Risultati finali
Modelling and visualization techniques
Specification and set-up Demonstration case Phase 1Common Framework Handbook 2
common framework versions
Definition of Privacy by Design and Privacy Preserving enablersValidation and Certification Methodology
Evaluation of the methodology
Validation Demonstration case Phase 1Design of Education and Professional Frame-work
Report on the outreach and dissemination activities 2
Requirements Analysis of Demonstration case Phase 2
will be produced as a documentation
Cross sectural cybersecurity building blocksExploitation strategy report 1
Framework to design and implement adaptive security systems
complete processing
Final educational and assessment FrameworkRequirements Analysis of Demonstration case Phase 1
Standardisation Procedure Assessment Document
considering cybersecurity goals
Exploitation strategy report 2CyberSec4Europe summer school 2
Website and Social media accounts 3
Clustering results and SU-ICT-03 project CONCERTATION conference year 1
proceedings and reporting of collaboration efforts results year 1 (including but not limited to ECSO (and Working Groups), cPPP, ENISA, DG CNECT, EUROPOL, EOS, CEN/CENELECT, ISO, international cooperation)
Exploitation strategy report 3Roadmap of the Set-Up of the NCC
A report describing how governance model 20 compares to related models developed by other SUICT03 projects
Cybersecurity outlook 2New trends monitoring versions
Final conference on the project resultsSupply chain security recommendations 2
Website and Social media accounts 4
Evaluation report on integration demonstration
Usability requirements validation
Guidelines for enhancement of societal security awareness
Continuous societal impact
Internal Validation of Governance StructureUsable security & privacy methods and rec-ommendations
Usable security & privacy methods and recommendations
Future Horizon RoadmapResearch and Development Roadmap 2
Evaluation of the Research and Innovation Roadmap
Final evaluation of roadmapprocess
Guidelines for GDPR compliant user experi-enceAwareness effectiveness study 1
SME cybersecurity awareness program 1
Validation of Demonstration cases Phase 2
is the fully documented demonstration case
Policy recommendation report 3Policy recommendation report 2
Policy recommendation report 1
Project Standards Matrix 2
updated document
Specification and set-up Demonstration case Phase 2will be produced as a documentation
Common Framework Handbook 1Research and Development Roadmap 1
Supply chain security recommendations 1
Project Standards Matrix 1
Website and Social media accounts 2
Analysis of interoperability and cross-border compliance issues
Evaluation and end results
Research challenges and requirements to man-age digital evidenceSU-ICT-03 project CONCERTATION conference year 3
Proceedings and reporting of collaboration efforts results year 3 including but not limited to ECSO and Working Groups cPPP ENISA DG CNECT EUROPOL EOS CENCENELECT ISO international cooperation due month 42 in order to include all project liaison results
Requirements Analysis from Vertical Stake-holdersRequirements Analysis from Vertical Stakeholders
Analysis of key research challenges for adaptive securityResearch and Development Roadmap 3
Second update of the Roadmap
SME cybersecurity awareness program 2Governance Structure 1
Research challenges and requirements for secure software development
CyberSec4Europe summer school 3
"Report ""The role of the certification and its implementations"""
Report The role of the certification and its implementations
Awareness effectiveness study 3Report on existing cyber ranges, requirements
SME cybersecurity awareness program 3
Website and Social media accounts 5
CyberSec4Europe summer school 1
Awareness effectiveness study 2
Report on the outreach and dissemination activities 1
Cybersecurity outlook 1
Legal Framework
Case Pilot for WP2 Governance
Dissemination material: Brochures, poster
Education and Training Review
Final report on the outreach and dissemination activities
Cybersecurity Standardisation Engagement Plan 2
updated document
Cybersecurity Standardisation Engagement Plan 1Dissemination and awareness plan
Governance Structure 2
SU-ICT-03 project CONCERTATION conference year 2
Proceedings and reporting of collaboration efforts results year 2 (including but not limited to ECSO (and Working Groups), cPPP, ENISA, DG CNECT, EUROPOL, EOS, CEN/CENELECT, ISO, international cooperation) – due month 24
methodologies and tools
Final cybersecurity enablers and underlying technologies componentsfinal version
Cooperation with Threat Intelligence Services for deploying adaptive honeypotsProof-of-concept implementation
Framework and Toolset for conformityUpdated version of enablers and components
second released based on feedback
Integration to demonstration casesfinal development
Collection of agreements, guidance documentation and dissemination materials
Collection of agreements, guidance documentation, and dissemination materials
Common virtual lab with open-source tools for research and developmentVirtual lab for open-source tools education and research
Virtual lab for opensource tools education and research
CyberSec4Europe, 2nd flagship challengePubblicazioni
Autori:
Davy Preuveneers, Wouter Joosen
Pubblicato in:
Journal of Cybersecurity and Privacy, Numero 1/1, 2021, Pagina/e 140-163, ISSN 2624-800X
Editore:
MDPI
DOI:
10.3390/jcp1010008
Autori:
Antreas Dionysiou, Elias Athanasopoulos
Pubblicato in:
Computers & Security, Numero 97, 2020, Pagina/e 101947, ISSN 0167-4048
Editore:
Pergamon Press Ltd.
DOI:
10.1016/j.cose.2020.101947
Autori:
Said Daoudagh, Francesca Lonetti, Eda Marchetti
Pubblicato in:
Journal of Software: Evolution and Process, Numero 27 August 2020, 2020, Pagina/e e2306, ISSN 2047-7481
Editore:
John Wiley and Sons Ltd
DOI:
10.1002/smr.2306
Autori:
Ana Nieto
Pubblicato in:
IEEE Transactions on Information Forensics and Security, Numero 15, 2020, Pagina/e 3325-3334, ISSN 1556-6013
Editore:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/tifs.2020.2988602
Autori:
Tânia Carvalho, Pedro Faria, Luís Antunes, Nuno Moniz
Pubblicato in:
PLOS ONE, Numero 16/6, 2021, Pagina/e e0252169, ISSN 1932-6203
Editore:
Public Library of Science
DOI:
10.1371/journal.pone.0252169
Autori:
Wenjuan LI, Weizhi MENG, Zhiqiang LIU, Man-Ho AU
Pubblicato in:
IEICE Transactions on Information and Systems, Numero E103.D/2, 2020, Pagina/e 196-203, ISSN 0916-8532
Editore:
Oxford University Press
DOI:
10.1587/transinf.2019ini0002
Autori:
Sebastien Andreina, Jens-Matthias Bohli, G. Karame, Wenting Li, Giorgia Azzurra Marson
Pubblicato in:
IEEE Transactions on Services Computing, 2020, Pagina/e 1-1, ISSN 1939-1374
Editore:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/tsc.2020.3038950
Autori:
Theodoros Apostolopoulos, Vasilios Katos, Kim-Kwang Raymond Choo, Constantinos Patsakis
Pubblicato in:
Future Generation Computer Systems, Numero 116, 2021, Pagina/e 393-405, ISSN 0167-739X
Editore:
Elsevier BV
DOI:
10.1016/j.future.2020.11.004
Autori:
Eugenia Politou, Efthimios Alepis, Constantinos Patsakis, Fran Casino, Mamoun Alazab
Pubblicato in:
Future Generation Computer Systems, Numero 112, 2020, Pagina/e 956-964, ISSN 0167-739X
Editore:
Elsevier BV
DOI:
10.1016/j.future.2020.06.037
Autori:
Ivan Pashchenko, Henrik Plate, Serena Elisa Ponta, Antonino Sabetta, Fabio Massacci
Pubblicato in:
IEEE Transactions on Software Engineering, Numero 21 September 2020, 2020, Pagina/e 1-1, ISSN 0098-5589
Editore:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/tse.2020.3025443
Autori:
Faeq Alrimawi, Liliana Pasquale, Deepak Mehta, Nobukazu Yoshioka, Bashar Nuseibeh
Pubblicato in:
IEEE Transactions on Software Engineering, Numero Monthly, 2020, Pagina/e 1-1, ISSN 0098-5589
Editore:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/tse.2020.2981310
Autori:
M. Caccia, L. Malinverno, L. Paolucci, C. Corridori, E. Proserpio, A. Abba, A. Cusimano, W. Kucewicz, P. Dorosz, M. Baszczyk, M. Esposito, P. Svenda
Pubblicato in:
Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment, Numero 980, 2020, Pagina/e 164480, ISSN 0168-9002
Editore:
Elsevier BV
DOI:
10.1016/j.nima.2020.164480
Autori:
David Harborth, Sebastian Pape, Kai Rannenberg
Pubblicato in:
Proceedings on Privacy Enhancing Technologies, Numero 2020/2, 2020, Pagina/e 111-128, ISSN 2299-0984
Editore:
Sciendo
DOI:
10.2478/popets-2020-0020
Autori:
Faeq Alrimawi, Liliana Pasquale, Bashar Nuseibeh
Pubblicato in:
IEEE Access, Numero 7, 2019, Pagina/e 111513-111527, ISSN 2169-3536
Editore:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/access.2019.2934221
Autori:
Alejandro Molina Zarca, Miloud Bagaa, Jorge Bernal Bernabe, Tarik Taleb, Antonio F. Skarmeta
Pubblicato in:
Sensors, Numero 20/13, 2020, Pagina/e 3622, ISSN 1424-8220
Editore:
Multidisciplinary Digital Publishing Institute (MDPI)
DOI:
10.3390/s20133622
Autori:
Fabio Massacci, Ivan Pashchenko
Pubblicato in:
IEEE Security & Privacy, Numero 19/3, 2021, Pagina/e 58-62, ISSN 1540-7993
Editore:
IEEE Computer Society
DOI:
10.1109/msec.2021.3065627
Autori:
Darren Hurley-Smith, Constantinos Patsakis, Julio Hernandez-Castro
Pubblicato in:
IEEE Transactions on Information Forensics and Security, 2020, Pagina/e 1-1, ISSN 1556-6013
Editore:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/tifs.2020.2988505
Autori:
Spyridon Papastergiou, Haralambos Mouratidis, Eleni-Maria Kalogeraki
Pubblicato in:
Evolving Systems, Numero 12/1, 2021, Pagina/e 91-108, ISSN 1868-6478
Editore:
Springer Verlag
DOI:
10.1007/s12530-020-09335-4
Autori:
Davide Ferraris, Carmen Fernandez-Gago, Javier Lopez
Pubblicato in:
Human-centric Computing and Information Sciences, Numero 10/1, 2020, ISSN 2192-1962
Editore:
Springer Science + Business Media
DOI:
10.1186/s13673-020-00257-3
Autori:
Ana Hermosilla, Alejandro Molina Zarca, Jorge Bernal Bernabe, Jordi Ortiz, Antonio Skarmeta
Pubblicato in:
IEEE Access, Numero 8, 2020, Pagina/e 131779-131795, ISSN 2169-3536
Editore:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/access.2020.3010209
Autori:
Per Meland, Shukun Tokas, Gencer Erdogan, Karin Bernsmed, Aida Omerovic
Pubblicato in:
Electronics, Numero 10/9, 2021, Pagina/e 1092, ISSN 2079-9292
Editore:
MDPI
DOI:
10.3390/electronics10091092
Autori:
Sebastian Pape, Federica Paci, Jan Jürjens, Fabio Massacci
Pubblicato in:
Information, Numero 11/5, 2020, Pagina/e 261, ISSN 2078-2489
Editore:
Multidisciplinary Digital Publishing Institute (MDPI)
DOI:
10.3390/info11050261
Autori:
Davy Preuveneers, Wouter Joosen, Jorge Bernal Bernabe, Antonio Skarmeta
Pubblicato in:
Security and Communication Networks, Numero 2020, 2020, Pagina/e 1-15, ISSN 1939-0122
Editore:
John Wiley & Sons Ltd.
DOI:
10.1155/2020/8833765
Autori:
Luca Durante, Lucia Seno, Adriano Valenzano
Pubblicato in:
IEEE Transactions on Information Forensics and Security, Numero 16, 2021, Pagina/e 2637-2651, ISSN 1556-6013
Editore:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/tifs.2021.3057552
Autori:
Nicola Dragoni, Alberto Lluch Lafuente, Fabio Massacci, Anders Schlichtkrull
Pubblicato in:
IEEE Security & Privacy, Numero 19/1, 2021, Pagina/e 81-88, ISSN 1540-7993
Editore:
IEEE Computer Society
DOI:
10.1109/msec.2020.3037446
Autori:
Sara N. Matheu, José L. Hernández-Ramos, Antonio F. Skarmeta, Gianmarco Baldini
Pubblicato in:
ACM Computing Surveys, Numero 53/6, 2021, Pagina/e 1-36, ISSN 0360-0300
Editore:
Association for Computing Machinary, Inc.
DOI:
10.1145/3410160
Autori:
Silvia Ghilezan, Jovanka Pantović, Ivan Prokić, Alceste Scalas, Nobuko Yoshida
Pubblicato in:
Proceedings of the ACM on Programming Languages, Numero 5/POPL, 2021, Pagina/e 1-28, ISSN 2475-1421
Editore:
Association for Computing Machinery
DOI:
10.1145/3434297
Autori:
Jan Jancar and Vladimir Sedlacek and Petr Svenda and Marek Sys
Pubblicato in:
IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2020, Numero 4, 2020, Pagina/e 281-308, ISSN 2569-2925
Editore:
IACR
DOI:
10.13154/tches.v2020.i4.281-308
Autori:
Patrícia Sousa, Luís Magalhães, João Resende, Rolando Martins, Luís Antunes
Pubblicato in:
Sensors, Numero 21/17, 2021, Pagina/e 5898, ISSN 1424-8220
Editore:
Multidisciplinary Digital Publishing Institute (MDPI)
DOI:
10.3390/s21175898
Autori:
Constantinos Patsakis, Fran Casino, Nikolaos Lykousas, Vasilios Katos
Pubblicato in:
IEEE Access, Numero 8, 2020, Pagina/e 118559-118571, ISSN 2169-3536
Editore:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/access.2020.3004727
Autori:
Gabriel Kuper, Fabio Massacci, Woohyun Shim, Julian Williams
Pubblicato in:
Risk Analysis, Numero 20 February 2020, 2020, ISSN 0272-4332
Editore:
Blackwell Publishing Inc.
DOI:
10.1111/risa.13454
Autori:
Pierantonia Sterlini, Fabio Massacci, Natalia Kadenko, Tobias Fiebig, Michel van Eeten
Pubblicato in:
IEEE Security & Privacy, Numero 18/1, 2020, Pagina/e 46-54, ISSN 1540-7993
Editore:
IEEE Computer Society
DOI:
10.1109/msec.2019.2945309
Autori:
Luca Allodi, Marco Cremonini, Fabio Massacci, Woohyun Shim
Pubblicato in:
Empirical Software Engineering, Numero 25/2, 2020, Pagina/e 1063-1094, ISSN 1382-3256
Editore:
Kluwer Academic Publishers
DOI:
10.1007/s10664-019-09797-4
Autori:
Sara Nieves Matheu García, Alejandro Molina Zarca, José Luis Hernández-Ramos, Jorge Bernal Bernabé, Antonio Skarmeta Gómez
Pubblicato in:
Applied Sciences, Numero 9/21, 2019, Pagina/e 4576, ISSN 2076-3417
Editore:
MDPI
DOI:
10.3390/app9214576
Autori:
Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Pubblicato in:
IET Information Security, Numero 2020, 2020, ISSN 1751-8709
Editore:
Institution of Engineering and Technology
DOI:
10.1049/iet-ifs.2019.0141
Autori:
Fabio Massacci
Pubblicato in:
IEEE Security & Privacy, Numero 17/5, 2019, Pagina/e 90-93, ISSN 1540-7993
Editore:
IEEE Computer Society
DOI:
10.1109/msec.2019.2918820
Autori:
Juan E. Rubio, Rodrigo Roman, Javier Lopez
Pubblicato in:
IEEE Transactions on Industrial Informatics, Numero In press, 2020, Pagina/e 1-1, ISSN 1551-3203
Editore:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/tii.2020.2976747
Autori:
Constantinos Patsakis, Fran Casino, Vasilios Katos
Pubblicato in:
Computers & Security, Numero 88, 2020, Pagina/e 101614, ISSN 0167-4048
Editore:
Pergamon Press Ltd.
DOI:
10.1016/j.cose.2019.101614
Autori:
Eugenia Politou, Fran Casino, Efthymios Alepis, Constantinos Patsakis
Pubblicato in:
IEEE Transactions on Emerging Topics in Computing, Numero 1 (VOL .X) (Frequency: 4), 2019, Pagina/e 1-1, ISSN 2168-6750
Editore:
IEEE Computer Society
DOI:
10.1109/tetc.2019.2949510
Autori:
Giorgio Di Tizio, Fabio Massacci
Pubblicato in:
Proceedings on Privacy Enhancing Technologies, Numero 2021/2, 2021, Pagina/e 259-281, ISSN 2299-0984
Editore:
Sciendo
DOI:
10.2478/popets-2021-0027
Autori:
Sara N. Matheu, Alberto Robles Enciso, Alejandro Molina Zarca, Dan Garcia-Carrillo, José Luis Hernández-Ramos, Jorge Bernal Bernabe, Antonio F. Skarmeta
Pubblicato in:
Sensors, Numero 20/7, 2020, Pagina/e 1882, ISSN 1424-8220
Editore:
Multidisciplinary Digital Publishing Institute (MDPI)
DOI:
10.3390/s20071882
Autori:
Michalis Papaevripides, Elias Athanasopoulos
Pubblicato in:
ACM Transactions on Privacy and Security, Numero 24/2, 2021, Pagina/e 1-29, ISSN 2471-2566
Editore:
ACM
DOI:
10.1145/3418898
Autori:
João S. Resende, Luís Magalhães, André Brandão, Rolando Martins, Luís Antunes
Pubblicato in:
Sensors, Numero 21/17, 2021, Pagina/e 5805, ISSN 1424-8220
Editore:
Multidisciplinary Digital Publishing Institute (MDPI)
DOI:
10.3390/s21175805
Autori:
Miguel Ambrona, Dario Fiore, Claudio Soriente
Pubblicato in:
Proceedings on Privacy Enhancing Technologies, Numero 2021/1, 2020, Pagina/e 21-42, ISSN 2299-0984
Editore:
Sciendo
DOI:
10.2478/popets-2021-0003
Autori:
Said Daoudagh, Francesca Lonetti, Eda Marchetti
Pubblicato in:
Software Quality Journal, Numero 28/1, 2020, Pagina/e 249-282, ISSN 0963-9314
Editore:
Kluwer Academic Publishers
DOI:
10.1007/s11219-019-09470-5
Autori:
Fran Casino, Eugenia Politou, Efthimios Alepis, Constantinos Patsakis
Pubblicato in:
IEEE Access, Numero 8, 2020, Pagina/e 4737-4744, ISSN 2169-3536
Editore:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/access.2019.2962017
Autori:
Kimmo Halunen, Outi-Marja Latvala
Pubblicato in:
Computer Science Review, Numero 39, 2021, Pagina/e 100340, ISSN 1574-0137
Editore:
Elsevier BV
DOI:
10.1016/j.cosrev.2020.100340
Autori:
Duc Ly Vu, Ivan Pashchenko, Fabio Massacci
Pubblicato in:
ICSE '21: Proceedings of the ACM/IEEE 43nd International Conference on Software Engineering Workshops, Numero 21-28 May 2021, 2021
Editore:
IEEE/ACM
Autori:
Claudio Soriente, Ghassan Karame, Wenting Li, Sergey Fedorov
Pubblicato in:
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 2019, Pagina/e 158-171, ISBN 978-1-7281-1148-3
Editore:
IEEE
DOI:
10.1109/eurosp.2019.00021
Autori:
Andreas V. Hess, Sebastian Modersheim, Achim D. Brucker, Anders Schlichtkrull
Pubblicato in:
2021 IEEE 34th Computer Security Foundations Symposium (CSF), 2021, Pagina/e 1-16, ISBN 978-1-7281-7607-9
Editore:
IEEE
DOI:
10.1109/csf51468.2021.00006
Autori:
Said Daoudagh, Francesca Lonetti, Eda Marchetti
Pubblicato in:
Proceedings of the 6th International Conference on Information Systems Security and Privacy, Numero 25 February 2020, 2020, Pagina/e 107-118, ISBN 978-989-758-399-5
Editore:
SCITEPRESS - Science and Technology Publications
DOI:
10.5220/0008974201070118
Autori:
Emmanouil Papadogiannakis, Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P. Markatos
Pubblicato in:
Proceedings of the Web Conference 2021, Numero 2021, 2021, Pagina/e 2130-2141, ISBN 9781450383127
Editore:
ACM
DOI:
10.1145/3442381.3450056
Autori:
João S. Resende, Marco Almeida, Rolando Martins, Luís Antunes
Pubblicato in:
Proceedings of Entropy 2021: The Scientific Tool of the 21st Century, 2021, Pagina/e 9755
Editore:
MDPI
DOI:
10.3390/entropy2021-09755
Autori:
Jan Bobolz, Fabian Eidens, Stephan Krenn, Daniel Slamanig, Christoph Striecks
Pubblicato in:
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, Numero 2020, 2020, Pagina/e 319-333, ISBN 9781450367509
Editore:
ACM
DOI:
10.1145/3320269.3384769
Autori:
Stefan Ruehrup, Stephan Krenn
Pubblicato in:
2019 IEEE International Conference on Connected Vehicles and Expo (ICCVE), Numero 2019, 2019, Pagina/e 1-6, ISBN 978-1-7281-0142-2
Editore:
IEEE
DOI:
10.1109/iccve45908.2019.8965198
Autori:
Said Daoudagh, Eda Machetti
Pubblicato in:
Proceedings of the Fourth Italian Conference on Cyber Security, Numero 4 February 2020, 2020, Pagina/e 128-140
Editore:
CEUR-WS.org
Autori:
Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Wenting Li
Pubblicato in:
Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, 2021, Pagina/e 131-142, ISBN 9781450383653
Editore:
ACM
DOI:
10.1145/3450569.3463564
Autori:
Behzad Abdolmaleki, Sebastian Ramacher, Daniel Slamanig
Pubblicato in:
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, Numero 2020, 2020, Pagina/e 1987-2005, ISBN 9781450370899
Editore:
ACM
DOI:
10.1145/3372297.3417228
Autori:
Said Daoudagh, Eda Marchetti
Pubblicato in:
Proceedings of the 8th International Conference on Model-Driven Engineering and Software Development, Numero 25 February 2020, 2020, Pagina/e 167-176, ISBN 978-989-758-400-8
Editore:
SCITEPRESS - Science and Technology Publications
DOI:
10.5220/0009358201670176
Autori:
Christian Bartolo Burlò, Adrian Francalanza, Alceste Scalas
Pubblicato in:
35th European Conference on Object-Oriented Programming (ECOOP 2021), 2021, Pagina/e 22:1–22:27, ISSN 1868-8969
Editore:
Schloss Dagstuhl -- Leibniz-Zentrum für Informatik
DOI:
10.4230/lipics.ecoop.2021.22
Autori:
Majid Salehi, Danny Hughes, Bruno Crispo
Pubblicato in:
2019 IEEE Conference on Dependable and Secure Computing (DSC), Numero 23/Dec/19, 2019, Pagina/e 1-8, ISBN 978-1-7281-2319-6
Editore:
IEEE
DOI:
10.1109/dsc47296.2019.8937667
Autori:
Davy Preuveneers, Wouter Joosen
Pubblicato in:
Foundations and Practice of Security. 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers, Numero 8 June 2020, 2020, ISBN 978-3-030-45370-1
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-45371-8_11
Autori:
S. Ali Mirheidari, S. Arshad , K. Onarlioglu, B. Crispo, E. Kirda, W. Robertson
Pubblicato in:
Usenix Security 2020 conference., Numero 12/Aug/20, 2020, Pagina/e all
Editore:
Usenix
Autori:
Stephan Krenn, Kai Samelin, Christoph Striecks
Pubblicato in:
Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19, Numero 2019, 2019, Pagina/e 1-10, ISBN 9781-450371643
Editore:
ACM Press
DOI:
10.1145/3339252.3339256
Autori:
Peter Hamm, David Harborth, Sebastian Pape
Pubblicato in:
Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19, Numero 14th, 2019, Pagina/e 1-7, ISBN 9781-450371643
Editore:
ACM Press
DOI:
10.1145/3339252.3340339
Autori:
Maurice H. ter Beek, Axel Legay, Alberto Lluch Lafuente, Andrea Vandin
Pubblicato in:
Proceedings of the 14th International Working Conference on Variability Modelling of Software-Intensive Systems, 2020, Pagina/e 1-9, ISBN 9781-450375016
Editore:
ACM
DOI:
10.1145/3377024.3377041
Autori:
Said Daoudagh, Francesca Lonetti, Eda Marchetti
Pubblicato in:
Proceedings of the 5th International Conference on Information Systems Security and Privacy, Numero February 23, 2019, Pagina/e 126-135, ISBN 978-989-758-359-9
Editore:
SCITEPRESS - Science and Technology Publications
DOI:
10.5220/0007379401260135
Autori:
Cesare Bartolini, Said Daoudagh, Gabriele Lenzini, Eda Marchetti
Pubblicato in:
Proceedings of the 14th International Conference on Software Technologies, Numero July 26, 2019, Pagina/e 331-338, ISBN 978-989-758-379-7
Editore:
SCITEPRESS - Science and Technology Publications
DOI:
10.5220/0007978703310338
Autori:
Antonello Calabrò, Said Daoudagh, Eda Marchetti
Pubblicato in:
Proceedings of the Third Italian Conference on Cyber Security,, Numero February 13, 2019
Editore:
CEUR-WS.org
Autori:
Anders Schlichtkrull, Sebastian Mödersheim
Pubblicato in:
Open Identity Summit 2020, 2020, Pagina/e 71-82, ISBN 978-3-88579-699-2
Editore:
Gesellschaft für Informatik e.V.
DOI:
10.18420/ois2020_06
Autori:
Paolo Barsocchi, Antonello Calabrò, Antonino Crivello, Said Daoudagh, Francesco Furfari, Michele Girolami, Eda Marchetti
Pubblicato in:
Quality of Information and Communications Technology - 13th International Conference, QUATIC 2020, Faro, Portugal, September 9–11, 2020, Proceedings, Numero 1266, 2020, Pagina/e 358-366, ISBN 978-3-030-58792-5
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-58793-2_29
Autori:
Giuseppe Garofalo, Davy Preuveneers, Wouter Joosen
Pubblicato in:
Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers, Numero 576, 2020, Pagina/e 209-225, ISBN 978-3-030-42503-6
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-42504-3_14
Autori:
Ulrich Haböck, Stephan Krenn
Pubblicato in:
Cryptology and Network Security - 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings, Numero 11829, 2019, Pagina/e 249-269, ISBN 978-3-030-31577-1
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-31578-8_14
Autori:
Jan Camenisch, Stephan Krenn, Ralf Küsters, Daniel Rausch
Pubblicato in:
Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part III, Numero 11923, 2019, Pagina/e 191-221, ISBN 978-3-030-34617-1
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-34618-8_7
Autori:
Panagiotis Papadopoulos, Panagiotis Ilia, Evangelos Markatos
Pubblicato in:
Information Security - 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings, Numero 11723, 2019, Pagina/e 277-296, ISBN 978-3-030-30214-6
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-30215-3_14
Autori:
Constantinos Diomedous, Elias Athanasopoulos
Pubblicato in:
Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedings, Numero 11543, 2019, Pagina/e 441-460, ISBN 978-3-030-22037-2
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-22038-9_21
Autori:
Alberto Lluch Lafuente
Pubblicato in:
Models, Languages, and Tools for Concurrent and Distributed Programming - Essays Dedicated to Rocco De Nicola on the Occasion of His 65th Birthday, Numero 11665, 2019, Pagina/e 471-486, ISBN 978-3-030-21484-5
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-21485-2_26
Autori:
Cesare Bartolini, Said Daoudagh, Gabriele Lenzini, Eda Marchetti
Pubblicato in:
Quality of Information and Communications Technology - 12th International Conference, QUATIC 2019, Ciudad Real, Spain, September 11–13, 2019, Proceedings, Numero 1010, 2019, Pagina/e 3-17, ISBN 978-3-030-29237-9
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-29238-6_1
Autori:
Said Daoudagh, Francesca Lonetti, Eda Marchetti
Pubblicato in:
Emerging Technologies for Authorization and Authentication - Second International Workshop, ETAA 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings, Numero 11967, 2020, Pagina/e 35-51, ISBN 978-3-030-39748-7
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-39749-4_3
Autori:
Spyridon Papastergiou, Haralambos Mouratidis, Eleni-Maria Kalogeraki
Pubblicato in:
Engineering Applications of Neural Networks - 20th International Conference, EANN 2019, Xersonisos, Crete, Greece, May 24-26, 2019, Proceedings, Numero 1000, 2019, Pagina/e 476-487, ISBN 978-3-030-20256-9
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-20257-6_41
Autori:
Neophytos Christou, Elias Athanasopoulos
Pubblicato in:
Emerging Technologies for Authorization and Authentication - Third International Workshop, ETAA 2020, Guildford, UK, September 18, 2020, Proceedings, Numero 12515, 2020, Pagina/e 33-49, ISBN 978-3-030-64454-3
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-64455-0_3
Autori:
David Derler, Stephan Krenn, Kai Samelin, Daniel Slamanig
Pubblicato in:
Security and Cryptography for Networks - 12th International Conference, SCN 2020, Amalfi, Italy, September 14–16, 2020, Proceedings, Numero 12238, 2020, Pagina/e 427-447, ISBN 978-3-030-57989-0
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-57990-6_21
Autori:
Sara N. Matheu, Antonio F. Skarmeta
Pubblicato in:
Security Risk Management for the Internet of Things: Technologies and Techniques for IoT Security, Privacy and Data Protection, 2020, ISBN 978-1-68083-682-0
Editore:
Now Publishers
DOI:
10.1561/9781680836837.ch10
Autori:
Christian Bartolo Burlò, Adrian Francalanza, Alceste Scalas, Catia Trubiani, Emilio Tuosto
Pubblicato in:
Coordination Models and Languages - 23rd IFIP WG 6.1 International Conference, COORDINATION 2021, Held as Part of the 16th International Federated Conference on Distributed Computing Techniques, DisCoTec 2021, Valletta, Malta, June 14–18, 2021, Proceedings, Numero 12717, 2021, Pagina/e 106-120, ISBN 978-3-030-78141-5
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-78142-2_7
Autori:
Hekkala Julius
Pubblicato in:
2019
Editore:
University of Oulu
Autori:
Lehto Niko
Pubblicato in:
2019
Editore:
University of Oulu
È in corso la ricerca di dati su OpenAIRE...
Si è verificato un errore durante la ricerca dei dati su OpenAIRE
Nessun risultato disponibile