Nicola Zannone
Orcid: 0000-0002-9081-5996
According to our database1,
Nicola Zannone
authored at least 177 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
ACM Trans. Comput. Hum. Interact., April, 2024
Int. J. Crit. Infrastructure Prot., 2024
Understanding the stumbling blocks of Italian higher education system: A process mining approach.
Expert Syst. Appl., 2024
Comput. Secur., 2024
IEEE Access, 2024
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
'Protect and Fight Back': A Case Study on User Motivations to Report Phishing Emails.
Proceedings of the 2024 European Symposium on Usable Security, 2024
The (Relative) Impact of Email Cues on the Perceived Threat of Phishing Attacks: A User Perspective on Phishing Deceptiveness.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
2023
Dataset, October, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
An Approach to Trade-off Privacy and Classification Accuracy in Machine Learning Processes.
Proceedings of the 31st Symposium of Advanced Database Systems, 2023
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023
Investigating the Resolution of Vulnerable Dependencies with Dependabot Security Updates.
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023
Impact Analysis of Coordinated Cyber-Physical Attacks via Statistical Model Checking: A Case Study.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2023
The Peculiar Case of Tailored Phishing against SMEs: Detection and Collective DefenseMechanisms at a Small IT Company.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Association Rule Mining Meets Regression Analysis: An Automated Approach to Unveil Systematic Biases in Decision-Making Processes.
J. Cybersecur. Priv., March, 2022
A decision-support framework for data anonymization with application to machine learning processes.
Inf. Sci., 2022
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system.
Int. J. Inf. Sec., 2022
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
PICO: privacy-preserving access control in IoT scenarios through incomplete information.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
ReLOG: A Unified Framework for Relationship-Based Access Control over Graph Databases.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022
2021
J. Comput. Secur., 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021
Not a Free Lunch, But a Cheap One: On Classifiers Performance on Anonymized Datasets.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
Combining Text and Visual Features to Improve the Identification of Cloned Webpages for Early Phishing Detection.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
A Latitudinal Study on the Use of Sequential and Concurrency Patterns in Deviance Mining.
Proceedings of the Complex Pattern Mining - New Challenges, Methods and Applications, 2020
IEEE Secur. Priv., 2020
Comput. Secur., 2020
Proceedings of the 29th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Second IEEE International Conference on Trust, 2020
Proceedings of the Information Systems Security - 16th International Conference, 2020
Don't Forget the Human: a Crowdsourced Approach to Automate Response and Containment Against Spear Phishing Attacks.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Proceedings of the Emerging Technologies for Authorization and Authentication, 2020
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
Testing the effectiveness of tailored phishing techniques in industry and academia: a field experiment.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
Comput. Secur., 2019
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019
Proceedings of the Emerging Technologies for Authorization and Authentication, 2019
Unveiling Systematic Biases in Decisional Processes: An Application to Discrimination Discovery.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the Business Process Management Forum, 2019
Proceedings of the 2nd IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2019
2018
J. Intell. Inf. Syst., 2018
ACM Comput. Surv., 2018
Comput. Commun., 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
From Security-by-Design to the Identification of Security-Critical Deviations in Process Executions.
Proceedings of the Information Systems in the Big Data Era, 2018
2017
Proceedings of the 7th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2017), 2017
Proceedings of the Data-Driven Process Discovery and Analysis, 2017
Proceedings of the BPM Demo Track and BPM Dissertation Award co-located with 15th International Conference on Business Process Modeling (BPM 2017), 2017
2016
J. Comput. Secur., 2016
Int. J. Inf. Sec., 2016
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
Proceedings of the New Frontiers in Mining Complex Patterns - 5th International Workshop, 2016
Proceedings of the Information Systems Security - 12th International Conference, 2016
Proceedings of the Data and Applications Security and Privacy XXX, 2016
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Frontiers ICT, 2015
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015
Constructing Probable Explanations of Nonconformity: A Data-Aware and History-Based Approach.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015
2014
Theory Pract. Log. Program., 2014
Data minimisation in communication protocols: a formal analysis framework and application to identity management.
Int. J. Inf. Sec., 2014
History-Based Construction of Alignments for Conformance Checking: Formalization and Implementation.
Proceedings of the Data-Driven Process Discovery and Analysis, 2014
History-based Construction of Log-Process Alignments for Conformance Checking: Discovering What Really Went Wrong.
Proceedings of the 4th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2014), 2014
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Proceedings of the 2014 International Conference on Collaboration Technologies and Systems, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Requirements engineering within a large-scale security-oriented research project: lessons learned.
Requir. Eng., 2013
Int. J. Cooperative Inf. Syst., 2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, 2013
Proceedings of the Situation Awareness with Systems of Systems, 2013
2012
Int. J. Inf. Technol. Decis. Mak., 2012
Proceedings of the Security and Trust Management - 8th International Workshop, 2012
Proceedings of the ICT Critical Infrastructures and Society, 2012
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
Proceedings of the Business Process Management - 10th International Conference, 2012
Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption.
Proceedings of the Seventh International Conference on Availability, 2012
2011
Int. J. Secur. Softw. Eng., 2011
Engineering and verifying agent-oriented requirements augmented by business constraints with <i>B</i>-Tropos.
Auton. Agents Multi Agent Syst., 2011
Proceedings of the Secure Data Management - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, 2011
Proceedings of the Information Systems Security - 7th International Conference, 2011
Proceedings of the Third International Workshop on Security Measurements and Metrics, 2011
Proceedings of the Third International Workshop on Security Measurements and Metrics, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank.
Proceedings of the Social Modeling for Requirements Engineering., 2011
2010
Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology.
Proceedings of the Advances in Intelligent Information Systems, 2010
A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities.
Requir. Eng., 2010
J. Theor. Appl. Electron. Commer. Res., 2010
Towards Data Protection Compliance.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010
2009
Int. J. Softw. Eng. Knowl. Eng., 2009
How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns.
Artif. Intell. Law, 2009
Proceedings of the POLICY 2009, 2009
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations.
Proceedings of the Conceptual Modeling, 2009
Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Security Agent-Oriented Requirements Engineering - the SI* Modeling Language and the Secure Tropos Methodology.
VDM, ISBN: 978-3-639-17654-4, 2009
2008
Int. J. Bus. Intell. Data Min., 2008
S&D Pattern Deployment at Organizational Level: A Prototype for Remote Healthcare System.
Proceedings of the 4th International Workshop on Security and Trust Management, 2008
Requirements model generation to support requirements elicitation: the Secure Tropos experience.
Autom. Softw. Eng., 2008
Proceedings of the First International Workshop on Requirements Engineering and Law, 2008
A Model-Driven Approach for the Specification and Analysis of Access Control Policies.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008
Proceedings of the Coordination Models and Languages, 10th International Conference, 2008
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008
Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach.
Proceedings of the The Third International Conference on Availability, 2008
2007
From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach.
Int. J. Softw. Eng. Knowl. Eng., 2007
Proceedings of the Service-Oriented Computing, 2007
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach.
Proceedings of the Eleventh International Conference on Artificial Intelligence and Law, 2007
Proceedings of the Computational Logic in Multi-Agent Systems, 8th International Workshop, 2007
Proceedings of the Agent-Oriented Software Engineering VIII, 8th International Workshop, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Hierarchical hippocratic databases with minimal disclosure for virtual organizations.
VLDB J., 2006
Int. J. Inf. Sec., 2006
Proceedings of the 14th IEEE International Conference on Requirements Engineering (RE 2006), 2006
Proceedings of the Data and Applications Security XX, 2006
Proceedings of the Advanced Information Systems Engineering, 18th International Conference, 2006
2005
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation.
Comput. Stand. Interfaces, 2005
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005
Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005), 29 August, 2005
Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005), 29 August, 2005
Proceedings of the Trust Management, Third International Conference, 2005
Proceedings of the Trust Management, Third International Conference, 2005
Proceedings of the Foundations of Security Analysis and Design III, 2005
Proceedings of the Computer Security, 2005
2004
Proceedings of the Security Protocols, 2004
Proceedings of the Trust Management, Second International Conference, 2004
Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures.
Proceedings of the Public Key Infrastructure, 2004