Andrea S. Atzeni

Orcid: 0000-0002-9095-8241

According to our database1, Andrea S. Atzeni authored at least 22 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A novel architecture to virtualise a hardware-bound trusted platform module.
Future Gener. Comput. Syst., January, 2024

2021
Toward a Complete Software Stack to Integrate Quantum Key Distribution in a Cloud Environment.
IEEE Access, 2021

2018
Countering Android Malware: A Scalable Semi-Supervised Approach for Family-Signature Generation.
IEEE Access, 2018

2017
HAIT: Heap Analyzer with Input Tracing.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Towards Stronger Data Security in an eID Management Infrastructure.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

The FICEP Infrastructure - How We Deployed the Italian eIDAS Node in the Cloud.
Proceedings of the E-Democracy - Privacy-Preserving, Secure, Intelligent E-Government Services, 2017

2015
Android Apps Risk Evaluation: a methodology.
EAI Endorsed Trans. Ubiquitous Environ., 2015

2014
How dangerous is your Android app?: an evaluation methodology.
Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, 2014

Lightweight Formal Verification in Real World, A Case Study.
Proceedings of the Advanced Information Systems Engineering Workshops, 2014

Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework.
Proceedings of the BCS-HCI 2014 Proceedings of the 28th International BCS Human Computer Interaction Conference, 2014

2013
Continuous Integration for Web-Based Software Infrastructures: Lessons Learned on the webinos Project.
Proceedings of the Hardware and Software: Verification and Testing, 2013

2012
Model-driven architectural risk analysis using architectural and contextualised attack patterns.
Proceedings of the Model-Driven Security Workshop, 2012

Requirements Sensemaking Using Concept Maps.
Proceedings of the Human-Centered Software Engineering - 4th International Conference, 2012

Personal PKI for the Smart Device Era.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012

2011
Here's Johnny: A Methodology for Developing Attacker Personas.
Proceedings of the Sixth International Conference on Availability, 2011

2008
Generation of Diagnostic Plans for Large ICT Systems.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Learning to Enhance Dependability of Information Systems.
Proceedings of the Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008

The risks with security metrics.
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008

2007
An Estimation of Attack Surface to Evaluate Network (in)security.
Proceedings of the ICEIS 2007, 2007

AMBRA: automated model-based risk analysis.
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007

2006
Why to adopt a security metric? A brief survey.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

2005
The Wireless Opaque Channel to Contrast Information Leakage.
Proceedings of the 2005 International Conference on a World of Wireless, 2005


  Loading...