Through modeling to synthesis of security automata F Martinell, I Matteucci Electronic Notes in Theoretical Computer Science 179, 31-46, 2007 | 90 | 2007 |
Risk analysis of Android applications: A user-centric solution G Dini, F Martinelli, I Matteucci, M Petrocchi, A Saracino, D Sgandurra Future Generation Computer Systems 80, 505-518, 2018 | 72 | 2018 |
Toucan: A protocol to secure controller area network G Bella, P Biondi, G Costantino, I Matteucci Proceedings of the ACM Workshop on Automotive Cybersecurity, 3-8, 2019 | 55 | 2019 |
CNL4DSA: a controlled natural language for data sharing agreements I Matteucci, M Petrocchi, ML Sbodio Proceedings of the 2010 ACM Symposium on Applied Computing, 616-620, 2010 | 54 | 2010 |
CANDY: A social engineering attack to leak information from infotainment system G Costantino, A La Marra, F Martinelli, I Matteucci 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 1-5, 2018 | 52 | 2018 |
Prioritized execution of privacy policies I Matteucci, P Mori, M Petrocchi International Workshop on Data Privacy Management, 133-145, 2012 | 36 | 2012 |
Extending Security-by-Contract with quantitative trust on mobile devices G Costa, N Dragoni, A Lazouski, F Martinelli, F Massacci, I Matteucci 2010 International Conference on Complex, Intelligent and Software Intensive …, 2010 | 36 | 2010 |
A novel security information and event management system for enhancing cyber security in a hydroelectric dam C Di Sarno, A Garofalo, I Matteucci, M Vallini International Journal of Critical Infrastructure Protection 13, 39-51, 2016 | 33 | 2016 |
A prototype for solving conflicts in XACML-based e-Health policies A Lunardelli, I Matteucci, P Mori, M Petrocchi Proceedings of the 26th IEEE international symposium on computer-based …, 2013 | 31 | 2013 |
A design phase for data sharing agreements I Matteucci, M Petrocchi, ML Sbodio, L Wiegand International Workshop on Data Privacy Management, 25-41, 2011 | 29 | 2011 |
CINNAMON: A module for AUTOSAR secure onboard communication G Bella, P Biondi, G Costantino, I Matteucci 2020 16th European Dependable Computing Conference (EDCC), 103-110, 2020 | 27 | 2020 |
Automated synthesis of enforcing mechanisms for security properties in a timed setting I Matteucci Electronic Notes in Theoretical Computer Science 186, 101-120, 2007 | 27 | 2007 |
An approach for the specification, verification and synthesis of secure systems F Martinelli, I Matteucci Electronic Notes in Theoretical Computer Science 168, 29-43, 2007 | 27 | 2007 |
A multi-criteria-based evaluation of android applications G Dini, F Martinelli, I Matteucci, M Petrocchi, A Saracino, D Sgandurra International Conference on Trusted Systems, 67-82, 2012 | 26 | 2012 |
A tour of secure software engineering solutions for connected vehicles A Bertolino, A Calabro’, F Di Giandomenico, G Lami, F Lonetti, E Marchetti, ... Software Quality Journal 26, 1223-1256, 2018 | 24 | 2018 |
A formal support for collaborative data sharing F Martinelli, I Matteucci, M Petrocchi, L Wiegand International Conference on Availability, Reliability, and Security, 547-561, 2012 | 24 | 2012 |
In-depth exploration of ISO/SAE 21434 and its correlations with existing standards G Costantino, M De Vincenzi, I Matteucci IEEE Communications Standards Magazine 6 (1), 84-92, 2022 | 22 | 2022 |
A framework for automatic generation of security controller F Martinelli, I Matteucci Software Testing, Verification and Reliability 22 (8), 563-582, 2012 | 22 | 2012 |
From qualitative to quantitative enforcement of security policy F Martinelli, I Matteucci, C Morisset Computer Network Security: 6th International Conference on Mathematical …, 2012 | 21 | 2012 |
Controlling usage in business process workflows through fine-grained security policies B Aziz, A Arenas, F Martinelli, I Matteucci, P Mori Trust, Privacy and Security in Digital Business: 5th International …, 2008 | 21 | 2008 |