Ilaria Matteucci
Orcid: 0000-0002-5936-8470
According to our database1,
Ilaria Matteucci
authored at least 113 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
J. Comput. Virol. Hacking Tech., November, 2024
Int. J. Softw. Tools Technol. Transf., August, 2024
Int. J. Inf. Sec., June, 2024
ACM Comput. Surv., June, 2024
Int. J. Inf. Sec., April, 2024
Contextualizing Security and Privacy of Software-Defined Vehicles: State of the Art and Industry Perspectives.
CoRR, 2024
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
2023
J. Comput. Virol. Hacking Tech., March, 2023
A Privacy-Preserving Solution for Intelligent Transportation Systems: Private Driver DNA.
IEEE Trans. Intell. Transp. Syst., January, 2023
Privacy-Preserving Data Sharing for Collaborative Analytics in Multi-Modal Transportation Systems.
ERCIM News, 2023
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023
Data Collection in Automotive: A Deep Analysis of Carmakers' Mobile App Privacy Policies.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023
Proceedings of the 21st IEEE International Conference on Industrial Informatics, 2023
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
SuperCyberKids: Enhancing Cybersecurity Education in K-12 Through Digital Game-Based Learning.
Proceedings of the Higher Education Learning Methodologies and Technologies Online, 2023
Securing Automotive Ethernet: Design and Implementation of Security Data Link Solutions.
Proceedings of the 20th ACS/IEEE International Conference on Computer Systems and Applications, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Inf. Softw. Technol., 2022
IEEE Commun. Stand. Mag., 2022
Designing and implementing an AUTOSAR-based Basic Software Module for enhanced security.
Comput. Networks, 2022
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 30th Euromicro International Conference on Parallel, 2022
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
2021
Proceedings of the Open Identity Summit 2021, Copenhagen, Denmark, June 1-2, 2021., 2021
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
2020
J. Inf. Secur. Appl., 2020
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020
Proceedings of the 18th IEEE International Conference on Industrial Informatics, 2020
Proceedings of the Bridges and Mediation in Higher Distance Education, 2020
Proceedings of the 16th European Dependable Computing Conference, 2020
2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
A Privacy-Preserving Infrastructure for Driver's Reputation Aware Automotive Services.
Proceedings of the Socio-Technical Aspects in Security and Trust, 2019
Proceedings of the Software Engineering for Resilient Systems, 2019
Proceedings of the Computer Safety, Reliability, and Security, 2019
Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2019
Proceedings of the 7th International Workshop on Software Engineering for Systems-of-Systems and 13th Workshop on Distributed Software Development, 2019
CANDY CREAM - Hacking Infotainment Android Systems to Command Instrument Cluster via Can Data Frame.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019
Proceedings of the ACM Workshop on Automotive Cybersecurity, 2019
2018
Softw. Qual. J., 2018
Future Gener. Comput. Syst., 2018
Towards a Declarative Approach to Stateful and Stateless Usage Control for Data Protection.
Proceedings of the 14th International Conference on Web Information Systems and Technologies, 2018
A Declarative Data Protection Approach: From Human-Readable Policies to Automatic Enforcement.
Proceedings of the Web Information Systems and Technologies, 2018
Proceedings of the 87th IEEE Vehicular Technology Conference, 2018
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018
Proceedings of the 26th Euromicro International Conference on Parallel, 2018
Proceedings of the New Trends in Databases and Information Systems, 2018
2017
Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017
Proceedings of the LPAR-21, 2017
Proceedings of the Information Systems Security and Privacy, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the Critical Information Infrastructures Security, 2017
2016
A novel security information and event management system for enhancing cyber security in a hydroelectric dam.
Int. J. Crit. Infrastructure Prot., 2016
ERCIM News, 2016
Proceedings of the Security and Trust Management - 12th International Workshop, 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the International Workshop on domAin specific Model-based AppRoaches to vErificaTion and validaTiOn, 2016
A Formal and Run-Time Framework for the Adaptation of Local Behaviours to Match a Global Property.
Proceedings of the Formal Aspects of Component Software - 13th International Conference, 2016
Proceedings of the Data Privacy Management and Security Assurance, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016
Proceedings of the Privacy Technologies and Policy - 4th Annual Privacy Forum, 2016
2015
Proceedings of the Proceedings Thirteenth Workshop on Quantitative Aspects of Programming Languages and Systems, 2015
1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and Security (TELERISE 2015).
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
Proceedings of the Programming Languages with Applications to Biology and Security, 2015
2014
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014
Int. J. Secur. Softw. Eng., 2014
Proceedings of the Computer Safety, Reliability, and Security, 2014
Introduction to the Safecomp 2014 Workshop: Reliability and Security Aspects for Critical Infrastructure Protection (ReSA4CI 2014).
Proceedings of the Computer Safety, Reliability, and Security, 2014
Improved Automatic Maturity Assessment of Wikipedia Medical Articles - (Short Paper).
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Conferences, 2014
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014
My Data, Your Data, Our Data: Managing Privacy Preferences in Multiple Subjects Personal Data.
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014
Proceedings of the Accountability and Security in the Cloud, 2014
2013
Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Trusted Systems - 5th International Conference, 2013
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
Partial Model Checking for the Verification and Synthesis of Secure Service Compositions.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013
Introducing Probabilities in Contract-Based Approaches for Mobile Application Security.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, 2013
2012
Softw. Test. Verification Reliab., 2012
Proceedings of the Model-Driven Security Workshop, 2012
Proceedings of the Computer Network Security, 2012
Proceedings of the Trusted Systems, 4th International Conference, 2012
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
2011
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011
Proceedings of the Formal Methods for Eternal Networked Software Systems, 2011
Proceedings of the 7th International Conference on the Quality of Software Architectures, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011
2010
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the CISIS 2010, 2010
2009
Proceedings of the Engineering Secure Software and Systems, 2009
2008
Proceedings of the 3rd International Workshop on Views On Designing Complex Architectures, 2008
Controlling Usage in Business Process Workflows through Fine-Grained Security Policies.
Proceedings of the Trust, 2008
A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device Application.
Proceedings of the Leveraging Applications of Formal Methods, 2008
Proceedings of the Architecting Dependable Systems VI, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the Web Services and Formal Methods, 4th International Workshop, 2007
2006
Automated Synthesis of Enforcing Mechanisms for Security Properties in a Timed Setting.
Proceedings of the First Workshop in Information and Computer Security, 2006
Proceedings of the Second International Workshop on Security and Trust Management, 2006
Proceedings of the Second International Workshop on Views on Designing Complex Architectures, 2006
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006