MARTINELLI, FABIO
 Distribuzione geografica
Continente #
AS - Asia 632
NA - Nord America 179
EU - Europa 42
AF - Africa 3
Totale 856
Nazione #
SG - Singapore 563
US - Stati Uniti d'America 178
KR - Corea 42
CN - Cina 22
IT - Italia 16
DE - Germania 11
FR - Francia 5
GB - Regno Unito 5
SY - Repubblica araba siriana 3
UG - Uganda 3
FI - Finlandia 2
IN - India 2
RO - Romania 2
CA - Canada 1
NL - Olanda 1
Totale 856
Città #
Singapore 436
Santa Clara 53
Seoul 42
Guangzhou 15
Boardman 5
Forest City 4
Campobasso 2
Castelfranco Veneto 2
Corsico 2
Fort Worth 2
Helsinki 2
London 2
Meudon 2
New Delhi 2
Prineville 2
Watford 2
Amsterdam 1
Ashburn 1
Cambridge 1
Cluj-Napoca 1
Dortmund 1
Hamburg 1
Macerata Campania 1
Montreal 1
Naples 1
Pasadena 1
Rome 1
Springfield 1
Totale 587
Nome #
A Survey over Low-Level Security Issues in Heavy Duty Vehicles 9
Obligation Management in Usage Control Systems 8
Usage control in cloud federations 7
An Exploratory Study on the Evolution of Android Malware Quality 6
Usage Control on Cloud systems 6
Improving security in industry 4.0 by extending OPC-UA with usage control 6
Formal Methods for Android Banking Malware Analysis and Detection 5
A "pay-how-you-drive" car insurance approach through cluster analysis 5
Who's Driving My Car? A Machine Learning based Approach to Driver Identification 5
Synthesis of Web Services Orchestrators in a Timed Setting 5
Semiring-base Specification Approaches for Quantitative Security 4
Phylogenetic Analysis for Ransomware Detection and Classification into Families 4
Application Security for Mobile Devices 4
Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach 4
Atti del convegno sulle attività di ricerca e l'innovazione per la sicurezza 4
Dynamic mobile malware detection through system call-based image representation 4
A Framework for Probabilistic Contract Compliance 4
A Flexible Framework for Access Control Based on Ability Authentication. 4
Application Security for Mobile Devices 4
Evaluating model checking for cyber threats code obfuscation identification 4
Fast and effective clustering of spam emails based on structural similarity 4
Cyber Risk management: an actuarial point of view 4
Privacy-Preserving Data Sharing for Collaborative Analytics in Multi-Modal Transportation Systems. 4
A proposal on enhancing XACML with continuous usage control features 4
Introducing probabilities in contract-based approaches for mobile application security 4
CARS: Context Aware Reputation Systems to evaluate vehicles' behaviour 4
A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware 4
Electric Vehicle Security and Privacy: A Comparative Analysis of Charging Methods 4
LEILA: formaL tool for idEntifying mobIle maLicious behAviour 4
Towards Attribute-based Access Control Policy Engineering Using Risk 4
Application Security for Mobile Devices 4
Risk-based Auto Delegation for Probabilistic Availability 4
A framework for locally managing credits and debits in MANETs 4
Risk Analysis of Android Applications: A Multi-Criteria and Usable Approach 4
Optimisation of cyber insurance coverage with selection of cost effective security controls 4
Risk-Aware Usage Decision Making in Highly Dynamic Systems 3
Time-continuous Authorization of Network Resources based on Usage Control 3
Emotions and Interests of Evolving Twitter Bots 3
Introducing Usage Control in MQTT 3
A prototype for Enforcing Usage Control Policies Based on XACML 3
Applying generalized non deducibility on compositions (GNDC) approach in dependability 3
A formal support for collaborative data sharing 3
A collaborative framework for generating probabilistic contracts 3
A survey on security for mobile devices 3
A framework for automatic security controller generation 3
Alfabeto digitale - puntata sessantatre - la cyberwar 3
Towards collaborative cyber threat intelligence for security management 3
Too Long, did not Enforce: A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed Environments 3
A Semantic Foundation for Trust Management Languages with Weights: An Application to the RTFamily 3
A privacy preserving infrastructure for driver's reputation aware automotive services 3
Extending Resource Access in Multi-Provider Networks using Trust Management 3
Deduction and Abduction with Soft Constraints 3
A Privacy-Preserving Infrastructure for Driver's Reputation Aware Automotive Services 3
Remote Policy Enforcement for Trusted Application Execution in Mobile Environments 3
Detection of repackaged mobile applications through a collaborative approach 3
An Approach for the Specification, Verification and Synthesis of Secure Systems 3
Through Modeling to Synthesis of Security Automata 3
Model and Synthesize Security Automata 3
Improving MQTT by inclusion of usage control 3
VISITO Tuscany (VIsual Support to cultural heritage InTeractive access in Tuscany 3
Digital Waste Disposal: an automated framework for analysis of spam emails 3
Cyber Insurance and Security Interdependence: Friends or Foes? 3
A Joint Safety and Security Analysis of message protection for CAN bus protocol 3
A Formal and Run-time Framework for the Adaptation of Local Behaviours to Match a Global Property 3
Privacy-Preserving Text Mining as a Service 3
Newsletter Serit - numero speciale "Serit Award" 3
Quantitative Evaluation of Enforcement Strategies 3
Human behavior characterization for driving style recognition in vehicle system 3
Visualizing the outcome of dynamic analysis of Android malware with VizMal 3
Semiring-based Specification Approaches for Quantitative Security 3
A Multi-Criteria-based Evaluation of Android Applications 3
2Faces: a new model of malware based on dynamic compiling and reflection 3
Application of Secure Two-Party Computation in a Privacy-Preserving Android App. 3
Towards Continuous Usage Control on Grid Computational Services 3
Secure software engineering for connected vehicles: a research agenda 3
Risk analysis of Android applications: A user-centric solution 3
On Probabilistic Application Compliance 3
CANDY: A social engineering attack to leak information from infotainment system 3
Ask a(n)droid to tell you the odds: probabilistic security-by-contract for mobile devices 3
Classifying Android Malware Through Subgraph Mining 3
Model checking and machine learning techniques for HummingBad mobile malware detection and mitigation 3
A framework for the modeling and synthesis of security automata based on process algebras 3
Current Research Issues on Cyber security in Robotics 3
Fine-grained Continuous Usage Control of Service based Grids The GridTrust Approach 3
Resource access in Multi-Provider Networks using Role Based Trust Management 3
Formal analysis of some secure procedures for certificate delivery 3
Enforcing mobile application security through probabilistic contracts 3
Are Photos On Social Networks Really Private? 3
Enhancing security in ETSI open source MANO with usage control capability 3
A tool for the synthesis of cryptographic orchestrators 3
Specification and Analysis of Information Flow Properties for Distributed Systems 3
Reputation-based composition of social web services 3
Preventing the drop in security investments for non-competitive cyber-insurance market 3
Optimal security configuration for cyber insurance 3
Cyber risk management: a new challenge for actuarial mathematics 3
How to Grant Less Permissions to Facebook Applications 3
Analysis of Data Sharing Agreements with Automated veri cation and WS implementation 3
A Privacy-Preserving Solution for Intelligent Transportation Systems: Private Driver DNA 3
Stateful Usage Control for Android Mobile Devices 3
Android collusion detection by means of audio signal analysis with machine learning techniques 3
Totale 357
Categoria #
all - tutte 6.892
article - articoli 1.783
book - libri 107
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 435
Totale 9.217


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2023/202482 0 0 0 0 0 0 0 0 5 2 64 11
2024/2025774 27 42 518 187 0 0 0 0 0 0 0 0
Totale 856