


Остановите войну!
for scientists:


default search action
Nicola Zannone
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j42]Tahir Ahmad
, Umberto Morelli
, Silvio Ranise, Nicola Zannone
:
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system. Int. J. Inf. Sec. 21(2): 379-408 (2022) - [j41]Loredana Caruccio, Domenico Desiato, Giuseppe Polese, Genoveffa Tortora, Nicola Zannone:
A decision-support framework for data anonymization with application to machine learning processes. Inf. Sci. 613: 1-32 (2022) - [c104]Stanley Clark, Nikolay Yakovets, George Fletcher, Nicola Zannone:
ReLOG: A Unified Framework for Relationship-Based Access Control over Graph Databases. DBSec 2022: 303-315 - [c103]Leon Kersten, Pavlo Burda, Luca Allodi, Nicola Zannone:
Investigating the Effect of Phishing Believability on Phishing Reporting. EuroS&P Workshops 2022: 117-128 - [c102]Savio Sciancalepore
, Nicola Zannone
:
PICO: privacy-preserving access control in IoT scenarios through incomplete information. SAC 2022: 147-156 - [c101]Stanley Clark, Nikolay Yakovets, George H. L. Fletcher, Nicola Zannone
:
Poster: A Flexible Relationship-Based Access Control Policy Generator. SACMAT 2022: 263-265 - 2021
- [j40]Mina Sheikhalishahi, Ischa Stork, Nicola Zannone
:
Privacy-preserving policy evaluation in multi-party access control. J. Comput. Secur. 29(6): 613-650 (2021) - [c100]Bram van Dooremaal, Pavlo Burda, Luca Allodi, Nicola Zannone
:
Combining Text and Visual Features to Improve the Identification of Cloned Webpages for Early Phishing Detection. ARES 2021: 60:1-60:10 - [c99]Mina Alishahi, Nicola Zannone
:
Not a Free Lunch, But a Cheap One: On Classifiers Performance on Anonymized Datasets. DBSec 2021: 237-258 - [c98]Pavlo Burda, Luca Allodi, Nicola Zannone
:
Dissecting Social Engineering Attacks Through the Lenses of Cognition. EuroS&P Workshops 2021: 149-160 - [c97]Milan Lopuhaä-Zwakenberg
, Mina Alishahi, Jeroen Kivits, Jordi Klarenbeek, Gert-Jan van der Velde, Nicola Zannone
:
Comparing Classifiers' Performance under Differential Privacy. SECRYPT 2021: 50-61 - 2020
- [j39]Federico Sinigaglia
, Roberto Carbone
, Gabriele Costa
, Nicola Zannone
:
A survey on multi-factor authentication for online banking in the wild. Comput. Secur. 95: 101745 (2020) - [j38]Luca Allodi
, Tzouliano Chotza, Ekaterina Panina, Nicola Zannone
:
The Need for New Antiphishing Measures Against Spear-Phishing Attacks. IEEE Secur. Priv. 18(2): 23-34 (2020) - [c96]Pavlo Burda, Tzouliano Chotza, Luca Allodi, Nicola Zannone
:
Testing the effectiveness of tailored phishing techniques in industry and academia: a field experiment. ARES 2020: 3:1-3:10 - [c95]Giovanni Maria Riva, Alexandr Vasenev, Nicola Zannone
:
SoK: engineering privacy-aware high-tech systems. ARES 2020: 19:1-19:10 - [c94]Yoram J. Meijaard, Bram C. M. Cappers, Josh G. M. Mengerink, Nicola Zannone
:
Predictive Analytics to Prevent Voice over IP International Revenue Sharing Fraud. DBSec 2020: 241-260 - [c93]Federica Paci
, Davide Bianchin, Elisa Quintarelli
, Nicola Zannone
:
IFTTT Privacy Checker. ETAA@ESORICS 2020: 90-107 - [c92]Pavlo Burda, Luca Allodi, Nicola Zannone
:
Don't Forget the Human: a Crowdsourced Approach to Automate Response and Containment Against Spear Phishing Attacks. EuroS&P Workshops 2020: 471-476 - [c91]Simone Pirocca, Luca Allodi, Nicola Zannone
:
A Toolkit for Security Awareness Training Against Targeted Phishing. ICISS 2020: 137-159 - [c90]Sowmya Ravidas, Indrakshi Ray, Nicola Zannone
:
Handling Incomplete Information in Policy Evaluation using Attribute Similarity. TPS-ISA 2020: 79-88 - [c89]Mina Sheikhalishahi, Nicola Zannone
:
On the Comparison of Classifiers' Construction over Private Inputs. TrustCom 2020: 691-698 - [c88]Mina Sheikhalishahi, Nicola Zannone
:
Privacy Preserving Statistical Detection of Adversarial Instances. WETICE 2020: 159-164 - [p4]Laura Genga
, Domenico Potena
, Andrea Chiorrini, Claudia Diamantini, Nicola Zannone
:
A Latitudinal Study on the Use of Sequential and Concurrency Patterns in Deviance Mining. Complex Pattern Mining 2020: 103-119
2010 – 2019
- 2019
- [j37]Laura Genga
, Nicola Zannone
, Anna Cinzia Squicciarini:
Discovering reliable evidence of data misuse by exploiting rule redundancy. Comput. Secur. 87 (2019) - [j36]Charles Morisset, Tim A. C. Willemse, Nicola Zannone
:
A framework for the extended evaluation of ABAC policies. Cybersecur. 2(1): 6 (2019) - [j35]Sowmya Ravidas, Alexios Lekidis, Federica Paci, Nicola Zannone
:
Access control in Internet-of-Things: A survey. J. Netw. Comput. Appl. 144: 79-101 (2019) - [c87]Neda Nasiriani, Anna Cinzia Squicciarini, Zara Saldanha, Sanchit Goel, Nicola Zannone
:
Hierarchical Clustering for Discrimination Discovery: A Top-Down Approach. AIKE 2019: 187-194 - [c86]Laura Genga
, Chiara Di Francescomarino, Chiara Ghidini, Nicola Zannone
:
Predicting Critical Behaviors in Business Process Executions: When Evidence Counts. BPM Forum 2019: 72-90 - [c85]Laura Genga
, Luca Allodi, Nicola Zannone
:
Unveiling Systematic Biases in Decisional Processes: An Application to Discrimination Discovery. AsiaCCS 2019: 67-72 - [c84]Sowmya Ravidas, Priyanka Karkhanis, Yanja Dajsuren, Nicola Zannone
:
An Authorization Framework for Cooperative Intelligent Transport Systems. ETAA@ESORICS 2019: 16-34 - [c83]Charles Morisset, Sowmya Ravidas, Nicola Zannone
:
On Attribute Retrieval in ABAC. FPS 2019: 225-241 - [c82]Clara Bertolissi, Jerry den Hartog, Nicola Zannone
:
Using Provenance for Secure Data Fusion in Cooperative Systems. SACMAT 2019: 185-194 - [c81]Mina Sheikhalishahi, Gamze Tillem, Zekeriya Erkin
, Nicola Zannone
:
Privacy-Preserving Multi-Party Access Control. WPES@CCS 2019: 1-13 - 2018
- [j34]Van Huynh Le, Jerry den Hartog, Nicola Zannone
:
Security and privacy for innovative automotive applications: A survey. Comput. Commun. 132: 17-41 (2018) - [j33]Mahdi Alizadeh, Xixi Lu, Dirk Fahland
, Nicola Zannone
, Wil M. P. van der Aalst
:
Linking data and process perspectives for conformance analysis. Comput. Secur. 73: 172-193 (2018) - [j32]Federica Paci
, Anna Cinzia Squicciarini
, Nicola Zannone
:
Survey on Access Control for Community-Centered Collaborative Systems. ACM Comput. Surv. 51(1): 6:1-6:38 (2018) - [j31]Laura Genga
, Mahdi Alizadeh, Domenico Potena
, Claudia Diamantini, Nicola Zannone
:
Discovering anomalous frequent patterns from partially ordered event logs. J. Intell. Inf. Syst. 51(2): 257-300 (2018) - [c80]Mattia Salnitri, Mahdi Alizadeh, Daniele Giovanella, Nicola Zannone
, Paolo Giorgini
:
From Security-by-Design to the Identification of Security-Critical Deviations in Process Executions. CAiSE Forum 2018: 218-234 - [c79]Luciano Argento
, Andrea Margheri
, Federica Paci
, Vladimiro Sassone
, Nicola Zannone
:
Towards Adaptive Access Control. DBSec 2018: 99-109 - [c78]Laura Genga, Nicola Zannone:
Towards a Systematic Process-aware Behavioral Analysis for Security. ICETE (1) 2018: 626-635 - [c77]Van Huynh Le, Jerry den Hartog, Nicola Zannone:
Feature Selection for Anomaly Detection in Vehicular Ad Hoc Networks. ICETE (1) 2018: 647-657 - [c76]Tho Le, Roland van Rijswijk-Deij
, Luca Allodi, Nicola Zannone
:
Economic incentives on DNSSEC deployment: Time to move from quantity to quality. NOMS 2018: 1-9 - [c75]Mahdi Alizadeh, Sander Peters, Sandro Etalle, Nicola Zannone
:
Behavior analysis in the medical sector: theory and practice. SAC 2018: 1637-1646 - [c74]Anna Cinzia Squicciarini, Sarah Michele Rajtmajer, Nicola Zannone
:
Multi-Party Access Control: Requirements, State of the Art and Open Challenges. SACMAT 2018: 49 - [c73]Charles Morisset, Tim A. C. Willemse, Nicola Zannone
:
Efficient Extended ABAC Evaluation. SACMAT 2018: 149-160 - [c72]Tahir Ahmad, Umberto Morelli
, Silvio Ranise
, Nicola Zannone
:
A Lazy Approach to Access Control as a Service (ACaaS) for IoT: An AWS Case Study. SACMAT 2018: 235-246 - 2017
- [j30]Fatih Turkmen
, Jerry den Hartog, Silvio Ranise
, Nicola Zannone
:
Formal analysis of XACML policies using SMT. Comput. Secur. 66: 185-203 (2017) - [c71]Laura Genga, Mahdi Alizadeh, Domenico Potena, Claudia Diamantini, Nicola Zannone:
APD tool: Mining Anomalous Patterns from Event Logs. BPM (Demos) 2017 - [c70]Niek Tax, Laura Genga, Nicola Zannone:
On the Use of Hierarchical Subtrace Mining for Efficient Local Process Model Mining. SIMPDA 2017: 8-22 - [c69]Laura Genga
, Niek Tax
, Nicola Zannone
:
Mining Local Process Models and Their Correlations. SIMPDA (Revised Selected Papers) 2017: 65-88 - 2016
- [j29]Boris Skoric, Sebastiaan J. A. de Hoogh, Nicola Zannone
:
Flow-based reputation with uncertainty: evidence-based subjective logic. Int. J. Inf. Sec. 15(4): 381-402 (2016) - [j28]Sokratis Vavilis, Milan Petkovic, Nicola Zannone
:
A severity-based quantification of data leakages in database systems. J. Comput. Secur. 24(3): 321-345 (2016) - [c68]Sokratis Vavilis, Alexandru Ionut Egner, Milan Petkovic, Nicola Zannone
:
Role Mining with Missing Values. ARES 2016: 167-176 - [c67]Jerry den Hartog, Nicola Zannone
:
A Policy Framework for Data Fusion and Derived Data Control. ABAC@CODASPY 2016: 47-57 - [c66]Mahdi Alizadeh, Nicola Zannone
:
Risk-based Analysis of Business Process Executions. CODASPY 2016: 130-132 - [c65]Alexandru Ionut Egner, Duc Luu, Jerry den Hartog, Nicola Zannone
:
An Authorization Service for Collaborative Situation Awareness. CODASPY 2016: 136-138 - [c64]Rauf Mahmudlu, Jerry den Hartog, Nicola Zannone
:
Data Governance and Transparency for Collaborative Systems. DBSec 2016: 199-216 - [c63]Jerry den Hartog, Nicola Zannone
:
Collaborative Access Decisions: Why Has My Decision Not Been Enforced? ICISS 2016: 109-130 - [c62]Laura Genga
, Domenico Potena
, Orazio Martino, Mahdi Alizadeh, Claudia Diamantini, Nicola Zannone
:
Subgraph Mining for Anomalous Pattern Discovery in Event Logs. NFMCP@PKDD/ECML 2016: 181-197 - [c61]Elisa Costante, Davide Fauri, Sandro Etalle, Jerry den Hartog, Nicola Zannone
:
A Hybrid Framework for Data Loss Prevention and Detection. IEEE Symposium on Security and Privacy Workshops 2016: 324-333 - 2015
- [j27]Sokratis Vavilis, Alexandru Ionut Egner, Milan Petkovic, Nicola Zannone
:
An anomaly analysis framework for database systems. Comput. Secur. 53: 156-173 (2015) - [j26]Samuel Paul Kaluvuri, Alexandru Ionut Egner, Jerry den Hartog, Nicola Zannone
:
SAFAX - An Extensible Authorization Service for Cloud Environments. Frontiers ICT 2: 9 (2015) - [j25]Donia El Kateb, Nicola Zannone
, Assaad Moawad, Patrice Caire, Grégory Nain
, Tejeddine Mouelhi, Yves Le Traon
:
Conviviality-driven access control policy. Requir. Eng. 20(4): 363-382 (2015) - [c60]Fatih Turkmen
, Jerry den Hartog, Silvio Ranise
, Nicola Zannone
:
Analysis of XACML Policies with SMT. POST 2015: 115-134 - [c59]Federica Paci
, Nicola Zannone
:
Preventing Information Inference in Access Control. SACMAT 2015: 87-97 - [c58]Jason Crampton, Charles Morisset, Nicola Zannone
:
On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval. SACMAT 2015: 99-109 - [c57]Mahdi Alizadeh, Massimiliano de Leoni
, Nicola Zannone
:
Constructing Probable Explanations of Nonconformity: A Data-Aware and History-Based Approach. SSCI 2015: 1358-1365 - [c56]Michael Feiri, Rolf Pielage, Jonathan Petit, Nicola Zannone
, Frank Kargl:
Pre-Distribution of Certificates for Pseudonymous Broadcast Authentication in VANET. VTC Spring 2015: 1-5 - 2014
- [j24]Sokratis Vavilis, Milan Petkovic, Nicola Zannone
:
A reference model for reputation systems. Decis. Support Syst. 61: 147-154 (2014) - [j23]Sandro Etalle, Nicola Zannone
:
Understanding Computer Security. Frontiers ICT 1: 3 (2014) - [j22]Meilof Veeningen, Benne de Weger, Nicola Zannone
:
Data minimisation in communication protocols: a formal analysis framework and application to identity management. Int. J. Inf. Sec. 13(6): 529-569 (2014) - [j21]Daniel Trivellato, Nicola Zannone
, Sandro Etalle:
GEM: A distributed goal evaluation algorithm for trust management. Theory Pract. Log. Program. 14(3): 293-337 (2014) - [c55]Fatih Turkmen
, Jerry den Hartog, Nicola Zannone
:
POSTER: Analyzing Access Control Policies with SMT. CCS 2014: 1508-1510 - [c54]Stan Damen, Jerry den Hartog, Nicola Zannone
:
CollAC: Collaborative access control. CTS 2014: 142-149 - [c53]Sokratis Vavilis, Milan Petkovic, Nicola Zannone
:
Data Leakage Quantification. DBSec 2014: 98-113 - [c52]Charles Morisset, Nicola Zannone
:
Reduction of access control decisions. SACMAT 2014: 53-62 - [c51]Mahdi Alizadeh, Massimiliano de Leoni, Nicola Zannone:
History-based Construction of Log-Process Alignments for Conformance Checking: Discovering What Really Went Wrong. SIMPDA 2014: 1-15 - [c50]Mahdi Alizadeh, Massimiliano de Leoni
, Nicola Zannone
:
History-Based Construction of Alignments for Conformance Checking: Formalization and Implementation. SIMPDA (Revised Selected Papers) 2014: 58-78 - [i5]Boris Skoric, Sebastiaan de Hoogh, Nicola Zannone:
Flow-based reputation with uncertainty: Evidence-Based Subjective Logic. CoRR abs/1402.3319 (2014) - 2013
- [j20]Daniel Trivellato, Nicola Zannone
, Maurice Glaundrup, Jacek Skowronek, Sandro Etalle:
A Semantic Security Framework for Systems of Systems. Int. J. Cooperative Inf. Syst. 22(1) (2013) - [j19]Arya Adriansyah, Boudewijn F. van Dongen, Nicola Zannone
:
Privacy Analysis of User Behavior Using Alignments. it Inf. Technol. 55(6): 255-260 (2013) - [j18]Elisa Costante, Federica Paci
, Nicola Zannone
:
Privacy-Aware Web Service Composition and Ranking. Int. J. Web Serv. Res. 10(3): 1-23 (2013) - [j17]Seda F. Gürses, Magali Seguran, Nicola Zannone
:
Requirements engineering within a large-scale security-oriented research project: lessons learned. Requir. Eng. 18(1): 43-66 (2013) - [c49]Sokratis Vavilis, Nicola Zannone
, Milan Petkovic:
Data reliability in home healthcare services. CBMS 2013: 377-380 - [c48]Meilof Veeningen, Mayla Brusò, Jerry den Hartog, Nicola Zannone
:
TRIPLEX: verifying data minimisation in communication systems. CCS 2013: 1415-1418 - [c47]Meilof Veeningen, Antonio Piepoli, Nicola Zannone
:
Are On-Line Personae Really Unlinkable? DPM/SETOP 2013: 369-379 - [c46]Elisa Costante, Federica Paci
, Nicola Zannone
:
Privacy-Aware Web Service Composition and Ranking. ICWS 2013: 131-138 - [c45]Meilof Veeningen, Benne de Weger, Nicola Zannone
:
Symbolic Privacy Analysis through Linkability and Detectability. IFIPTM 2013: 1-16 - [c44]Marina Egea, Federica Paci, Marinella Petrocchi, Nicola Zannone
:
PERSONA - A Personalized Data Protection Framework. IFIPTM 2013: 272-280 - [c43]Stan Damen, Nicola Zannone
:
Privacy Implications of Privacy Settings and Tagging in Facebook. Secure Data Management 2013: 121-138 - [c42]Elisa Costante, Sokratis Vavilis, Sandro Etalle, Jerry den Hartog, Milan Petkovic, Nicola Zannone:
Database Anomalous Activities - Detection and Quantification. SECRYPT 2013: 603-608 - [c41]Arya Adriansyah, Boudewijn F. van Dongen
, Nicola Zannone
:
Controlling Break-the-Glass through Alignment. SocialCom 2013: 606-611 - [p3]Daniel Trivellato, Sandro Etalle, Erik Luit, Nicola Zannone
:
The POLIPO Security Framework. Situation Awareness with Systems of Systems 2013: 189-208 - 2012
- [j16]Antonino Simone, Boris Skoric, Nicola Zannone
:
Flow-Based Reputation: More than Just Ranking. Int. J. Inf. Technol. Decis. Mak. 11(3): 551-578 (2012) - [c40]Muhammad Asim, Tanya Ignatenko, Milan Petkovic, Daniel Trivellato, Nicola Zannone
:
Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption. ARES 2012: 212-217 - [c39]Sebastian Banescu
, Milan Petkovic, Nicola Zannone
:
Measuring Privacy Compliance Using Fitness Metrics. BPM 2012: 114-119 - [c38]Sandro Etalle, Timothy L. Hinrichs, Adam J. Lee, Daniel Trivellato, Nicola Zannone
:
Policy Administration in Tag-Based Authorization. FPS 2012: 162-179 - [c37]Sokratis Vavilis, Milan Petkovic, Nicola Zannone
:
Impact of ICT on Home Healthcare. HCC 2012: 111-122 - [c36]Meilof Veeningen, Benne de Weger, Nicola Zannone
:
Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy. STM 2012: 145-160 - [i4]Antonino Simone, Boris Skoric, Nicola Zannone:
Flow-based reputation: more than just ranking. CoRR abs/1203.1820 (2012) - [i3]Muhammad Asim, Tanya Ignatenko, Milan Petkovic, Daniel Trivellato, Nicola Zannone:
Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption. CoRR abs/1205.5757 (2012) - [i2]Meilof Veeningen, Benne de Weger, Nicola Zannone:
Data Minimisation in Communication Protocols: A Formal Analysis Framework and Application to Identity Management. CoRR abs/1206.7111 (2012) - [i1]Daniel Trivellato, Nicola Zannone, Sandro Etalle:
GEM: a Distributed Goal Evaluation Algorithm for Trust Management. CoRR abs/1210.0368 (2012) - 2011
- [j15]Marco Montali
, Paolo Torroni
, Nicola Zannone
, Paola Mello, Volha Bryl:
Engineering and verifying agent-oriented requirements augmented by business constraints with B-Tropos. Auton. Agents Multi Agent Syst. 23(2): 193-223 (2011) - [j14]Yudistira Asnar, Fabio Massacci, Ayda Saïdane, Carlo Riccucci, Massimo Felici, Alessandra Tedeschi, Paul El Khoury, Keqin Li, Magali Seguran, Nicola Zannone:
Organizational Patterns for Security and Dependability: From Design to Application. Int. J. Secur. Softw. Eng. 2(3): 1-22 (2011) - [c35]Daniel Trivellato, Nicola Zannone, Sandro Etalle:
Poster: protecting information in systems of systems. CCS 2011: 865-868 - [c34]Golnaz Elahi, Eric S. K. Yu, Nicola Zannone
:
Security Risk Management by Qualitative Vulnerability Analysis. Metrisec@ESEM 2011: 1-10 - [c33]Sebastian Banescu
, Nicola Zannone
:
Measuring Privacy Compliance with Process Specifications. Metrisec@ESEM 2011: 41-50 - [c32]Meilof Veeningen, Benne de Weger, Nicola Zannone
:
Formal Privacy Analysis of Communication Protocols for Identity Management. ICISS 2011: 235-249 - [c31]Daniel Trivellato, Nicola Zannone
, Sandro Etalle:
A Security Framework for Systems of Systems. POLICY 2011: 182-183 - [c30]Milan Petkovic, Davide Prandi
, Nicola Zannone
:
Purpose Control: Did You Process the Data for the Intended Purpose? Secure Data Management 2011: 145-168 - [p2]Fabio Massacci, Nicola Zannone:
Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank. Social Modeling for Requirements Engineering 2011: 337-362 - [e3]Úlfar Erlingsson, Roel J. Wieringa, Nicola Zannone
:
Engineering Secure Software and Systems - Third International Symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011. Proceedings. Lecture Notes in Computer Science 6542, Springer 2011, ISBN 978-3-642-19124-4 [contents] - 2010
- [j13]Klemens Böhm, Sandro Etalle, Jerry den Hartog, Christian Hütter, Slim Trabelsi, Daniel Trivellato, Nicola Zannone
:
A Flexible Architecture for Privacy-Aware Trust Management. J. Theor. Appl. Electron. Commer. Res. 5(2): 77-96 (2010) - [j12]Golnaz Elahi, Eric S. K. Yu, Nicola Zannone
:
A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities. Requir. Eng. 15(1): 41-62 (2010) - [c29]