default search action
Nicola Zannone
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j48]Federico Cunico, Stefano Aldegheri, Andrea Avogaro, Michele Boldo, Nicola Bombieri, Luigi Capogrosso, Ariel Caputo, Damiano Carra, Stefano Centomo, Dong Seon Cheng, Ettore Cinquetti, Marco Cristani, Mirco De Marchi, Florenc Demrozi, Marco Emporio, Franco Fummi, Luca Geretti, Samuele Germiniani, Andrea Giachetti, Federico Girella, Enrico Martini, Gloria Menegaz, Niek Muijs, Federica Paci, Marco Panato, Graziano Pravadelli, Elisa Quintarelli, Ilaria Siviero, Silvia Francesca Storti, Carlo Tadiello, Cristian Turetta, Tiziano Villa, Nicola Zannone, Davide Quaglia:
Enhancing Safety and Privacy in Industry 4.0: The ICE Laboratory Case Study. IEEE Access 12: 154570-154599 (2024) - [j47]R. J. van Geest, Giuseppe Cascavilla, Joris Hulstijn, Nicola Zannone:
The applicability of a hybrid framework for automated phishing detection. Comput. Secur. 139: 103736 (2024) - [j46]Claudia Diamantini, Laura Genga, Alex Mircoli, Domenico Potena, Nicola Zannone:
Understanding the stumbling blocks of Italian higher education system: A process mining approach. Expert Syst. Appl. 242: 122747 (2024) - [j45]Vittoria Cozza, Mila Dalla Preda, Ruggero Lanotte, Marco Lucchese, Massimo Merro, Nicola Zannone:
Obfuscation strategies for industrial control systems. Int. J. Crit. Infrastructure Prot. 47: 100717 (2024) - [j44]Pavlo Burda, Luca Allodi, Nicola Zannone:
Cognition in Social Engineering Empirical Research: A Systematic Literature Review. ACM Trans. Comput. Hum. Interact. 31(2): 19:1-19:55 (2024) - [c124]Pavlo Burda, Maria Eleni Kokkini, Luca Allodi, Nicola Zannone:
The (Relative) Impact of Email Cues on the Perceived Threat of Phishing Attacks: A User Perspective on Phishing Deceptiveness. EuroS&P Workshops 2024: 67-84 - [c123]Pavlo Burda, Luca Allodi, Alexander Serebrenik, Nicola Zannone:
'Protect and Fight Back': A Case Study on User Motivations to Report Phishing Emails. EuroUSEC 2024: 30-43 - [c122]Gelareh Hasel Mehri, Tien-Dung Le, Bram C. M. Cappers, Jerry den Hartog, Nicola Zannone:
WiP: Enhancing the Comprehension of XACML Policies. SACMAT 2024 - [c121]Gelareh Hasel Mehri, Benjamin Monmege, Clara Bertolissi, Nicola Zannone:
A Bargaining-Game Framework for Multi-Party Access Control. SACMAT 2024 - 2023
- [c120]Federica Paci, Jacopo Pizzoli, Nicola Zannone:
A Comprehensive Study on Third-Party User Tracking in Mobile Applications. ARES 2023: 97:1-97:8 - [c119]Marco Lucchese, Francesco Lupia, Massimo Merro, Federica Paci, Nicola Zannone, Angelo Furfaro:
HoneyICS: A High-interaction Physics-aware Honeynet for Industrial Control Systems. ARES 2023: 113:1-113:10 - [c118]Vittoria Cozza, Mila Dalla Preda, Marco Lucchese, Massimo Merro, Nicola Zannone:
Towards Obfuscation of Programmable Logic Controllers. ARES 2023: 121:1-121:10 - [c117]Gelareh Hasel Mehri, Inez L. Wester, Federica Paci, Nicola Zannone:
Mitigating Privilege Misuse in Access Control through Anomaly Detection. ARES 2023: 139:1-139:10 - [c116]Francesco Lupia, Marco Lucchese, Massimo Merro, Nicola Zannone:
ICS Honeypot Interactions: A Latitudinal Study. IEEE Big Data 2023: 3025-3034 - [c115]Ioana Andreea Marin, Pavlo Burda, Nicola Zannone, Luca Allodi:
The Influence of Human Factors on the Intention to Report Phishing Emails. CHI 2023: 620:1-620:18 - [c114]Pavlo Burda, Abdul Malek Altawekji, Luca Allodi, Nicola Zannone:
The Peculiar Case of Tailored Phishing against SMEs: Detection and Collective DefenseMechanisms at a Small IT Company. EuroS&P Workshops 2023: 232-243 - [c113]Ruggero Lanotte, Massimo Merro, Nicola Zannone:
Impact Analysis of Coordinated Cyber-Physical Attacks via Statistical Model Checking: A Case Study. FORTE 2023: 75-94 - [c112]Hamid Mohayeji, Andrei Agaronian, Eleni Constantinou, Nicola Zannone, Alexander Serebrenik:
Investigating the Resolution of Vulnerable Dependencies with Dependabot Security Updates. MSR 2023: 234-246 - [c111]Marco Lucchese, Massimo Merro, Federica Paci, Nicola Zannone:
Towards A High-interaction Physics-aware Honeynet for Industrial Control Systems. SAC 2023: 76-79 - [c110]Dominik Roy George, Savio Sciancalepore, Nicola Zannone:
Privacy-Preserving Multi-Party Access Control for Third-Party UAV Services. SACMAT 2023: 19-30 - [c109]Clara Bertolissi, Alba Martinez Anton, Nicola Zannone:
Data Sharing in Social Networks. SACMAT 2023: 181-192 - [c108]Loredana Caruccio, Domenico Desiato, Giuseppe Polese, Genoveffa Tortora, Nicola Zannone:
An Approach to Trade-off Privacy and Classification Accuracy in Machine Learning Processes. SEBD 2023: 420-429 - [c107]Mina Alishahi, Wouter Leeuw, Nicola Zannone:
BC-FL k-means: A Blockchain-based Framework for Federated Clustering. TrustCom 2023: 1348-1354 - [d1]Pavlo Burda, Luca Allodi, Nicola Zannone:
Cognition in Social Engineering Empirical Research: a Systematic Literature Review. Zenodo, 2023 - 2022
- [j43]Paul Lukowicz, Anton Nijholt, Kaleem Siddiqi, Marcello Pelillo, Kristof Van Laerhoven, Luca Viganò, Nicola Zannone:
Editorial: 2021 editors' pick: Computer science. Frontiers Comput. Sci. 4 (2022) - [j42]Tahir Ahmad, Umberto Morelli, Silvio Ranise, Nicola Zannone:
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system. Int. J. Inf. Sec. 21(2): 379-408 (2022) - [j41]Loredana Caruccio, Domenico Desiato, Giuseppe Polese, Genoveffa Tortora, Nicola Zannone:
A decision-support framework for data anonymization with application to machine learning processes. Inf. Sci. 613: 1-32 (2022) - [j40]Laura Genga, Luca Allodi, Nicola Zannone:
Association Rule Mining Meets Regression Analysis: An Automated Approach to Unveil Systematic Biases in Decision-Making Processes. J. Cybersecur. Priv. 2(1): 191-219 (2022) - [c106]Stanley Clark, Nikolay Yakovets, George Fletcher, Nicola Zannone:
ReLOG: A Unified Framework for Relationship-Based Access Control over Graph Databases. DBSec 2022: 303-315 - [c105]Leon Kersten, Pavlo Burda, Luca Allodi, Nicola Zannone:
Investigating the Effect of Phishing Believability on Phishing Reporting. EuroS&P Workshops 2022: 117-128 - [c104]Pavlo Burda, Luca Allodi, Nicola Zannone:
A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection. FPS 2022: 443-452 - [c103]Savio Sciancalepore, Nicola Zannone:
PICO: privacy-preserving access control in IoT scenarios through incomplete information. SAC 2022: 147-156 - [c102]Stanley Clark, Nikolay Yakovets, George H. L. Fletcher, Nicola Zannone:
Poster: A Flexible Relationship-Based Access Control Policy Generator. SACMAT 2022: 263-265 - 2021
- [j39]Mina Sheikhalishahi, Ischa Stork, Nicola Zannone:
Privacy-preserving policy evaluation in multi-party access control. J. Comput. Secur. 29(6): 613-650 (2021) - [c101]Bram van Dooremaal, Pavlo Burda, Luca Allodi, Nicola Zannone:
Combining Text and Visual Features to Improve the Identification of Cloned Webpages for Early Phishing Detection. ARES 2021: 60:1-60:10 - [c100]Mina Alishahi, Nicola Zannone:
Not a Free Lunch, But a Cheap One: On Classifiers Performance on Anonymized Datasets. DBSec 2021: 237-258 - [c99]Pavlo Burda, Luca Allodi, Nicola Zannone:
Dissecting Social Engineering Attacks Through the Lenses of Cognition. EuroS&P Workshops 2021: 149-160 - [c98]Milan Lopuhaä-Zwakenberg, Mina Alishahi, Jeroen Kivits, Jordi Klarenbeek, Gert-Jan van der Velde, Nicola Zannone:
Comparing Classifiers' Performance under Differential Privacy. SECRYPT 2021: 50-61 - 2020
- [j38]Federico Sinigaglia, Roberto Carbone, Gabriele Costa, Nicola Zannone:
A survey on multi-factor authentication for online banking in the wild. Comput. Secur. 95: 101745 (2020) - [j37]Luca Allodi, Tzouliano Chotza, Ekaterina Panina, Nicola Zannone:
The Need for New Antiphishing Measures Against Spear-Phishing Attacks. IEEE Secur. Priv. 18(2): 23-34 (2020) - [c97]Pavlo Burda, Tzouliano Chotza, Luca Allodi, Nicola Zannone:
Testing the effectiveness of tailored phishing techniques in industry and academia: a field experiment. ARES 2020: 3:1-3:10 - [c96]Giovanni Maria Riva, Alexandr Vasenev, Nicola Zannone:
SoK: engineering privacy-aware high-tech systems. ARES 2020: 19:1-19:10 - [c95]Yoram J. Meijaard, Bram C. M. Cappers, Josh G. M. Mengerink, Nicola Zannone:
Predictive Analytics to Prevent Voice over IP International Revenue Sharing Fraud. DBSec 2020: 241-260 - [c94]Federica Paci, Davide Bianchin, Elisa Quintarelli, Nicola Zannone:
IFTTT Privacy Checker. ETAA@ESORICS 2020: 90-107 - [c93]Pavlo Burda, Luca Allodi, Nicola Zannone:
Don't Forget the Human: a Crowdsourced Approach to Automate Response and Containment Against Spear Phishing Attacks. EuroS&P Workshops 2020: 471-476 - [c92]Simone Pirocca, Luca Allodi, Nicola Zannone:
A Toolkit for Security Awareness Training Against Targeted Phishing. ICISS 2020: 137-159 - [c91]Sowmya Ravidas, Indrakshi Ray, Nicola Zannone:
Handling Incomplete Information in Policy Evaluation using Attribute Similarity. TPS-ISA 2020: 79-88 - [c90]Mina Sheikhalishahi, Nicola Zannone:
On the Comparison of Classifiers' Construction over Private Inputs. TrustCom 2020: 691-698 - [c89]Mina Sheikhalishahi, Nicola Zannone:
Privacy Preserving Statistical Detection of Adversarial Instances. WETICE 2020: 159-164 - [p4]Laura Genga, Domenico Potena, Andrea Chiorrini, Claudia Diamantini, Nicola Zannone:
A Latitudinal Study on the Use of Sequential and Concurrency Patterns in Deviance Mining. Complex Pattern Mining 2020: 103-119
2010 – 2019
- 2019
- [j36]Laura Genga, Nicola Zannone, Anna Cinzia Squicciarini:
Discovering reliable evidence of data misuse by exploiting rule redundancy. Comput. Secur. 87 (2019) - [j35]Charles Morisset, Tim A. C. Willemse, Nicola Zannone:
A framework for the extended evaluation of ABAC policies. Cybersecur. 2(1): 6 (2019) - [j34]Sowmya Ravidas, Alexios Lekidis, Federica Paci, Nicola Zannone:
Access control in Internet-of-Things: A survey. J. Netw. Comput. Appl. 144: 79-101 (2019) - [c88]Neda Nasiriani, Anna Cinzia Squicciarini, Zara Saldanha, Sanchit Goel, Nicola Zannone:
Hierarchical Clustering for Discrimination Discovery: A Top-Down Approach. AIKE 2019: 187-194 - [c87]Laura Genga, Chiara Di Francescomarino, Chiara Ghidini, Nicola Zannone:
Predicting Critical Behaviors in Business Process Executions: When Evidence Counts. BPM Forum 2019: 72-90 - [c86]Laura Genga, Luca Allodi, Nicola Zannone:
Unveiling Systematic Biases in Decisional Processes: An Application to Discrimination Discovery. AsiaCCS 2019: 67-72 - [c85]Sowmya Ravidas, Priyanka Karkhanis, Yanja Dajsuren, Nicola Zannone:
An Authorization Framework for Cooperative Intelligent Transport Systems. ETAA@ESORICS 2019: 16-34 - [c84]Charles Morisset, Sowmya Ravidas, Nicola Zannone:
On Attribute Retrieval in ABAC. FPS 2019: 225-241 - [c83]Clara Bertolissi, Jerry den Hartog, Nicola Zannone:
Using Provenance for Secure Data Fusion in Cooperative Systems. SACMAT 2019: 185-194 - [c82]Mina Sheikhalishahi, Gamze Tillem, Zekeriya Erkin, Nicola Zannone:
Privacy-Preserving Multi-Party Access Control. WPES@CCS 2019: 1-13 - 2018
- [j33]Van Huynh Le, Jerry den Hartog, Nicola Zannone:
Security and privacy for innovative automotive applications: A survey. Comput. Commun. 132: 17-41 (2018) - [j32]Mahdi Alizadeh, Xixi Lu, Dirk Fahland, Nicola Zannone, Wil M. P. van der Aalst:
Linking data and process perspectives for conformance analysis. Comput. Secur. 73: 172-193 (2018) - [j31]Federica Paci, Anna Cinzia Squicciarini, Nicola Zannone:
Survey on Access Control for Community-Centered Collaborative Systems. ACM Comput. Surv. 51(1): 6:1-6:38 (2018) - [j30]Laura Genga, Mahdi Alizadeh, Domenico Potena, Claudia Diamantini, Nicola Zannone:
Discovering anomalous frequent patterns from partially ordered event logs. J. Intell. Inf. Syst. 51(2): 257-300 (2018) - [c81]Mattia Salnitri, Mahdi Alizadeh, Daniele Giovanella, Nicola Zannone, Paolo Giorgini:
From Security-by-Design to the Identification of Security-Critical Deviations in Process Executions. CAiSE Forum 2018: 218-234 - [c80]Luciano Argento, Andrea Margheri, Federica Paci, Vladimiro Sassone, Nicola Zannone:
Towards Adaptive Access Control. DBSec 2018: 99-109 - [c79]Laura Genga, Nicola Zannone:
Towards a Systematic Process-aware Behavioral Analysis for Security. ICETE (1) 2018: 626-635 - [c78]Van Huynh Le, Jerry den Hartog, Nicola Zannone:
Feature Selection for Anomaly Detection in Vehicular Ad Hoc Networks. ICETE (1) 2018: 647-657 - [c77]Tho Le, Roland van Rijswijk-Deij, Luca Allodi, Nicola Zannone:
Economic incentives on DNSSEC deployment: Time to move from quantity to quality. NOMS 2018: 1-9 - [c76]Mahdi Alizadeh, Sander Peters, Sandro Etalle, Nicola Zannone:
Behavior analysis in the medical sector: theory and practice. SAC 2018: 1637-1646 - [c75]Anna Cinzia Squicciarini, Sarah Michele Rajtmajer, Nicola Zannone:
Multi-Party Access Control: Requirements, State of the Art and Open Challenges. SACMAT 2018: 49 - [c74]Charles Morisset, Tim A. C. Willemse, Nicola Zannone:
Efficient Extended ABAC Evaluation. SACMAT 2018: 149-160 - [c73]Tahir Ahmad, Umberto Morelli, Silvio Ranise, Nicola Zannone:
A Lazy Approach to Access Control as a Service (ACaaS) for IoT: An AWS Case Study. SACMAT 2018: 235-246 - 2017
- [j29]Fatih Turkmen, Jerry den Hartog, Silvio Ranise, Nicola Zannone:
Formal analysis of XACML policies using SMT. Comput. Secur. 66: 185-203 (2017) - [c72]Laura Genga, Mahdi Alizadeh, Domenico Potena, Claudia Diamantini, Nicola Zannone:
APD tool: Mining Anomalous Patterns from Event Logs. BPM (Demos) 2017 - [c71]Niek Tax, Laura Genga, Nicola Zannone:
On the Use of Hierarchical Subtrace Mining for Efficient Local Process Model Mining. SIMPDA 2017: 8-22 - [c70]Laura Genga, Niek Tax, Nicola Zannone:
Mining Local Process Models and Their Correlations. SIMPDA (Revised Selected Papers) 2017: 65-88 - 2016
- [j28]Boris Skoric, Sebastiaan J. A. de Hoogh, Nicola Zannone:
Flow-based reputation with uncertainty: evidence-based subjective logic. Int. J. Inf. Sec. 15(4): 381-402 (2016) - [j27]Sokratis Vavilis, Milan Petkovic, Nicola Zannone:
A severity-based quantification of data leakages in database systems. J. Comput. Secur. 24(3): 321-345 (2016) - [c69]Sokratis Vavilis, Alexandru Ionut Egner, Milan Petkovic, Nicola Zannone:
Role Mining with Missing Values. ARES 2016: 167-176 - [c68]Jerry den Hartog, Nicola Zannone:
A Policy Framework for Data Fusion and Derived Data Control. ABAC@CODASPY 2016: 47-57 - [c67]Mahdi Alizadeh, Nicola Zannone:
Risk-based Analysis of Business Process Executions. CODASPY 2016: 130-132 - [c66]Alexandru Ionut Egner, Duc Luu, Jerry den Hartog, Nicola Zannone:
An Authorization Service for Collaborative Situation Awareness. CODASPY 2016: 136-138 - [c65]Rauf Mahmudlu, Jerry den Hartog, Nicola Zannone:
Data Governance and Transparency for Collaborative Systems. DBSec 2016: 199-216 - [c64]Jerry den Hartog, Nicola Zannone:
Collaborative Access Decisions: Why Has My Decision Not Been Enforced? ICISS 2016: 109-130 - [c63]Laura Genga, Domenico Potena, Orazio Martino, Mahdi Alizadeh, Claudia Diamantini, Nicola Zannone:
Subgraph Mining for Anomalous Pattern Discovery in Event Logs. NFMCP@PKDD/ECML 2016: 181-197 - [c62]Elisa Costante, Davide Fauri, Sandro Etalle, Jerry den Hartog, Nicola Zannone:
A Hybrid Framework for Data Loss Prevention and Detection. IEEE Symposium on Security and Privacy Workshops 2016: 324-333 - 2015
- [j26]Sokratis Vavilis, Alexandru Ionut Egner, Milan Petkovic, Nicola Zannone:
An anomaly analysis framework for database systems. Comput. Secur. 53: 156-173 (2015) - [j25]Samuel Paul Kaluvuri, Alexandru Ionut Egner, Jerry den Hartog, Nicola Zannone:
SAFAX - An Extensible Authorization Service for Cloud Environments. Frontiers ICT 2: 9 (2015) - [j24]Donia El Kateb, Nicola Zannone, Assaad Moawad, Patrice Caire, Grégory Nain, Tejeddine Mouelhi, Yves Le Traon:
Conviviality-driven access control policy. Requir. Eng. 20(4): 363-382 (2015) - [c61]Fatih Turkmen, Jerry den Hartog, Silvio Ranise, Nicola Zannone:
Analysis of XACML Policies with SMT. POST 2015: 115-134 - [c60]Federica Paci, Nicola Zannone:
Preventing Information Inference in Access Control. SACMAT 2015: 87-97 - [c59]Jason Crampton, Charles Morisset, Nicola Zannone:
On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval. SACMAT 2015: 99-109 - [c58]Mahdi Alizadeh, Massimiliano de Leoni, Nicola Zannone:
Constructing Probable Explanations of Nonconformity: A Data-Aware and History-Based Approach. SSCI 2015: 1358-1365 - [c57]Michael Feiri, Rolf Pielage, Jonathan Petit, Nicola Zannone, Frank Kargl:
Pre-Distribution of Certificates for Pseudonymous Broadcast Authentication in VANET. VTC Spring 2015: 1-5 - 2014
- [j23]Sokratis Vavilis, Milan Petkovic, Nicola Zannone:
A reference model for reputation systems. Decis. Support Syst. 61: 147-154 (2014) - [j22]Sandro Etalle, Nicola Zannone:
Understanding Computer Security. Frontiers ICT 1: 3 (2014) - [j21]Meilof Veeningen, Benne de Weger, Nicola Zannone:
Data minimisation in communication protocols: a formal analysis framework and application to identity management. Int. J. Inf. Sec. 13(6): 529-569 (2014) - [j20]Daniel Trivellato, Nicola Zannone, Sandro Etalle:
GEM: A distributed goal evaluation algorithm for trust management. Theory Pract. Log. Program. 14(3): 293-337 (2014) - [c56]Fatih Turkmen, Jerry den Hartog, Nicola Zannone:
POSTER: Analyzing Access Control Policies with SMT. CCS 2014: 1508-1510 - [c55]Stan Damen, Jerry den Hartog, Nicola Zannone:
CollAC: Collaborative access control. CTS 2014: 142-149 - [c54]Sokratis Vavilis, Milan Petkovic, Nicola Zannone:
Data Leakage Quantification. DBSec 2014: 98-113 - [c53]Charles Morisset, Nicola Zannone:
Reduction of access control decisions. SACMAT 2014: 53-62 - [c52]Mahdi Alizadeh, Massimiliano de Leoni, Nicola Zannone:
History-based Construction of Log-Process Alignments for Conformance Checking: Discovering What Really Went Wrong. SIMPDA 2014: 1-15 - [c51]Mahdi Alizadeh, Massimiliano de Leoni, Nicola Zannone:
History-Based Construction of Alignments for Conformance Checking: Formalization and Implementation. SIMPDA (Revised Selected Papers) 2014: 58-78 - [i5]Boris Skoric, Sebastiaan de Hoogh, Nicola Zannone:
Flow-based reputation with uncertainty: Evidence-Based Subjective Logic. CoRR abs/1402.3319 (2014) - 2013
- [j19]Daniel Trivellato, Nicola Zannone, Maurice Glaundrup, Jacek Skowronek, Sandro Etalle:
A Semantic Security Framework for Systems of Systems. Int. J. Cooperative Inf. Syst. 22(1) (2013) - [j18]Arya Adriansyah, Boudewijn F. van Dongen, Nicola Zannone:
Privacy Analysis of User Behavior Using Alignments. it Inf. Technol. 55(6): 255-260 (2013) - [j17]Elisa Costante, Federica Paci, Nicola Zannone:
Privacy-Aware Web Service Composition and Ranking. Int. J. Web Serv. Res. 10(3): 1-23 (2013) - [j16]Seda F. Gürses, Magali Seguran, Nicola Zannone:
Requirements engineering within a large-scale security-oriented research project: lessons learned. Requir. Eng. 18(1): 43-66 (2013) - [c50]Sokratis Vavilis, Nicola Zannone, Milan Petkovic:
Data reliability in home healthcare services. CBMS 2013: 377-380 - [c49]Meilof Veeningen, Mayla Brusò, Jerry den Hartog, Nicola Zannone:
TRIPLEX: verifying data minimisation in communication systems. CCS 2013: 1415-1418 - [c48]