Antonella Santone

Orcid: 0000-0002-2634-4456

According to our database1, Antonella Santone authored at least 234 papers between 1995 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Alzheimer's Disease Evaluation Through Visual Explainability by Means of Convolutional Neural Networks.
Int. J. Neural Syst., February, 2024

Cybersecurity-Related Tweet Classification by Explainable Deep Learning.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

Spiral Drawing Test and Explainable Convolutional Neural Networks for Parkinson's Disease Detection.
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024

Detecting Retinal Fundus Image Synthesis by Means of Generative Adversarial Network.
Proceedings of the 17th International Joint Conference on Biomedical Engineering Systems and Technologies, 2024

2023
Explainable Convolutional Neural Networks for Brain Cancer Detection and Localisation.
Sensors, September, 2023

Diabetic retinopathy detection and diagnosis by means of robust and explainable convolutional neural networks.
Neural Comput. Appl., August, 2023

Interpretable laryngeal tumor grading of histopathological images via depth domain adaptive network with integration gradient CAM and priori experience-guided attention.
Comput. Biol. Medicine, March, 2023

A ViT-AMC Network With Adaptive Model Fusion and Multiobjective Optimization for Interpretable Laryngeal Tumor Grading From Histopathological Images.
IEEE Trans. Medical Imaging, 2023

A Novel Classification Technique based on Formal Methods.
ACM Trans. Knowl. Discov. Data, 2023

Water Meter Reading for Smart Grid Monitoring.
Sensors, 2023

TriAD: A Deep Ensemble Network for Alzheimer Classification and Localization.
IEEE Access, 2023

A Method for Robust and Explainable Image-Based Network Traffic Classification with Deep Learning.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Feasibility of Tree-Based Machine Learning Models to Discriminate Safe and Unsafe Posture During Weight Lifting.
Proceedings of the IEEE International Conference on Metrology for eXtended Reality, 2023

A Machine Learning approach to classify ventilatory efficiency.
Proceedings of the IEEE International Conference on Metrology for eXtended Reality, 2023

Explainable Deep Learning for Brain Cancer Detection and Localisation.
Proceedings of the IEEE International Conference on Metrology for eXtended Reality, 2023

Object Detection and Localisation in Thermal Images by means of UAV/Drone.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023

Damage Detection and Localisation using UAV/ Drone with Object Detection.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023

Explainable Deep Learning for Face Mask Detection.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023

Exploring Quantum Machine Learning for Explainable Malware Detection.
Proceedings of the International Joint Conference on Neural Networks, 2023

Benchmarking YOLO Models for Automatic Reading in Smart Metering Systems: A Performance Comparison Analysis.
Proceedings of the International Conference on Machine Learning and Applications, 2023

An Explainable Convolutional Neural Network for Dynamic Android Malware Detection.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

StegWare: A Novel Malware Model Exploiting Payload Steganography and Dynamic Compilation.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

A Fuzzy Deep Learning Network for Dynamic Mobile Malware Detection.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2023

Image-Based Malware Detection Through a Deep Neuro-Fuzzy Model.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2023

Evaluating Fuzzy Machine Learning for Smart Grid Instability Detection.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2023

A Driver Detection Method by Means of Explainable Deep Learning.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Computational cost of CT Radiomics workflow: a case study on COVID-19.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Data Poisoning Attacks over Diabetic Retinopathy Images Classification.
Proceedings of the IEEE International Conference on Big Data, 2023

A Proposal for Trustworthy Artificial Intelligence.
Proceedings of the IEEE International Conference on Big Data, 2023

Explainable Deep Learning for Smart Grid Stability Detection.
Proceedings of the IEEE International Conference on Big Data, 2023

Obfuscated Mobile Malware Detection by Means of Dynamic Analysis and Explainable Deep Learning.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
2Faces: a new model of malware based on dynamic compiling and reflection.
J. Comput. Virol. Hacking Tech., 2022

Formal Equivalence Checking for Mobile Malware Detection and Family Classification.
IEEE Trans. Software Eng., 2022

Driver Identification Through Formal Methods.
IEEE Trans. Intell. Transp. Syst., 2022

FABNet: Fusion Attention Block and Transfer Learning for Laryngeal Cancer Tumor Grading in P63 IHC Histopathology Images.
IEEE J. Biomed. Health Informatics, 2022

Machine Learning on Soccer Player Positions.
Int. J. Decis. Support Syst. Technol., 2022

Explainability of radiomics through formal methods.
Comput. Methods Programs Biomed., 2022

A novel methodology for head and neck carcinoma treatment stage detection by means of model checking.
Artif. Intell. Medicine, 2022

Assessing Deep Learning Predictions in Image-Based Malware Detection with Activation Maps.
Proceedings of the Security and Trust Management - 18th International Workshop, 2022

A Real-time Method for CAN Bus Intrusion Detection by Means of Supervised Machine Learning.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

A Method for Road Accident Prevention in Smart Cities based on Deep Reinforcement Learning.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Timed Automata Networks for SCADA Attacks Real-Time Mitigation.
Proceedings of the Intelligent Decision Technologies, 2022

A Method for Intrusion Detection in Smart Grid.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

Drone Audio recognition based on Machine Learning Techniques.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

High Grade Brain Cancer Segmentation by means of Deep Learning.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

A Model Checking-based Approach to Malicious Family Detection in iOS Environment.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

On the Resilience of Shallow Machine Learning Classification in Image-based Malware Detection.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

Explainable Retinopathy Diagnosis and Localisation by means of Class Activation Mapping.
Proceedings of the International Joint Conference on Neural Networks, 2022

Continuous and Silent User Authentication Through Mouse Dynamics and Explainable Deep Learning.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

COVID-19 Detection from Cough Recording by means of Explainable Deep Learning.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

On the Influence of Image Settings in Deep Learning-based Malware Detection.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Designing Robust Deep Learning Classifiers for Image-based Malware Analysis.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Explainable Deep Learning Methodologies for Biomedical Images Classification.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Automatic Gleason Score Diagnosis with Fuzzy Classification and Radiomic Features.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2022

Emotion Recognition from Facial Expression using Explainable Deep Learning.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

Vulnerable Smart Contract Detection by Means of Model Checking.
Proceedings of the BSCI 2022: Proceedings of the 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2022

Blood Cells Counting and Localisation through Deep Learning Object Detection.
Proceedings of the IEEE International Conference on Big Data, 2022

Smart Grid monitoring through Deep Learning for Image-based Automatic Dial Meter Reading.
Proceedings of the IEEE International Conference on Big Data, 2022

Continuous and Silent User Authentication Through Mouse Dynamics and Explainable Deep Learning: A Proposal.
Proceedings of the IEEE International Conference on Big Data, 2022

Machine Learning for Uterine Cervix Screening.
Proceedings of the 22nd IEEE International Conference on Bioinformatics and Bioengineering, 2022

Deep Learning for Heartbeat Phonocardiogram Signals Explainable Classification.
Proceedings of the 22nd IEEE International Conference on Bioinformatics and Bioengineering, 2022

Explainable Deep Learning for Alzheimer Disease Classification and Localisation.
AII, 2022

Introducing Quantum Computing in Mobile Malware Detection.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Audio signal processing for Android malware detection and family identification.
J. Comput. Virol. Hacking Tech., 2021

CAN-Bus Attack Detection With Deep Learning.
IEEE Trans. Intell. Transp. Syst., 2021

Dynamic Mobile Malware Detection through System Call-based Image representation.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Transfer learning for mobile real-time face mask detection and localization.
J. Am. Medical Informatics Assoc., 2021

Towards an interpretable deep learning model for mobile malware detection and family identification.
Comput. Secur., 2021

Mobile Family Detection through Audio Signals Classification.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Automated Intention Mining with Comparatively Fine-tuning BERT.
Proceedings of the NLPIR 2021: 5th International Conference on Natural Language Processing and Information Retrieval, Sanya, China, December 17, 2021

Detecting Call Indirection Obfuscation through Equivalence Checking in Android environment.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

Exploiting Supervised Machine Learning for Driver Detection in a Real-World Environment.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

A Method for Automatic Penetration Testing and Mitigation: A <i>Red Hat</i> Approach.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

Android Collusion Detection by means of Audio Signal Analysis with Machine Learning techniques.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

Vulnerability Evaluation of Android Malware Detectors against Adversarial Examples.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

Perturbation of Image-based Malware Detection with Smali level morphing techniques.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

A Proposal to Ensure Social Distancing with Deep Learning-based Object Detection.
Proceedings of the International Joint Conference on Neural Networks, 2021

A Semi-Automated Explainability-Driven Approach for Malware Analysis through Deep Learning.
Proceedings of the International Joint Conference on Neural Networks, 2021

Thermal Ablation Treatment Detection by means of Machine Learning.
Proceedings of the International Joint Conference on Neural Networks, 2021

Colluding Covert Channel for Malicious Information Exfiltration in Android Environment.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

A Methodology based on Formal Methods for Thermal Ablation Area Detection.
Proceedings of the 14th International Joint Conference on Biomedical Engineering Systems and Technologies, 2021

SteælErgon: A Framework for Injecting Colluding Malicious Payload in Android Applications.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Editorial.
J. Comput. Virol. Hacking Tech., 2020

Deep learning for image-based mobile malware detection.
J. Comput. Virol. Hacking Tech., 2020

Model checking and machine learning techniques for <i>HummingBad</i> mobile malware detection and mitigation.
Simul. Model. Pract. Theory, 2020

Radiomics for Gleason Score Detection through Deep Learning.
Sensors, 2020

DECAB-LSTM: Deep Contextualized Attentional Bidirectional LSTM for cancer hallmark classification.
Knowl. Based Syst., 2020

Visualizing the outcome of dynamic analysis of Android malware with VizMal.
J. Inf. Secur. Appl., 2020

Anomaly detection in substation networks.
J. Inf. Secur. Appl., 2020

Android Collusion: Detecting Malicious Applications Inter-Communication through SharedPreferences.
Inf., 2020

BPM perspectives to support ICSs: Exploiting the integration of formal verifications into investment service provision processes.
Ind. Manag. Data Syst., 2020

Timed Automata for Mobile Ransomware Detection.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2020

Model checking for malicious family detection and phylogenetic analysis in mobile environment.
Comput. Secur., 2020

Explainable Deep Learning for Pulmonary Disease and Coronavirus COVID-19 Detection from X-rays.
Comput. Methods Programs Biomed., 2020

An ensemble learning approach for brain cancer detection exploiting radiomic features.
Comput. Methods Programs Biomed., 2020

Human behavior characterization for driving style recognition in vehicle system.
Comput. Electr. Eng., 2020

Extended pointers for memory protection in single address space systems.
Comput. Electr. Eng., 2020

Machine Learning for Driver Detection through CAN bus.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

Machine learning for coronavirus covid-19 detection from chest x-rays.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020

Deep learning for heart disease detection through cardiac sounds.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020

Evaluating Deep Learning Classification Reliability in Android Malware Family Detection.
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020

Image-based Malware Family Detection: An Assessment between Feature Extraction and Classification Techniques.
Proceedings of the 5th International Conference on Internet of Things, 2020

Hourly Global Solar Radiation Reconstruction Applying Machine Learning.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Enhanced Privacy and Data Protection using Natural Language Processing and Artificial Intelligence.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Malicious Collusion Detection in Mobile Environment by means of Model Checking.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Lung Cancer Detection and Characterisation through Genomic and Radiomic Biomarkers.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Identify Potential Attacks from Simulated Log Analysis.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Bank Credit Risk Management based on Data Mining Techniques.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Android Run-time Permission Exploitation User Awareness by Means of Formal Methods.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Accidental Sensitive Data Leaks Prevention via Formal Verification.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Predicting Probability of Default Under IFRS 9 Through Data Mining Techniques.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

Code Reordering Obfuscation Technique Detection by Means of Weak Bisimulation.
Proceedings of the Advanced Information Networking and Applications, 2020

Colluding Android Apps Detection via Model Checking.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

Towards the Use of Generative Adversarial Neural Networks to Attack Online Resources.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

VisualDroid: automatic triage and detection of Android repackaged applications.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
LEILA: Formal Tool for Identifying Mobile Malicious Behaviour.
IEEE Trans. Software Eng., 2019

A "pay-how-you-drive" car insurance approach through cluster analysis.
Soft Comput., 2019

Model Checking Techniques Applied to Satellite Operational Mode Management.
IEEE Syst. J., 2019

Protected pointers to specify access privileges in distributed systems.
J. Parallel Distributed Comput., 2019

Model Checking Based Approach for Compliance Checking.
Inf. Technol. Control., 2019

Prostate Gleason Score Detection and Cancer Treatment Through Real-Time Formal Verification.
IEEE Access, 2019

Real-Time SCADA Attack Detection by Means of Formal Methods.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

Formal Verification of Radio Communication Management in Railway Systems Using Model Checking Technique.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

Wearable Devices for Human Activity Recognition and User Detection.
Proceedings of the 27th Euromicro International Conference on Parallel, 2019

Energy Consumption Metrics for Mobile Device Dynamic Malware Detection.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

Model Checking for Data Anomaly Detection.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

<i>Dunuen</i>: A User-Friendly Formal Verification Tool.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

Formal Modeling for Magnetic Resonance Images Tamper Mitigation.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

Radiomic Features for Medical Images Tamper Detection by Equivalence Checking.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

A Blockchain Based Proposal for Protecting Healthcare Systems through Formal Methods.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

Exploiting Model Checking for Mobile Botnet Detection.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

Formal Methods for Android Banking Malware Analysis and Detection.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

Social Network Polluting Contents Detection through Deep Learning Techniques.
Proceedings of the International Joint Conference on Neural Networks, 2019

Cascade Learning for Mobile Malware Families Detection through Quality and Android Metrics.
Proceedings of the International Joint Conference on Neural Networks, 2019

Neural Networks for Lung Cancer Detection through Radiomic Features.
Proceedings of the International Joint Conference on Neural Networks, 2019

Machine Learning to Identify Gender via Hair Elements.
Proceedings of the International Joint Conference on Neural Networks, 2019

Model Checking to Detect the Hummingbad Malware.
Proceedings of the Intelligent Distributed Computing XIII, 2019

Spyware Detection using Temporal Logic.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Can Machine Learning Predict Soccer Match Results?
Proceedings of the 11th International Conference on Agents and Artificial Intelligence, 2019

Investigating Mobile Applications Quality in Official and Third-party Marketplaces.
Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering, 2019

A Data Life Cycle Modeling Proposal by Means of Formal Methods.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

User Authentication through Keystroke Dynamics by means of Model Checking: A Proposal.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

A Model Checking based Proposal for Mobile Colluding Attack Detection.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

A Methodology for Real-Time Data Verification exploiting Deep Learning and Model Checking.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Special issue on formal methods for security engineering.
J. Comput. Virol. Hacking Tech., 2018

Evaluating model checking for cyber threats code obfuscation identification.
J. Parallel Distributed Comput., 2018

Talos: no more ransomware victims with formal methods.
Int. J. Inf. Sec., 2018

Safety Critical Systems Formal Verification Using Execution Traces.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018

Real-Time Driver Behaviour Characterization Through Rule-Based Machine Learning.
Proceedings of the Computer Safety, Reliability, and Security, 2018

Context-Awareness Mobile Devices for Traffic Incident Prevention.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018

Data Leakage in Java Applets with Exception Mechanism.
Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to, 2018

Cluster Analysis for Driver Aggressiveness Identification.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Who's Driving My Car? A Machine Learning based Approach to Driver Identification.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Measuring Mobile Applications Quality and Security in Higher Education.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

A Formal Methodology for Notational Analysis and Real-Time Decision Support in Sport Environment.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Formal Methods Meet Mobile Code Obfuscation Identification of Code Reordering Technique.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

Diabetes Mellitus Affected Patients Classification and Diagnosis through Machine Learning Techniques.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017

Model Checking for Mobile Android Malware Evolution.
Proceedings of the 5th IEEE/ACM International FME Workshop on Formal Methods in Software Engineering, 2017

Identifying Mobile Repackaged Applications through Formal Methods.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Car hacking identification through fuzzy logic algorithms.
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017

How Discover a Malware using Model Checking.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Malware and Formal Methods: Rigorous Approaches for detecting Malicious Behaviour.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Heuristic search for equivalence checking.
Softw. Syst. Model., 2016

Model Checking to Support Action Controls in the Purchasing Process.
Proceedings of the 25th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2016

Hey Malware, I Can Find You!
Proceedings of the 25th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2016

Conformance Checking using Formal Methods.
Proceedings of the 11th International Joint Conference on Software Technologies (ICSOFT 2016) - Volume 1: ICSOFT-EA, Lisbon, Portugal, July 24, 2016

Download malware? no, thanks: how formal methods can block update attacks.
Proceedings of the 4th FME Workshop on Formal Methods in Software Engineering, 2016

Identification of Android Malware Families with Model Checking.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Ransomware Steals Your Phone. Formal Methods Rescue It.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2016

Ransomware Inside Out.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Analysing Wiki Quality Using Probabilistic Model Checking.
Proceedings of the 24th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2015

Equivalence-Based Selection of Best-Fit Models to Support Wiki Design.
Proceedings of the 24th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2015

Integrating Model Driven and Model Checking to Mine Design Patterns.
Proceedings of the Software Technologies - 10th International Joint Conference, 2015

Model Checking to Improve Precision of Design Pattern Instances Identification in OO Systems.
Proceedings of the ICSOFT-PT 2015, 2015

Infer Gene Regulatory Networks from Time Series Data with Probabilistic Model Checking.
Proceedings of the 3rd IEEE/ACM FME Workshop on Formal Methods in Software Engineering, 2015

k-Bisimulation: A Bisimulation for Measuring the Dissimilarity Between Processes.
Proceedings of the Formal Aspects of Component Software - 12th International Conference, 2015

Improving Design Patterns Finder Precision Using a Model Checking Approach.
Proceedings of the CAiSE 2015 Forum at the 27th International Conference on Advanced Information Systems Engineering co-located with 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015), 2015

2014
GreASE: A Tool for Efficient "Nonequivalence" Checking.
ACM Trans. Softw. Eng. Methodol., 2014

CD-Form: A clone detector based on formal methods.
Sci. Comput. Program., 2014

Model Checking Properties on Reduced Trace Systems.
Algorithms, 2014

A Novel Methodology Based on Formal Methods for Analysis and Verification of Wikis.
Proceedings of the 2014 IEEE 23rd International WETICE Conference, 2014

An Eclipse-Based Editor to Support LOTOS Newcomers.
Proceedings of the 2014 IEEE 23rd International WETICE Conference, 2014

Powerful Equivalence Checking in the Bank Supply Process.
Proceedings of the 2014 IEEE World Congress on Services, 2014

2013
Incremental construction of systems: An efficient characterization of the lacking sub-system.
Sci. Comput. Program., 2013

Application of Equivalence Checking in a Loan Origination Process in Banking Industry.
Proceedings of the 2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2013

Efficient Formal Verification in Banking Processes.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Partial Order Interpretation of a Mu-Calculus-Like Temporal Logic.
Proceedings of the ICSOFT 2013, 2013

Infer gene regulatory networks from time series data with formal methods.
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013

2012
Abstract reduction in directed model checking CCS processes.
Acta Informatica, 2012

A novel approach based on formal methods for clone detection.
Proceedings of the Proceeding of the 6th International Workshop on Software Clones, 2012

Modelling and Analysing Social Networks through Formal Methods and Heuristic Searches.
Proceedings of the ICSOFT 2012 - Proceedings of the 7th International Conference on Software Paradigm Trends, Rome, Italy, 24, 2012

2011
Clone detection through process algebras and Java bytecode.
Proceedings of the Proceeding of the 5th ICSE International Workshop on Software Clones, 2011

Ant Colony Optimization for Deadlock Detection in Concurrent Systems.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

2009
A Formula Driven Incremental Construction of Web Service Compositions.
Proceedings of the ICSOFT 2009, 2009

Applying Formal Methods to Process Innovation.
Proceedings of the Advances in Software Engineering, 2009

Abstracting Models from Execution Traces for Performing Formal Verification.
Proceedings of the Advances in Software Engineering, 2009

2008
Modular formal verification of specifications of concurrent systems.
Softw. Test. Verification Reliab., 2008

2007
A user-friendly interface to specify temporal properties of concurrent systems.
Inf. Sci., 2007

Discovery of SOA patterns via model checking.
Proceedings of the 2nd International Workshop on Service Oriented Software Engineering: in conjunction with the 6th ESEC/FSE joint meeting, 2007

2006
DELFIN<sup>+</sup>: An efficient deadlock detection tool for CCS processes.
J. Comput. Syst. Sci., 2006

Formal Verification of Concurrent Systems via Directed Model Checking.
Proceedings of the 6th International Workshop on Automated Verification of Critical Systems, 2006

2005
Compositionality and locality for improving model checking in the selective mu-calculus.
Sci. Comput. Program., 2005

A local approach for temporal model checking of Java bytecode.
J. Comput. Syst. Sci., 2005

Using heuristic search for finding deadlocks in concurrent systems.
Inf. Comput., 2005

Reduced Models for Efficient CCS Verification.
Formal Methods Syst. Des., 2005

2004
Formula-based abstractions and symbolic execution for model checking programs.
Microprocess. Microsystems, 2004

Model Checking Multithreaded Programs by Means of Reduced Models.
Proceedings of the Fourth Workshop on Language Descriptions, Tools, and Applications, 2004

2003
Heuristic Search + Local Model Checking in Selective mu-Calculus.
IEEE Trans. Software Eng., 2003

Modifying LOTOS Specifications by Means of Automatable Formula-Based Integrations.
J. Autom. Reason., 2003

Abstract Interpretation and Model Checking for Checking Secure Information Flow in Concurrent Systems.
Fundam. Informaticae, 2003

2002
Efficient model checking of properties of a distributed application: a multimedia case study.
Softw. Test. Verification Reliab., 2002

Syntactic reductions for efficient deadlock analysis.
Softw. Test. Verification Reliab., 2002

A tool supporting efficient model checking of concurrent specifications.
Microprocess. Microsystems, 2002

A Formula-Driven Modular Attack on State Explosion.
Int. J. Found. Comput. Sci., 2002

A Notion of Non-Interference for Timed Automata.
Fundam. Informaticae, 2002

Automatic verification of concurrent systems using a formula-based compositional approach.
Acta Informatica, 2002

Local model checking of Java bytecode.
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002

A Tableau-Based Procedure for Model Checking Programs.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

2001
Reusing LOTOS specifications.
Microprocess. Microsystems, 2001

Efficient Verification of a Multicast Protocol for Mobile Computing.
Comput. J., 2001

2000
Logic Based Abstractions of Real-Time Systems.
Formal Methods Syst. Des., 2000

Compositionality for Improving Model Checking.
Proceedings of the Formal Techniques for Distributed System Development, 2000

1999
LORETO: A Tool for Reducing State Explosion in Verification of LOTOS Programs.
Softw. Pract. Exp., 1999

Selective Mu-Calculus and Formula-Based Equivalence of Transition Systems.
J. Comput. Syst. Sci., 1999

Abstract Interpretation of Trace Semantics for Concurrent Calculi.
Inf. Process. Lett., 1999

Formula Based Abstractions of Transition Systems for Real-Time Model Checking.
Proceedings of the FM'99 - Formal Methods, 1999

1998
State Space Reduction by Non-Standard Semantics for Deadlock Analysis.
Sci. Comput. Program., 1998

Towards a Logical Semantics for Pure Prolog.
Sci. Comput. Program., 1998

A Transformation System for Concurrent Processes.
Acta Informatica, 1998

1997
Algebraic Computational Models of OR-Parallel Execution of Prolog.
Acta Informatica, 1997

Selective µ-calculus: New Modal Operators for Proving Properties on Reduced Transition Systems.
Proceedings of the Formal Description Techniques and Protocol Specification, 1997

1996
Unfold/Fold Transformations of Concurrent Processes.
Proceedings of the Programming Languages: Implementations, 1996

A Non-Standard Semantics for Generating Reduced Transition Systems.
Proceedings of the Analysis and Verification of Multiple-Agent Languages, 1996

1995
Modeling OR-Parallel Execution of Prolog using CHOCS.
Proceedings of the Logic Programming, 1995


  Loading...