Andrea Saracino

According to our database1, Andrea Saracino authored at least 46 papers between 2012 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention.
IEEE Trans. Dependable Sec. Comput., 2018

Risk analysis of Android applications: A user-centric solution.
Future Generation Comp. Syst., 2018

Practical Location Validation in Participatory Sensing Through Mobile WiFi Hotspots.
CoRR, 2018

Practical Location Validation in Participatory Sensing Through Mobile WiFi Hotspots.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Privacy Preserving Distributed Attribute Computation for Usage Control in the Internet of Things.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Privacy Preserving Distributed Computation of Private Attributes for Collaborative Privacy Aware Usage Control Systems.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

Walking Through the Deep: Gait Analysis for User Authentication Through Deep Learning.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Phylogenetic Analysis for Ransomware Detection and Classification into Families.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

POSTER: A Framework for Phylogenetic Analysis in Mobile Environment.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Too Long, did not Enforce: A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed Environments.
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018

2017
Stateful Data Usage Control for Android Mobile Devices.
Int. J. Inf. Sec., 2017

Implementing Usage Control in Internet of Things: A Smart Home Use Case.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Smart Parental Advisory: A Usage Control and Deep Learning-Based Framework for Dynamic Parental Control on Smart TV.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

Improving MQTT by Inclusion of Usage Control.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Try Walking in My Shoes, if You Can: Accurate Gait Recognition Through Deep Learning.
Proceedings of the Computer Safety, Reliability, and Security, 2017

A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

Concurrent History-based Usage Control Policies.
Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017

Privacy-preserving text mining as a service.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Introducing Usage Control in MQTT.
Proceedings of the Computer Security, 2017

BRIDEMAID: An Hybrid Tool for Accurate Detection of Android Malware.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Data Usage Control: Introducing a New Framework for Cloud and Mobile Environments.
ERCIM News, 2016

LVS: A WiFi-based system to tackle Location Spoofing in location-based services.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

Modeling Privacy Aware Information Sharing Systems: A Formal and General Approach.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

On Probabilistic Application Compliance.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Enforcement of U-XACML History-Based Usage Control Policy.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

Enhancing Android permission through usage control: a BYOD use-case.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of Android malware.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Data-Sluice: Fine-grained traffic control for Android application.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

Collaborative Attribute Retrieval in Environment with Faulty Attribute Managers.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Detection of repackaged mobile applications through a collaborative approach.
Concurrency and Computation: Practice and Experience, 2015

Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015

Preserving QoI in participatory sensing by tackling location-spoofing through mobile WiFi hotspots.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015

Fast and Effective Clustering of Spam Emails Based on Structural Similarity.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

2014
Stateful Usage Control for Android Mobile Devices.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

Enforcing Mobile Application Security Through Probabilistic Contracts.
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014

Addressing privacy issues in location-based collaborative and distributed environments.
Proceedings of the 2014 International Conference on Collaboration Technologies and Systems, 2014

2013
Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Remote Policy Enforcement for Trusted Application Execution in Mobile Environments.
Proceedings of the Trusted Systems - 5th International Conference, 2013

Classifying Android Malware through Subgraph Mining.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Introducing Probabilities in Contract-Based Approaches for Mobile Application Security.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

A collaborative framework for generating probabilistic contracts.
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013

Towards enforcing on-the-fly policies in BYOD environments.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

Probabilistic Contract Compliance for Mobile Applications.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
MADAM: A Multi-level Anomaly Detector for Android Malware.
Proceedings of the Computer Network Security, 2012

A Multi-criteria-Based Evaluation of Android Applications.
Proceedings of the Trusted Systems, 4th International Conference, 2012


  Loading...