Daniele Sgandurra

According to our database1, Daniele Sgandurra
  • authored at least 48 papers between 2007 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Risk analysis of Android applications: A user-centric solution.
Future Generation Comp. Syst., 2018

2017
Efficient Attack Graph Analysis through Approximate Inference.
ACM Trans. Priv. Secur., 2017

VSMURF: A Novel Sliding Window Cleaning Algorithm for RFID Networks.
J. Sensors, 2017

Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

2016
Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems.
ACM Comput. Surv., 2016

Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection.
CoRR, 2016

Efficient Attack Graph Analysis through Approximate Inference.
CoRR, 2016

Formalizing Threat Models for Virtualized Systems.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

2015
AntiCheetah: Trustworthy computing in an outsourced (cheating) environment.
Future Generation Comp. Syst., 2015

Exact Inference Techniques for the Dynamic Analysis of Attack Graphs.
CoRR, 2015

Detection of repackaged mobile applications through a collaborative approach.
Concurrency and Computation: Practice and Experience, 2015

Design and Development of a Facebook Application to Raise Privacy Awareness.
Proceedings of the 23rd Euromicro International Conference on Parallel, 2015

Sharing Data through Confidential Clouds: An Architectural Perspective.
Proceedings of the 1st IEEE/ACM International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, 2015

2014
Automating the assessment of ICT risk.
J. Inf. Sec. Appl., 2014

A Scenario Method to Automatically Assess ICT Risk.
Proceedings of the 22nd Euromicro International Conference on Parallel, 2014

Enforcing Mobile Application Security Through Probabilistic Contracts.
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014

Addressing privacy issues in location-based collaborative and distributed environments.
Proceedings of the 2014 International Conference on Collaboration Technologies and Systems, 2014

2013
A Survey on Security for Mobile Devices.
IEEE Communications Surveys and Tutorials, 2013

AntiCheetah: An Autonomic Multi-round Approach for Reliable Computing.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Remote Policy Enforcement for Trusted Application Execution in Mobile Environments.
Proceedings of the Trusted Systems - 5th International Conference, 2013

CheR: Cheating Resilience in the Cloud via Smart Resource Allocation.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Classifying Android Malware through Subgraph Mining.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Introducing Probabilities in Contract-Based Approaches for Mobile Application Security.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

A collaborative framework for generating probabilistic contracts.
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013

Are photos on Social Networks really private?
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013

Towards enforcing on-the-fly policies in BYOD environments.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

How to grant less permissions to facebook applications.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

Probabilistic Contract Compliance for Mobile Applications.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
MADAM: A Multi-level Anomaly Detector for Android Malware.
Proceedings of the Computer Network Security, 2012

A Multi-criteria-Based Evaluation of Android Applications.
Proceedings of the Trusted Systems, 4th International Conference, 2012

2011
Attestation of integrity of overlay networks.
Journal of Systems Architecture - Embedded Systems Design, 2011

An Obfuscation-Based Approach against Injection Attacks.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Semantic Attestation of Node Integrity in Overlays.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010, 2010

Securing a Community Cloud.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

2009
Hierarchical, model-based risk management of critical infrastructures.
Rel. Eng. & Sys. Safety, 2009

Transparent Process Monitoring in a Virtual Environment.
Electr. Notes Theor. Comput. Sci., 2009

Measuring Semantic Integrity for Remote Attestation.
Proceedings of the Trusted Computing, 2009

PsycoTrace: Virtual and Transparent Monitoring of a Process Self.
Proceedings of the 17th Euromicro International Conference on Parallel, 2009

Modeling and Managing Risk in Billing Infrastructures.
Proceedings of the Critical Infrastructure Protection III, 2009

Cloud security is not (just) virtualization security: a short paper.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

Securing Health Information Infrastructures through Overlays.
Proceedings of the Second International Conference on Health Informatics, 2009

2008
Virtual interacting network community: exploiting multi-core architectures to increase security.
Proceedings of the 5th Conference on Computing Frontiers, 2008

Secure Sharing of an ICT Infrastructure through Vinci.
Proceedings of the Resilient Networks and Services, 2008

Semantics-Driven Introspection in a Virtual Environment.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Security and Integrity of a Distributed File Storage in a Virtual Environment.
Proceedings of the Fourth International IEEE Security in Storage Workshop, 2007

Managing Critical Infrastructures through Virtual Network Communities.
Proceedings of the Critical Information Infrastructures Security, 2007

Building Trustworthy Intrusion Detection through VM Introspection.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007


  Loading...