ATZENI, ANDREA
HAIT: Heap Analyzer with Input Tracing
2017 Atzeni, Andrea; Marcelli, Andrea; Muroni, Francesco; Squillero, Giovanni
The FICEP Infrastructure - How we deployed the Italian eIDAS Node in the cloud
2017 Smiraglia, Paolo; DE BENEDICTIS, Marco; Atzeni, Andrea; Lioy, Antonio; Pucciarelli, Massimiliano
Towards Stronger Data Security in an eID Management Infrastructure
2017 Berbecaru, DIANA GRATIELA; Atzeni, Andrea; DE BENEDICTIS, Marco; Smiraglia, Paolo
Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework
2014 Shamal, Faily; John, Lyle; Ivan, Fléchais; Atzeni, Andrea; Cameroni, Cesare; Hans, Myrhaug; Ayse, Göker; Robert, Kleinfeld
How Dangerous is Your Android App? An Evaluation Methodology
2014 Atzeni, Andrea; Su, Tao; M., Baltatu; R., D'Alessandro; G., Pessiva
Lightweight Formal Verification in Real World, A Case Study
2014 Atzeni, Andrea; Su, Tao; Montanaro, Teodoro
Continuous integration for web-based software infrastructures: lessons learned on the webinos project
2013 Su, Tao; Lyle, J.; Atzeni, Andrea; Faily, S.; Virji, H.; Ntanos, C.; Botsikas, C.
Personal PKI for the smart device era
2013 Lyle, J.; Paverd, A.; King Lacroix, J.; Atzeni, Andrea; Virji, H.; Flechais, I.; Faily, S.
Policies in Context: Factors Influencing the Elicitation and Categorisation of Context−Sensitive Security Policies
2013 Faily, S.; Lyle, J.; Flechais, I.; Atzeni, Andrea; Cameroni, Cesare; Myrhaug, H.; Goker, A.; Kleinfeld, R.
Model-driven architectural risk analysis using architectural and contextualised attack patterns
2012 Faily, S.; Lyle, J.; Namiluko, C.; Atzeni, Andrea; Cameroni, Cesare
Requirements Sensemaking using Concept Maps
2012 Faily, S.; Lyle, J.; Paul, A.; Atzeni, Andrea; Blomme, D.; Desruelle, H.; Bangalore, K.
Here's Johnny: a methodology for developing attacker personas
2011 Atzeni, Andrea; Faily, S.; Lyle, J.; Cameroni, Cesare; Flechais, I.
Toward a formal framework to evaluate wireless sensor network security
2009 ABOU EL KALAM, A; Atzeni, Andrea; Cappadonia, Alberto; Cesena, Emanuele; FISCHER HUBNER, S; Lindskog, S; Martucci, L. A.; Pastrone, C.
Generation of Diagnostic Plans for Large ICT Systems
2008 Aime, MARCO DOMENICO; Atzeni, Andrea
Learning to enhance dependability of information systems
2008 Aime, MARCO DOMENICO; Atzeni, Andrea; Pomi, PAOLO CARLO
The Risks With Security Metrics
2008 Aime, MARCO DOMENICO; Atzeni, Andrea; Pomi, PAOLO CARLO
AMBRA - Automated Model-Based Risk Analysis
2007 Aime, MARCO DOMENICO; Atzeni, Andrea; Pomi, PAOLO CARLO
An estimation of attack surface to evaluate network (in)security
2007 Atzeni, Andrea; Lioy, Antonio
Opaque channel: contrasting information leakage in wireless scenarios
2006 Aime, MARCO DOMENICO; Atzeni, Andrea
A generic overall framework for network security evaluation
2005 Atzeni, Andrea; Lioy, Antonio; Tamburino, Lucia
| Citazione | Data di pubblicazione | Autori | File |
|---|---|---|---|
| HAIT: Heap Analyzer with Input Tracing / Atzeni, Andrea; Marcelli, Andrea; Muroni, Francesco; Squillero, Giovanni. - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT:(2017), pp. 327-334. ( SECRYPT 2017 Madrid, Spain 24-26 Luglio 2017) [10.5220/0006420803270334]. | 1-gen-2017 | ATZENI, ANDREAMARCELLI, ANDREAMURONI, FRANCESCOSQUILLERO, GIOVANNI | - |
| The FICEP Infrastructure - How we deployed the Italian eIDAS Node in the cloud / Smiraglia, Paolo; DE BENEDICTIS, Marco; Atzeni, Andrea; Lioy, Antonio; Pucciarelli, Massimiliano. - STAMPA. - (2017), pp. 196-210. ( e-Democracy 2017: Privacy-Preserving, Secure, Intelligent e-Government Services Athens (Greece) December 14-15, 2017) [10.1007/978-3-319-71117-1_14]. | 1-gen-2017 | SMIRAGLIA, PAOLODE BENEDICTIS, MARCOATZENI, ANDREALIOY, ANTONIO + | - |
| Towards Stronger Data Security in an eID Management Infrastructure / Berbecaru, DIANA GRATIELA; Atzeni, Andrea; DE BENEDICTIS, Marco; Smiraglia, Paolo. - STAMPA. - (2017), pp. 391-395. ( PDP-2017: 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing St. Petersburg (Russia) 06-08 March 2017) [10.1109/PDP.2017.90]. | 1-gen-2017 | BERBECARU, DIANA GRATIELAATZENI, ANDREADE BENEDICTIS, MARCOSMIRAGLIA, PAOLO | - |
| Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework / Shamal, Faily; John, Lyle; Ivan, Fléchais; Atzeni, Andrea; Cameroni, Cesare; Hans, Myrhaug; Ayse, Göker; Robert, Kleinfeld. - ELETTRONICO. - (2014), pp. 189-194. ( HCI'14: 28th Int. BCS Human Computer Interaction Conference 2014 Southport (UK) 9-12 September 2014) [10.14236/ewic/hci2014.21]. | 1-gen-2014 | ATZENI, ANDREACAMERONI, CESARE + | ewic_hci14_short_paper4.pdf |
| How Dangerous is Your Android App? An Evaluation Methodology / Atzeni, Andrea; Su, Tao; M., Baltatu; R., D'Alessandro; G., Pessiva. - ELETTRONICO. - (2014), pp. 130-139. ( 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services London, United Kingdom 02/12/2014-05/12/2014) [10.4108/icst.mobiquitous.2014.257832]. | 1-gen-2014 | ATZENI, ANDREASU, TAO + | - |
| Lightweight Formal Verification in Real World, A Case Study / Atzeni, Andrea; Su, Tao; Montanaro, Teodoro. - STAMPA. - (2014), pp. 335-342. ( WISSE 2014: 4th International Workshop on Information Systems Security Engineering Thessaloniki (Greece) 17 June 2014) [10.1007/978-3-319-07869-4_31]. | 1-gen-2014 | ATZENI, ANDREASU, TAOMONTANARO, TEODORO | - |
| Continuous integration for web-based software infrastructures: lessons learned on the webinos project / Su, Tao; Lyle, J.; Atzeni, Andrea; Faily, S.; Virji, H.; Ntanos, C.; Botsikas, C.. - STAMPA. - LNCS-8244:(2013), pp. 145-150. ( HVC-2013: Ninth Haifa Verification Conference Haifa (Israel) 5-7/11/2013) [10.1007/978-3-319-03077-7_10]. | 1-gen-2013 | SU, TAOATZENI, ANDREA + | - |
| Personal PKI for the smart device era / Lyle, J.; Paverd, A.; King Lacroix, J.; Atzeni, Andrea; Virji, H.; Flechais, I.; Faily, S.. - STAMPA. - (2013), pp. 69-84. ( 9th European Workshop EuroPKI 2012 Pisa (Italy) September 13-14, 2012). | 1-gen-2013 | ATZENI, ANDREA + | - |
| Policies in Context: Factors Influencing the Elicitation and Categorisation of Context−Sensitive Security Policies / Faily, S.; Lyle, J.; Flechais, I.; Atzeni, Andrea; Cameroni, Cesare; Myrhaug, H.; Goker, A.; Kleinfeld, R.. - ELETTRONICO. - (2013). ( HUPS-2013: workshop on Home Usable Privacy and Security Newcastle (UK) 24-26/7/2013). | 1-gen-2013 | ATZENI, ANDREACAMERONI, CESARE + | - |
| Model-driven architectural risk analysis using architectural and contextualised attack patterns / Faily, S.; Lyle, J.; Namiluko, C.; Atzeni, Andrea; Cameroni, Cesare. - (2012). ( MDSec 2012: Workshop on Model-Driven Security, at the 15th ACM/IEEE International Conference on Model Driven Engineering Languages and System Innsbruck (Austria) October 1-5, 2012) [10.1145/2422498.2422501]. | 1-gen-2012 | ATZENI, ANDREACAMERONI, CESARE + | - |
| Requirements Sensemaking using Concept Maps / Faily, S.; Lyle, J.; Paul, A.; Atzeni, Andrea; Blomme, D.; Desruelle, H.; Bangalore, K.. - STAMPA. - 7623:(2012), pp. 217-232. ( HCSE-2012: 4th International Conference on Human-Centred Software Engineering Toulouse (France) October 29-31, 2012) [10.1007/978-3-642-34347-6_13]. | 1-gen-2012 | ATZENI, ANDREA + | - |
| Here's Johnny: a methodology for developing attacker personas / Atzeni, Andrea; Faily, S.; Lyle, J.; Cameroni, Cesare; Flechais, I.. - STAMPA. - (2011), pp. 722-727. ( ARES-2011: 6th Int. Conf. on Availability, Reliability and Security Vienna (Austria) 22-26 August 2011) [10.1109/ARES.2011.115]. | 1-gen-2011 | ATZENI, ANDREACAMERONI, CESARE + | - |
| Toward a formal framework to evaluate wireless sensor network security / ABOU EL KALAM, A; Atzeni, Andrea; Cappadonia, Alberto; Cesena, Emanuele; FISCHER HUBNER, S; Lindskog, S; Martucci, L. A.; Pastrone, C.. - (2009). | 1-gen-2009 | ATZENI, ANDREACAPPADONIA, ALBERTOCESENA, EMANUELE + | - |
| Generation of Diagnostic Plans for Large ICT Systems / Aime, MARCO DOMENICO; Atzeni, Andrea. - STAMPA. - (2008), pp. 344-349. ( Second International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE'08) Cap Esterel, France August 25-31, 2008) [10.1109/SECURWARE.2008.56]. | 1-gen-2008 | AIME, MARCO DOMENICOATZENI, ANDREA | - |
| Learning to enhance dependability of information systems / Aime, MARCO DOMENICO; Atzeni, Andrea; Pomi, PAOLO CARLO. - STAMPA. - (2008), pp. 483-484. ( SASO 2008, IEEE International Conference on Self-Adaptive and Self-Organizing Systems Venezia October 20-24, 2008) [10.1109/SASO.2008.50]. | 1-gen-2008 | AIME, MARCO DOMENICOATZENI, ANDREAPOMI, PAOLO CARLO | - |
| The Risks With Security Metrics / Aime, MARCO DOMENICO; Atzeni, Andrea; Pomi, PAOLO CARLO. - STAMPA. - (2008), pp. 65-70. ( QoP 2008, ACM Workshop on Quality of Protection Alexandria, VA, USA 27 Oct 2008) [10.1145/1456362.1456376]. | 1-gen-2008 | AIME, MARCO DOMENICOATZENI, ANDREAPOMI, PAOLO CARLO | - |
| AMBRA - Automated Model-Based Risk Analysis / Aime, MARCO DOMENICO; Atzeni, Andrea; Pomi, PAOLO CARLO. - STAMPA. - (2007), pp. 43-48. ( QoP-2007, ACM workshop on Quality of Protection Alexandria, VA, USA October 29, 2007) [10.1145/1314257.1314272]. | 1-gen-2007 | AIME, MARCO DOMENICOATZENI, ANDREAPOMI, PAOLO CARLO | - |
| An estimation of attack surface to evaluate network (in)security / Atzeni, Andrea; Lioy, Antonio. - STAMPA. - (2007), pp. 493-498. ( ICEIS 2007 - 9th International Conference on Enterprise Information Systems Funchal (Portugal) 12-16 June 2007). | 1-gen-2007 | ATZENI, ANDREALIOY, ANTONIO | - |
| Opaque channel: contrasting information leakage in wireless scenarios / Aime, MARCO DOMENICO; Atzeni, Andrea. - STAMPA. - (2006), pp. 481-490. ( AICA-2006 Cesena (Italy) September 21-22, 2006). | 1-gen-2006 | AIME, MARCO DOMENICOATZENI, ANDREA | - |
| A generic overall framework for network security evaluation / Atzeni, Andrea; Lioy, Antonio; Tamburino, Lucia. - STAMPA. - (2005), pp. 605-615. ( AICA-2005 Udine (Italy) October 5-7, 2005). | 1-gen-2005 | ATZENI, ANDREALIOY, ANTONIOTAMBURINO, Lucia | - |