Andrea Saracino

Orcid: 0000-0001-8149-9322

According to our database1, Andrea Saracino authored at least 81 papers between 2012 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Cyber threat intelligence for critical infrastructure security.
Concurr. Comput. Pract. Exp., 2023

The Explainability-Privacy-Utility Trade-Off for Machine Learning-Based Tabular Data Analysis.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Privacy-Preserving Object Recognition with Explainability in Smart Systems.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Graph-Based Android Malware Detection and Categorization through BERT Transformer.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Privacy-Preserving Analysis for Remote Video Anomaly Detection in Real Life Environments.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022

Privacy preserving data sharing and analysis for edge-based architectures.
Int. J. Inf. Sec., 2022

Preserving Privacy in the Globalized Smart Home: The SIFIS-Home Project.
IEEE Secur. Priv., 2022

Exploiting If This Then That and Usage Control obligations for Smart Home security and management.
Concurr. Comput. Pract. Exp., 2022

Demo: Usage Control using Controlled Privacy Aware Face Recognition.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Privacy vs Accuracy Trade-Off in Privacy Aware Face Recognition in Smart Systems.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

2021
Ask a(n)droid to tell you the odds: probabilistic security-by-contract for mobile devices.
Soft Comput., 2021

Using recurrent neural networks for continuous authentication through gait analysis.
Pattern Recognit. Lett., 2021

Cybsersecurity Issues in Robotics.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Towards Collaborative Cyber Threat Intelligence for Security Management.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

2020
RESPOnSE - A Framework for Enforcing Risk-Aware Security Policies in Constrained Dynamic Environments.
Sensors, 2020

D-BRIDEMAID: A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

Session-dependent Usage Control for Big Data.
J. Internet Serv. Inf. Secur., 2020

Digital Waste Disposal: an automated framework for analysis of spam emails.
Int. J. Inf. Sec., 2020

Pushing Forward Security in Network Slicing by Leveraging Continuous Usage Control.
IEEE Commun. Mag., 2020

Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things.
Proceedings of the 19th IEEE International Conference on Trust, 2020

End to End Autorship Email Verification Framework for a Secure Communication.
Proceedings of the Information Systems Security and Privacy - 6th International Conference, 2020

Email Spoofing Attack Detection through an End to End Authorship Attribution System.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Multi-level Distributed Intrusion Detection System for an IoT based Smart Home Environment.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Improving security in industry 4.0 by extending OPC-UA with usage control.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
A scheme for the sticky policy representation supporting secure cyber-threat intelligence analysis and sharing.
Inf. Comput. Secur., 2019

Managing QoS in Smart Buildings Through Software Defined Network and Usage Control.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Obligation Management in Usage Control Systems.
Proceedings of the 27th Euromicro International Conference on Parallel, 2019

Demonstration of secure slicing using ETSI MANO enhanced with Usage Control Capability.
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019

Using IFTTT to Express and Enforce UCON Obligations.
Proceedings of the Information Security Practice and Experience, 2019

Enhancing Security in ETSI Open Source MANO with Usage Control Capability.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Distributed UCON in CoAP and MQTT Protocols.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

A Distributed Usage Control Framework for Industrial Internet of Things.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

2018
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention.
IEEE Trans. Dependable Secur. Comput., 2018

Risk analysis of Android applications: A user-centric solution.
Future Gener. Comput. Syst., 2018

Practical Location Validation in Participatory Sensing Through Mobile WiFi Hotspots.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Privacy Preserving Distributed Attribute Computation for Usage Control in the Internet of Things.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Privacy Preserving Distributed Computation of Private Attributes for Collaborative Privacy Aware Usage Control Systems.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

Walking Through the Deep: Gait Analysis for User Authentication Through Deep Learning.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Phylogenetic Analysis for Ransomware Detection and Classification into Families.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Not so Crisp, Malware! Fuzzy Classification of Android Malware Classes.
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018

Towards General Scheme for Data Sharing Agreements Empowering Privacy-Preserving Data Analysis of Structured CTI.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

Enhancing Usage Control for Performance: An Architecture for Systems of Systems.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

POSTER: A Framework for Phylogenetic Analysis in Mobile Environment.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Too Long, did not Enforce: A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed Environments.
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018

2017
Stateful Data Usage Control for Android Mobile Devices.
Int. J. Inf. Sec., 2017

Implementing Usage Control in Internet of Things: A Smart Home Use Case.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Smart Parental Advisory: A Usage Control and Deep Learning-Based Framework for Dynamic Parental Control on Smart TV.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

Improving MQTT by Inclusion of Usage Control.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Try Walking in My Shoes, if You Can: Accurate Gait Recognition Through Deep Learning.
Proceedings of the Computer Safety, Reliability, and Security, 2017

A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

Concurrent History-based Usage Control Policies.
Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017

Privacy-preserving text mining as a service.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Introducing Usage Control in MQTT.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

BRIDEMAID: An Hybrid Tool for Accurate Detection of Android Malware.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Data Usage Control: Introducing a New Framework for Cloud and Mobile Environments.
ERCIM News, 2016

LVS: A WiFi-based system to tackle Location Spoofing in location-based services.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

Modeling Privacy Aware Information Sharing Systems: A Formal and General Approach.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

On Probabilistic Application Compliance.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Enforcement of U-XACML History-Based Usage Control Policy.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

Enhancing Android permission through usage control: a BYOD use-case.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of Android malware.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Data-Sluice: Fine-grained traffic control for Android application.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

Collaborative Attribute Retrieval in Environment with Faulty Attribute Managers.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Enforcing Application Security on Android Mobile Devices.
PhD thesis, 2015

Detection of repackaged mobile applications through a collaborative approach.
Concurr. Comput. Pract. Exp., 2015

Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015

Preserving QoI in participatory sensing by tackling location-spoofing through mobile WiFi hotspots.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015

Fast and Effective Clustering of Spam Emails Based on Structural Similarity.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

2014
Stateful Usage Control for Android Mobile Devices.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

Enforcing Mobile Application Security Through Probabilistic Contracts.
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014

Addressing privacy issues in location-based collaborative and distributed environments.
Proceedings of the 2014 International Conference on Collaboration Technologies and Systems, 2014

2013
Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Remote Policy Enforcement for Trusted Application Execution in Mobile Environments.
Proceedings of the Trusted Systems - 5th International Conference, 2013

Classifying Android Malware through Subgraph Mining.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Introducing Probabilities in Contract-Based Approaches for Mobile Application Security.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

A collaborative framework for generating probabilistic contracts.
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013

Towards enforcing on-the-fly policies in BYOD environments.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

Probabilistic Contract Compliance for Mobile Applications.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
MADAM: A Multi-level Anomaly Detector for Android Malware.
Proceedings of the Computer Network Security, 2012

A Multi-criteria-Based Evaluation of Android Applications.
Proceedings of the Trusted Systems, 4th International Conference, 2012


  Loading...