SARACINO, ANDREA
 Distribuzione geografica
Continente #
NA - Nord America 432
AS - Asia 150
EU - Europa 28
Totale 610
Nazione #
US - Stati Uniti d'America 431
SG - Singapore 130
KR - Corea 12
IT - Italia 11
FI - Finlandia 9
CN - Cina 7
FR - Francia 4
NL - Olanda 2
CA - Canada 1
DE - Germania 1
GB - Regno Unito 1
HK - Hong Kong 1
Totale 610
Città #
Santa Clara 393
Singapore 102
Seoul 12
Helsinki 9
Guangzhou 5
Pisa 4
Fort Worth 3
Castelfranco Veneto 2
Meudon 2
Prineville 2
Amsterdam 1
Ashburn 1
Cascina 1
Forest City 1
Hong Kong 1
London 1
Miami 1
Montreal 1
Rome 1
Springfield 1
Turin 1
Venice 1
Totale 546
Nome #
Detection of diversity and stand parameters in Mediterranean forests using leaf-off discrete return LiDAR data 13
Introducing Usage Control in MQTT 12
Addressing privacy issues in location-based collaborative and distributed environments 12
Obligation Management in Usage Control Systems 12
A critical thermal transition driving spring phenology of Northern Hemisphere conifers 11
Rapporto tecnico contenente i risultati ottenuti in merito allo studio di tecniche di crowd sourcing combinate con l'uso di droni 11
Improving security in industry 4.0 by extending OPC-UA with usage control 11
Phylogenetic Analysis for Ransomware Detection and Classification into Families 10
Digital Waste Disposal: an automated framework for analysis of spam emails 10
Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach 10
A Framework for Probabilistic Contract Compliance 10
A Multi-Criteria-based Evaluation of Android Applications 10
Current Research Issues on Cyber security in Robotics 10
Enforcing mobile application security through probabilistic contracts 10
Fast and effective clustering of spam emails based on structural similarity 10
Response--a framework for enforcing risk-aware security policies in constrained dynamic environments 10
A collaborative framework for generating probabilistic contracts 9
Towards collaborative cyber threat intelligence for security management 9
Towards Enforcing On-The-Fly Policies in BYOD Environments 9
A Multi-Criteria-Based Evaluation of Android Applications 9
Remote Policy Enforcement for Trusted Application Execution in Mobile Environments 9
Improving MQTT by inclusion of usage control 9
Probabilistic Contract Compliance for Mobile Applications 9
Privacy-Preserving Text Mining as a Service 9
Ask a(n)droid to tell you the odds: probabilistic security-by-contract for mobile devices 9
Classifying Android Malware Through Subgraph Mining 9
Enhancing security in ETSI open source MANO with usage control capability 9
Introducing probabilities in contract-based approaches for mobile application security 9
Demonstration of secure slicing using ETSI MANO enhanced with Usage Control Capability 9
Digital waste sorting: A goal-based, self-learning approach to label spam email campaigns 9
A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware 9
Preserving Privacy in the Globalized Smart Home: The SIFIS-Home Project 9
Too Long, did not Enforce: A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed Environments 8
Managing QoS in Smart Buildings Through Software Defined Network and Usage Control 8
Privacy preserving distributed computation of private attributes for collaborative privacy aware usage control systems 8
Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns 8
On Probabilistic Application Compliance 8
MADAM: A Multi-Level Anomaly Detector for Android Malware 8
Cybsersecurity issues in robotics 8
MADAM: a Multi-Level Anomaly Detector for Android Malware 8
Implementing Usage Control in Internet of Things: A Smart Home Use Case 8
Concurrent History-based Usage Control Policies 8
Modeling Privacy Aware Information Sharing Systems: A Formal and General Approach 8
Privacy Preserving Distributed Attribute Computation for Usage Control in the Internet of Things 8
A scheme for the sticky policy representation supporting secure cyber-threat intelligence analysis and sharing 8
Using IFTTT to Express and Enforce UCON Obligations 8
Enhancing Usage Control for Performance: An Architecture for Systems of Systems 8
Risk Analysis of Android Applications: A Multi-Criteria and Usable Approach 8
Collaborative Attribute Retrieval in Environment with Faulty Attribute Managers 8
I Find Your Behavior Disturbing: Static and Dynamic App Behavioral Analysis for Detection of Android Malware 7
MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes 7
Privacy vs Accuracy Trade-Off in Privacy Aware Face Recognition in Smart Systems 7
Privacy preserving data sharing and analysis for edge-based architectures 7
Pushing Forward Security in Network Slicing by Leveraging Continuous Usage Control 7
Risk analysis of Android applications: A user-centric solution 7
Exploiting If This Then That and Usage Control obligations for Smart Home security and management 7
Not so Crisp, malware! Fuzzy classification of android malware classes 7
Behavioral analysis for a continuous user authentication 7
BRIDEMAID: An Hybrid Tool for Accurate Detection of Android Malware 7
Using the ACE Framework to Enforce Access and Usage Control with Notifications of Revoked Access Rights 7
Session-dependent usage control for big data 7
Detection of repackaged mobile applications through a collaborative approach 6
Multi-level distributed intrusion detection system for an IoT based smart home environment 6
Stateful Usage Control for Android Mobile Devices 6
Stateful Data Usage Control for Android Mobile Devices 6
Walking Through the Deep: Gait Analysis for User Authentication through Deep Learning 6
Preserving QoI in participatory sensing by tackling location-spoofing through mobile WiFi hotspots 5
Email spoofing attack detection through an end to end authorship attribution system 5
Madam: Effective and efficient behavior-based android malware detection and prevention 5
Trading-off Privacy, Utility, and Explainability in Deep Learning-based Image Data Analysis 5
Practical Location Validation in Participatory Sensing Through Mobile WiFi Hotspots 5
Using recurrent neural networks for continuous authentication through gait analysis 5
Enforcement of U-XACML History-Based Usage Control Policy 4
Data-Sluice: Fine-grained Traffic Control for Android Application 4
LVS: A WiFi-based system to tackle Location Spoofing in location-based services 4
Risk analysis of Android applications: A user-centric solution 4
Enhancing Android permission through Usage control: A BYOD use-case 4
Totale 616
Categoria #
all - tutte 2.619
article - articoli 683
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 79
Totale 3.381


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2023/202423 0 0 0 0 0 0 0 0 1 0 20 2
2024/2025593 7 9 133 39 339 63 3 0 0 0 0 0
Totale 616