Fabio Martinelli
#163,414
Most Influential Person Now
Fabio Martinelli's AcademicInfluence.com Rankings
Fabio Martinellicriminal-justice Degrees
Criminal Justice
#199
World Rank
#225
Historical Rank
Cyber Security
#22
World Rank
#24
Historical Rank
Fabio Martinellicomputer-science Degrees
Computer Science
#9593
World Rank
#10069
Historical Rank
Cybersecurity
#22
World Rank
#24
Historical Rank
Information Security
#24
World Rank
#24
Historical Rank
Database
#6563
World Rank
#6798
Historical Rank
Download Badge
Criminal Justice Computer Science
Why Is Fabio Martinelli Influential?
(Suggest an Edit or Addition)Fabio Martinelli's Published Works
Published Works
- A Survey on Security for Mobile Devices (2013) (538)
- MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention (2018) (322)
- MADAM: A Multi-level Anomaly Detector for Android Malware (2012) (255)
- Classification of ransomware families with machine learning based on N-gram of opcodes (2019) (145)
- Usage control in computer security: A survey (2010) (144)
- Cyber-insurance survey (2017) (137)
- Non Interference for the Analysis of Cryptographic Protocols (2000) (122)
- A Uniform Approach for the Definition of Security Properties (1999) (110)
- Information flow analysis in a discrete-time process algebra (2000) (91)
- R-PackDroid: API package-based characterization and detection of mobile ransomware (2017) (90)
- Human behavior characterization for driving style recognition in vehicle system (2020) (81)
- Analysis of security protocols as open systems (2003) (75)
- Car hacking identification through fuzzy logic algorithms (2017) (70)
- SEAS, a secure e-voting protocol: Design and implementation (2005) (69)
- Through Modeling to Synthesis of Security Automata (2007) (68)
- Usage control in cloud systems (2012) (68)
- Computer Security – ESORICS 2012 (2012) (65)
- Evaluating Convolutional Neural Network for Effective Mobile Malware Detection (2017) (64)
- BRIDEMAID: An Hybrid Tool for Accurate Detection of Android Malware (2017) (60)
- Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection (2017) (57)
- Real-time information flow analysis (2003) (56)
- On the effectiveness of system API-related information for Android ransomware detection (2018) (54)
- Towards Continuous Usage Control on Grid Computational Services (2005) (53)
- LEILA: Formal Tool for Identifying Mobile Malicious Behaviour (2019) (51)
- Partial model checking and theorem proving for ensuring security properties (1998) (50)
- Risk analysis of Android applications: A user-centric solution (2018) (49)
- On usage control for GRID systems (2010) (48)
- A Simple Language for Real-Time Cryptographic Protocol Analysis (2003) (48)
- Representing Biological Systems with Multiset Rewriting (2003) (48)
- A Proposal on Enhancing XACML with Continuous Usage Control Features (2009) (44)
- A “pay-how-you-drive” car insurance approach through cluster analysis (2018) (42)
- Dynamic malware detection and phylogeny analysis using process mining (2019) (41)
- The CONTRAIL Approach to Cloud Federations (2012) (41)
- A simple framework for real-time cryptographic protocol analysis with compositional proof rules (2004) (41)
- Classification of Security Properties - Part II: Network Security (2002) (40)
- Implementing Usage Control in Internet of Things: A Smart Home Use Case (2017) (40)
- Visualizing the outcome of dynamic analysis of Android malware with VizMal (2020) (39)
- A Prototype for Enforcing Usage Control Policies Based on XACML (2012) (39)
- Towards an interpretable deep learning model for mobile malware detection and family identification (2021) (38)
- Formal approach to security metrics.: what does "more secure" mean for you? (2010) (38)
- Machine learning for coronavirus covid-19 detection from chest x-rays (2020) (34)
- Runtime monitoring for next generation Java ME platform (2010) (33)
- Fine Grained Access Control with Trust and Reputation Management for Globus (2007) (32)
- Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis (2018) (31)
- Risk-Aware Usage Decision Making in Highly Dynamic Systems (2010) (30)
- Privacy-preserving interest-casting in opportunistic networks (2012) (30)
- Driver and Path Detection through Time-Series Classification (2018) (29)
- Extending Security-by-Contract with Quantitative Trust on Mobile Devices (2010) (29)
- A model for usage control in GRID systems (2007) (28)
- Enhancing Java ME Security Support with Resource Usage Monitoring (2008) (27)
- Secrecy in Security Protocols as Non Interference (1999) (27)
- A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware (2017) (27)
- Automatic Verification of Cryptographic Protocols through Compositional Analysis Techniques (1999) (27)
- Defining authentication in a trace model (2003) (26)
- Tor traffic analysis and detection via machine learning techniques (2017) (26)
- A Semantic Foundation for Trust Management Languages with Weights: An Application to the RTFamily (2008) (25)
- Relating multiset rewriting and process algebras for security protocol analysis (2005) (25)
- Towards Modelling Adaptive Attacker's Behaviour (2012) (25)
- Modeling Privacy Aware Information Sharing Systems: A Formal and General Approach (2016) (25)
- Formal Aspects in Security and Trust (2005) (24)
- A Multi-criteria-Based Evaluation of Android Applications (2012) (24)
- Practical Privacy-Preserving Medical Diagnosis Using Homomorphic Encryption (2016) (24)
- Security-by-Contract (SxC) for Software and Services of Mobile Systems (2009) (24)
- Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment (2017) (24)
- Formal Methods Meet Mobile Code Obfuscation Identification of Code Reordering Technique (2017) (24)
- Securing Java with Local Policies (2009) (24)
- An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-cast (2012) (24)
- An exploratory study on the evolution of Android malware quality (2018) (24)
- Improving Grid Services Security with Fine Grain Policies (2004) (23)
- Security and Trust (2011) (23)
- A comparison of three authentication properties (2003) (23)
- Fine-grained and History-based Access Control with Trust Management for Autonomic Grid Services (2006) (23)
- A Formal Support for Collaborative Data Sharing (2012) (23)
- Enhancing grid security by fine-grained behavioral control and negotiation-based authorization (2009) (22)
- Trade-off analysis of safety and security in CAN bus communication (2017) (22)
- Evaluating model checking for cyber threats code obfuscation identification (2018) (22)
- Privacy preserving clustering over horizontal and vertical partitioned data (2017) (22)
- Stateful Data Usage Control for Android Mobile Devices (2017) (22)
- Quantitative access control with partially-observable Markov decision processes (2012) (22)
- On Representing Biological Systems through Multiset Rewriting (2003) (22)
- Try Walking in My Shoes, if You Can: Accurate Gait Recognition Through Deep Learning (2017) (21)
- Testing of PolPA-based usage control systems (2014) (21)
- Fast and Effective Clustering of Spam Emails Based on Structural Similarity (2015) (21)
- Message Authentication through Non Interference (2000) (21)
- Towards an Integrated Formal Analysis for Security and Trust (2005) (21)
- Detection of repackaged mobile applications through a collaborative approach (2015) (20)
- Enhancing Java Security with History Based Access Control (2007) (20)
- Privacy-Utility Feature Selection as a Privacy Mechanism in Collaborative Data Classification (2017) (20)
- An Approach for the Specification, Verification and Synthesis of Secure Systems (2007) (20)
- Real-Time SCADA Attack Detection by Means of Formal Methods (2019) (20)
- Deep learning for heart disease detection through cardiac sounds (2020) (20)
- Who's Driving My Car? A Machine Learning based Approach to Driver Identification (2018) (20)
- Weighted Datalog and Levels of Trust (2008) (20)
- Keystroke Analysis for User Identification using Deep Neural Networks (2019) (20)
- Mobile Implementation and Formal Verification of an e-Voting System (2008) (19)
- A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device Application (2008) (19)
- A time series classification approach to game bot detection (2017) (19)
- Controlling Usage in Business Process Workflows through Fine-Grained Security Policies (2008) (19)
- Logical Specification and Analysis of Fault Tolerant Systems Through Partial Model Checking (2005) (19)
- A framework for automatic generation of security controller (2012) (18)
- A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints (2010) (18)
- Investigating the Privacy versus Forwarding Accuracy Tradeoff in OpportunisticInterest-Casting (2014) (18)
- Security-by-Contract-with-Trust for Mobile Devices (2010) (18)
- Risk-Based Usage Control for Service Oriented Architecture (2010) (18)
- Classifying Android Malware through Subgraph Mining (2013) (17)
- I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of Android malware (2016) (17)
- Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things (2020) (17)
- Towards enforcing on-the-fly policies in BYOD environments (2013) (17)
- Formal Models of Timing Attacks on Web Privacy (2002) (17)
- Determining the Probability of Smart Grid Attacks by Combining Attack Tree and Attack Graph Analysis (2014) (16)
- Using recurrent neural networks for continuous authentication through gait analysis (2021) (16)
- On Relating and Integrating Two Trust Management Frameworks (2007) (16)
- Testing of PolPA authorization systems (2012) (16)
- Data Privacy Management and Security Assurance (2016) (16)
- Detection of images with adult content for parental control on mobile devices? (2009) (16)
- Improving MQTT by Inclusion of Usage Control (2017) (16)
- On Usage Control for GRID Services (2009) (15)
- Formal Methods for Android Banking Malware Analysis and Detection (2019) (15)
- Walking Through the Deep: Gait Analysis for User Authentication Through Deep Learning (2018) (15)
- Automated analysis of timed security: a case study on web privacy (2004) (15)
- Cost-Aware Runtime Enforcement of Security Policies (2012) (15)
- Detection of Obfuscation Techniques in Android Applications (2018) (15)
- Cyber Risk Management: An Actuarial Point of View (2019) (15)
- Formal Analysis of Security Metrics and Risk (2011) (14)
- Architecture, Workflows, and Prototype for Stateful Data Usage Control in Cloud (2014) (14)
- A General Method for Assessment of Security in Complex Services (2011) (14)
- Synthesis of Local Controller Programs for Enforcing Global Security Properties (2008) (14)
- Privacy Preserving Random Decision Tree Classification Over Horizontally and Vertically Partitioned Data (2018) (13)
- Model Checking for Mobile Android Malware Evolution (2017) (13)
- Cluster Analysis for Driver Aggressiveness Identification (2018) (13)
- Energy Consumption Metrics for Mobile Device Dynamic Malware Detection (2019) (13)
- Usage control in SIP-based multimedia delivery (2013) (13)
- Preventing the Drop in Security Investments for Non-competitive Cyber-Insurance Market (2017) (13)
- From Qualitative to Quantitative Enforcement of Security Policy (2012) (13)
- Influence of Attribute Freshness on Decision Making in Usage Control (2010) (12)
- Engineering Secure Future Internet Services and Systems (2014) (12)
- A Fine-Grained and X.509-Based Access Control System for Globus (2006) (12)
- Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks (2010) (12)
- Foundations of Security Analysis and Design III, FOSAD 2004/2005 Tutorial Lectures (2005) (12)
- Risk-Based Auto-delegation for Probabilistic Availability (2011) (12)
- A Uniform Framework for Security and Trust Modeling and Analysis with Crypto-CCS (2007) (12)
- A fuzzy-based process mining approach for dynamic malware detection (2017) (12)
- Enforcing UCON Policies on the Enterprise Service Bus (2010) (12)
- Enhancing Video Surveillance with Usage Control and Privacy-Preserving Solutions (2016) (12)
- Trust Management VII (2013) (11)
- Synthesis of Web Services Orchestrators in a Timed Setting (2007) (11)
- On Usage Control in Data Grids (2009) (11)
- Usage Control in Cloud Federations (2014) (11)
- A Runtime Monitoring Environment for Mobile Java (2008) (11)
- Privacy-Utility Feature Selection as a tool in Private Data Classification (2017) (11)
- Cost-Effective Enforcement of Access and Usage Control Policies Under Uncertainties (2013) (11)
- A Model Checking based Proposal for Mobile Colluding Attack Detection (2019) (11)
- Symbolic Semantics and Analysis for Crypto-CCS with (Almost) Generic Inference Systems (2002) (11)
- Fine-Grained Continuous Usage Control of Service Based Grids - The GridTrust Approach (2008) (11)
- Enhancing Android permission through usage control: a BYOD use-case (2016) (11)
- Privacy-preserving text mining as a service (2017) (11)
- Towards Information Flow Properties for Distributed Systems (2009) (11)
- Model checking and machine learning techniques for HummingBad mobile malware detection and mitigation (2020) (11)
- Techniques for Security Checking: Non-Interference vs Control Flow Analysis (2002) (11)
- Usage Control, Risk and Trust (2010) (10)
- Too Long, did not Enforce: A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed Environments (2018) (10)
- Introducing Usage Control in MQTT (2017) (10)
- Biometrics to Enhance Smartcard Security (Discussion) (2003) (10)
- Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach (2013) (10)
- Image-based Malware Family Detection: An Assessment between Feature Extraction and Classification Techniques (2020) (10)
- Optimisation of cyber insurance coverage with selection of cost effective security controls (2021) (10)
- Symbolic Partial Model Checking for Security Analysis (2003) (10)
- A tour of secure software engineering solutions for connected vehicles (2018) (9)
- Introducing Probabilities in Contract-Based Approaches for Mobile Application Security (2013) (9)
- SEAS: A Secure E-Voting Applet System (2003) (9)
- Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks (2008) (9)
- Formal Anaylsis of Some Timed Security Properties in Wireless Protocols (2003) (9)
- A collaborative framework for generating probabilistic contracts (2013) (9)
- A Novel Structural-Entropy-based Classification Technique for Supporting Android Ransomware Detection and Analysis (2018) (8)
- Privacy preserving data sharing and analysis for edge-based architectures (2021) (8)
- CANDY: A Social Engineering Attack to Leak Information from Infotainment System (2018) (8)
- Debating Cybersecurity or Securing a Debate? - (Position Paper) (2014) (8)
- Biometrics to Enhance Smartcard Security (2003) (8)
- Cybsersecurity Issues in Robotics (2021) (8)
- Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols (2003) (8)
- Pushing Forward Security in Network Slicing by Leveraging Continuous Usage Control (2020) (8)
- Social Network Polluting Contents Detection through Deep Learning Techniques (2019) (8)
- Network of Excellence on Engineering Secure Future Internet Software Services and Systems (2011) (8)
- Design of Approaches for Dependability and Initial Prototypes (2011) (8)
- Compositional verification of integrity for digital stream signature protocols (2003) (8)
- Collaborative Attribute Retrieval in Environment with Faulty Attribute Managers (2016) (8)
- Evaluating Deep Learning Classification Reliability in Android Malware Family Detection (2020) (8)
- Tor traffic analysis and identification (2017) (8)
- Access control mechanisms for fraglets (2007) (8)
- Probabilistic Contract Compliance for Mobile Applications (2013) (8)
- Smart Parental Advisory: A Usage Control and Deep Learning-Based Framework for Dynamic Parental Control on Smart TV (2017) (8)
- Investigating the Privacy vs . Forwarding Accuracy Tradeoff in Opportunistic Interest-Casting (2013) (8)
- LoSeRO: a locality sensitive routing protocol in opportunistic networks (2016) (8)
- Applying Machine Learning Techniques to Detect and Analyze Web Phishing Attacks (2018) (7)
- Automated Analysis of Some Security Mechanisms of SCEP (2002) (7)
- Privacy Preserving Hierarchical Clustering over Multi-party Data Distribution (2017) (7)
- Relating Process Algebras and Multiset Rewriting for Security Protocol Analysis (2003) (7)
- A Quantitative Approach for Inexact Enforcement of Security Policies (2012) (7)
- Integration of Quantitative Methods for Risk Evaluation within Usage Control Policies (2013) (7)
- A Survey of Usage Control in Computer Security (2008) (7)
- Modular plans for secure service composition (2010) (7)
- Dynamic Mobile Malware Detection through System Call-based Image representation (2021) (7)
- Constrained Automata: A Formal Tool for Risk Assessment and Mitigation,Journal of Informationa Assurance and Security, 2008 (2006) (7)
- Cost-effective enforcement of UCONA policies (2011) (7)
- A Joint Safety and Security Analysis of message protection for CAN bus protocol (2018) (7)
- Driver Identification: a Time Series Classification Approach (2018) (7)
- Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns (2015) (7)
- Probabilistic Cost Enforcement of Security Policies (2013) (7)
- A Survey on Cyber-Insurance (2015) (6)
- Privacy-Aware Data Sharing in a Tree-Based Categorical Clustering Algorithm (2016) (6)
- Call Graph and Model Checking for Fine-Grained Android Malicious Behaviour Detection (2020) (6)
- Priorities-Based Review Computation (2012) (6)
- Conceptual Models for Assessment & Assurance of Dependability, Security and Privacy in the Eternal CONNECTed World (2010) (6)
- Enhanced Privacy and Data Protection using Natural Language Processing and Artificial Intelligence (2020) (6)
- Towards Policy Engineering for Attribute-Based Access Control (2013) (6)
- Remote Policy Enforcement for Trusted Application Execution in Mobile Environments (2013) (6)
- Real-Time Driver Behaviour Characterization Through Rule-Based Machine Learning (2018) (6)
- A Formal and Run-Time Framework for the Adaptation of Local Behaviours to Match a Global Property (2016) (6)
- Cascade Learning for Mobile Malware Families Detection through Quality and Android Metrics (2019) (6)
- Enforcement of U-XACML History-Based Usage Control Policy (2016) (6)
- Compositional Verification of Secure Streamed Data: A Case Study with EMSS (2003) (6)
- Game Bot Detection in Online Role Player Game through Behavioural Features (2017) (6)
- A semiring-based framework for the deduction/abduction reasoning in access control with weighted credentials (2012) (6)
- Privacy Preserving Expectation Maximization (EM) Clustering Construction (2018) (6)
- Trust management for grid systems (2010) (6)
- AntiCheetah: Trustworthy computing in an outsourced (cheating) environment (2015) (6)
- Towards Attribute-Based Access Control Policy Engineering Using Risk (2013) (6)
- Are photos on Social Networks really private? (2013) (6)
- Preserving QoI in participatory sensing by tackling location-spoofing through mobile WiFi hotspots (2015) (6)
- Stateful Usage Control for Android Mobile Devices (2014) (6)
- Formal Analysis of Security Metrics with Defensive Actions (2013) (6)
- EXTENDING RESOURCE ACCESS IN MULTI -PROVIDER NETWORKS USING TRUST MANAGEMENT * (2011) (6)
- Engineering Secure Future Internet Services (2011) (5)
- Signed and Weighted Trust Credentials in Fraglets (2008) (5)
- Preserving security properties under refinement (2011) (5)
- Privacy Preserving Distributed Attribute Computation for Usage Control in the Internet of Things (2018) (5)
- Malicious Collusion Detection in Mobile Environment by means of Model Checking (2020) (5)
- Secure service orchestration in open networks (2011) (5)
- A Proposal to Ensure Social Distancing with Deep Learning-based Object Detection (2021) (5)
- Data-Sluice: Fine-grained traffic control for Android application (2016) (5)
- A machine-learning framework for supporting intelligent web-phishing detection and analysis (2019) (5)
- Applying Generalized Non Deducibility on Compositions (GNDC) Approach in Dependability (2004) (5)
- Towards a Declarative Approach to Stateful and Stateless Usage Control for Data Protection (2018) (5)
- Experimenting and assessing machine learning tools for detecting and analyzing malicious behaviors in complex environments (2018) (5)
- LoSeRO: A Locality Sensitive Routing Protocol in Opportunistic Networks with Contact Profiles (2020) (5)
- Optimal Security Configuration for Cyber Insurance (2018) (5)
- Detection of Malicious Software by Analyzing Distinct Artifacts Using Machine Learning and Deep Learning Algorithms (2021) (5)
- CARS: Context Aware Reputation Systems to Evaluate Vehicles' Behaviour (2018) (5)
- Distributed Data Anonymization (2019) (5)
- Privacy-Preserving Energy-Reading for Smart Meter (2015) (5)
- VizMal: A Visualization Tool for Analyzing the Behavior of Android Malware (2018) (5)
- Obligation Management in Usage Control Systems (2019) (5)
- Quantitative Evaluation of Enforcement Strategies - Position Paper (2013) (5)
- Secure Two-party Agglomerative Hierarchical Clustering Construction (2018) (5)
- Semiring-based Specification Approaches for Quantitative Security (2015) (5)
- Colluding Android Apps Detection via Model Checking (2020) (5)
- A Formalization of Credit and Responsibility Within the GNDC Schema (2006) (5)
- A Uniform Approach to Security and Fault-Tolerance Specification and Analysis (2009) (5)
- Biometrics to Enhance Smartcard Security Simulating MOC using TOC ? (2003) (5)
- On Security Countermeasures Ranking through Threat Analysis (2014) (5)
- Privacy-preserving mobility-casting in opportunistic networks (2014) (5)
- Machine Learning for Driver Detection through CAN bus (2020) (4)
- Automated Synthesis and Ranking of Secure BPMN Orchestrators (2013) (4)
- Security by Insurance for Services (2016) (4)
- Towards General Scheme for Data Sharing Agreements Empowering Privacy-Preserving Data Analysis of Structured CTI (2018) (4)
- Neural Networks for Driver Behavior Analysis (2021) (4)
- CheR: Cheating Resilience in the Cloud via Smart Resource Allocation (2013) (4)
- Idea: Action Refinement for Security Properties Enforcement (2009) (4)
- Context-Awareness Mobile Devices for Traffic Incident Prevention (2018) (4)
- Access and Usage Control in Grid Systems (2010) (4)
- A Distributed Usage Control Framework for Industrial Internet of Things (2019) (4)
- Improving security in industry 4.0 by extending OPC-UA with usage control (2020) (4)
- Model Checking Based Approach for Compliance Checking (2019) (4)
- A Data Life Cycle Modeling Proposal by Means of Formal Methods (2019) (4)
- A Secure Environment for Grid-based Supply Chains (2008) (4)
- Android Collusion: Detecting Malicious Applications Inter-Communication through SharedPreferences (2020) (4)
- AntiCheetah: An Autonomic Multi-round Approach for Reliable Computing (2013) (4)
- Executable Specification of Cryptofraglets in Maude for Security Verification (2009) (4)
- Formal analysis of some secure procedures for certificate delivery (2006) (4)
- How Discover a Malware using Model Checking (2017) (4)
- Partial Model Checking for the Verification and Synthesis of Secure Service Compositions (2013) (4)
- Analysis of Data Sharing Agreements (2017) (4)
- Context-Aware Analysis of Data Sharing Agreements (2010) (4)
- Model Checking for Data Anomaly Detection (2019) (4)
- Local Management of Credits and Debits in Mobile Ad Hoc Networks (2004) (4)
- Extending the Globus Architecture with Role-Based Trust Management (2007) (4)
- Measuring Mobile Applications Quality and Security in Higher Education (2018) (4)
- Session-dependent Usage Control for Big Data (2020) (3)
- Trust Management: 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings (Lecture Notes in Computer Science) (2006) (3)
- Proceedings of the 4th international conference on Trust Management (2006) (3)
- Automated adaptation via quantitative partial model checking (2016) (3)
- Phylogenetic Analysis for Ransomware Detection and Classification into Families (2018) (3)
- Network security supported by arguments (2015) (3)
- Identifying Insecure Features in Android Applications using Model Checking (2018) (3)
- Wearable Devices for Human Activity Recognition and User Detection (2019) (3)
- Process Algebraic Frameworks for the Specification and Analysis of Cryptographic Protocols (2003) (3)
- Secure Service Composition with Symbolic Effects (2009) (3)
- Mobile Silent and Continuous Authentication using Apps Sequence (2017) (3)
- Location-Based Routing for Opportunistic Networks (2015) (3)
- A Privacy-Preserving Infrastructure for Driver's Reputation Aware Automotive Services (2019) (3)
- Investigating Mobile Applications Quality in Official and Third-party Marketplaces (2019) (3)
- Business Reputation of Social Networks of Web Services (2015) (3)
- Public Key Infrastructures, Services and Applications (2009) (3)
- Detecting Colluding Inter-App Communication in Mobile Environment (2020) (3)
- Using IFTTT to Express and Enforce UCON Obligations (2019) (3)
- Android Run-time Permission Exploitation User Awareness by Means of Formal Methods (2020) (3)
- LVS: A WiFi-based system to tackle Location Spoofing in location-based services (2016) (3)
- Practical Location Validation in Participatory Sensing Through Mobile WiFi Hotspots (2018) (3)
- On the Statistical Detection of Adversarial Instances over Encrypted Data (2019) (3)
- Towards the Use of Generative Adversarial Neural Networks to Attack Online Resources (2020) (3)
- Enhancing Security in ETSI Open Source MANO with Usage Control Capability (2019) (3)
- Enhancing Usage Control for Performance: A Proposal for Systems of Systems (Research Poster) (2018) (3)
- On the Synthesis of Secure Services Composition (2014) (3)
- A tool for the synthesis of cryptographic orchestrators (2012) (3)
- Distributed UCON in CoAP and MQTT Protocols (2019) (3)
- Spyware Detection using Temporal Logic (2019) (3)
- A Secure Distributed Framework for Agglomerative Hierarchical Clustering Construction (2018) (3)
- Broadcast Authentication for Resource Constrained Devices: A Major Pitfall and Some Solutions (2012) (3)
- Model Checking to Detect the Hummingbad Malware (2019) (3)
- A quality model for social networks populated with web services (2015) (3)
- VisualDroid: automatic triage and detection of Android repackaged applications (2020) (3)
- Risk Analysis of Android Applications: A Multi-Criteria and Usable Approach (2015) (3)
- Formal Modelling and Verification in Service-Oriented Computing (2007) (2)
- Dependability in dynamic, evolving and heterogeneous systems: the connect approach (2010) (2)
- A uniform framework for the modeling and analysis of security and trust with Crypto-CCS ? ( Preliminary version ) (2006) (2)
- IMS Session Management Based on Usage Control (2011) (2)
- Mitigating Security Risks in Web Service Invocations: Contract-Based Approaches (2014) (2)
- Fine Grained Access Control for Computational Services (2006) (2)
- Finalised dependability framework and evaluation results (2012) (2)
- Privacy-Preserving LDA Classification over Horizontally Distributed Data (2019) (2)
- A Declarative Data Protection Approach: From Human-Readable Policies to Automatic Enforcement (2018) (2)
- Code Reordering Obfuscation Technique Detection by Means of Weak Bisimulation (2020) (2)
- Quantitative evaluation of enforcement strategies (2013) (2)
- Exploiting Vehicles' Reputation to Mitigate DoS Attack (2016) (2)
- An Improved Role-Based Access to Android Applications with JCHR (2014) (2)
- Privacy for 5G-Supported Vehicular Networks (2021) (2)
- Digital Waste Disposal: an automated framework for analysis of spam emails (2019) (2)
- MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes (2016) (2)
- Continuous Authorizations in SIP with Usage Control (2012) (2)
- Identifying Mobile Repackaged Applications through Formal Methods (2017) (2)
- Enforcing Mobile Application Security Through Probabilistic Contracts (2014) (2)
- Efficient Detection of Conflicts in Data Sharing Agreements (2017) (2)
- Negotiation of Weighted RTML Credentials on Mobile Devices (2012) (2)
- A Semi-Automated Explainability-Driven Approach for Malware Analysis through Deep Learning (2021) (2)
- Fine Grained Access Control for Computational Services (2006) (2)
- Emotions and Interests of Evolving Twitter Bots (2020) (2)
- Revised Selected Papers of the 10th International Workshop on Data Privacy Management, and Security Assurance - Volume 9481 (2015) (2)
- Methodologies and tools for data sharing agreement infrastructure (2008) (2)
- Reasoning about and Harmonizing the Interaction Behavior of Networked Systems at Application- and Middleware- Layer (2011) (2)
- Cyber Insurance and Time-to-Compromise: An Integrated Approach (2019) (2)
- Privacy Preserving Distributed Computation of Private Attributes for Collaborative Privacy Aware Usage Control Systems (2018) (2)
- Formal aspects in security and trust : Third International Workshop, FAST 2005 : Newcastle upon Tyne, UK, July 18-19, 2005 : revised selected papers (2006) (2)
- Safety Critical Systems Formal Verification Using Execution Traces (2018) (2)
- How to grant less permissions to facebook applications (2013) (2)
- Mobile Family Detection through Audio Signals Classification (2021) (2)
- Robust Malware Classification via Deep Graph Networks on Call Graph Topologies (2021) (2)
- Private mobility-cast for opportunistic networks (2017) (2)
- Alurity, a Toolbox for Robot Cybersecurity (2020) (2)
- Metric-Aware Secure Service Orchestration (2012) (2)
- User Authentication through Keystroke Dynamics by means of Model Checking: A Proposal (2019) (2)
- Cyber Insurance and Security Interdependence: Friends or Foes? (2018) (2)
- Android Collusion Detection by means of Audio Signal Analysis with Machine Learning techniques (2021) (2)
- Towards Collaborative Cyber Threat Intelligence for Security Management (2021) (2)
- Time-Continuous Authorization of Network Resources Based on Usage Control (2011) (2)
- On Probabilistic Application Compliance (2016) (2)
- R-PackDroid: Practical On-Device Detection of Android Ransomware (2018) (2)
- Formal Aspects in Security and Trust: 5th International Workshop, FAST 2008 Malaga, Spain, October 9-10, 2008 Revised Selected Papers (2009) (1)
- Sharing Data through Confidential Clouds: An Architectural Perspective (2015) (1)
- Vulnerable Smart Contract Detection by Means of Model Checking (2022) (1)
- Biometrics to enhance smartcard security. Commentary. Authors' reply (2005) (1)
- Demonstration of secure slicing using ETSI MANO enhanced with Usage Control Capability (2019) (1)
- Improving Vehicle Safety Through a Fog Collaborative Infrastructure (2018) (1)
- A Distributed Authorization System with Mobile Usage Control Policies (2011) (1)
- Driver Identification Through Formal Methods (2022) (1)
- Perturbation of Image-based Malware Detection with Smali level morphing techniques (2021) (1)
- Detecting Call Indirection Obfuscation through Equivalence Checking in Android environment (2021) (1)
- Managing QoS in Smart Buildings Through Software Defined Network and Usage Control (2019) (1)
- A Framework for Probabilistic Contract Compliance (2013) (1)
- Model Checking for Real-Time Attack Detection in Water Distribution Systems (2022) (1)
- Relating Process Algebras and Multiset Rewriting ( for Example for Security Protocol Analysis ) (2002) (1)
- Predicting Probability of Default Under IFRS 9 Through Data Mining Techniques (2020) (1)
- Malware and Formal Methods: Rigorous Approaches for detecting Malicious Behaviour (2017) (1)
- Reputation Systems to Mitigate DoS Attack in Vehicular Network (2017) (1)
- Application Security for Mobile Devices (2015) (1)
- Email Spoofing Attack Detection through an End to End Authorship Attribution System (2020) (1)
- There are Two Sides to Every Question - Controller Versus Attacker (2015) (1)
- SteælErgon: A Framework for Injecting Colluding Malicious Payload in Android Applications (2021) (1)
- Applying Deep Learning Techniques to CAN Bus Attacks for Supporting Identification and Analysis Tasks (2018) (1)
- Exploiting If This Then That and Usage Control obligations for Smart Home security and management (2021) (1)
- About Compositional Analysis of Pi-Calculus Processes (2002) (1)
- Proceedings of the 12th International Conference on Information Security (2009) (1)
- Cyber Risk Management: A New Challenge for Actuarial Mathematics (2018) (1)
- Generative adversarial networks for subdomain enumeration (2022) (1)
- Information Security and Privacy - Challenges and Outlook (2021) (1)
- Information Flow in a Discrete-Time Process Algebra (2000) (1)
- 2Faces: a new model of malware based on dynamic compiling and reflection (2021) (1)
- A scheme for the sticky policy representation supporting secure cyber-threat intelligence analysis and sharing (2019) (1)
- POSTER: A Framework for Phylogenetic Analysis in Mobile Environment (2018) (1)
- Privacy Preserving Collaborative Agglomerative Hierarchical Clustering Construction (2018) (1)
- Formal analysis of some secure procedures for certificate delivery: Research Articles (2006) (1)
- Twinkle twinkle little DroidDream, How I wonder what you are? (2017) (1)
- Trust Management VII: 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013, Proceedings (2013) (1)
- Theoretical foundations of security analysis and design II (2005) (1)
- Cybersecurity and Privacy (2020) (0)
- Cybersecurity - Introduction to the Special Theme (2016) (0)
- Concurrent History-based Usage Control Policies (2017) (0)
- Evaluation of Risk for Complex Systems Using Attack Surface (2014) (0)
- On the Influence of Image Settings in Deep Learning-based Malware Detection (2022) (0)
- Model and Synthesize Security Automata 1 (2006) (0)
- Towards a Usage Control Based Video Surveillance Framework (2016) (0)
- Automated Analysis of Web Security: A Case Study on Web Privacy (2004) (0)
- Multi-dimensional Secure Service Orchestration (2013) (0)
- Íêää Øøôô»»ûûûººð××úúúöºòð»ðó Blockin Blockinøø»òø Blockin×»úóðùññ¾ºøñð Ää×øè Ôôôô× (2001) (0)
- Foreword from the QASA 2014 program chairs (2015) (0)
- A Comparison Among Policy Editors for Attributed Based Access Control Model (2020) (0)
- Foundations of Security Analysis and Design VIII : FOSAD 2014/2015/2016 Tutorial Lectures (2016) (0)
- 2nd International Conference on Bio-inspired Models of Network, Information, and Computing Systems Home Authors Committees Keynote Speakers Title Author Abstract Self-organizing Mobile Surveillance Security Networks an Information Theoretical Approach for Molecular Communication (invited Paper) Eval (2007) (0)
- Data Privacy Management, and Security Assurance: 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21–22, 2015. Revised Selected Papers (2016) (0)
- Action Refinement for Security Properties Enforcement (2010) (0)
- Detecting and Analyzing Anomalies Across Historical Data Changes: A Data-Driven Approach (2018) (0)
- Special issue on security and trust management for dynamic coalitions (2010) (0)
- Bank Credit Risk Management based on Data Mining Techniques (2020) (0)
- ICT Systems Security and Privacy Protection - 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings (2017) (0)
- Applying Deep Learning Techniques to CAN Bus Attacks for Supporting Identification and Analysis Tasks. (2018) (0)
- Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France (2005) (0)
- Timed Automata for Mobile Ransomware Detection (2020) (0)
- Privacy-Preserving Interest-Cast for Android Smartphones (2013) (0)
- Secure and Privacy-Aware Mobile Identity Management (2013) (0)
- Using Incentives to Analyze Social Web Services' Behaviors (2014) (0)
- Action Refinement for Security Properties Enforcement (2010) (0)
- Proceedings of the 6th European conference on Public key infrastructures, services and applications (2009) (0)
- Foreword from the QASA 2015 chairs (2015) (0)
- Foreword from the QASA 2015 chairs (2015) (0)
- An Innovative Framework for Supporting Social Network Polluting-content Detection and Analysis (2019) (0)
- Handling Meta Attribute Information in Usage Control Policies (Short Paper) (2021) (0)
- Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings (2009) (0)
- D4.3 Part II: Engineering Secure Future Internet Services: A Research Manifesto and Agenda from the NESSoS Community: Final Release (2013) (0)
- A Machine Learning Approach for Game Bot Detection Through Behavioural Features (2017) (0)
- Service-Oriented Computing: 18th International Conference, ICSOC 2020, Dubai, United Arab Emirates, December 14–17, 2020, Proceedings (2020) (0)
- Using Soft Constraints for Deduction and Abduction in Policy-based Access Authorization 1 (2010) (0)
- A Deep-Learning-Based Framework for Supporting Analysis and Detection of Attacks on CAN Buses (2020) (0)
- Some relationships between two trust management languages (2006) (0)
- A Study on Rating Services Based on Users' Categories (2012) (0)
- Colluding Covert Channel for Malicious Information Exfiltration in Android Environment (2021) (0)
- Extending Security-by-Contract with Extending Security-by-Contract with Quantitative Trust on Mobile Quantitative Trust on Mobile Devices Devices (2010) (0)
- Timed Automata Networks for SCADA Attacks Real-Time Mitigation (2022) (0)
- Automated Intention Mining with Comparatively Fine-tuning BERT (2021) (0)
- Message Authenti ation throughNon Interferen e ? (2000) (0)
- A multi-criteria ranking of security countermeasures (2016) (0)
- Vulnerability Evaluation of Android Malware Detectors against Adversarial Examples (2021) (0)
- Public key infrastructures, services and applications : 6th European workshop, EuroPKI 2009 : Pisa, Italy, September 10 - 11, 2009 : revised selected papers (2010) (0)
- Consolidated dependability framework (2012) (0)
- Accidental Sensitive Data Leaks Prevention via Formal Verification (2020) (0)
- General Framewhork for Secure Service Orchestration ? (2014) (0)
- Proceedings of the Third international conference on Formal Aspects in Security and Trust (2005) (0)
- 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014 (2014) (0)
- D3.a: Advances in Analysis Technology (2007) (0)
- Reputation-Based Composition of Social Web Services (2014) (0)
- SH 2010: Welcome message from workshop organizers: FutureTech 2010 (2010) (0)
- Trust Management VII, 7th WG11.11 International conference (2013) (0)
- ABOUT COMPOSITIONAL ANALYSIS OF 1r-CALCULUS PROCESSES* (2013) (0)
- Privacy-Preserving Opportunistic Networking (2014) (0)
- Exploiting Supervised Machine Learning for Driver Detection in a Real-World Environment (2021) (0)
- Consiglio Nazionale delle Ricerche About compositional analysis of pi-calculus (2005) (0)
- Relating Pro ess Algebras and MultisetRewriting for Immediate De ryption Proto ols ? (2002) (0)
- Foreword from the QASA 2014 program chairs (2015) (0)
- An Ensemble Fuzzy Logic Approach to Game Bot Detection through Behavioural Features (2018) (0)
- A Flexible Framework for Access Control Based on Ability Authentication (2005) (0)
- A Neural-Network-Based Framework for Supporting Driver Classification and Analysis (2021) (0)
- A Quantitative Partial Model-Checking Function and Its Optimisation (2017) (0)
- Getmewhere: A Location-Based Privacy-Preserving Information Service (2018) (0)
- A Social Engineering Attack to Leak Private Information from Android In-Vehicle Infotainment Systems (2017) (0)
- Fighting Cybercrime by Introducing Trustworthiness and Interpretability in Deep Learning Malware Detection (2022) (0)
- Parental Control for Mobile Devices (2010) (0)
- Formal aspects in security and trust : IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22-27, 2004, Toulouse, France (2005) (0)
- Improving Machine Learning Tools with Embeddings: Applications to Big Data Security (2018) (0)
- Ask a(n)droid to tell you the odds: probabilistic security-by-contract for mobile devices (2020) (0)
- Foreword from the QASA 2016 program chairs (2016) (0)
- Security policies in scientific data sharing agreements (2008) (0)
- End to End Autorship Email Verification Framework for a Secure Communication (2020) (0)
- A framework for automatic security controller generation (2009) (0)
- Guest Editors’ Preface (2007) (0)
- A Machine-Learning-Based Framework for Supporting Malware Detection and Analysis (2021) (0)
- Various Shades of Intrusion: An Analysis of Grayware, Adsware, Spyware, and Other Borderline Android Apps (2017) (0)
This paper list is powered by the following services: