Остановите войну!
for scientists:
default search action
Paolo Tonella
- > Home > Persons > Paolo Tonella
Publications
- 2023
- [j87]Andrea Romdhana, Alessio Merlo, Mariano Ceccato, Paolo Tonella:
Assessing the security of inter-app communications in android through reinforcement learning. Comput. Secur. 131: 103311 (2023) - 2022
- [j78]Andrea Romdhana, Alessio Merlo, Mariano Ceccato, Paolo Tonella:
Deep Reinforcement Learning for Black-box Testing of Android Apps. ACM Trans. Softw. Eng. Methodol. 31(4): 65:1-65:29 (2022) - [c183]Andrea Romdhana, Mariano Ceccato, Alessio Merlo, Paolo Tonella:
IFRIT: Focused Testing through Deep Reinforcement Learning. ICST 2022: 24-34 - 2021
- [c174]Emanuele Viglianisi, Mariano Ceccato, Paolo Tonella:
Summary of: A Federated Society of Bots for Smart Contract Testing. ICST 2021: 282-283 - [c173]Andrea Romdhana, Mariano Ceccato, Gabriel Claudiu Georgiu, Alessio Merlo, Paolo Tonella:
COSMO: Code Coverage Made Easier for Android. ICST 2021: 417-423 - [i16]Andrea Romdhana, Alessio Merlo, Mariano Ceccato, Paolo Tonella:
Deep Reinforcement Learning for Black-Box Testing of Android Apps. CoRR abs/2101.02636 (2021) - 2020
- [j73]Alessio Viticchié, Leonardo Regano, Cataldo Basile, Marco Torchiano, Mariano Ceccato, Paolo Tonella:
Empirical assessment of the effort needed to attack programs protected with client/server code splitting. Empir. Softw. Eng. 25(1): 1-48 (2020) - [j71]Emanuele Viglianisi, Mariano Ceccato, Paolo Tonella:
A federated society of bots for smart contract testing. J. Syst. Softw. 168: 110647 (2020) - [c162]Maurizio Leotta, Matteo Biagiola, Filippo Ricca, Mariano Ceccato, Paolo Tonella:
A Family of Experiments to Assess the Impact of Page Object Pattern in Web Test Suite Development. ICST 2020: 263-273 - [c161]Mariano Ceccato, Davide Corradini, Luca Gazzola, Fitsum Meshesha Kifetew, Leonardo Mariani, Matteo Orrù, Paolo Tonella:
A Framework for In-Vivo Testing of Mobile Applications. ICST 2020: 286-296 - [i9]Mariano Ceccato, Davide Corradini, Luca Gazzola, Fitsum Meshesha Kifetew, Leonardo Mariani, Matteo Orrù, Paolo Tonella:
A Framework for In-Vivo Testing of Mobile Applications. CoRR abs/2002.01785 (2020) - 2019
- [j70]Mariano Ceccato, Paolo Tonella, Cataldo Basile, Paolo Falcarin, Marco Torchiano, Bart Coppens, Bjorn De Sutter:
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge. Empir. Softw. Eng. 24(1): 240-286 (2019) - [c156]Mariano Ceccato, Luca Gazzola, Fitsum Meshesha Kifetew, Leonardo Mariani, Matteo Orrù, Paolo Tonella:
Toward In-Vivo Testing of Mobile Applications. ISSRE Workshops 2019: 137-143 - 2017
- [c151]Mariano Ceccato, Paolo Tonella, Cataldo Basile, Bart Coppens, Bjorn De Sutter, Paolo Falcarin, Marco Torchiano:
How professional hackers understand protected code while performing attack tasks. ICPC 2017: 154-164 - [i4]Alessio Viticchié, Leonardo Regano, Marco Torchiano, Cataldo Basile, Mariano Ceccato, Paolo Tonella, Roberto Tiella:
Assessment of Source Code Obfuscation Techniques. CoRR abs/1704.02307 (2017) - [i3]Mariano Ceccato, Paolo Tonella, Cataldo Basile, Bart Coppens, Bjorn De Sutter, Paolo Falcarin, Marco Torchiano:
How Professional Hackers Understand Protected Code while Performing Attack Tasks. CoRR abs/1704.02774 (2017) - 2016
- [c143]Alessio Viticchié, Leonardo Regano, Marco Torchiano, Cataldo Basile, Mariano Ceccato, Paolo Tonella, Roberto Tiella:
Assessment of Source Code Obfuscation Techniques. SCAM 2016: 11-20 - 2015
- [j60]Mariano Ceccato, Alessandro Marchetto, Leonardo Mariani, Cu D. Nguyen, Paolo Tonella:
Do Automatically Generated Test Cases Make Debugging Easier? An Experimental Assessment of Debugging Effectiveness and Efficiency. ACM Trans. Softw. Eng. Methodol. 25(1): 5:1-5:38 (2015) - 2014
- [j58]Mariano Ceccato, Massimiliano Di Penta, Paolo Falcarin, Filippo Ricca, Marco Torchiano, Paolo Tonella:
A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques. Empir. Softw. Eng. 19(4): 1040-1074 (2014) - [c134]Paolo Tonella, Mariano Ceccato, Bjorn De Sutter, Bart Coppens:
POSTER: A Measurement Framework to Quantify Software Protections. CCS 2014: 1505-1507 - 2012
- [c114]Mariano Ceccato, Alessandro Marchetto, Leonardo Mariani, Cu D. Nguyen, Paolo Tonella:
An empirical study about the effectiveness of debugging when random test cases are used. ICSE 2012: 452-462 - 2011
- [j45]Mariano Ceccato, Paolo Tonella:
CodeBender: Remote Software Protection Using Orthogonal Replacement. IEEE Softw. 28(2): 28-34 (2011) - 2010
- [j40]Mariano Ceccato, Thomas Roy Dean, Paolo Tonella, Davide Marchignoli:
Migrating legacy data structures based on variable overlay to Java. J. Softw. Maintenance Res. Pract. 22(3): 211-237 (2010) - [j39]Filippo Ricca, Massimiliano Di Penta, Marco Torchiano, Paolo Tonella, Mariano Ceccato:
How Developers' Experience and Ability Influence Web Application Comprehension Tasks Supported by UML Stereotypes: A Series of Four Experiments. IEEE Trans. Software Eng. 36(1): 96-118 (2010) - [c93]Mariano Ceccato, Paolo Tonella:
Static analysis for enforcing intra-thread consistent locks in the migration of a legacy system. ICSM 2010: 1-9 - 2009
- [j38]Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, Christian S. Collberg, Paolo Tonella:
Trading-off security and performance in barrier slicing for remote software entrusting. Autom. Softw. Eng. 16(2): 235-261 (2009) - [j37]Mariano Ceccato, Paolo Tonella:
Dynamic aspect mining. IET Softw. 3(4): 321-336 (2009) - [j36]Filippo Ricca, Marco Torchiano, Massimiliano Di Penta, Mariano Ceccato, Paolo Tonella:
Using acceptance tests as a support for clarifying requirements: A series of experiments. Inf. Softw. Technol. 51(2): 270-283 (2009) - [j35]Mariano Ceccato, Thomas Roy Dean, Paolo Tonella:
Recovering structured data types from a legacy data model with overlays. Inf. Softw. Technol. 51(10): 1454-1468 (2009) - [c83]Mariano Ceccato, Massimiliano Di Penta, Jasvir Nagra, Paolo Falcarin, Filippo Ricca, Marco Torchiano, Paolo Tonella:
The effectiveness of source code obfuscation: An experimental assessment. ICPC 2009: 178-187 - [c82]Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, Anirban Majumdar:
Remote software protection by orthogonal client replacement. SAC 2009: 448-455 - 2008
- [c74]Mariano Ceccato, Massimiliano Di Penta, Jasvir Nagra, Paolo Falcarin, Filippo Ricca, Marco Torchiano, Paolo Tonella:
Towards experimental evaluation of code obfuscation techniques. QoP 2008: 39-46 - [c73]Mariano Ceccato, Paolo Tonella, Cristina Matteotti:
Goto Elimination Strategies in the Migration of Legacy Code to Java. CSMR 2008: 53-62 - [c72]Filippo Ricca, Massimiliano Di Penta, Marco Torchiano, Paolo Tonella, Mariano Ceccato, Corrado Aaron Visaggio:
Are fit tables really talking?: a series of experiments to understand whether fit tables are useful during evolution tasks. ICSE 2008: 361-370 - [c67]Mariano Ceccato, Jasvir Nagra, Paolo Tonella:
Distributing Trust Verification to Increase Application Performance. PDP 2008: 604-610 - [c66]Mariano Ceccato, Thomas Roy Dean, Paolo Tonella:
Using Program Transformations to Add Structure to a Legacy Data Model. SCAM 2008: 197-206 - [c65]Mariano Ceccato, Yoram Ofek, Paolo Tonella:
Remote Entrusting by Run-Time Software Authentication. SOFSEM 2008: 83-97 - [c64]Mariano Ceccato, Thomas Roy Dean, Paolo Tonella, Davide Marchignoli:
Data Model Reverse Engineering in Migrating a Legacy System to Java. WCRE 2008: 177-186 - 2007
- [j31]Filippo Ricca, Marco Torchiano, Massimiliano Di Penta, Mariano Ceccato, Paolo Tonella:
The Use of Executable FIT Tables to support Maintenance and Evolution Tasks. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 8 (2007) - [j29]Filippo Ricca, Massimiliano Di Penta, Marco Torchiano, Paolo Tonella, Mariano Ceccato:
How design notations affect the comprehension of Web applications. J. Softw. Maintenance Res. Pract. 19(5): 339-359 (2007) - [c61]Filippo Ricca, Massimiliano Di Penta, Marco Torchiano, Paolo Tonella, Mariano Ceccato:
The Role of Experience and Ability in Comprehension Tasks Supported by UML Stereotypes. ICSE 2007: 375-384 - [c59]Filippo Ricca, Marco Torchiano, Mariano Ceccato, Paolo Tonella:
Talking tests: an empirical assessment of the role of fit acceptance tests in clarifying requirements. IWPSE 2007: 51-58 - [c58]Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, Christian S. Collberg, Paolo Tonella:
Barrier Slicing for Remote Software Trusting. SCAM 2007: 27-36 - 2006
- [j23]Mariano Ceccato, Marius Marin, Kim Mens, Leon Moonen, Paolo Tonella, Tom Tourwé:
Applying and combining three different aspect Mining Techniques. Softw. Qual. J. 14(3): 209-231 (2006) - [j22]David W. Binkley, Mariano Ceccato, Mark Harman, Filippo Ricca, Paolo Tonella:
Tool-Supported Refactoring of Existing Object-Oriented Code into Aspects. IEEE Trans. Software Eng. 32(9): 698-717 (2006) - [c53]Filippo Ricca, Massimiliano Di Penta, Marco Torchiano, Paolo Tonella, Mariano Ceccato:
An empirical study on the usefulness of Conallen's stereotypes inWeb application comprehension. WSE 2006: 58-68 - [i1]Mariano Ceccato, Marius Marin, Kim Mens, Leon Moonen, Paolo Tonella, Tom Tourwé:
Applying and Combining Three Different Aspect Mining Techniques. CoRR abs/cs/0607006 (2006) - 2005
- [j20]Paolo Tonella, Mariano Ceccato:
Refactoring the Aspectizable Interfaces: An Empirical Assessment. IEEE Trans. Software Eng. 31(10): 819-832 (2005) - [c50]David W. Binkley, Mariano Ceccato, Mark Harman, Filippo Ricca, Paolo Tonella:
Automated Refactoring of Object Oriented Code into Aspects. ICSM 2005: 27-36 - [c48]Mariano Ceccato, Marius Marin, Kim Mens, Leon Moonen, Paolo Tonella, Tom Tourwé:
A Qualitative Comparison of Three Aspect Mining Techniques. IWPC 2005: 13-22 - 2004
- [c43]Paolo Tonella, Mariano Ceccato:
Migrating Interface Implementation to Aspects. ICSM 2004: 220-229 - [c40]Mariano Ceccato, Paolo Tonella:
Adding Distribution to Existing Applications by Means of Aspect Oriented Programming. SCAM 2004: 107-116 - [c39]Paolo Tonella, Mariano Ceccato:
Aspect Mining through the Formal Concept Analysis of Execution Traces. WCRE 2004: 112-121
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-26 20:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint