Privacy-Preserving Mobile Malware Detection Through Federated Machine Learning.
Proceedings of the 26th International Conference on Enterprise Information Systems, 2024
Spiral Drawing Test and Explainable Convolutional Neural Networks for Parkinson's Disease Detection.
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024
Evaluating the Impact of Generative Adversarial Network in Android Malware Detection.
Proceedings of the 19th International Conference on Evaluation of Novel Approaches to Software Engineering, 2024
Security Policy Generation and Verification through Large Language Models: A Proposal.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
Proceedings of the 17th International Joint Conference on Biomedical Engineering Systems and Technologies, 2024
SYNAPSE - An Integrated Cyber Security Risk & Resilience Management Platform, With Holistic Situational Awareness, Incident Response & Preparedness Capabilities: SYNAPSE.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Explainable Convolutional Neural Networks for Brain Cancer Detection and Localisation.
Sensors, September, 2023
Diabetic retinopathy detection and diagnosis by means of robust and explainable convolutional neural networks.
Neural Comput. Appl., August, 2023
A survey of human-computer interaction (HCI) & natural habits-based behavioural biometric modalities for user recognition schemes.
Pattern Recognit., July, 2023
A Privacy-Preserving Solution for Intelligent Transportation Systems: Private Driver DNA.
IEEE Trans. Intell. Transp. Syst., January, 2023
IEEE Trans. Dependable Secur. Comput., 2023
A deep-learning approach to game bot identification via behavioural features analysis in complex massively-cooperative environments.
Int. J. Data Min. Model. Manag., 2023
Privacy-Preserving Data Sharing for Collaborative Analytics in Multi-Modal Transportation Systems.
ERCIM News, 2023
Concurr. Comput. Pract. Exp., 2023
IEEE Access, 2023
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023
A Method for Robust and Explainable Image-Based Network Traffic Classification with Deep Learning.
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023
Proceedings of the International Joint Conference on Neural Networks, 2023
Benchmarking YOLO Models for Automatic Reading in Smart Metering Systems: A Performance Comparison Analysis.
Proceedings of the International Conference on Machine Learning and Applications, 2023
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
StegWare: A Novel Malware Model Exploiting Payload Steganography and Dynamic Compilation.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Proceedings of the IEEE International Conference on Fuzzy Systems, 2023
Proceedings of the IEEE International Conference on Fuzzy Systems, 2023
Proceedings of the IEEE International Conference on Fuzzy Systems, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Obfuscated Mobile Malware Detection by Means of Dynamic Analysis and Explainable Deep Learning.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
J. Comput. Virol. Hacking Tech., 2022
IEEE Trans. Intell. Transp. Syst., 2022
RiderAuth: A cancelable touch-signature based rider authentication scheme for driverless taxis.
J. Inf. Secur. Appl., 2022
Int. J. Inf. Sec., 2022
Fighting Cybercrime by Introducing Trustworthiness and Interpretability in Deep Learning Malware Detection.
ERCIM News, 2022
Exploiting If This Then That and Usage Control obligations for Smart Home security and management.
Concurr. Comput. Pract. Exp., 2022
Assessing Deep Learning Predictions in Image-Based Malware Detection with Activation Maps.
Proceedings of the Security and Trust Management - 18th International Workshop, 2022
A Real-time Method for CAN Bus Intrusion Detection by Means of Supervised Machine Learning.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
A Method for Road Accident Prevention in Smart Cities based on Deep Reinforcement Learning.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
Proceedings of the Intelligent Decision Technologies, 2022
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022
On the Resilience of Shallow Machine Learning Classification in Image-based Malware Detection.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022
Explainable Retinopathy Diagnosis and Localisation by means of Class Activation Mapping.
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the Fifteenth International Conference on Machine Vision, 2022
Continuous and Silent User Authentication Through Mouse Dynamics and Explainable Deep Learning.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022
Proceedings of the IEEE Intl. Conf. on Dependable, 2022
Proceedings of the BSCI 2022: Proceedings of the 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
Smart Grid monitoring through Deep Learning for Image-based Automatic Dial Meter Reading.
Proceedings of the IEEE International Conference on Big Data, 2022
Continuous and Silent User Authentication Through Mouse Dynamics and Explainable Deep Learning: A Proposal.
Proceedings of the IEEE International Conference on Big Data, 2022
Proceedings of the 22nd IEEE International Conference on Bioinformatics and Bioengineering, 2022
Proceedings of the 22nd IEEE International Conference on Bioinformatics and Bioengineering, 2022
AII, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Proceedings of the Advancing Research in Information and Communication Technology, 2021
Ask a(n)droid to tell you the odds: probabilistic security-by-contract for mobile devices.
Soft Comput., 2021
Pattern Recognit. Lett., 2021
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
Optimisation of cyber insurance coverage with selection of cost effective security controls.
Comput. Secur., 2021
Towards an interpretable deep learning model for mobile malware detection and family identification.
Comput. Secur., 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the NLPIR 2021: 5th International Conference on Natural Language Processing and Information Retrieval, Sanya, China, December 17, 2021
Detecting Call Indirection Obfuscation through Equivalence Checking in Android environment.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021
Exploiting Supervised Machine Learning for Driver Detection in a Real-World Environment.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021
Android Collusion Detection by means of Audio Signal Analysis with Machine Learning techniques.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
A Semi-Automated Explainability-Driven Approach for Malware Analysis through Deep Learning.
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
Colluding Covert Channel for Malicious Information Exfiltration in Android Environment.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021
A Framework for Supporting Ransomware Detection and Prevention Based on Hybrid Analysis.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021
Proceedings of the Emerging Technologies for Authorization and Authentication, 2021
Proceedings of the 29th European Symposium on Artificial Neural Networks, 2021
SteælErgon: A Framework for Injecting Colluding Malicious Payload in Android Applications.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
LoSeRO: A Locality Sensitive Routing Protocol in Opportunistic Networks with Contact Profiles.
IEEE Trans. Mob. Comput., 2020
Model checking and machine learning techniques for <i>HummingBad</i> mobile malware detection and mitigation.
Simul. Model. Pract. Theory, 2020
D-BRIDEMAID: A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020
J. Inf. Secur. Appl., 2020
Android Collusion: Detecting Malicious Applications Inter-Communication through SharedPreferences.
Inf., 2020
Int. J. Inf. Sec., 2020
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2020
IEEE Commun. Mag., 2020
Comput. Electr. Eng., 2020
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
A Deep-Learning-Based Framework for Supporting Analysis and Detection of Attacks on CAN Buses.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020
Evaluating Deep Learning Classification Reliability in Android Malware Family Detection.
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020
Image-based Malware Family Detection: An Assessment between Feature Extraction and Classification Techniques.
Proceedings of the 5th International Conference on Internet of Things, 2020
Enhanced Privacy and Data Protection using Natural Language Processing and Artificial Intelligence.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the Information Systems Security and Privacy - 6th International Conference, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the Emerging Technologies for Authorization and Authentication, 2020
Proceedings of the 2020 IEEE Conference on Evolving and Adaptive Intelligent Systems, 2020
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020
Proceedings of the Advanced Information Networking and Applications, 2020
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020
Towards the Use of Generative Adversarial Neural Networks to Attack Online Resources.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
IEEE Trans. Software Eng., 2019
Soft Comput., 2019
Random Struct. Algorithms, 2019
A scheme for the sticky policy representation supporting secure cyber-threat intelligence analysis and sharing.
Inf. Comput. Secur., 2019
Int. J. Inf. Sec., 2019
Classification of ransomware families with machine learning based on N-gram of opcodes.
Future Gener. Comput. Syst., 2019
On the effectiveness of system API-related information for Android ransomware detection.
Comput. Secur., 2019
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019
Proceedings of the Security and Trust Management - 15th International Workshop, 2019
A Privacy-Preserving Infrastructure for Driver's Reputation Aware Automotive Services.
Proceedings of the Socio-Technical Aspects in Security and Trust, 2019
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019
Proceedings of the 27th Euromicro International Conference on Parallel, 2019
Proceedings of the 27th Euromicro International Conference on Parallel, 2019
Demonstration of secure slicing using ETSI MANO enhanced with Usage Control Capability.
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019
Proceedings of the Information Security Practice and Experience, 2019
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
Cascade Learning for Mobile Malware Families Detection through Quality and Android Metrics.
Proceedings of the International Joint Conference on Neural Networks, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
A machine-learning framework for supporting intelligent web-phishing detection and analysis.
Proceedings of the 23rd International Database Applications & Engineering Symposium, 2019
Proceedings of the Intelligent Distributed Computing XIII, 2019
Proceedings of the Intelligent Distributed Computing XIII, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
An Innovative Framework for Supporting Social Network Polluting-content Detection and Analysis.
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering, 2019
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019
Proceedings of the International Conference on Cyber Situational Awareness, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
User Authentication through Keystroke Dynamics by means of Model Checking: A Proposal.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019
2018
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention.
IEEE Trans. Dependable Secur. Comput., 2018
Softw. Qual. J., 2018
J. Softw. Evol. Process., 2018
Experimenting and assessing machine learning tools for detecting and analyzing malicious behaviors in complex environments.
J. Reliab. Intell. Environ., 2018
J. Parallel Distributed Comput., 2018
Future Gener. Comput. Syst., 2018
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018
Towards a Declarative Approach to Stateful and Stateless Usage Control for Data Protection.
Proceedings of the 14th International Conference on Web Information Systems and Technologies, 2018
A Declarative Data Protection Approach: From Human-Readable Policies to Automatic Enforcement.
Proceedings of the Web Information Systems and Technologies, 2018
Proceedings of the 87th IEEE Vehicular Technology Conference, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Privacy Preserving Distributed Attribute Computation for Usage Control in the Internet of Things.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Privacy Preserving Distributed Computation of Private Attributes for Collaborative Privacy Aware Usage Control Systems.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018
Proceedings of the ICT Systems Security and Privacy Protection, 2018
Walking Through the Deep: Gait Analysis for User Authentication Through Deep Learning.
Proceedings of the ICT Systems Security and Privacy Protection, 2018
Proceedings of the Computer Safety, Reliability, and Security, 2018
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018
A Secure Distributed Framework for Agglomerative Hierarchical Clustering Construction.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018
Proceedings of the 26th Euromicro International Conference on Parallel, 2018
Proceedings of the 26th Euromicro International Conference on Parallel, 2018
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018
Proceedings of the 20th International Conference on Information Integration and Web-based Applications & Services, 2018
Enhancing Usage Control for Performance: A Proposal for Systems of Systems (Research Poster).
Proceedings of the 2018 International Conference on High Performance Computing & Simulation, 2018
Detecting and Analyzing Anomalies Across Historical Data Changes: A Data-Driven Approach.
Proceedings of the IEEE 30th International Conference on Tools with Artificial Intelligence, 2018
Proceedings of the Information Systems Security and Privacy - 4th International Conference, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Phylogenetic Analysis for Ransomware Detection and Classification into Families.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Applying Deep Learning Techniques to CAN Bus Attacks for Supporting Identification and Analysis Tasks.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
A Novel Structural-Entropy-based Classification Technique for Supporting Android Ransomware Detection and Analysis.
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018
Towards General Scheme for Data Sharing Agreements Empowering Privacy-Preserving Data Analysis of Structured CTI.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018
Proceedings of the Distributed Computing and Artificial Intelligence, 2018
Privacy Preserving Random Decision Tree Classification Over Horizontally and Vertically Partitioned Data.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018
Proceedings of the International Conference On Cyber Situational Awareness, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Too Long, did not Enforce: A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed Environments.
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Proceedings of the 7th International Conference on Web Intelligence, Mining and Semantics, 2017
Privacy-Utility Feature Selection as a Privacy Mechanism in Collaborative Data Classification.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017
Formal Methods Meet Mobile Code Obfuscation Identification of Code Reordering Technique.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Smart Parental Advisory: A Usage Control and Deep Learning-Based Framework for Dynamic Parental Control on Smart TV.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Try Walking in My Shoes, if You Can: Accurate Gait Recognition Through Deep Learning.
Proceedings of the Computer Safety, Reliability, and Security, 2017
Proceedings of the Symposium on Applied Computing, 2017
Proceedings of the 25th Euromicro International Conference on Parallel, 2017
Proceedings of the 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems, 2017
Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017
Proceedings of the LPAR-21, 2017
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017
Proceedings of the Software Technologies - 12th International Joint Conference, 2017
Proceedings of the 12th International Conference on Software Technologies, 2017
Proceedings of the 5th IEEE/ACM International FME Workshop on Formal Methods in Software Engineering, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the Information Systems Security and Privacy, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017
Proceedings of the Distributed Computing and Artificial Intelligence, 2017
Proceedings of the Critical Information Infrastructures Security, 2017
Preventing the Drop in Security Investments for Non-competitive Cyber-Insurance Market.
Proceedings of the Risks and Security of Internet and Systems, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Security and Trust Management - 12th International Workshop, 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016
I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of Android malware.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 24th Euromicro International Conference on Parallel, 2016
Proceedings of the International Workshop on domAin specific Model-based AppRoaches to vErificaTion and validaTiOn, 2016
Proceedings of the IEEE Symposium on Computers and Communication, 2016
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
A Formal and Run-Time Framework for the Adaptation of Local Behaviours to Match a Global Property.
Proceedings of the Formal Aspects of Component Software - 13th International Conference, 2016
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Serv. Oriented Comput. Appl., 2015
Future Gener. Comput. Syst., 2015
Proceedings of the Proceedings Thirteenth Workshop on Quantitative Aspects of Programming Languages and Systems, 2015
Concurr. Comput. Pract. Exp., 2015
Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015
Preserving QoI in participatory sensing by tackling location-spoofing through mobile WiFi hotspots.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015
Proceedings of the 1st IEEE/ACM International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, 2015
Proceedings of the Inclusive Smart Cities and e-Health, 2015
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015
Proceedings of the Programming Languages with Applications to Biology and Security, 2015
2014
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014
Investigating the Privacy versus Forwarding Accuracy Tradeoff in OpportunisticInterest-Casting.
IEEE Trans. Mob. Comput., 2014
Int. J. Secur. Softw. Eng., 2014
Proceedings of the Web Information Systems Engineering - WISE 2014 Workshops, 2014
Proceedings of the Security and Trust Management - 10th International Workshop, 2014
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
Determining the Probability of Smart Grid Attacks by Combining Attack Tree and Attack Graph Analysis.
Proceedings of the Smart Grid Security - Second International Workshop, 2014
Proceedings of the Computer Safety, Reliability, and Security, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
Proceedings of the Ninth International Conference on Availability, 2014
2013
IEEE Syst. J., 2013
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Symposium on Theory of Computing Conference, 2013
Proceedings of the Risk Assessment and Risk-Driven Testing - First International Workshop, 2013
Proceedings of the Trusted Systems - 5th International Conference, 2013
Proceedings of the Trusted Systems - 5th International Conference, 2013
Integration of Quantitative Methods for Risk Evaluation within Usage Control Policies.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
Partial Model Checking for the Verification and Synthesis of Secure Service Compositions.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
Introducing Probabilities in Contract-Based Approaches for Mobile Application Security.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013
Proceedings of the Business Process Management Workshops, 2013
Proceedings of the 9th International Conference on Information Assurance and Security, 2013
Proceedings of the 9th International Conference on Information Assurance and Security, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Softw. Test. Verification Reliab., 2012
Proceedings of the Proceedings Fifth Interaction and Concurrency Experience, 2012
A semiring-based framework for the deduction/abduction reasoning in access control with weighted credentials.
Comput. Math. Appl., 2012
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012
Proceedings of the Trust, Privacy and Security in Digital Business, 2012
Proceedings of the Security and Trust Management - 8th International Workshop, 2012
Broadcast Authentication for Resource Constrained Devices: A Major Pitfall and Some Solutions.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012
Proceedings of the 20th Euromicro International Conference on Parallel, 2012
Proceedings of the Model-Driven Security Workshop, 2012
An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-cast.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012
Proceedings of the Computer Network Security, 2012
Proceedings of the Computer Network Security, 2012
Proceedings of the Information Security - 15th International Conference, 2012
Proceedings of the Trusted Systems, 4th International Conference, 2012
Proceedings of the 7th International Workshop on Automation of Software Test, 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
Proceedings of the Intelligent Web Services Meet Social Computing, 2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
2011
Random Struct. Algorithms, 2011
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
Proceedings of the Formal Methods for Eternal Networked Software Systems, 2011
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011
Proceedings of the Future Internet, 2011
Proceedings of the Computer Aided Systems Theory - EUROCAST 2011, 2011
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011
Proceedings of the CRiSIS 2011, 2011
2010
Proceedings of the Handbook of Information and Communication Security, 2010
Secur. Commun. Networks, 2010
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks.
Comput. Commun., 2010
Proceedings of the Security and Trust Management - 6th International Workshop, 2010
Proceedings of the 2nd International Workshop on Software Engineering for Resilient Systems, 2010
Proceedings of the 18th Euromicro Conference on Parallel, 2010
Proceedings of the On the Move to Meaningful Internet Systems, 2010
Proceedings of the Software Architecture, 4th European Conference, 2010
Proceedings of the CISIS 2010, 2010
A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints.
Proceedings of the Autonomic and Trusted Computing - 7th International Conference, 2010
2009
Enhancing grid security by fine-grained behavioral control and negotiation-based authorization.
Int. J. Inf. Sec., 2009
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009
Proceedings of the 6th International Conference on Mobile Technology, 2009
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009
Proceedings of the Grids, 2009
Proceedings of the Engineering Secure Software and Systems, 2009
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009
Proceedings of the Bioinspired Models of Network, Information, and Computing Systems, 2009
2008
J. Autom. Reason., 2008
Proceedings of the 3rd International Workshop on Views On Designing Complex Architectures, 2008
Proceedings of the 4th International Workshop on Security and Trust Management, 2008
Controlling Usage in Business Process Workflows through Fine-Grained Security Policies.
Proceedings of the Trust, 2008
Fine-Grained Continuous Usage Control of Service Based Grids - The GridTrust Approach.
Proceedings of the Towards a Service-Based Internet, 2008
A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device Application.
Proceedings of the Leveraging Applications of Formal Methods, 2008
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008
Proceedings of the Architecting Dependable Systems VI, 2008
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Proceedings of the 3rd International ICST Conference on Bio-Inspired Models of Network, 2008
A Semantic Foundation for Trust Management Languages with Weights: An Application to the RTFamily.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008
Proceedings of the The Third International Conference on Availability, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Random Struct. Algorithms, 2007
Proceedings of the Web Services and Formal Methods, 4th International Workshop, 2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Proceedings of the Foundations of Security Analysis and Design IV, 2007
Proceedings of the Computer Aided Systems Theory, 2007
Proceedings of the 2nd International ICST Conference on Bio-Inspired Models of Network, 2007
2006
Softw. Test. Verification Reliab., 2006
Proceedings of the First Workshop in Information and Computer Security, 2006
Proceedings of the Second International Workshop on Views on Designing Complex Architectures, 2006
Proceedings of the Second International Workshop on Security and Trust Management, 2006
Proceedings of the Second International Workshop on Views on Designing Complex Architectures, 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: CoopIS, 2006
Fine-grained and History-based Access Control with Trust Management for Autonomic Grid Services.
Proceedings of the 2006 International Conference on Autonomic and Autonomous Systems (ICAS 2006), 2006
2005
Theor. Comput. Sci., 2005
J. Comput. Secur., 2005
Proceedings of the First International Workshop on Security and Trust Management, 2005
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January, 2005
Proceedings of the Joint International Conference on Autonomic and Autonomous Systems 2005 / International Conference on Networking and Services 2005, 2005
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2005
2004
A simple framework for real-time cryptographic protocol analysis with compositional proof rules.
Sci. Comput. Program., 2004
Int. J. Inf. Sec., 2004
Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models, 2004
Proceedings of the On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, 2004
Proceedings of the Communications and Multimedia Security, 2004
2003
Logical Specification and Analysis of Fault Tolerant Systems Through Partial Model Checking.
Proceedings of the International Workshop on Software Verification and Validation, 2003
Applying Generalized Non Deducibility on Compositions (GNDC) Approach in Dependability.
Proceedings of the Formal Methods for Security and Time: Proceedings of the MEFISTO Project 2003, 2003
Proceedings of the Security Protocols, 2003
Proceedings of the Security Protocols, 2003
Proceedings of the Computer Network Security, 2003
Proceedings of the Computer Network Security, 2003
Process Algebraic Frameworks for the Specification and Analysis of Cryptographic Protocols.
Proceedings of the Mathematical Foundations of Computer Science 2003, 2003
Proceedings of the Theoretical Computer Science, 8th Italian Conference, 2003
Proceedings of the 44th Symposium on Foundations of Computer Science (FOCS 2003), 2003
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2003
Proceedings of the Computer Aided Systems Theory, 2003
Proceedings of the Programming Languages and Systems, 2003
Proceedings of the 3rd International Conference on Application of Concurrency to System Design (ACSD 2003), 2003
2002
Symbolic Semantics and Analysis for Crypto-CCS with (Almost) Generic Inference Systems.
Proceedings of the Mathematical Foundations of Computer Science 2002, 2002
Proceedings of the Information Security, 5th International Conference, 2002
Proceedings of the Foundations of Information Technology in the Era of Networking and Mobile Computing, 2002
Proceedings of the Foundations of Security Analysis and Design II, 2002
2001
Proceedings of the Theory of Concurrency, Higher Order Languages and Types, 2001
Proceedings of the Theory of Concurrency, Higher Order Languages and Types, 2001
2000
Proceedings of the Automata, Languages and Programming, 27th International Colloquium, 2000
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000
Proceedings of the Algebraic Methodology and Software Technology. 8th International Conference, 2000
1999
Proceedings of the Workshop on Secure Architectures and Information Flow 1999, 1999
Automatic Verification of Cryptographic Protocols through Compositional Analysis Techniques.
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 1999
Proceedings of the FM'99 - Formal Methods, 1999
1998
Inf. Process. Lett., 1998
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998