Corrado Aaron Visaggio

Orcid: 0000-0002-0558-4450

Affiliations:
  • University of Sannio, Italy


According to our database1, Corrado Aaron Visaggio authored at least 124 papers between 2002 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Automated Identification and Qualitative Characterization of Safety Concerns Reported in UAV Software Platforms.
ACM Trans. Softw. Eng. Methodol., May, 2023

Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks?
CoRR, 2023

2022
Detection and robustness evaluation of android malware classifiers.
J. Comput. Virol. Hacking Tech., 2022

GANG-MAM: GAN based enGine for Modifying Android Malware.
SoftwareX, 2022

Profiling gas consumption in solidity smart contracts.
J. Syst. Softw., 2022

Patchworking: Exploring the code changes induced by vulnerability fixing activities.
Inf. Softw. Technol., 2022

A systematic literature review of IoT time series anomaly detection solutions.
Future Gener. Comput. Syst., 2022

An Exploratory Study on Self-Fixed Software Vulnerabilities in OSS Projects.
Proceedings of the IEEE International Conference on Software Analysis, 2022

An empirical investigation on the trade-off between smart contract readability and gas consumption.
Proceedings of the 30th IEEE/ACM International Conference on Program Comprehension, 2022

We cannot trust in you: a study about the dissonance among anti-malware engines.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Exploiting Natural Language Structures in Software Informal Documentation.
IEEE Trans. Software Eng., 2021

Investigating the criticality of user-reported issues through their relations with app rating.
J. Softw. Evol. Process., 2021

A systematic literature review of blockchain and smart contract development: Techniques, tools, and open challenges.
J. Syst. Softw., 2021

Malware detection employed by visualization and deep neural network.
Comput. Secur., 2021

A Study on Misclassification of Software Vulnerabilities when using Deep Learning and Machine Learning Algorithms.
Proceedings of the Italian Conference on Cybersecurity, 2021

Automatic Classification of Vulnerabilities using Deep Learning and Machine Learning Algorithms.
Proceedings of the International Joint Conference on Neural Networks, 2021

An NLP-based Tool for Software Artifacts Analysis.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2021

iSCREAM: a suite for Smart Contract REAdability assessMent.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2021

It's a Matter of Style: Detecting Social Bots through Writing Style Consistency.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

2020
Demystifying the adoption of behavior-driven development in open source projects.
Inf. Softw. Technol., 2020

GasMet: Profiling Gas Leaks in the Deployment of Solidity Smart Contracts.
CoRR, 2020

Investigating the vulnerability fixing process in OSS projects: Peculiarities and challenges.
Comput. Secur., 2020

About the Robustness and Looseness of Yara Rules.
Proceedings of the Testing Software and Systems, 2020

Repadiography: towards a visual support for triaging repackaged apps.
Proceedings of the Fourth Italian Conference on Cyber Security, 2020

2019
LEILA: Formal Tool for Identifying Mobile Malicious Behaviour.
IEEE Trans. Software Eng., 2019

Summarizing vulnerabilities' descriptions to support experts during vulnerability assessment activities.
J. Syst. Softw., 2019

On the effectiveness of system API-related information for Android ransomware detection.
Comput. Secur., 2019

Adversarial deep learning for energy management in buildings.
Proceedings of the 2019 Summer Simulation Conference, 2019

2018
An exploratory study on the evolution of Android malware quality.
J. Softw. Evol. Process., 2018

Talos: no more ransomware victims with formal methods.
Int. J. Inf. Sec., 2018

R-PackDroid: Practical On-Device Detection of Android Ransomware.
CoRR, 2018

Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

A Nlp-based Solution to Prevent from Privacy Leaks in Social Network Posts.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Clustering for malware classification.
J. Comput. Virol. Hacking Tech., 2017

A comparison of static, dynamic, and hybrid analysis for malware detection.
J. Comput. Virol. Hacking Tech., 2017

SocioBot: a Twitter-based botnet.
Int. J. Secur. Networks, 2017

Classic cryptanalysis using hidden Markov models.
Cryptologia, 2017

Android apps and user feedback: a dataset for software evolution and quality improvement.
Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics, 2017

s2ipt: A Lightweight Network Intrusion Detection/Prevention System based on IPtables.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Mobile Silent and Continuous Authentication using Apps Sequence.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

R-PackDroid: API package-based characterization and detection of mobile ransomware.
Proceedings of the Symposium on Applied Computing, 2017

Ransomware at X-Rays.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

SURF: summarizer of user reviews feedback.
Proceedings of the 39th International Conference on Software Engineering, 2017

"Mirror, Mirror on the Wall, Who is the Fairest One of All?" - Machine Learning versus Model Checking: A Comparison between Two Static Techniques for Malware Family Identification.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Identifying Mobile Repackaged Applications through Formal Methods.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
Support vector machines and malware detection.
J. Comput. Virol. Hacking Tech., 2016

Clustering versus SVM for malware detection.
J. Comput. Virol. Hacking Tech., 2016

A set of features to detect web security threats.
J. Comput. Virol. Hacking Tech., 2016

An HMM and structural entropy based detector for Android malware: An empirical study.
Comput. Secur., 2016

Hey Malware, I Can Find You!
Proceedings of the 25th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2016

What would users change in my app? summarizing app reviews for recommending software changes.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

ARdoc: app reviews development oriented classifier.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Silent and Continuous Authentication in Mobile Environment.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

How I Met Your Mother? - An Empirical Study about Android Malware Phylogenesis.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of Android malware.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Exploring Mobile User Experience Through Code Quality Metrics.
Proceedings of the Product-Focused Software Process Improvement, 2016

Advanced transcriptase for JavaScript malware.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

DECA: development emails content analyzer.
Proceedings of the 38th International Conference on Software Engineering, 2016

Mobile malware detection in the real world.
Proceedings of the 38th International Conference on Software Engineering, 2016

Download malware? no, thanks: how formal methods can block update attacks.
Proceedings of the 4th FME Workshop on Formal Methods in Software Engineering, 2016

Identification of Android Malware Families with Model Checking.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

A Methodology for Silent and Continuous Authentication in Mobile Environment.
Proceedings of the E-Business and Telecommunications - 13th International Joint Conference, 2016

Ransomware Steals Your Phone. Formal Methods Rescue It.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2016

Malware Detection Using Dynamic Birthmarks.
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016

Static Analysis of Malicious Java Applets.
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016

Acquiring and Analyzing App Metrics for Effective Mobile Malware Detection.
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016

Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Detecting Android malware using sequences of system calls.
Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile, 2015

Mobile Malware Detection using Op-code Frequency Histograms.
Proceedings of the SECRYPT 2015, 2015

Evaluating Mobile Malware by Extracting User Experience-Based Features.
Proceedings of the Product-Focused Software Process Improvement, 2015

Development Emails Content Analyzer: Intention Mining in Developer Discussions (T).
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015

How can i improve my app? Classifying user reviews for software maintenance and evolution.
Proceedings of the 2015 IEEE International Conference on Software Maintenance and Evolution, 2015

6th International Workshop on Emerging Trends in Software Metrics (WETSoM 2015).
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Evaluating Op-Code Frequency Histograms in Malware and Third-Party Mobile Applications.
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015

Composition-Malware: Building Android Malware at Run Time.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Static analysis for the detection of metamorphic computer viruses using repeated-instructions counting heuristics.
J. Comput. Virol. Hacking Tech., 2014

Metamorphic Malware Detection Using Code Metrics.
Inf. Secur. J. A Glob. Perspect., 2014

Malicious JavaScript Detection by Features Extraction.
e Informatica Softw. Eng. J., 2014

Enhancing Online Discussion Forums with Topic-Driven Content Search and Assisted Posting.
Proceedings of the Knowledge Discovery, Knowledge Engineering and Knowledge Management, 2014

Enhancing Online Discussion Forums with a Topic-driven Navigational Paradigm - A Plugin for the Moodle Learning Management System.
Proceedings of the KDIR 2014 - Proceedings of the International Conference on Knowledge Discovery and Information Retrieval, Rome, Italy, 21, 2014

Detection of Malicious Web Pages Using System Calls Sequences.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

2013
A Case Study of Automating User Experience-Oriented Performance Testing on Smartphones.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

4th international workshop on emerging trends in software metrics (WETSoM 2013).
Proceedings of the 35th International Conference on Software Engineering, 2013

A Classifier of Malicious Android Applications.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Managing Trust in Social Networks.
Inf. Secur. J. A Glob. Perspect., 2012

2010
Session Management Vulnerabilities in Today's Web.
IEEE Secur. Priv., 2010

A heuristic-based approach for detecting SQL-injection vulnerabilities in web applications.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2010

2009
A System for Managing Security Knowledge using Case Based Reasoning and Misuse Cases.
J. Univers. Comput. Sci., 2009

Managing Security Knowledge through Case based Reasoning.
Proceedings of the Security in Information Systems, 2009

A Test Framework for Assessing Effectiveness of the Data Privacy Policy's Implementation into Relational Databases.
Proceedings of the The Forth International Conference on Availability, 2009

2008
A three-layered model to implement data privacy policies.
Comput. Stand. Interfaces, 2008

Are fit tables really talking?: a series of experiments to understand whether fit tables are useful during evolution tasks.
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008

Evaluation of BPMN Models Quality - A Family of Experiments.
Proceedings of the ENASE 2008, 2008

A System to Prevent Multi-users and Multi-sessions Attack to Breach Privacy Policies in a Trust-End Filter.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Does enforcing anonymity mean decreasing data usefulness?
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008

2007
Evaluating performances of pair designing in industry.
J. Syst. Softw., 2007

Building measure-based prediction models for UML class diagram maintainability.
Empir. Softw. Eng., 2007

A Three Layered Model to Implement Data Privacy Policies.
Proceedings of the Security in Information Systems, 2007

Tuning anonymity level for assuring high data quality: an empirical study.
Proceedings of the First International Symposium on Empirical Software Engineering and Measurement, 2007

2006
Applying a framework for the improvement of software process maturity.
Softw. Pract. Exp., 2006

FMESP: Framework for the modeling and evaluation of software processes.
J. Syst. Archit., 2006

How Distribution Affects the Success of Pair Programming.
Int. J. Softw. Eng. Knowl. Eng., 2006

WECAP: A Web Environment for Project Planning.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006

Productivity of Test Driven Development: A Controlled Experiment with Professionals.
Proceedings of the Product-Focused Software Process Improvement, 2006

Investigando los beneficios de Pair Designing: un estudio empírico con profesionales.
Proceedings of the XI Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2006), 2006

Evaluating advantages of test driven development: a controlled experiment with professionals.
Proceedings of the 2006 International Symposium on Empirical Software Engineering (ISESE 2006), 2006

Performances of Pair Designing on Software Evolution: a controlled experiment.
Proceedings of the 10th European Conference on Software Maintenance and Reengineering (CSMR 2006), 2006

2005
Validazione empirica del pair programming.
PhD thesis, 2005

Pair designing as practice for enforcing and diffusing design knowledge.
J. Softw. Maintenance Res. Pract., 2005

A family of experiments to validate metrics for software process models.
J. Syst. Softw., 2005

Empirical Study on the Productivity of the Pair Programming.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2005

The Impact of Educational Background on Design Knowledge Sharing During Pair Programming: An Empirical Study.
Proceedings of the Professional Knowledge Management, Third Biennial Conference, 2005

Confirming the influence of educational background in pair-design knowledge through experiments.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Empirical validation of pair programming.
Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), 2005

Maintainability of Software Process Models: An Empirical Study.
Proceedings of the 9th European Conference on Software Maintenance and Reengineering (CSMR 2005), 2005

2004
Introducing Quality System in Small and Medium Enterprises: An Experience Report.
Proceedings of the Product Focused Software Process Improvement, 2004

Working in Pairs as a Means for Design Knowledge Building: An Empirical Study.
Proceedings of the 12th International Workshop on Program Comprehension (IWPC 2004), 2004

Towards the Definition of a Maintainability Model for Web Applications.
Proceedings of the 8th European Conference on Software Maintenance and Reengineering (CSMR 2004), 2004

2003
Lessons learned about distributed pair programming: what are the knowledge needs to address?
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003

Full Reuse Maintenance Process for Reducing Software Degradatio.
Proceedings of the 7th European Conference on Software Maintenance and Reengineering (CSMR 2003), 2003

2002
From Knowledge Management Concepts Toward Software Engineering Practices.
Proceedings of the Product Focused Software Process Improvement, 2002

ProMisE: A Framework for Process Models Customization to the Operative Context.
Proceedings of the 2002 International Symposium on Empirical Software Engineering (ISESE 2002), 2002

A Decision Model Supporting Cooperative Work as an Experience Package.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002


  Loading...