default search action
Marco Cremonini
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i3]Marco Cremonini:
A Critical Take on Privacy in a Datafied Society. CoRR abs/2308.02573 (2023) - 2022
- [c33]Francesco Renzini, Carlo Debernardi, Federico Bianchi, Marco Cremonini, Flaminio Squazzoni:
The New Frontiers of Social Simulation in the Data Science Era: An Introduction to the Proceedings. ESSA 2022: 1-10 - 2020
- [j8]Luca Allodi, Marco Cremonini, Fabio Massacci, Woohyun Shim:
Measuring the accuracy of software vulnerability assessments: experiments with students and professionals. Empir. Softw. Eng. 25(2): 1063-1094 (2020) - [j7]Marco Cremonini, Samira Maghool:
The Unknown of the Pandemic: An Agent-Based Model of Final Phase Risks. J. Artif. Soc. Soc. Simul. 23(4) (2020)
2010 – 2019
- 2019
- [c32]Donatello Luna, Luca Allodi, Marco Cremonini:
Productivity and Patterns of Activity in Bug Bounty Programs: Analysis of HackerOne and Google Vulnerability Research. ARES 2019: 67:1-67:10 - [c31]Jeppe Høy Christensen, Niels Henrik Pontoppidan, Marco Anisetti, Valerio Bellandi, Marco Cremonini:
Improving Hearing Healthcare with Big Data Analytics of Real-Time Hearing Aid Data. SERVICES 2019: 307-313 - 2018
- [c30]Jeppe Høy Christensen, Michael Kai Petersen, Niels Henrik Pontoppidan, Marco Cremonini:
Big Data Analytics in Healthcare: Design and Implementation for a Hearing Aid Case Study. SITIS 2018: 296-303 - [i2]Marco Cremonini, Francesca Casamassima:
Controllability of Social Networks and the Strategic Use of Random Information. CoRR abs/1807.07761 (2018) - [i1]Luca Allodi, Marco Cremonini, Fabio Massacci, Woohyun Shim:
The Effect of Security Education and Expertise on Security Assessments: the Case of Software Vulnerabilities. CoRR abs/1808.06547 (2018) - 2017
- [c29]Marco Anisetti, Valerio Bellandi, Marco Cremonini, Ernesto Damiani, Jonatan Maggesi:
Big data platform for public health policies. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - 2016
- [c28]Francesca Casamassima, Marco Cremonini:
Use of Random Topics as Practical Control Signals in a Social Network Model. COMPLEX NETWORKS 2016: 539-550 - 2015
- [c27]Jart Armin, Paolo Foti, Marco Cremonini:
0-Day Vulnerabilities and Cybercrime. ARES 2015: 711-718 - [c26]Alberto Ceselli, Marco Cremonini, Simeone Cristofaro:
Models and Methods for the Analysis of the Diffusion of Skills in Social Networks. OR 2015: 475-481 - 2014
- [c25]Luca Allodi, Luca Chiodi, Marco Cremonini:
Self-organizing Techniques for Knowledge Diffusion in Dynamic Social Networks. CompleNet 2014: 75-86 - 2011
- [j6]Claudio A. Ardagna, Marco Cremonini, Sabrina De Capitani di Vimercati, Pierangela Samarati:
An Obfuscation-Based Approach for Protecting Location Privacy. IEEE Trans. Dependable Secur. Comput. 8(1): 13-27 (2011) - [c24]Luca Allodi, Luca Chiodi, Marco Cremonini:
Modifying Trust Dynamics through Cooperation and Defection in Evolving Social Networks. TRUST 2011: 131-145 - [c23]Luca Allodi, Luca Chiodi, Marco Cremonini:
The asymmetric diffusion of trust between communities: simulations in dynamic social networks. WSC 2011: 3146-3157 - 2010
- [j5]Marco Cremonini, Dmitri Nizovtsev:
Risks and Benefits of Signaling Information System Characteristics to Strategic Attackers. J. Manag. Inf. Syst. 26(3): 241-274 (2010) - [c22]Marco Riccardi, David Oro, Jesus Luna, Marco Cremonini, Marc Vilanova:
A framework for financial botnet analysis. eCrime 2010: 1-7
2000 – 2009
- 2009
- [j4]Claudio Agostino Ardagna, Marco Cremonini, Gabriele Gianini:
Landscape-aware location-privacy protection in location-based services. J. Syst. Archit. 55(4): 243-254 (2009) - [c21]Alberto Ceselli, Roberto Cordone, Marco Cremonini:
Balanced Clustering for Efficient Detection of Scientific Plagiarism. CTW 2009: 163-170 - [c20]Claudio A. Ardagna, Marco Cremonini, Sabrina De Capitani di Vimercati, Pierangela Samarati:
Access Control in Location-Based Services. Privacy in Location-Based Applications 2009: 106-126 - 2008
- [j3]Claudio A. Ardagna, Marco Cremonini, Sabrina De Capitani di Vimercati, Pierangela Samarati:
A privacy-aware access control system. J. Comput. Secur. 16(4): 369-397 (2008) - [p2]Claudio A. Ardagna, Marco Cremonini, Sabrina De Capitani di Vimercati, Pierangela Samarati:
Privacy-enhanced Location-based Access Control. Handbook of Database Security 2008: 531-552 - 2007
- [j2]Marco Anisetti, Valerio Bellandi, Alberto Colombo, Marco Cremonini, Ernesto Damiani, Fulvio Frati, Joël T. Hounsou, Davide Rebeccani:
Learning Computer Networking on Open Paravirtual Laboratories. IEEE Trans. Educ. 50(4): 302-311 (2007) - [c19]Claudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati:
Managing Privacy in LBAC Systems. AINA Workshops (2) 2007: 7-12 - [c18]Claudio A. Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati:
Location Privacy Protection Through Obfuscation-Based Techniques. DBSec 2007: 47-60 - [c17]Claudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati:
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy. SEC 2007: 313-324 - 2006
- [c16]Claudio A. Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati:
Supporting location-based conditions in access control policies. AsiaCCS 2006: 212-222 - [c15]Marco Cremonini, Dmitri Nizovtsev:
Understanding and Influencing Attackers' Decisions: Implications for Security Investment Strategies. WEIS 2006 - 2005
- [c14]Claudio A. Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati:
The Architecture of a Privacy-Aware Access Control Decision Component. CASSIS 2005: 1-15 - [c13]Marco Cremonini, Patrizia Martini:
Evaluating Information Security Investments from Attackers Perspective: the Return-On-Attack (ROA). WEIS 2005 - 2003
- [c12]Marco Cremonini, Ernesto Damiani, Pierangela Samarati:
Semantics-Aware Perimeter Protection. DBSec 2003: 229-242 - [c11]Marco Cremonini, Sabrina De Capitani di Vimercati, Ernesto Damiani, Pierangela Samarati:
An XML-based approach to combine firewalls and web services security specifications. XML Security 2003: 69-78 - 2001
- [p1]Ciarán Bryce, Marco Cremonini:
Coordination and Security on the Internet. Coordination of Internet Agents: Models, Technologies, and Applications 2001: 274-298 - 2000
- [c10]Marco Cremonini, Andrea Omicini, Franco Zambonelli:
Coordination and Access Control in Open Distributed Agent Systems: The TuCSoN Approach. COORDINATION 2000: 99-114 - [c9]Marco Cremonini, Andrea Omicini, Franco Zambonelli:
Ruling Agent Motion in Structured Environments. HPCN Europe 2000: 187-196
1990 – 1999
- 1999
- [j1]Antonio Corradi, Marco Cremonini, Rebecca Montanari, Cesare Stefanelli:
Mobile Agents Integrity for Electronic Commerce Applications. Inf. Syst. 24(6): 519-533 (1999) - [c8]Marco Cremonini, Andrea Omicini, Franco Zambonelli:
Coordination in Context: Authentication, Authorisation and Topology in Mobile Agent Applications. COORDINATION 1999: 416 - [c7]Antonio Corradi, Marco Cremonini, Rebecca Montanari, Cesare Stefanelli:
Mobile agents and security: protocols for integrity. DAIS 1999: 177-190 - [c6]Marco Cremonini, Andrea Omicini, Franco Zambonelli:
Multi-agent Systems on the Internet: Extending the Scope of Coordination towards Security and Topology. MAAMAW 1999: 77-88 - [c5]Marco Cremonini, Andrea Omicini, Franco Zambonelli:
Building Mobile Agent Applications in HiMAT. PDSE 1999: 174-181 - [c4]Marco Cremonini, Andrea Omicini, Franco Zambonelli:
The HiMAT Model for Mobile Agent Applications. PODC 1999: 272 - [c3]Marco Cremonini, Andrea Omicini, Franco Zambonelli:
Modelling Network Topology and Mobile Agent Interaction: An Integrated Framework. SAC 1999: 410-412 - 1998
- [c2]Antonio Corradi, Marco Cremonini, Cesare Stefanelli:
Melding Abstractions with Mobile Agents. CIA 1998: 278-289 - [c1]Antonio Corradi, Marco Cremonini, Cesare Stefanelli:
Locality Abstraction and Security Models in a Mobile Agent Environment. WETICE 1998: 230-235
Coauthor Index
aka: Claudio Agostino Ardagna
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint