IIT Home Page CNR Home Page



Angelica Marotta

Foto di Angelica Marotta


EU Project - Confidential and Compliant Clouds (Coco Cloud)

EU project - Network of Excellence on Engineering Secure Future Internet Software (NESSoS)

The Network of Excellence on Engineering Secure Future Internet Software Services and Systems (NESSoS) aims at constituting and integrating a long lasting research community on engineering secure s

EU Project - Open Computing Infrastructures for Elastic Services (CONTRAIL)

FP7 CAMINO: Comprehensive Approach to cyber roadMap coordINation and develOpment

L'obiettivo principale del progetto è quello di fornire 

MIUR-PRIN TENACE: Protecting National Critical Infrastructures from Cyber Threats (PRIN-20103P34XC)

The TENACE project will investigate the protection of national critical infrastructures from cyber threats following a collaborative approach whenever appropriate.


The objective of this project is to deliver an innovative technology that enables an efficient, fast and seamless exchange of clinical data among mobile devices, ensuring at the same time that the

PRIN Security Horizons

Il nostro progetto tende a sviluppare una metodologia rigorosa e un framework linguistico per fornire metodi formali a sostegno di chi progetta, implementa e mantiene sistemi software sicuri,

Progetto Premiale e-SHS ICT for Social Health and Solidarity

The realization of a Smart City is a very complex and a long-term process: it is necessary a fundamental understanding of the local reality, the needs of the community and of the single persons, of

Regional project Modelli e Metodi per Filtraggio di Revisioni Online (MyChoice)

Lo sviluppo di nuove tecnologie e infrastrutture telematiche rende disponibile online una gran quantità di prodotti e servizi.



Pubblicazioni e prodotti editoriali dal 01/01/2016

A Logical Key Hierarchy Based approach to preserve content privacy in Decentralized Online Social Networks

A privacy preserving infrastructure for driver's reputation aware automotive services

Big Data & Social Media Intelligence

Exploiting an unpatched flaw in daloRADIUS 1.1-2 to obtain a reverse shell

How long does it take before a new Internet node is contacted for the very first time?

Improving MQTT by Inclusion of Usage Control

Introducing Usage Control in MQTT

Knowledge Representation Frameworks for Terminology Management inCybersecurity: The OCS Project Use Case

Leveraging ROP to redirect the execution flow of flawed binaries

Libro Bianco:Il Futuro della Cybersecurity in Italia: Ambiti Progettuali Strategici Progetti e Azioni per difendere al meglio il Paese dagli attacchi informatici

Parlano di noi: la Ludoteca del Registro su Rai Play

Sagishi: an undercover software agent infiltrating IoT botnets

Security policy monitoring of BPMN‐based service compositions

Presentazioni e Demo

APT: MIRAI come caso di studio