ATZENI, ANDREA

ATZENI, ANDREA  

Dipartimento di Automatica e Informatica  

012066  

Mostra records
Risultati 1 - 20 di 32 (tempo di esecuzione: 0.037 secondi).
Citazione Data di pubblicazione Autori File
A generic overall framework for network security evaluation / Atzeni, Andrea; Lioy, Antonio; Tamburino, Lucia. - STAMPA. - (2005), pp. 605-615. ((Intervento presentato al convegno AICA-2005 tenutosi a Udine (Italy) nel October 5-7, 2005. 1-gen-2005 ATZENI, ANDREALIOY, ANTONIOTAMBURINO, Lucia -
AMBRA - Automated Model-Based Risk Analysis / Aime, MARCO DOMENICO; Atzeni, Andrea; Pomi, PAOLO CARLO. - STAMPA. - (2007), pp. 43-48. ((Intervento presentato al convegno QoP-2007, ACM workshop on Quality of Protection tenutosi a Alexandria, VA, USA nel October 29, 2007 [10.1145/1314257.1314272]. 1-gen-2007 AIME, MARCO DOMENICOATZENI, ANDREAPOMI, PAOLO CARLO -
An estimation of attack surface to evaluate network (in)security / Atzeni, Andrea; Lioy, Antonio. - STAMPA. - (2007), pp. 493-498. ((Intervento presentato al convegno ICEIS 2007 - 9th International Conference on Enterprise Information Systems tenutosi a Funchal (Portugal) nel 12-16 June 2007. 1-gen-2007 ATZENI, ANDREALIOY, ANTONIO -
Android Apps Risk Evaluation: a methodology / Atzeni, Andrea; Su, Tao; Baltatu, Madalina; D'Alessandro, Rosalia; Pessiva, Giovanni. - In: ICST TRANSACTIONS ON UBIQUITOUS ENVIRONMENTS. - ISSN 2032-9377. - ELETTRONICO. - 1:4(2015), pp. 1-18. [10.4108/ue.1.4.e5] 1-gen-2015 ATZENI, ANDREASU, TAO + ue.1.4.e5.pdf
Authentication / Atzeni, Andrea; Lioy, Antonio. - STAMPA. - (2015), pp. 4239-4247. [10.4018/978-1-4666-5888-2.ch416] 1-gen-2015 ATZENI, ANDREALIOY, ANTONIO torsec_authentication_IGI_2014.pdf
Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework / Shamal, Faily; John, Lyle; Ivan, Fléchais; Atzeni, Andrea; Cameroni, Cesare; Hans, Myrhaug; Ayse, Göker; Robert, Kleinfeld. - ELETTRONICO. - (2014), pp. 189-194. ((Intervento presentato al convegno HCI'14: 28th Int. BCS Human Computer Interaction Conference 2014 tenutosi a Southport (UK) nel 9-12 September 2014 [10.14236/ewic/hci2014.21]. 1-gen-2014 ATZENI, ANDREACAMERONI, CESARE + ewic_hci14_short_paper4.pdf
Continuous integration for web-based software infrastructures: lessons learned on the webinos project / Su, Tao; Lyle, J.; Atzeni, Andrea; Faily, S.; Virji, H.; Ntanos, C.; Botsikas, C.. - STAMPA. - LNCS-8244:(2013), pp. 145-150. ((Intervento presentato al convegno HVC-2013: Ninth Haifa Verification Conference tenutosi a Haifa (Israel) nel 5-7/11/2013 [10.1007/978-3-319-03077-7_10]. 1-gen-2013 SU, TAOATZENI, ANDREA + -
Countering Android Malware: a Scalable Semi-Supervised Approach for Family-Signature Generation / Atzeni, Andrea; Díaz, Fernando; Marcelli, Andrea; Sánchez, Antonio; Squillero, Giovanni; Tonda, Alberto. - In: IEEE ACCESS. - ISSN 2169-3536. - ELETTRONICO. - (2018), pp. 59540-59556. [10.1109/ACCESS.2018.2874502] 1-gen-2018 Andrea AtzeniAndrea MarcelliGiovanni Squillero + 08485352.pdf
Developing secure‚ unified multi−device and multi−domain platforms: a case study from the webinos project / Atzeni, Andrea; Lyle, J.; Faily, S.. - STAMPA. - (2014), pp. 310-333. [10.4018/978-1-4666-4514-1.ch012] 1-gen-2014 ATZENI, ANDREA + -
The FICEP Infrastructure - How we deployed the Italian eIDAS Node in the cloud / Smiraglia, Paolo; DE BENEDICTIS, Marco; Atzeni, Andrea; Lioy, Antonio; Pucciarelli, Massimiliano. - STAMPA. - (2017), pp. 196-210. ((Intervento presentato al convegno e-Democracy 2017: Privacy-Preserving, Secure, Intelligent e-Government Services tenutosi a Athens (Greece) nel December 14-15, 2017 [10.1007/978-3-319-71117-1_14]. 1-gen-2017 SMIRAGLIA, PAOLODE BENEDICTIS, MARCOATZENI, ANDREALIOY, ANTONIO + -
Generation of Diagnostic Plans for Large ICT Systems / Aime, MARCO DOMENICO; Atzeni, Andrea. - STAMPA. - (2008), pp. 344-349. ((Intervento presentato al convegno Second International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE'08) tenutosi a Cap Esterel, France nel August 25-31, 2008 [10.1109/SECURWARE.2008.56]. 1-gen-2008 AIME, MARCO DOMENICOATZENI, ANDREA -
HAIT: Heap Analyzer with Input Tracing / Atzeni, Andrea; Marcelli, Andrea; Muroni, Francesco; Squillero, Giovanni. - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT:(2017), pp. 327-334. ((Intervento presentato al convegno SECRYPT 2017 tenutosi a Madrid, Spain nel 24-26 Luglio 2017 [10.5220/0006420803270334]. 1-gen-2017 ATZENI, ANDREAMARCELLI, ANDREAMURONI, FRANCESCOSQUILLERO, GIOVANNI hait-heap-analyzer.pdf
Hard clues in soft environments: The Cloud's influence on digital forensics / Atzeni, Andrea; Smiraglia, Paolo; Siringo, Andrea. - STAMPA. - (2015), pp. 258-284. [10.4018/978-1-4666-8387-7.ch012] 1-gen-2015 ATZENI, ANDREASMIRAGLIA, PAOLOSIRINGO, Andrea -
Here's Johnny: a methodology for developing attacker personas / Atzeni, Andrea; Faily, S.; Lyle, J.; Cameroni, Cesare; Flechais, I.. - STAMPA. - (2011), pp. 722-727. ((Intervento presentato al convegno ARES-2011: 6th Int. Conf. on Availability, Reliability and Security tenutosi a Vienna (Austria) nel 22-26 August 2011 [10.1109/ARES.2011.115]. 1-gen-2011 ATZENI, ANDREACAMERONI, CESARE + -
How Dangerous is Your Android App? An Evaluation Methodology / Atzeni, Andrea; Su, Tao; M., Baltatu; R., D'Alessandro; G., Pessiva. - ELETTRONICO. - (2014), pp. 130-139. ((Intervento presentato al convegno 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services tenutosi a London, United Kingdom nel 02/12/2014-05/12/2014 [10.4108/icst.mobiquitous.2014.257832]. 1-gen-2014 ATZENI, ANDREASU, TAO + p130-atzeni.pdf
Learning to enhance dependability of information systems / Aime, MARCO DOMENICO; Atzeni, Andrea; Pomi, PAOLO CARLO. - STAMPA. - (2008), pp. 483-484. ((Intervento presentato al convegno SASO 2008, IEEE International Conference on Self-Adaptive and Self-Organizing Systems tenutosi a Venezia nel October 20-24, 2008 [10.1109/SASO.2008.50]. 1-gen-2008 AIME, MARCO DOMENICOATZENI, ANDREAPOMI, PAOLO CARLO -
Lightweight Formal Verification in Real World, A Case Study / Atzeni, Andrea; Su, Tao; Montanaro, Teodoro. - STAMPA. - (2014), pp. 335-342. ((Intervento presentato al convegno WISSE 2014: 4th International Workshop on Information Systems Security Engineering tenutosi a Thessaloniki (Greece) nel 17 June 2014 [10.1007/978-3-319-07869-4_31]. 1-gen-2014 ATZENI, ANDREASU, TAOMONTANARO, TEODORO 1780335.pdf
Model-driven architectural risk analysis using architectural and contextualised attack patterns / Faily, S.; Lyle, J.; Namiluko, C.; Atzeni, Andrea; Cameroni, Cesare. - (2012). ((Intervento presentato al convegno MDSec 2012: Workshop on Model-Driven Security, at the 15th ACM/IEEE International Conference on Model Driven Engineering Languages and System tenutosi a Innsbruck (Austria) nel October 1-5, 2012 [10.1145/2422498.2422501]. 1-gen-2012 ATZENI, ANDREACAMERONI, CESARE + -
Opaque channel: contrasting information leakage in wireless scenarios / Aime, MARCO DOMENICO; Atzeni, Andrea. - STAMPA. - (2006), pp. 481-490. ((Intervento presentato al convegno AICA-2006 tenutosi a Cesena (Italy) nel September 21-22, 2006. 1-gen-2006 AIME, MARCO DOMENICOATZENI, ANDREA -
Personal PKI for the smart device era / Lyle, J.; Paverd, A.; King Lacroix, J.; Atzeni, Andrea; Virji, H.; Flechais, I.; Faily, S.. - STAMPA. - (2013), pp. 69-84. ((Intervento presentato al convegno 9th European Workshop EuroPKI 2012 tenutosi a Pisa (Italy) nel September 13-14, 2012. 1-gen-2013 ATZENI, ANDREA + -