Angelo Spognardi

According to our database1, Angelo Spognardi authored at least 59 papers between 2004 and 2020.

Collaborative distances:



In proceedings 
PhD thesis 





Emergent properties, models, and laws of behavioral similarities within groups of twitter users.
Computer Communications, 2020

On the capability of evolved spambots to evade detection via genetic engineering.
Online Social Networks and Media, 2019

Better Safe Than Sorry: An Adversarial Approach to Improve Social Bot Detection.
Proceedings of the 11th ACM Conference on Web Science, 2019

Social Fingerprinting: Detection of Spambot Groups Through DNA-Inspired Behavioral Modeling.
IEEE Trans. Dependable Sec. Comput., 2018

DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation.
Security and Communication Networks, 2018

Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications.
Security and Communication Networks, 2018

From Reaction to Proaction: Unexplored Ways to the Detection of Evolving Spambots.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Predicting Online Review Scores Across Reviewer Categories.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2018, 2018

Mining Implicit Data Association from Tripadvisor Hotel Reviews.
Proceedings of the Workshops of the EDBT/ICDT 2018 Joint Conference (EDBT/ICDT 2018), 2018

A language-based approach to modelling and analysis of Twitter interactions.
J. Log. Algebr. Meth. Program., 2017

A Study on Text-Score Disagreement in Online Reviews.
Cognitive Computation, 2017

The Paradigm-Shift of Social Spambots: Evidence, Theories, and Tools for the Arms Race.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Security Flows in OAuth 2.0 Framework: A Case Study.
Proceedings of the Computer Safety, Reliability, and Security, 2017

Analysis of DDoS-Capable IoT Malwares.
Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, 2017

Exploiting Digital DNA for the Analysis of Similarities in Twitter Behaviours.
Proceedings of the 2017 IEEE International Conference on Data Science and Advanced Analytics, 2017

Security And Privacy Issues in Healthcare Monitoring Systems: A Case Study.
Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2017), 2017

Bioinspired Security Analysis of Wireless Protocols.
MONET, 2016

DNA-Inspired Online Behavioral Modeling and Its Application to Spambot Detection.
IEEE Intelligent Systems, 2016

Social Fingerprinting - or the Truth About You.
ERCIM News, 2016

SafeDroid: A Distributed Malware Detection Service for Android.
Proceedings of the 9th IEEE International Conference on Service-Oriented Computing and Applications, 2016

Mind the tracker you wear: a security analysis of wearable health trackers.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Evaluation of Professional Cloud Password Management Tools.
Proceedings of the Current Trends in Web Engineering, 2016

A Matter of Words: NLP for Quality Evaluation of Wikipedia Medical Articles.
Proceedings of the Web Engineering - 16th International Conference, 2016

Experimental Measures of News Personalization in Google News.
Proceedings of the Current Trends in Web Engineering, 2016

Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers.
IJSN, 2015

Fame for sale: Efficient detection of fake Twitter followers.
Decision Support Systems, 2015

Domain-specific queries and Web search personalization: some investigations.
Proceedings of the Proceedings 11th International Workshop on Automated Specification and Verification of Web Systems, 2015

TRAP: Using Targeted ads to unveil Google personal profiles.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

VISIO: A Visual Approach for Singularity Detection in Recommendation Systems.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Twitlang(er): Interactions Modeling Language (and Interpreter) for Twitter.
Proceedings of the Software Engineering and Formal Methods - 13th International Conference, 2015

Visual detection of singularities in review platforms.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Clone wars: Distributed detection of clone attacks in mobile WSNs.
J. Comput. Syst. Sci., 2014

Discriminating Between the Wheat and the Chaff in Online Recommendation Systems.
ERCIM News, 2014

A Lot of Slots - Outliers Confinement in Review-Based Systems.
Proceedings of the Web Information Systems Engineering - WISE 2014, 2014

Improved Automatic Maturity Assessment of Wikipedia Medical Articles - (Short Paper).
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Conferences, 2014

A Criticism to Society (As Seen by Twitter Analytics).
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014

No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

Maturity Assessment of Wikipedia Medical Articles.
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014

Cryptofraglets Reloaded - Bioinspired Security Modeling of a RFID Protocol and Properties.
Proceedings of the 8th International Conference on Bio-inspired Information and Communications Technologies, 2014

DDoS Detection with Information Theory Metrics and Netflows - A Real Case.
Proceedings of the SECRYPT 2012, 2012

Large-Scale Traffic Anomaly Detection: Analysis of Real Netflow Datasets.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2012

Wireless Sensor Replica Detection in Mobile Environments.
Proceedings of the Distributed Computing and Networking - 13th International Conference, 2012

Relieve Internet Routing Security of Public Key Infrastructure.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

Intrusion-resilient integrity in data-centric unattended WSNs.
Pervasive and Mobile Computing, 2011

"Who Counterfeited My Viagra?" Probabilistic Item Removal Detection via RFID Tag Cooperation.
EURASIP J. Wireless Comm. and Networking, 2011

MhRep: Multi-hop Replication Scheme for Data Survival in Unattended Wireless Sensor Networks.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops, 2011

Replication Schemes in Unattended Wireless Sensor Networks.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

eRIPP-FS: Enforcing privacy and security in RFID.
Security and Communication Networks, 2010

Data Security in Unattended Wireless Sensor Networks.
IEEE Trans. Computers, 2009

Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks.
Ad Hoc Networks, 2009

Collaborative authentication in unattended WSNs.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary.
IACR Cryptology ePrint Archive, 2008

Catch Me (If You Can): Data Survival in Unattended Sensor Networks.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

RoK: A robust key pre-distribution protocol for multi-phase wireless sensor networks.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

A formal framework for the performance analysis of P2P networks protocols.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

A methodology for P2P file-sharing traffic detection.
Proceedings of the Second International Workshop on Hot Topics in Peer-to-Peer Systems, 2005

BaRT, balanced randomized tree: a scalable and distributed protocol for lookup in peer-to-peer networks.
Proceedings of the International Workshop on Hot Topics in Peer-to-Peer Systems, 2004