IIT Home Page CNR Home Page



Angelica Marotta

Foto di Angelica Marotta


ARTEMIS Sesamo: Security and Safety Modelling

The SESAMO project addresses the root causes of problems arising with convergence of safety and security in embedded systems at architectural level, where subtle and poorly understood interactions

FP7 CAMINO: Comprehensive Approach to cyber roadMap coordINation and develOpment

L'obiettivo principale del progetto è quello di fornire 

Pubblicazioni e prodotti editoriali prima del 01/01/2016

Analisi forense di sistemi di file sharing

Pubblicazioni e prodotti editoriali dal 01/01/2016

A language-based approach to modelling and analysis of Twitter interactions

Analysis of Data Sharing Agreements

A Quantitative Partial Model-Checking Function and Its Optimisation

A Time Series Classification Approach to Game Bot Detection

Blockchain Based Access Control

BRIDEMAID: An Hybrid Tool for Accurate Detection of Android Malware

Car Hacking Identification through Fuzzy Logic Algorithms

Concurrent History-based Usage Control Policies

Enforcing Security in IoT and Home Networks

Formal Methods Meet Mobile Code Obfuscation

How Discover a Malware using Model Checking

How to footprint, report and remotely secure compromised IoT devices

Identifying Mobile Repackaged Applications through Formal Methods

Implementing Usage Control in Internet of Things: A Smart Home Use Case

Machine Learning meets iOS Malware: Identifying Malicious Applications on Apple Environment

Mining Worse and Better Opinions: Unsupervised and Agnostic Aggregation of Online Reviews

Mobile Silent and Continuous Authentication using Apps Sequence

Model Checking for Mobile Android Malware Evolution

Privacy and temporal aware allocation of data in Decentralized Online Social Networks.

Privacy Preserving Clustering over Horizontal and Vertical Partitioned Data

Privacy-Preserving Text Mining as a Service

Privacy-Utility Feature Selection as a Privacy Mechanism in Collaborative Data Classification

Privacy-Utility Feature Selection as a tool in Private Data Classification

Private mobility-cast for opportunistic networks

R-PackDroid: API Package-Based Characterization and Detection of Mobile Ransomware

TOUCAN A proTocol tO secUre Controller Area Network

Twinkle Twinkle Little DroidDream, How I Wonder What You Are?