According to our database1, Marco Cremonini authored at least 44 papers between 1998 and 2020.
Legend:Book In proceedings Article PhD thesis Other
J. Artif. Soc. Soc. Simul., 2020
Measuring the accuracy of software vulnerability assessments: experiments with students and professionals.
Empir. Softw. Eng., 2020
Proceedings of the 2019 IEEE World Congress on Services, 2019
Productivity and Patterns of Activity in Bug Bounty Programs: Analysis of HackerOne and Google Vulnerability Research.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
The Effect of Security Education and Expertise on Security Assessments: the Case of Software Vulnerabilities.
Big Data Analytics in Healthcare: Design and Implementation for a Hearing Aid Case Study.
Proceedings of the 14th International Conference on Signal-Image Technology & Internet-Based Systems, 2018
Proceedings of the 2017 IEEE SmartWorld, 2017
Proceedings of the Complex Networks & Their Applications V - Proceedings of the 5th International Workshop on Complex Networks and their Applications (COMPLEX NETWORKS 2016), Milan, Italy, November 30, 2016
Proceedings of the Operations Research Proceedings 2015, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
Proceedings of the Complex Networks V, 2014
IEEE Trans. Dependable Secur. Comput., 2011
The asymmetric diffusion of trust between communities: simulations in dynamic social networks.
Proceedings of the Winter Simulation Conference 2011, 2011
Modifying Trust Dynamics through Cooperation and Defection in Evolving Social Networks.
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011
Risks and Benefits of Signaling Information System Characteristics to Strategic Attackers.
J. Manag. Inf. Syst., 2010
Proceedings of the 2010 eCrime Researchers Summit, 2010
J. Syst. Archit., 2009
Proceedings of the Privacy in Location-Based Applications, 2009
Proceedings of the 8th Cologne-Twente Workshop on Graphs and Combinatorial Optimization, 2009
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
IEEE Trans. Educ., 2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the Data and Applications Security XXI, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Understanding and Influencing Attackers' Decisions: Implications for Security Investment Strategies.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Evaluating Information Security Investments from Attackers Perspective: the Return-On-Attack (ROA).
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005
Proceedings of the Construction and Analysis of Safe, 2005
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
Coordination and Security on the Internet.
Proceedings of the Coordination of Internet Agents: Models, Technologies, and Applications, 2001
Proceedings of the High-Performance Computing and Networking, 8th International Conference, 2000
Coordination and Access Control in Open Distributed Agent Systems: The TuCSoN Approach.
Proceedings of the Coordination Languages and Models, 4th International Conference, 2000
Proceedings of the 1999 ACM Symposium on Applied Computing, 1999
Proceedings of the Eighteenth Annual ACM Symposium on Principles of Distributed Computing, 1999
Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, 1999
Multi-agent Systems on the Internet: Extending the Scope of Coordination towards Security and Topology.
Proceedings of the MultiAgent System Engineering, 1999
Mobile agents and security: protocols for integrity.
Proceedings of the Distributed Applications and Interoperable Systems II, Second IFIP WG 6.1 International Working Conference on Distributed Applications and Interoperable Systems, June 28, 1999
Coordination in Context: Authentication, Authorisation and Topology in Mobile Agent Applications.
Proceedings of the Coordination Languages and Models, Third International Conference, 1999
Proceedings of the 7th Workshop on Enabling Technologies (WETICE '98), 1998
Proceedings of the Cooperative Information Agents II, 1998