IIT Home Page CNR Home Page

cybersecurity

Projects

ARTEMIS Sesamo: Security and Safety Modelling

The SESAMO project addresses the root causes of problems arising with convergence of safety and security in embedded systems at architectural level, where subtle and poorly understood interactions

FP7 CAMINO: Comprehensive Approach to cyber roadMap coordINation and develOpment

The major goal of the project is to provide a realistic roadmap for improving resilience against cybercrime and cyber terrorism.

Publications and editorial products until 01/01/2016

Analisi forense di sistemi di file sharing

Publications and editorial products from the 01/01/2016

A language-based approach to modelling and analysis of Twitter interactions

Analysis of Data Sharing Agreements

A Quantitative Partial Model-Checking Function and Its Optimisation

A Time Series Classification Approach to Game Bot Detection

Blockchain Based Access Control

BRIDEMAID: An Hybrid Tool for Accurate Detection of Android Malware

Car Hacking Identification through Fuzzy Logic Algorithms

Concurrent History-based Usage Control Policies

Enforcing Security in IoT and Home Networks

Formal Methods Meet Mobile Code Obfuscation

How Discover a Malware using Model Checking

How to footprint, report and remotely secure compromised IoT devices

Identifying Mobile Repackaged Applications through Formal Methods

Implementing Usage Control in Internet of Things: A Smart Home Use Case

Machine Learning meets iOS Malware: Identifying Malicious Applications on Apple Environment

Mining Worse and Better Opinions: Unsupervised and Agnostic Aggregation of Online Reviews

Mobile Silent and Continuous Authentication using Apps Sequence

Model Checking for Mobile Android Malware Evolution

Privacy and temporal aware allocation of data in Decentralized Online Social Networks.

Privacy Preserving Clustering over Horizontal and Vertical Partitioned Data

Privacy-Preserving Text Mining as a Service

Privacy-Utility Feature Selection as a Privacy Mechanism in Collaborative Data Classification

Privacy-Utility Feature Selection as a tool in Private Data Classification

Private mobility-cast for opportunistic networks

R-PackDroid: API Package-Based Characterization and Detection of Mobile Ransomware

TOUCAN A proTocol tO secUre Controller Area Network

Twinkle Twinkle Little DroidDream, How I Wonder What You Are?