default search action
Ilaria Matteucci
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j19]Marco De Vincenzi, Gianpiero Costantino, Ilaria Matteucci, Florian Fenzl, Christian Plappert, Roland Rieke, Daniel Zelle:
A Systematic Review on Security Attacks and Countermeasures in Automotive Ethernet. ACM Comput. Surv. 56(6): 135:1-135:38 (2024) - [j18]Miguel Angel Olivero, Antonia Bertolino, Francisco José Domínguez Mayo, María José Escalona, Ilaria Matteucci:
A systematic mapping study on security for systems of systems. Int. J. Inf. Sec. 23(2): 787-817 (2024) - [j17]Davide Micale, Ilaria Matteucci, Florian Fenzl, Roland Rieke, Giuseppe Patanè:
A context-aware on-board intrusion detection system for smart vehicles. Int. J. Inf. Sec. 23(3): 2203-2223 (2024) - [j16]Chiara Bodei, Marco De Vincenzi, Ilaria Matteucci:
Formal analysis of an AUTOSAR-based basic software module. Int. J. Softw. Tools Technol. Transf. 26(4): 495-508 (2024) - [j15]Gianpiero Costantino, Marco De Vincenzi, Ilaria Matteucci:
A vehicle firmware security vulnerability: an IVI exploitation. J. Comput. Virol. Hacking Tech. 20(4): 681-696 (2024) - 2023
- [j14]Gianpiero Costantino, Marco De Vincenzi, Fabio Martinelli, Ilaria Matteucci:
A Privacy-Preserving Solution for Intelligent Transportation Systems: Private Driver DNA. IEEE Trans. Intell. Transp. Syst. 24(1): 258-273 (2023) - [j13]Gianpiero Costantino, Ilaria Matteucci:
Reversing Kia Motors Head Unit to discover and exploit software vulnerabilities. J. Comput. Virol. Hacking Tech. 19(1): 33-49 (2023) - 2022
- [j12]Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci:
Designing and implementing an AUTOSAR-based Basic Software Module for enhanced security. Comput. Networks 218: 109377 (2022) - [j11]Gianpiero Costantino, Marco De Vincenzi, Ilaria Matteucci:
In-Depth Exploration of ISO/SAE 21434 and Its Correlations with Existing Standards. IEEE Commun. Stand. Mag. 6(1): 84-92 (2022) - [j10]Miguel Angel Olivero, Antonia Bertolino, Francisco José Domínguez Mayo, Ilaria Matteucci, María José Escalona:
A Delphi study to recognize and assess systems of systems vulnerabilities. Inf. Softw. Technol. 146: 106874 (2022) - 2020
- [j9]Miguel Angel Olivero, Antonia Bertolino, Francisco José Domínguez Mayo, María José Escalona, Ilaria Matteucci:
Digital persona portrayal: Identifying pluridentity vulnerabilities in digital life. J. Inf. Secur. Appl. 52: 102492 (2020) - 2018
- [j8]Gianluca Dini, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Andrea Saracino, Daniele Sgandurra:
Risk analysis of Android applications: A user-centric solution. Future Gener. Comput. Syst. 80: 505-518 (2018) - [j7]Antonia Bertolino, Antonello Calabrò, Felicita Di Giandomenico, Giuseppe Lami, Francesca Lonetti, Eda Marchetti, Fabio Martinelli, Ilaria Matteucci, Paolo Mori:
A tour of secure software engineering solutions for connected vehicles. Softw. Qual. J. 26(4): 1223-1256 (2018) - 2016
- [j6]Cesario Di Sarno, Alessia Garofalo, Ilaria Matteucci, Marco Vallini:
A novel security information and event management system for enhancing cyber security in a hydroelectric dam. Int. J. Crit. Infrastructure Prot. 13: 39-51 (2016) - 2015
- [j5]Marco Casassa Mont, Ilaria Matteucci, Marinella Petrocchi, Marco Luca Sbodio:
Towards safer information sharing in the cloud. Int. J. Inf. Sec. 14(4): 319-334 (2015) - 2014
- [j4]Vincenzo Ciancia, José Antonio Martín, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Ernesto Pimentel:
Automated Synthesis and Ranking of Secure BPMN Orchestrators. Int. J. Secur. Softw. Eng. 5(2): 44-64 (2014) - 2012
- [j3]Gabriele Costa, Ilaria Matteucci:
Gate automata-driven run-time enforcement. Comput. Math. Appl. 63(2): 518-524 (2012) - [j2]Fabio Martinelli, Ilaria Matteucci:
A framework for automatic generation of security controller. Softw. Test. Verification Reliab. 22(8): 563-582 (2012) - 2010
- [j1]Gabriele Costa, Aliaksandr Lazouski, Fabio Martinelli, Ilaria Matteucci, Valérie Issarny, Rachid Saadi, Nicola Dragoni, Fabio Massacci:
Security-by-Contract-with-Trust for Mobile Devices. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(4): 75-91 (2010)
Conference and Workshop Papers
- 2024
- [c88]Marco De Vincenzi, Chiara Bodei, Ilaria Matteucci:
OLIVE: Flexible, Portable, and Sustainable V2X Multi-Factor Authentication. SAC 2024: 215-217 - 2023
- [c87]Marco De Vincenzi, Ilaria Matteucci, Fabio Martinelli, Stefano Sebastio:
Application of Secure Two-Party Computation in a Privacy-Preserving Android App. ARES 2023: 144:1-144:7 - [c86]Marco De Vincenzi, Chiara Bodei, Ilaria Matteucci:
Securing Automotive Ethernet: Design and Implementation of Security Data Link Solutions. AICCSA 2023: 1-9 - [c85]Flavio Manganello, Peadar Callaghan, Giuseppe Città, Paola Denaro, Jeffrey Earp, Chiara Fante, Dirk Ifenthaler, Catlyn Kirna, Luca Janka Laszlo, Ilaria Matteucci, Salvatore Perna, Nicolai Plintz, Anna Vaccarelli, Manuel Gentile:
SuperCyberKids: Enhancing Cybersecurity Education in K-12 Through Digital Game-Based Learning. HELMeTO 2023: 323-334 - [c84]Chiara Bodei, Gianpiero Costantino, Marco De Vincenzi, Ilaria Matteucci, Anna Monreale:
Vehicle Data Collection: A Privacy Policy Analysis and Comparison. ICISSP 2023: 626-633 - [c83]Chiara Bodei, Marco De Vincenzi, Ilaria Matteucci:
From Hardware-Functional to Software-Defined Vehicles and their Security Issues. INDIN 2023: 1-10 - [c82]Chiara Bodei, Gianpiero Costantino, Marco De Vincenzi, Ilaria Matteucci, Anna Monreale:
Data Collection in Automotive: A Deep Analysis of Carmakers' Mobile App Privacy Policies. ITSC 2023: 425-432 - [c81]Gianpiero Costantino, Marco De Vincenzi, Fabio Martinelli, Ilaria Matteucci:
Electric Vehicle Security and Privacy: A Comparative Analysis of Charging Methods. VTC2023-Spring 2023: 1-7 - 2022
- [c80]Gianpiero Costantino, Marco De Vincenzi, Ilaria Matteucci:
A Comparative Analysis of UNECE WP.29 R155 and ISO/SAE 21434. EuroS&P Workshops 2022: 340-347 - [c79]Christian Plappert, Florian Fenzl, Roland Rieke, Ilaria Matteucci, Gianpiero Costantino, Marco De Vincenzi:
SECPAT: Security Patterns for Resilient Automotive E / E Architectures. PDP 2022: 255-264 - [c78]Davide Micale, Gianpiero Costantino, Ilaria Matteucci, Florian Fenzl, Roland Rieke, Giuseppe Patanè:
CAHOOT: a Context-Aware veHicular intrusiOn detectiOn sysTem. TrustCom 2022: 1211-1218 - [c77]Luca Dariz, Gianpiero Costantino, Ilaria Matteucci:
Full-protocol safety analysis of CINNAMON. VTC Spring 2022: 1-7 - 2021
- [c76]Gianpiero Costantino, Ilaria Matteucci, Davide Micale, Giuseppe Patanè:
Private Drivers Identification based on users' routine. ISPA/BDCloud/SocialCom/SustainCom 2021: 1753-1762 - [c75]Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci, Mirco Marchetti:
Towards the COSCA framework for "COnseptualing Secure CArs". Open Identity Summit 2021: 37-46 - 2020
- [c74]Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci:
CINNAMON: A Module for AUTOSAR Secure Onboard Communication. EDCC 2020: 103-110 - [c73]Michela Fazzolari, Stefania Fabbri, Ilaria Matteucci, Marinella Petrocchi, Anna Vaccarelli:
Presente Digitale: An Online Education System for Teachers. HELMeTO 2020: 271-285 - [c72]Gianpiero Costantino, Luca Dariz, Ilaria Matteucci:
Analysis of Functional Safety in a secure implementation of CAN Protocol. INDIN 2020: 134-141 - [c71]Gianpiero Costantino, Ilaria Matteucci, Domenico Morales:
EARNEST: A challenge-based intrusion prevention system for CAN messages. ISSRE Workshops 2020: 243-248 - 2019
- [c70]Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci:
TOUCAN: A proTocol tO secUre Controller Area Network. AutoSec@CODASPY 2019: 3-8 - [c69]Gianpiero Costantino, Ilaria Matteucci:
CANDY CREAM - Hacking Infotainment Android Systems to Command Instrument Cluster via Can Data Frame. CSE/EUC 2019: 476-481 - [c68]Miguel Angel Olivero, Antonia Bertolino, Francisco José Domínguez Mayo, María José Escalona, Ilaria Matteucci:
Security assessment of systems of systems. SESoS-WDES@ICSE 2019: 62-65 - [c67]Pietro Biondi, Giampaolo Bella, Gianpiero Costantino, Ilaria Matteucci:
Implementing CAN bus security by TOUCAN. MobiHoc 2019: 399-400 - [c66]Gianpiero Costantino, Ilaria Matteucci:
Demo: CANDY CREAM. SAFECOMP Workshops 2019: 203-209 - [c65]Miguel Angel Olivero, Antonia Bertolino, Francisco José Domínguez Mayo, María José Escalona, Ilaria Matteucci:
Addressing Security Properties in Systems of Systems: Challenges and Ideas. SERENE 2019: 138-146 - [c64]Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci, Paolo Santi:
A Privacy-Preserving Infrastructure for Driver's Reputation Aware Automotive Services. STAST 2019: 159-174 - [c63]Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci:
Are you secure in your car?: poster. WiSec 2019: 308-309 - 2018
- [c62]Udo Bub, Ajantha Dahanayake, Jérôme Darmont, Claudia Diamantini, Fabio Fassetti, Eduardo Fermé, Nadia Kabachi, Ilaria Matteucci, Bálint Molnár, Sham Navathe, Ermelinda Oro, Marinella Petrocchi, Simona E. Rombo, Massimo Ruffolo, Angelo Spognardi, Bernhard Thalheim, Domenico Ursino:
Contributions from ADBIS 2018 Workshops. ADBIS (Short Papers and Workshops) 2018: 91-102 - [c61]Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci, Antonia Bertolino, Antonello Calabrò, Eda Marchetti:
CARS: Context Aware Reputation Systems to Evaluate Vehicles' Behaviour. PDP 2018: 446-453 - [c60]Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci, Francesco Mercaldo:
Improving Vehicle Safety Through a Fog Collaborative Infrastructure. SMARTCOMP 2018: 446-451 - [c59]Gianpiero Costantino, Antonio La Marra, Fabio Martinelli, Ilaria Matteucci:
CANDY: A Social Engineering Attack to Leak Information from Infotainment System. VTC Spring 2018: 1-5 - [c58]Francesco Di Cerbo, Alessio Lunardelli, Ilaria Matteucci, Fabio Martinelli, Paolo Mori:
A Declarative Data Protection Approach: From Human-Readable Policies to Automatic Enforcement. WEBIST (Revised Selected Papers) 2018: 78-98 - [c57]Francesco Di Cerbo, Fabio Martinelli, Ilaria Matteucci, Paolo Mori:
Towards a Declarative Approach to Stateful and Stateless Usage Control for Data Protection. WEBIST 2018: 308-315 - 2017
- [c56]Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci:
Reputation Systems to Mitigate DoS Attack in Vehicular Network. CRITIS 2017: 261-265 - [c55]Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi:
Efficient Detection of Conflicts in Data Sharing Agreements. ICISSP (Revised Selected Papers) 2017: 148-172 - [c54]Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi:
Analysis of Data Sharing Agreements. ICISSP 2017: 167-178 - [c53]Stefano Bistarelli, Fabio Martinelli, Ilaria Matteucci, Francesco Santini:
A Quantitative Partial Model-Checking Function and Its Optimisation. LPAR 2017: 319-337 - [c52]Fabio Martinelli, Ilaria Matteucci, Paolo Mori, Andrea Saracino:
Concurrent History-based Usage Control Policies. MODELSWARD 2017: 657-666 - 2016
- [c51]José Fran. Ruiz, Marinella Petrocchi, Ilaria Matteucci, Gianpiero Costantino, Carmela Gambardella, Mirko Manea, Anil Ozdeniz:
A Lifecycle for Data Sharing Agreements: How it Works Out. APF 2016: 3-20 - [c50]Silvia Bonomi, Ilaria Matteucci:
Introduction to ReSA4CI 2016. DSN Workshops 2016: 136 - [c49]Ilaria Matteucci, Francesco Santini:
Decomposing Global Quantitative Properties into Local Ones. DPM/QASA@ESORICS 2016: 34-50 - [c48]Stefano Bistarelli, Fabio Martinelli, Ilaria Matteucci, Francesco Santini:
A Formal and Run-Time Framework for the Adaptation of Local Behaviours to Match a Global Property. FACS 2016: 134-152 - [c47]Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci:
Exploiting Vehicles' Reputation to Mitigate DoS Attack. AMARETTO@MODELSWARD 2016: 75-82 - [c46]Nicola Nostro, Ilaria Matteucci, Andrea Ceccarelli, Francesco Santini, Felicita Di Giandomenico, Fabio Martinelli, Andrea Bondavalli:
A multi-criteria ranking of security countermeasures. SAC 2016: 530-533 - [c45]Stefano Bistarelli, Francesco Santini, Fabio Martinelli, Ilaria Matteucci:
Automated adaptation via quantitative partial model checking. SAC 2016: 1993-1996 - [c44]Fabio Martinelli, Ilaria Matteucci, Paolo Mori, Andrea Saracino:
Enforcement of U-XACML History-Based Usage Control Policy. STM 2016: 64-81 - 2015
- [c43]Fabio Martinelli, Ilaria Matteucci, Francesco Santini:
There are Two Sides to Every Question - Controller Versus Attacker. Programming Languages with Applications to Biology and Security 2015: 304-318 - [c42]Ilaria Matteucci, Paolo Mori, Marinella Petrocchi:
1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and Security (TELERISE 2015). ICSE (2) 2015: 1015-1016 - [c41]Fabio Martinelli, Ilaria Matteucci, Francesco Santini:
Semiring-based Specification Approaches for Quantitative Security. QAPL 2015: 95-109 - 2014
- [c40]Marina Egea, Ilaria Matteucci, Paolo Mori, Marinella Petrocchi:
Definition of Data Sharing Agreements - The Case of Spanish Data Protection Law. A4Cloud 2014: 248-272 - [c39]Stefania Gnesi, Ilaria Matteucci, Corrado Moiso, Paolo Mori, Marinella Petrocchi, Michele Vescovi:
My Data, Your Data, Our Data: Managing Privacy Preferences in Multiple Subjects Personal Data. APF 2014: 154-171 - [c38]Riccardo Conti, Ilaria Matteucci, Paolo Mori, Marinella Petrocchi:
An Expertise-Driven Authoring Tool for E-Health Data Policies. CBMS 2014: 82-87 - [c37]Riccardo Conti, Emanuel Marzini, Angelo Spognardi, Ilaria Matteucci, Paolo Mori, Marinella Petrocchi:
Maturity Assessment of Wikipedia Medical Articles. CBMS 2014: 281-286 - [c36]Jerry den Hartog, Ilaria Matteucci:
Introducing Probabilities in Controller Strategies. DPM/SETOP/QASA 2014: 233-249 - [c35]Fabio Martinelli, Ilaria Matteucci, Andrea Saracino, Daniele Sgandurra:
Enforcing Mobile Application Security Through Probabilistic Contracts. ESSoS Doctoral Symposium 2014 - [c34]Emanuel Marzini, Angelo Spognardi, Ilaria Matteucci, Paolo Mori, Marinella Petrocchi, Riccardo Conti:
Improved Automatic Maturity Assessment of Wikipedia Medical Articles - (Short Paper). OTM Conferences 2014: 612-622 - [c33]Nicola Nostro, Ilaria Matteucci, Andrea Ceccarelli, Felicita Di Giandomenico, Fabio Martinelli, Andrea Bondavalli:
On Security Countermeasures Ranking through Threat Analysis. SAFECOMP Workshops 2014: 243-254 - [c32]Silvia Bonomi, Ilaria Matteucci:
Introduction to the Safecomp 2014 Workshop: Reliability and Security Aspects for Critical Infrastructure Protection (ReSA4CI 2014). SAFECOMP Workshops 2014: 301-303 - 2013
- [c31]Vincenzo Ciancia, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, José Antonio Martín, Ernesto Pimentel:
Automated Synthesis and Ranking of Secure BPMN Orchestrators. ARES 2013: 455-464 - [c30]Alessio Lunardelli, Ilaria Matteucci, Paolo Mori, Marinella Petrocchi:
A prototype for solving conflicts in XACML-based e-Health policies. CBMS 2013: 449-452 - [c29]Gianluca Dini, Fabio Martinelli, Ilaria Matteucci, Andrea Saracino, Daniele Sgandurra:
Introducing Probabilities in Contract-Based Approaches for Mobile Application Security. DPM/SETOP 2013: 284-299 - [c28]Fabio Martinelli, Ilaria Matteucci:
Partial Model Checking for the Verification and Synthesis of Secure Service Compositions. EuroPKI 2013: 1-11 - [c27]Vincenzo Ciancia, Fabio Martinelli, Ilaria Matteucci, Charles Morisset:
Quantitative Evaluation of Enforcement Strategies - Position Paper. FPS 2013: 178-186 - [c26]Fabio Martinelli, Ilaria Matteucci, Andrea Saracino, Daniele Sgandurra:
Remote Policy Enforcement for Trusted Application Execution in Mobile Environments. INTRUST 2013: 70-84 - [c25]Gianluca Dini, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Andrea Saracino, Daniele Sgandurra:
Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach. TrustCom/ISPA/IUCC 2013: 1541-1546 - 2012
- [c24]Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Luca Wiegand:
A Formal Support for Collaborative Data Sharing. CD-ARES 2012: 547-561 - [c23]Ilaria Matteucci, Paolo Mori, Marinella Petrocchi:
Prioritized Execution of Privacy Policies. DPM/SETOP 2012: 133-145 - [c22]Gianluca Dini, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Andrea Saracino, Daniele Sgandurra:
A Multi-criteria-Based Evaluation of Android Applications. INTRUST 2012: 67-82 - [c21]Fabio Martinelli, Ilaria Matteucci, Charles Morisset:
From Qualitative to Quantitative Enforcement of Security Policy. MMM-ACNS 2012: 22-35 - [c20]Vincenzo Ciancia, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, José Antonio Martín, Ernesto Pimentel:
A tool for the synthesis of cryptographic orchestrators. MDsec@MoDELS 2012: 10 - 2011
- [c19]Ilaria Matteucci, Marinella Petrocchi, Marco Luca Sbodio, Luca Wiegand:
A Design Phase for Data Sharing Agreements. DPM/SETOP 2011: 25-41 - [c18]Fabio Martinelli, Ilaria Matteucci:
Preserving security properties under refinement. SESS@ICSE 2011: 15-21 - [c17]Gabriele Costa, Ilaria Matteucci:
Trust-Driven Policy Enforcement through Gate Automata. IMIS 2011: 208-215 - [c16]Gabriele Costa, Ilaria Matteucci:
Elective temporal logic. QoSA/ISARCS 2011: 143-152 - [c15]Gabriele Costa, Valérie Issarny, Fabio Martinelli, Ilaria Matteucci, Rachid Saadi:
Security and Trust. SFM 2011: 393-416 - [c14]Ilaria Matteucci, Paolo Mori, Marinella Petrocchi, Luca Wiegand:
Controlled data sharing in E-health. STAST 2011: 17-23 - 2010
- [c13]Gabriele Costa, Nicola Dragoni, Aliaksandr Lazouski, Fabio Martinelli, Fabio Massacci, Ilaria Matteucci:
Extending Security-by-Contract with Quantitative Trust on Mobile Devices. CISIS 2010: 872-877 - [c12]Ilaria Matteucci, Marinella Petrocchi, Marco Luca Sbodio:
CNL4DSA: a controlled natural language for data sharing agreements. SAC 2010: 616-620 - 2009
- [c11]Fabio Martinelli, Ilaria Matteucci:
Idea: Action Refinement for Security Properties Enforcement. ESSoS 2009: 37-42 - 2008
- [c10]Fabio Martinelli, Ilaria Matteucci:
Synthesis of Local Controller Programs for Enforcing Global Security Properties. ARES 2008: 1120-1127 - [c9]Gabriele Lenzini, Fabio Martinelli, Ilaria Matteucci, Stefania Gnesi:
A Uniform Approach to Security and Fault-Tolerance Specification and Analysis. WADS 2008: 172-201 - [c8]Paolo Greci, Fabio Martinelli, Ilaria Matteucci:
A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device Application. ISoLA 2008: 221-236 - [c7]Benjamin Aziz, Alvaro Arenas, Fabio Martinelli, Ilaria Matteucci, Paolo Mori:
Controlling Usage in Business Process Workflows through Fine-Grained Security Policies. TrustBus 2008: 100-117 - [c6]Roberto Gorrieri, Fabio Martinelli, Ilaria Matteucci:
Towards Information Flow Properties for Distributed Systems. VODCA@FOSAD 2008: 65-84 - 2007
- [c5]Fabio Martinelli, Ilaria Matteucci:
Synthesis of Web Services Orchestrators in a Timed Setting. WS-FM 2007: 124-138 - 2006
- [c4]Ilaria Matteucci:
A Tool for the Synthesis of Controller Programs. Formal Aspects in Security and Trust 2006: 112-126 - [c3]Fabio Martinelli, Ilaria Matteucci:
An Approach for the Specification, Verification and Synthesis of Secure Systems. VODCA@FOSAD 2006: 29-43 - [c2]Fabio Martinelli, Ilaria Matteucci:
Through Modeling to Synthesis of Security Automata. STM 2006: 31-46 - [c1]Ilaria Matteucci:
Automated Synthesis of Enforcing Mechanisms for Security Properties in a Timed Setting. ICS@SYNASC 2006: 101-120
Parts in Books or Collections
- 2014
- [p2]José Antonio Martín, Fabio Martinelli, Ilaria Matteucci, Ernesto Pimentel, Mathieu Turuani:
On the Synthesis of Secure Services Composition. Engineering Secure Future Internet Services and Systems 2014: 140-159 - [p1]Riccardo Conti, Alessio Lunardelli, Ilaria Matteucci, Paolo Mori, Marinella Petrocchi:
Preserving Data Privacy in e-Health. Engineering Secure Future Internet Services and Systems 2014: 366-392
Editorship
- 2015
- [e1]Ilaria Matteucci, Paolo Mori, Marinella Petrocchi:
1st IEEE/ACM International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, TELERISE 2015, Florence, Italy, May 18, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-7097-4 [contents]
Informal and Other Publications
- 2023
- [i6]Daniele Albanese, Giuseppe Crincoli, Marco De Vincenzi, Giacomo Iadarola, Fabio Martinelli, Ilaria Matteucci, Paolo Mori:
Privacy-Preserving Data Sharing for Collaborative Analytics in Multi-Modal Transportation Systems. ERCIM News 2023(133) (2023) - 2021
- [i5]Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci:
TOUCAN: A proTocol tO secUre Controller Area Network. CoRR abs/2111.10642 (2021) - [i4]Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci:
CINNAMON: A Module for AUTOSAR Secure Onboard Communication. CoRR abs/2111.12026 (2021) - [i3]Davide Micale, Gianpiero Costantino, Ilaria Matteucci, Giuseppe Patanè, Giampaolo Bella:
Secure Routine: A Routine-Based Algorithm for Drivers Identification. CoRR abs/2112.06200 (2021) - 2016
- [i2]Carmela Gambardella, Ilaria Matteucci, Marinella Petrocchi:
Data Sharing Agreements: How to Glue Definition, Analysis and Mapping Together. ERCIM News 2016(106) (2016) - 2014
- [i1]Alessia Garofalo, Cesario Di Sarno, Ilaria Matteucci, Marco Vallini, Valerio Formicola:
Closing the loop of SIEM analysis to Secure Critical Infrastructures. CoRR abs/1405.2995 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint