IIT Home Page CNR Home Page

CyberSecurity

Persone

Angelica Marotta

Foto di Angelica Marotta

Progetti

ARTEMIS Sesamo: Security and Safety Modelling

The SESAMO project addresses the root causes of problems arising with convergence of safety and security in embedded systems at architectural level, where subtle and poorly understood interactions

EU Project - Confidential and Compliant Clouds (Coco Cloud)

EU project - Network of Excellence on Engineering Secure Future Internet Software (NESSoS)

The Network of Excellence on Engineering Secure Future Internet Software Services and Systems (NESSoS) aims at constituting and integrating a long lasting research community on engineering secure s

EU Project - Open Computing Infrastructures for Elastic Services (CONTRAIL)

FP7 CAMINO: Comprehensive Approach to cyber roadMap coordINation and develOpment

L'obiettivo principale del progetto è quello di fornire 

MIUR-PRIN TENACE: Protecting National Critical Infrastructures from Cyber Threats (PRIN-20103P34XC)

The TENACE project will investigate the protection of national critical infrastructures from cyber threats following a collaborative approach whenever appropriate.

MobiCare

The objective of this project is to deliver an innovative technology that enables an efficient, fast and seamless exchange of clinical data among mobile devices, ensuring at the same time that the

PRIN Security Horizons

Il nostro progetto tende a sviluppare una metodologia rigorosa e un framework linguistico per fornire metodi formali a sostegno di chi progetta, implementa e mantiene sistemi software sicuri,

Progetto Premiale e-SHS ICT for Social Health and Solidarity

The realization of a Smart City is a very complex and a long-term process: it is necessary a fundamental understanding of the local reality, the needs of the community and of the single persons, of

Regional project Modelli e Metodi per Filtraggio di Revisioni Online (MyChoice)

Lo sviluppo di nuove tecnologie e infrastrutture telematiche rende disponibile online una gran quantità di prodotti e servizi.

Secure!

Secure!

Pubblicazioni e prodotti editoriali dal 01/01/2016

A Logical Key Hierarchy Based approach to preserve content privacy in Decentralized Online Social Networks

Big Data & Social Media Intelligence

How long does it take before a new Internet node is contacted for the very first time?

Improving MQTT by Inclusion of Usage Control

Introducing Usage Control in MQTT

Leveraging ROP to redirect the execution flow of flawed binaries

Libro Bianco:Il Futuro della Cybersecurity in Italia: Ambiti Progettuali Strategici Progetti e Azioni per difendere al meglio il Paese dagli attacchi informatici

Security policy monitoring of BPMN‐based service compositions

Presentazioni e Demo

APT: MIRAI come caso di studio