SARACINO, ANDREA
SARACINO, ANDREA
Istituto di informatica e telematica - IIT
Exploiting usage control for implementation and enforcement of security by contract
2025 Rasori, Marco; Mori, Paolo; Saracino, Andrea; Aldini, Alessandro
On-device derivation of IoT usage control policies: Automating U-XACML policy generation from natural language with LLMs in smart homes environments
2025 Alajramy, Loay; Simoni, Marco; Rasori, Marco; Saracino, Andrea; Mori, Paolo
Trading-off Privacy, Utility, and Explainability in Deep Learning-based Image Data Analysis
2024 Abbasi, Wisam; Mori, Paolo; Saracino, Andrea
Using the ACE Framework to Enforce Access and Usage Control with Notifications of Revoked Access Rights
2024 Rasori, Marco; Saracino, Andrea; Mori, Paolo; Tiloca, Marco
A critical thermal transition driving spring phenology of Northern Hemisphere conifers
2023 Huang, J. -G.; Zhang, Y.; Wang, M.; Yu, X.; Deslauriers, A.; Fonti, P.; Liang, E.; Makinen, H.; Oberhuber, W.; Rathgeber, C. B. K.; Tognetti, R.; Treml, V.; Yang, B.; Zhai, L.; Zhang, J. -L.; Antonucci, S.; Bergeron, Y.; Camarero, J. J.; Campelo, F.; Cufar, K.; Cuny, H. E.; De Luis, M.; Fajstavr, M.; Giovannelli, A.; Gricar, J.; Gruber, A.; Gryc, V.; Guney, A.; Jyske, T.; Kaspar, J.; King, G.; Krause, C.; Lemay, A.; Liu, F.; Lombardi, F.; del Castillo, E. M.; Morin, H.; Nabais, C.; Nojd, P.; Peters, R. L.; Prislan, P.; Saracino, A.; Shishov, V. V.; Swidrak, I.; Vavrcik, H.; Vieira, J.; Zeng, Q.; Liu, Y.; Rossi, S.
Preserving Privacy in the Globalized Smart Home: The SIFIS-Home Project
2022 Ardito, L; Barbato, L; Mori, P; Saracino, A
Privacy vs Accuracy Trade-Off in Privacy Aware Face Recognition in Smart Systems
2022 Abbasi, W; Mori, P; Saracino, A; Frascolla, V
Cybsersecurity issues in robotics
2021 Lacava, G; Marotta, A; Martinelli, F; Saracino, A; La Marra, A; Giluriarte, E; Mayoralvilches, V
Exploiting If This Then That and Usage Control obligations for Smart Home security and management
2021 Giorgi, G; La Marra, A; Martinelli, F; Mori, P; Rizos, A; Saracino, A
Privacy preserving data sharing and analysis for edge-based architectures
2021 Sheikhalishahi, M; Saracino, A; Martinelli, F; La Marra, A
Towards collaborative cyber threat intelligence for security management
2021 Osliak, O; Saracino, A; Martinelli, F; Dimitrakos, T
Using recurrent neural networks for continuous authentication through gait analysis
2021 Giorgi, G; Saracino, A; Martinelli, F
Ask a(n)droid to tell you the odds: probabilistic security-by-contract for mobile devices
2020 Aldini, A; LA MARRA, Antonio; Martinelli, F; Saracino, A
Current Research Issues on Cyber security in Robotics
2020 Lacava, G; Marotta, A; Martinelli, F; Saracino, A; LA MARRA, Antonio; Giluriarte, E; Mayoral Vilches, V
Digital Waste Disposal: an automated framework for analysis of spam emails
2020 Sheikhalishahi, M; Saracino, A; Martinelli, F; LA MARRA, Antonio; Mejri, M; Tawbi, N
Email spoofing attack detection through an end to end authorship attribution system
2020 Giorgi, G; Saracino, A; Martinelli, F
Improving security in industry 4.0 by extending OPC-UA with usage control
2020 Martinelli, F; Osliak, O; Mori, P; Saracino, A
Multi-level distributed intrusion detection system for an IoT based smart home environment
2020 S. Facchini ; G. Giorgi ; A. Saracino ; G. Dini
Pushing Forward Security in Network Slicing by Leveraging Continuous Usage Control
2020 Martini, B; Mori, P; Marino, F; Saracino, A; Lunardelli, A; Marra, Al; Martinelli, F; Castoldi, P
Response--a framework for enforcing risk-aware security policies in constrained dynamic environments
2020 Michailidou, C; Gkioulos, V; Shalaginov, A; Rizos, A; Saracino, A
| Titolo | Data di pubblicazione | Autore(i) | File |
|---|---|---|---|
| Exploiting usage control for implementation and enforcement of security by contract | 1-gen-2025 | Rasori, Marco; Mori, Paolo; Saracino, Andrea; Aldini, Alessandro | |
| On-device derivation of IoT usage control policies: Automating U-XACML policy generation from natural language with LLMs in smart homes environments | 1-gen-2025 | Alajramy, Loay; Simoni, Marco; Rasori, Marco; Saracino, Andrea; Mori, Paolo | |
| Trading-off Privacy, Utility, and Explainability in Deep Learning-based Image Data Analysis | 1-gen-2024 | Abbasi, Wisam; Mori, Paolo; Saracino, Andrea | |
| Using the ACE Framework to Enforce Access and Usage Control with Notifications of Revoked Access Rights | 1-gen-2024 | Rasori, Marco; Saracino, Andrea; Mori, Paolo; Tiloca, Marco | |
| A critical thermal transition driving spring phenology of Northern Hemisphere conifers | 1-gen-2023 | Huang, J. -G.; Zhang, Y.; Wang, M.; Yu, X.; Deslauriers, A.; Fonti, P.; Liang, E.; Makinen, H.; Oberhuber, W.; Rathgeber, C. B. K.; Tognetti, R.; Treml, V.; Yang, B.; Zhai, L.; Zhang, J. -L.; Antonucci, S.; Bergeron, Y.; Camarero, J. J.; Campelo, F.; Cufar, K.; Cuny, H. E.; De Luis, M.; Fajstavr, M.; Giovannelli, A.; Gricar, J.; Gruber, A.; Gryc, V.; Guney, A.; Jyske, T.; Kaspar, J.; King, G.; Krause, C.; Lemay, A.; Liu, F.; Lombardi, F.; del Castillo, E. M.; Morin, H.; Nabais, C.; Nojd, P.; Peters, R. L.; Prislan, P.; Saracino, A.; Shishov, V. V.; Swidrak, I.; Vavrcik, H.; Vieira, J.; Zeng, Q.; Liu, Y.; Rossi, S. | |
| Preserving Privacy in the Globalized Smart Home: The SIFIS-Home Project | 1-gen-2022 | Ardito, L; Barbato, L; Mori, P; Saracino, A | |
| Privacy vs Accuracy Trade-Off in Privacy Aware Face Recognition in Smart Systems | 1-gen-2022 | Abbasi, W; Mori, P; Saracino, A; Frascolla, V | |
| Cybsersecurity issues in robotics | 1-gen-2021 | Lacava, G; Marotta, A; Martinelli, F; Saracino, A; La Marra, A; Giluriarte, E; Mayoralvilches, V | |
| Exploiting If This Then That and Usage Control obligations for Smart Home security and management | 1-gen-2021 | Giorgi, G; La Marra, A; Martinelli, F; Mori, P; Rizos, A; Saracino, A | |
| Privacy preserving data sharing and analysis for edge-based architectures | 1-gen-2021 | Sheikhalishahi, M; Saracino, A; Martinelli, F; La Marra, A | |
| Towards collaborative cyber threat intelligence for security management | 1-gen-2021 | Osliak, O; Saracino, A; Martinelli, F; Dimitrakos, T | |
| Using recurrent neural networks for continuous authentication through gait analysis | 1-gen-2021 | Giorgi, G; Saracino, A; Martinelli, F | |
| Ask a(n)droid to tell you the odds: probabilistic security-by-contract for mobile devices | 1-gen-2020 | Aldini, A; LA MARRA, Antonio; Martinelli, F; Saracino, A | |
| Current Research Issues on Cyber security in Robotics | 1-gen-2020 | Lacava, G; Marotta, A; Martinelli, F; Saracino, A; LA MARRA, Antonio; Giluriarte, E; Mayoral Vilches, V | |
| Digital Waste Disposal: an automated framework for analysis of spam emails | 1-gen-2020 | Sheikhalishahi, M; Saracino, A; Martinelli, F; LA MARRA, Antonio; Mejri, M; Tawbi, N | |
| Email spoofing attack detection through an end to end authorship attribution system | 1-gen-2020 | Giorgi, G; Saracino, A; Martinelli, F | |
| Improving security in industry 4.0 by extending OPC-UA with usage control | 1-gen-2020 | Martinelli, F; Osliak, O; Mori, P; Saracino, A | |
| Multi-level distributed intrusion detection system for an IoT based smart home environment | 1-gen-2020 | S. Facchini ; G. Giorgi ; A. Saracino ; G. Dini | |
| Pushing Forward Security in Network Slicing by Leveraging Continuous Usage Control | 1-gen-2020 | Martini, B; Mori, P; Marino, F; Saracino, A; Lunardelli, A; Marra, Al; Martinelli, F; Castoldi, P | |
| Response--a framework for enforcing risk-aware security policies in constrained dynamic environments | 1-gen-2020 | Michailidou, C; Gkioulos, V; Shalaginov, A; Rizos, A; Saracino, A |