Fabio Massacci
#163,911
Most Influential Person Now
Researcher
Fabio Massacci's AcademicInfluence.com Rankings
Fabio Massaccicomputer-science Degrees
Computer Science
#9661
World Rank
#10138
Historical Rank
Database
#6626
World Rank
#6861
Historical Rank

Download Badge
Computer Science
Why Is Fabio Massacci Influential?
(Suggest an Edit or Addition)Fabio Massacci's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- A survey of autonomic communications (2006) (723)
- Modeling security requirements through ownership, permission and delegation (2005) (252)
- Exptime Tableaux for ALC (2000) (175)
- Logical Cryptanalysis as a SAT Problem (2000) (144)
- Comparing Vulnerability Severity and Exploits Using Case-Control Studies (2014) (123)
- Requirements engineering for trust management: model, methodology, and reasoning (2006) (117)
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications (2015) (114)
- Strongly Analytic Tableaux for Normal Modal Logics (1994) (104)
- Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation (2005) (104)
- Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning (2004) (101)
- Combining Deduction and Model Checking into Tableaux and Algorithms for Converse-PDL (2000) (99)
- An access control framework for business processes for web services (2003) (89)
- The Taming of the (X)OR (2000) (88)
- Single Step Tableaux for Modal Logics (2000) (83)
- From Trust to Dependability through Risk Analysis (2007) (82)
- Generalized XML security views (2005) (82)
- Verifying security protocols as planning in logic programming (2001) (82)
- Security and Trust Requirements Engineering (2005) (77)
- Verifying the SET registration protocols (2003) (77)
- Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code (2007) (73)
- Security-by-contract on the .NET platform (2008) (69)
- Anatomy of Exploit Kits - Preliminary Analysis of Exploit Kits as Software Artefacts (2013) (65)
- The verification of an industrial payment protocol: the SET purchase phase (2002) (65)
- Simplification: A General Constraint Propagation Technique for Propositional and Modal Tableaux (1998) (64)
- A preliminary analysis of vulnerability scores for attacks in wild: the ekits and sym datasets (2012) (64)
- Requirement Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard (2003) (63)
- Formal Verification of Cardholder Registration in SET (2000) (61)
- Which is the right source for vulnerability studies?: an empirical analysis on Mozilla Firefox (2010) (59)
- Security Events and Vulnerability Data for Cybersecurity Risk Estimation (2017) (59)
- My Software has a Vulnerability, should I worry? (2013) (58)
- How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns (2009) (58)
- Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology (2010) (57)
- Reactive non-interference for a browser model (2011) (56)
- Verifying the SET Purchase Protocols (2005) (56)
- An ontology for secure socio-technical systems (2007) (56)
- Design and Results of TANCS-2000 Non-classical (Modal) Systems Comparison (2000) (56)
- Using Walk-SAT and Rel-Sat for Cryptographic Key Search (1999) (55)
- HIT4Mal: Hybrid image transformation for malware classification (2019) (55)
- Vulnerable open source dependencies: counting those that matter (2018) (55)
- How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach (2007) (51)
- Computer-aided Support for Secure Tropos (2007) (51)
- Lotrec : The Generic Tableau Prover for Modal and Description Logics (2001) (50)
- Security and Trust in IT Business Outsourcing: a Manifesto (2007) (49)
- Hierarchical hippocratic databases with minimal disclosure for virtual organizations (2006) (49)
- The (un)reliability of NVD vulnerable versions data: an empirical experiment on Google Chrome vulnerabilities (2013) (49)
- An Extended Ontology for Security Requirements (2011) (49)
- Tableaux and Algorithms for Propositional Dynamic Logic with Converse (1996) (48)
- Predictability of Enforcement (2011) (43)
- Designing Security Requirements Models Through Planning (2006) (41)
- An automatic method for assessing the versions affected by a vulnerability (2016) (41)
- Design and Results of the Tableaux-99 Non-classical (Modal) Systems Comparison (1999) (41)
- Interactive Access Control for Web Services (2004) (40)
- Then and Now: On the Maturity of the Cybercrime Markets The Lesson That Black-Hat Marketeers Learned (2016) (40)
- An Experimental Comparison of Two Risk-Based Security Methods (2013) (40)
- Modeling Social and Individual Trust in Requirements Engineering Methodologies (2005) (39)
- After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixes (2011) (39)
- An Empirical Methodology to Evaluate Vulnerability Discovery Models (2014) (38)
- MalwareLab: Experimentation with Cybercrime Attack Tools (2013) (37)
- A Convolutional Transformation Network for Malware Classification (2019) (37)
- Reasoning About Security: A Logic and a Decision Method for Role-Based Access Control (1997) (35)
- An overview of the verification of SET (2005) (35)
- Usage Control in Service-Oriented Architectures (2007) (35)
- A flexible security architecture to support third-party applications on mobile devices (2007) (34)
- Towards Black Box Testing of Android Apps (2015) (34)
- Quantitative Assessment of Risk Reduction with Cybercrime Black Market Monitoring (2013) (33)
- ST-tool: a CASE tool for security requirements engineering (2005) (33)
- An Interactive Trust Management and Negotiation Scheme (2004) (32)
- Interactive Credential Negotiation for Stateful Business Processes (2005) (31)
- Do you really mean what you actually enforced? (2009) (30)
- A Qualitative Study of Dependency Management and Its Security Implications (2020) (30)
- Extending Security-by-Contract with Quantitative Trust on Mobile Devices (2010) (29)
- The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals (2015) (28)
- Logical Cryptanalysis as a SAT Problem ? Encoding and Analysis of the U.S. Data Encryption Standard (2000) (27)
- Security Engineering for Ambient Intelligence: A Manifesto (2006) (27)
- Evolving Embedded Systems (2010) (27)
- Enhancing Java ME Security Support with Resource Usage Monitoring (2008) (27)
- DES: a Challenge Problem for Nonmonotonic Reasoning Systems (2000) (26)
- How to fake an RSA signature by encoding modular root finding as a SAT problem (2003) (26)
- Decision Procedures for Expressive Description Logics with Intersection, Composition, Converse of Roles and Role Identity (2001) (26)
- Towards Systematic Achievement of Compliance in Service-Oriented Architectures: The MASTER Approach (2008) (25)
- FuturesMEX: Secure, Distributed Futures Market Exchange (2018) (25)
- Interactive access control for autonomic systems: From theory to implementation (2008) (25)
- How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners (2012) (25)
- Security-by-Contract (SxC) for Software and Services of Mobile Systems (2009) (24)
- A Screening Test for Disclosed Vulnerabilities in FOSS Components (2019) (24)
- A Negotiation Scheme for Access Rights Establishment in Autonomic Communication (2007) (24)
- From Early Requirements Analysis towards Secure Workflows (2007) (23)
- A Model-Driven Approach for the Specification and Analysis of Access Control Policies (2008) (23)
- Vuln4Real: A Methodology for Counting Actually Vulnerable Dependencies (2022) (22)
- The S3MS.NET Run Time Monitor: Tool Demonstration (2009) (22)
- Matching in security-by-contract for mobile code (2009) (22)
- Security-by-contract for web services (2007) (22)
- Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures (2004) (22)
- Perspectives on the SolarWinds Incident (2021) (21)
- The Work‐Averse Cyberattacker Model: Theory and Evidence from Two Million Attack Signatures (2017) (21)
- Matching Midlet’s Security Claims with a Platform Security Policy using Automata Modulo Theory∗ (2007) (20)
- Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation (2005) (20)
- A Security-by-Contract Architecture for Pervasive Services (2007) (20)
- REW-SMT: A New Approach for Rewriting XACML Request with Dynamic Big Data Security Policies (2017) (20)
- Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations (2017) (20)
- Runtime Enforcement of Security Policies on Black Box Reactive Programs (2015) (20)
- NodeSentry: least-privilege library integration for server-side JavaScript (2014) (19)
- Contextual Reasoning Is NP-Complete (1996) (19)
- Identifying the implied: Findings from three differentiated replications on the use of security requirements templates (2017) (19)
- An experiment on comparing textual vs. visual industrial methods for security risk assessment (2014) (19)
- What the heck is this application doing? - A security-by-contract architecture for pervasive services (2009) (19)
- Single Step Tableaux for Modal Logics Computational Properties, Complexity and Methodology (2000) (18)
- Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank (2011) (18)
- Security-by-Contract-with-Trust for Mobile Devices (2010) (18)
- Retaliation: Can We Live with Flaws? (2005) (17)
- Quality of Protection - Security Measurements and Metrics (2006) (17)
- Typosquatting and Combosquatting Attacks on the Python Ecosystem (2020) (17)
- On the Equivalence Between Graphical and Tabular Representations for Security Risk Assessment (2017) (17)
- Towards Practical Enforcement Theories (2009) (17)
- A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems (2009) (17)
- Towards a quantitative assessment of security in software architectures (2008) (16)
- A Method for Security Governance, Risk, and Compliance (GRC): A Goal-Process Approach (2011) (16)
- Computer Aided Threat Identification (2011) (16)
- The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations (2017) (15)
- Detecting Conflicts of Interest (2006) (14)
- Security in the Firefox OS and Tizen Mobile Platforms (2014) (14)
- Towards the Formal Verification of Ciphers: Logical Cryptanalysis of DES (1999) (14)
- Economic Impacts of Rules- versus Risk-Based Cybersecurity Regulations for Critical Infrastructure Providers (2016) (14)
- Organizational Patterns for Security and Dependability: From Design to Application (2011) (14)
- On the Security Cost of Using a Free and Open Source Component in a Proprietary Product (2016) (14)
- LastPyMile: identifying the discrepancy between sources and packages (2021) (14)
- An independent validation of vulnerability discovery models (2012) (14)
- Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution (2011) (13)
- Modelling Quality of Protection in Outsourced Business Processes (2007) (13)
- Assessing a requirements evolution approach: Empirical studies in the Air Traffic Management domain (2012) (13)
- A Protocol's Life After Attacks (2003) (13)
- Simulating midlet's security claims with automata modulo theory (2008) (13)
- Iterative enforcement by suppression: Towards practical enforcement theories (2012) (13)
- Towards Using Source Code Repositories to Identify Software Supply Chain Attacks (2020) (13)
- Design and results of TANCS-00 (2000) (13)
- Measuring the accuracy of software vulnerability assessments: experiments with students and professionals (2020) (12)
- Goal-Equivalent Secure Business Process Re-engineering (2009) (12)
- Planning Attacks to Security Protocols: Case Studies in Logic Programming (2002) (12)
- IT Interdependence and the Economic Fairness of Cybersecurity Regulations for Civil Aviation (2015) (12)
- Privacy Is Linking Permission to Purpose (2004) (12)
- A Load Time Policy Checker for Open Multi-application Smart Cards (2011) (11)
- The Meaning of Logs (2007) (11)
- Crime Pays If You Are Just an Average Hacker (2012) (11)
- Anytime approximate model reasoning (1998) (11)
- Security-by-Contract for the OSGi Platform (2012) (11)
- Logical Cryptanalysis as a SAT Problem: the Encoding of the Data Encryption Standard (1999) (11)
- Estimating the Assessment Difficulty of CVSS Environmental Metrics: An Experiment (2017) (11)
- An executable specification language for planning attacks to security protocols (2000) (11)
- From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach (2007) (10)
- Multi-session Security Monitoring for Mobile Code (2006) (10)
- Optimisation of cyber insurance coverage with selection of cost effective security controls (2021) (10)
- IoT Security Configurability with Security-by-Contract (2019) (10)
- A Systematically Empirical Evaluation of Vulnerability Discovery Models: a Study on Browsers' Vulnerabilities (2013) (9)
- No purpose, no data: goal-oriented access control forambient assisted living (2009) (9)
- GoCoMM: a governance and compliance maturity model (2009) (9)
- ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements (2005) (9)
- Understanding the Security Implications of Kubernetes Networking (2021) (9)
- An Access Control System for Business Processes for Web Services (2002) (9)
- E pluribus unum : Deduction, abduction and induction, the reasoning services for access control in autonomic communication (2005) (9)
- Anytime Approximate Modal Reasoning (1998) (9)
- Reactive non-interference for the browser: extended version (2011) (9)
- Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract? (2010) (8)
- TESTREX: a Testbed for Repeatable Exploits (2014) (8)
- Delta-Bench: Differential Benchmark for Static Analysis Security Testing Tools (2017) (8)
- An algorithm for the appraisal of assurance indicators for complex business processes (2007) (8)
- SolarWinds and the Challenges of Patching: Can We Ever Stop Dancing With the Devil? (2021) (8)
- Security triage: an industrial case study on the effectiveness of a lean methodology to identify security requirements (2014) (8)
- Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language (2005) (8)
- Tableau Methods for Formal Verification of Multi-Agent Distributed Systems (1998) (8)
- Safety and Security in Multiagent Systems (2009) (8)
- Tableaux Methods for Access Control in Distributed Systems (1997) (8)
- A Server-Side JavaScript Security Architecture for Secure Integration of Third-Party Libraries (2019) (8)
- Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training (2017) (8)
- Are We Preparing Students to Build Security In? A Survey of European Cybersecurity in Higher Education Programs [Education] (2021) (8)
- Solving QBF by SMV (2002) (8)
- Cyberinsurance and Public Policy : Self-Protection and Insurance with Endogenous Adversaries (2015) (8)
- Towards Practical Security Monitors of UML Policies for Mobile Applications (2007) (8)
- Who Should Pay for Interdependent Risk? Policy Implications for Security Interdependence Among Airports (2020) (8)
- A First Empirical Evaluation Framework for Security Risk Assessment Methods in the ATM Domain (2014) (7)
- A Tool for Managing Evolving Security Requirements (2011) (7)
- Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading (2021) (7)
- An Approach for Decision Support on the Uncertainty in Feature Model Evolution (2014) (7)
- A Uniform Tableaux Method for Nonmonotonic Modal Logics (1996) (7)
- Mac-A-Mal: macOS malware analysis framework resistant to anti evasion techniques (2019) (7)
- Maintaining privacy on derived objects (2005) (7)
- Empirical Recovery: Hansen-Scheinkman Factorization and Ross Recovery from High Frequency Option Prices (2016) (7)
- Attack Potential in Impact and Complexity (2017) (7)
- A Logical Model for Security of Web Services (2003) (6)
- Superficial Tableaux for Contextual Reasoning (1995) (6)
- The Effect of Security Education and Expertise on Security Assessments: the Case of Software Vulnerabilities (2018) (6)
- Supporting Software Evolution for Open Smart Cards by Security-by-Contract (2012) (6)
- TaintBench: Automatic real-world malware benchmarking of Android taint analyses (2021) (6)
- Formal verification of card-holder registration in SET (2000) (6)
- Diversity: A Poor Man's Solution to Drone Takeover (2017) (6)
- Autonomic communications (2006) (6)
- Supporting Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract (2010) (6)
- Protecting the Internet of Things with Security-by-Contract and Fog Computing (2019) (6)
- Technical Leverage in a Software Ecosystem: Development Opportunities and Security Risks (2021) (6)
- Managing Evolution by Orchestrating Requirements and Testing Engineering Processes (2012) (6)
- Simpli cation with renaming: A general proof technique for tableau and sequent-based provers (1997) (6)
- A Relative Cost-Benefit Approach for Evaluating Alternative Airport Security Policies (2014) (6)
- MAP-REDUCE Runtime Enforcement of Information Flow Policies (2013) (6)
- Graphical vs. Tabular Notations for Risk Models: On the Role of Textual Labels and Complexity (2017) (6)
- Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006 (2006) (5)
- The Work-Averse Attacker Model (2015) (5)
- The Verification of an Industrial Payment Protocol (2002) (5)
- Engineering Secure Future Internet Services (2011) (5)
- Quality Of Protection: Security Measurements and Metrics (Advances in Information Security) (2006) (5)
- Load Time Security Verification (2011) (5)
- A System for Interactive Authorization for Business Processes for Web Services (2004) (5)
- How CVSS is DOSsing your patching policy (and wasting your money). (2013) (5)
- Security triage: A report of a lean security requirements methodology for cost-effective security analysis (2014) (5)
- TANCS non classical system comparison (1999) (5)
- Governance Challenges for European Cybersecurity Policies: Stakeholder Views (2020) (5)
- The S 3 MS . NET Run Time Monitor (2009) (5)
- Future Data and Security Engineering (2017) (5)
- Comparing Vulnerability Severity and Exploits Using (2014) (4)
- Realizing Trustworthy Business Services by a New GRC Approach (2009) (4)
- An Idea of an Independent Validation of Vulnerability Discovery Models (2012) (4)
- SecureChange: Security Engineering for Lifelong Evolvable Systems (2010) (4)
- Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications (2010) (4)
- TestREx: a framework for repeatable exploits (2017) (4)
- Load time code validation for mobile phone Java Cards (2013) (4)
- Issues in modelling the SET protocol (2002) (4)
- The dark side of vulnerability exploitation: a proposal for a research analysis. ? (2012) (4)
- Making Sense of Specifications: The Formalization of SET (2000) (4)
- A Security Architecture for Web 2.0 Applications (2009) (4)
- Breaking Security Protocols as an AI Planning Problem (1997) (4)
- A New Challenge for Automated Reasoning: Veriication and Cryptanalysis of Cryptographic Algorithms (1999) (4)
- SeCMER: A Tool to Gain Control of Security Requirements Evolution (2011) (4)
- Computer-Aided Generation of Enforcement Mechanisms for Error-Tolerant Policies (2011) (4)
- The proof complexity of analytic and clausal tableaux (2000) (4)
- Which security catalogue is better for novices? (2015) (4)
- Legal Patterns Implement Trust in IT Requirements: When Legal Means are the "Best" Implementation of IT Technical Goals (2009) (4)
- Goal-Oriented Access Control Model for Ambient Assisted Living (2009) (4)
- Blockchain-based Invoice Factoring: from business requirements to commitments (2019) (4)
- Trust Management: 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings (Lecture Notes in Computer Science) (2006) (3)
- Quantitative Assessment for Organisational Security & Dependability (2009) (3)
- Security-By-Contract for the Future Internet (2009) (3)
- A Bridge between Modal Logics and Contextual Reasoning (1995) (3)
- Managing changes with legacy security engineering processes (2011) (3)
- Decentralized Transaction Clearing Beyond Blockchains (2016) (3)
- Generalized Xml Security Views Generalized Xml Security Views (2005) (3)
- Security views for outsourced business processes (2008) (3)
- Infringo ergo sum: when will software engineering support infringements? (2010) (3)
- Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper) (2011) (3)
- Proceedings of the 4th international conference on Trust Management (2006) (3)
- A Dynamic Security Framework for Ambient Intelligent Systems: A Smart-Home Based eHealth Application (2010) (3)
- Preliminary Experiments on the Relative Comprehensibility of Tabular and Graphical Risk Models (2015) (3)
- Secure Software Development in the Era of Fluid Multi-party Open Software and Services (2021) (3)
- Abduction and Deduction in Logic Programming for Access Control for Autonomic Systems (2005) (3)
- UNICORN: A Tool for Modeling and Reasoning on the Uncertainty of Requirements Evolution (2013) (3)
- Distributed Financial Exchanges: Security Challenges and Design Principles (2020) (2)
- Action, Inaction, Trust, and Cybersecurity's Common Property Problem (2016) (2)
- Is "Deny Access" a Valid "Fail-Safe Default" Principle for Building Security in Cyberphysical Systems? (2019) (2)
- Empirical Assessment of Security Requirements and Architecture: Lessons Learned (2014) (2)
- EMFASE -- An Empirical Framework for Security Design and Economic Trade-off (2014) (2)
- Software Updates Strategies: A Quantitative Evaluation Against Advanced Persistent Threats (2022) (2)
- E-government and On-line Services: Security and Legal Patterns 1. – Introduction (2007) (2)
- A Proof Theory for Tractable Approximations of Propositional Reasoning (1997) (2)
- Dynamic Resiliency to Changes (2011) (2)
- JCS special issue on EU-funded ICT research on Trust and Security (2010) (2)
- Emerging Mobile Platforms : Firefox OS and Tizen (2014) (2)
- Testing Decision Procedures for Security-by-Contract : Extended (2008) (2)
- D 7 . 3 : A MODEL-BASED TESTING APPROACH FOR EVOLUTION (2011) (2)
- Cyber Insurance and Time-to-Compromise: An Integrated Approach (2019) (2)
- Satisfaction of Control Objectives by Control Processes (2009) (2)
- Unruly Innovation: Distributed Ledgers, Blockchains and the Protection of Transactional Rents (2016) (2)
- Security-by-Contract for Web Services or How to Trade Credentials for Services ∗ (2007) (2)
- Towards a Security Stress-Test for Cloud Configurations (2022) (2)
- Goal-Equivalent Secure Business Process Re-engineering for E-Health ? (2007) (2)
- Empirical Validation of Security Methods (2013) (2)
- Poster: Analysis of Exploits in the Wild Or: do Cybersecurity Standards Make Sense? (2013) (2)
- Technical Leverage: Dependencies Are a Mixed Blessing (2021) (2)
- An Experimental Approach for Estimating Cyber Risk: a Proposal Building upon Cyber Ranges and Capture the Flags (2020) (2)
- Cyberinsurance and Public Policy: Self-Protection and Insurance with Endogenous Security Risks (2017) (2)
- Special issue on security and trust preface (2008) (1)
- A Calculus of Tracking: Theory and Practice (2021) (1)
- Teaching Predictive Modeling to Junior Software Engineers - Seminar Format and Its Evaluation (2017) (1)
- An Ontology for Secure Socio-Technical Systems 1 (2008) (1)
- Mac-A-Mal: An Automated Framework for Mac Malware Hunting (2018) (1)
- Programmable enforcement framework of information flow policies (2014) (1)
- Reasoning about Naming and Time for Credential-based Systems (1)
- The Data Protection Officer: A Ubiquitous Role That No One Really Knows (2022) (1)
- Cook and Reckhow are Wrong: Subexponential Tableaux Proofs for Their Family of Formulae (1998) (1)
- Controlling Application Interactions on the Novel Smart Cards with Security-by-Contract (2012) (1)
- Special issue on Security and Trust (2008) (1)
- K-clusters Tableaux a Tool for Modal Logics and Inconsistent Belief Sets (1994) (1)
- On the feasibility of detecting injections in malicious npm packages (2022) (1)
- Load Time Security Verification: The Claim Checker (2011) (1)
- On the Effort for Security Maintenance of Free and Open Source Components (2018) (1)
- Engineering Secure Software and Systems, Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings (2010) (1)
- LastPyMile Replication Package (2021) (1)
- S×C4IoT: A Security-by-contract Framework for Dynamic Evolving IoT Devices (2022) (1)
- Dynamic resiliency to user assignment (2010) (1)
- What Has Artifact Evaluation Ever Done for Us? (2022) (1)
- Chapter VII Interactive Access Control and Trust Negotiation for Autonomic Communication (2007) (1)
- Multisession monitor for .NET mobile applications: theory and implementation (2007) (1)
- A Privacy Model to Support Minimal Disclosure in Virtual Organizations (2006) (1)
- A QBDI-based Fuzzer Taming Magic Bytes (2019) (1)
- Are Software Updates Useless against Advanced Persistent Threats? (2022) (1)
- On the Effort for Security Maintenance of Open Source Components (2018) (1)
- Non-monotonic Security Protocols and Failures in Financial Intermediation (2018) (1)
- Hansen-Scheinkman Factorization and Ross Recovery from Option Panels (2016) (1)
- Security of the OSGi platform (2012) (1)
- Automated Reasoning and the Verification of Security Protocols (1999) (1)
- Decentralized Financial Intermediation Beyond Blockchains (2016) (1)
- Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations (2017) (1)
- A security architecture for server-side JavaScript: Extended abstract (2014) (1)
- Information Security and Privacy - Challenges and Outlook (2021) (1)
- Attacking fair-exchange protocols: parallel models vs trace models (2001) (1)
- Pseudo Ground-Truth Generators and Large-Scale Studies (2022) (1)
- Introduction to the Special Issue on Vulnerabilities (2022) (0)
- Lightweight Parsing and Slicing for Bug Identification in C (2022) (0)
- The Data Protection Officer, an ubiquitous role nobody really knows (2022) (0)
- Measuring the accuracy of software vulnerability assessments: experiments with students and professionals (2020) (0)
- Building Principles for Lawful Cyber Lethal Autonomous Weapons (2022) (0)
- Interactive Access Control in Autonomic Communication (2004) (0)
- Session details: Network security (2007) (0)
- Deliverable D3.1 Confidentiality and Integrity Policies (2011) (0)
- An Open-Source Cloud Testbed for Security Experimentation (2022) (0)
- Yearbook 2014 Fp7 Security and Trust Research Projects (2014) (0)
- Privacy Is Linking Permission to Purpose. Authors' reply (2006) (0)
- Governance Challenges for European CyberSecurity Policy : Stakeholders Views First draft (2019) (0)
- An Empirical Study of the Technology Transfer Potential of EU Security and Trust R&D Projects (2014) (0)
- Research and Innovation Yearbook 2013 (2013) (0)
- MAP-REDUCE Enforcement Framework of Information Flow Policies (2013) (0)
- SecureChange public project deliverable D6.6: Development-time and on-device interplay (2012) (0)
- Extended Abstract : Embeddable Security-by-Contract Verifier for Java Card ? (2012) (0)
- Machine Learning for Source Code Vulnerability Detection: What Works and What Isn’t There Yet (2022) (0)
- Deposited in DRO : 14 July 2015 Version of attached le : Accepted Version Peer-review status of attached le : Peer-reviewed Citation for published item (2015) (0)
- Evaluation of Airport Security Training Programs: Perspectives and Issues (2013) (0)
- When will software engineering support infringements (2010) (0)
- Reduction rules and universal variables for first order tableaux and DPLL (2000) (0)
- An Inline Monitoring System for .NET Mobile Devices (2008) (0)
- Extending Security-by-Contract with Extending Security-by-Contract with Quantitative Trust on Mobile Quantitative Trust on Mobile Devices Devices (2010) (0)
- EXPTIME Tableaux for A £ C ( Extended (2002) (0)
- Logging key assurance indicators in business processes (2009) (0)
- Preface (2008) (0)
- SoK: Run-time security for cloud microservices. Are we there yet? (2023) (0)
- An automatic method for assessing the versions affected by a vulnerability (2015) (0)
- Preliminary Findings on FOSS Dependencies and Security : A Qualitative Study on Developers’ Attitudes and Experience (2020) (0)
- Introduction to the Special Issue on Security and Privacy for COVID-19 (2022) (0)
- Invited talks (2011) (0)
- Simulation Matching Implementation of Automata Modulo Theory (AMT) (2009) (0)
- Consolidating cybersecurity in Europe: A case study on job profiles assessment (2022) (0)
- D3.1 Secure Evolving Software Systems: a State of the Art Survey (2009) (0)
- EU-Funded ICT Research on Trust and Security: Book Edition of Journal of Computer Security (2010) (0)
- Query Rewriting over Generalized XML Security Views (2005) (0)
- Vision: What If They All Die? Crypto Requirements For Key People (2020) (0)
- A5.D3.2 - Security Properties Specification Language (final version) and Property Reasoning Mechanisms (2008) (0)
- D . 3 . 4 PROOF-OF-CONCEPT CASE TOOL (2011) (0)
- Chapter 4 Organizational Patterns for Security and Dependability: from Design to Application Organizational Patterns for Security and Dependability (2016) (0)
- Optimizing IRM with Automata Modulo Theory (2009) (0)
- Affordable Security or Big Guy vs Small Guy - Does the Depth of Your Pockets Impact Your Protocols? (2019) (0)
- TestREx: a framework for repeatable exploits (2017) (0)
- Preliminary Findings on FOSS Dependencies and Security (2020) (0)
- NTMS 2008, 2nd International Conference on New Technologies, Mobility and Security, November 5-7, 2008, Tangier, Morocco (2008) (0)
- Please hold on: more time = more patches? Automated program repair as anytime algorithms (2021) (0)
- Identifying the implied: Findings from three differentiated replications on the use of security requirements templates (2016) (0)
- A protocol's life after attacks... Commentary. Authors' reply (2005) (0)
- Guest Editorial: Special section on software reliability and security (2012) (0)
- "Free" as in Freedom to Protest? (2022) (0)
- How to capture and use legal patterns in IT (2009) (0)
- 25 Years in Application Security: Looking Back, Looking Forward (2022) (0)
- Who Should Pay for Interdependent Risk? Policy Implications for Cyber-Physical Security Interdependence in Aviation (2018) (0)
- Are Machine Learning Models for Malware Detection Ready for Prime Time? (2023) (0)
- Cryptographic and Financial Fairness (2022) (0)
- Curriculum guidelines for new Fintech Master's Programmes (2020) (0)
- Innovative trust & security research outputs (2014) (0)
- Using Third Party Components for Building an Application Might be More Dangerous Than You Think (2016) (0)
- On the acceptance by code reviewers of candidate security patches suggested by Automated Program Repair tools (2022) (0)
- A tool for managing evolving security requirements Conference Item (2016) (0)
- Network of Excellence Proceedings of the first ESSoS (2012) (0)
- Interactive Access Control for Web Services Interactive Access Control for Web Services (2004) (0)
- INCLUSION MATCHING IMPLEMENTATION OF AUTOMATA MODULO THEORY (AMT) (2010) (0)
- outputs A tool for managing evolving security requirements (2012) (0)
- Preface (2007) (0)
- A tool for managing evolving security requirements Conference or Workshop Item (2018) (0)
- High-level algorithms and data structures requirements for security-by-contract on Java cards (2012) (0)
- WACCO 2020: the 2nd Workshop on Attackers and Cybercrime Operations Co-held with IEEE European Symposium on Security and Privacy 2020 (2020) (0)
- Proceedings of the 1st International Symposium on Engineering Secure Software and Systems (2009) (0)
- Building cross-language corpora for human understanding of privacy policies (2023) (0)
- The Risk of Relying on a Public Communications Infrastructure (2020) (0)
- cant ext ual easoning is N (1996) (0)
- Towards Security Climate Forecasts (2010) (0)
- Non-monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion) (2018) (0)
- Security-By-Contract ( S × C ) for Mobile Systems (0)
- Privacy is Linking Permission to Purpose (Transcript of Discussion) (2004) (0)
- Mac-A-Mal: macOS malware analysis framework resistant to anti evasion techniques (2019) (0)
- Single Step Tableaux for Modal (1998) (0)
- Selecting a Secure Cloud Provider - An Empirical Study and Multi Criteria Approach (2020) (0)
- Editorial Board (2013) (0)
- Approximate reasoning for contextual databases (1996) (0)
- Top Technology Trends for 2020 Featured in Computer (2020) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Fabio Massacci?
Fabio Massacci is affiliated with the following schools: