Marco Cremonini

According to our database1, Marco Cremonini authored at least 44 papers between 1998 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




The Unknown of the Pandemic: An Agent-Based Model of Final Phase Risks.
J. Artif. Soc. Soc. Simul., 2020

Measuring the accuracy of software vulnerability assessments: experiments with students and professionals.
Empir. Softw. Eng., 2020

Improving Hearing Healthcare with Big Data Analytics of Real-Time Hearing Aid Data.
Proceedings of the 2019 IEEE World Congress on Services, 2019

Productivity and Patterns of Activity in Bug Bounty Programs: Analysis of HackerOne and Google Vulnerability Research.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

The Effect of Security Education and Expertise on Security Assessments: the Case of Software Vulnerabilities.
CoRR, 2018

Controllability of Social Networks and the Strategic Use of Random Information.
CoRR, 2018

Big Data Analytics in Healthcare: Design and Implementation for a Hearing Aid Case Study.
Proceedings of the 14th International Conference on Signal-Image Technology & Internet-Based Systems, 2018

Big data platform for public health policies.
Proceedings of the 2017 IEEE SmartWorld, 2017

Use of Random Topics as Practical Control Signals in a Social Network Model.
Proceedings of the Complex Networks & Their Applications V - Proceedings of the 5th International Workshop on Complex Networks and their Applications (COMPLEX NETWORKS 2016), Milan, Italy, November 30, 2016

Models and Methods for the Analysis of the Diffusion of Skills in Social Networks.
Proceedings of the Operations Research Proceedings 2015, 2015

0-Day Vulnerabilities and Cybercrime.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Self-organizing Techniques for Knowledge Diffusion in Dynamic Social Networks.
Proceedings of the Complex Networks V, 2014

An Obfuscation-Based Approach for Protecting Location Privacy.
IEEE Trans. Dependable Secur. Comput., 2011

The asymmetric diffusion of trust between communities: simulations in dynamic social networks.
Proceedings of the Winter Simulation Conference 2011, 2011

Modifying Trust Dynamics through Cooperation and Defection in Evolving Social Networks.
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Risks and Benefits of Signaling Information System Characteristics to Strategic Attackers.
J. Manag. Inf. Syst., 2010

A framework for financial botnet analysis.
Proceedings of the 2010 eCrime Researchers Summit, 2010

Landscape-aware location-privacy protection in location-based services.
J. Syst. Archit., 2009

Access Control in Location-Based Services.
Proceedings of the Privacy in Location-Based Applications, 2009

Balanced Clustering for Efficient Detection of Scientific Plagiarism.
Proceedings of the 8th Cologne-Twente Workshop on Graphs and Combinatorial Optimization, 2009

Privacy-enhanced Location-based Access Control.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

A privacy-aware access control system.
J. Comput. Secur., 2008

Learning Computer Networking on Open Paravirtual Laboratories.
IEEE Trans. Educ., 2007

A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy.
Proceedings of the New Approaches for Security, 2007

Location Privacy Protection Through Obfuscation-Based Techniques.
Proceedings of the Data and Applications Security XXI, 2007

Managing Privacy in LBAC Systems.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Understanding and Influencing Attackers' Decisions: Implications for Security Investment Strategies.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006

Supporting location-based conditions in access control policies.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Evaluating Information Security Investments from Attackers Perspective: the Return-On-Attack (ROA).
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005

The Architecture of a Privacy-Aware Access Control Decision Component.
Proceedings of the Construction and Analysis of Safe, 2005

An XML-based approach to combine firewalls and web services security specifications.
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, 2003

Semantics-Aware Perimeter Protection.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

Coordination and Security on the Internet.
Proceedings of the Coordination of Internet Agents: Models, Technologies, and Applications, 2001

Ruling Agent Motion in Structured Environments.
Proceedings of the High-Performance Computing and Networking, 8th International Conference, 2000

Coordination and Access Control in Open Distributed Agent Systems: The TuCSoN Approach.
Proceedings of the Coordination Languages and Models, 4th International Conference, 2000

Mobile Agents Integrity for Electronic Commerce Applications.
Inf. Syst., 1999

Modelling Network Topology and Mobile Agent Interaction: An Integrated Framework.
Proceedings of the 1999 ACM Symposium on Applied Computing, 1999

The HiMAT Model for Mobile Agent Applications.
Proceedings of the Eighteenth Annual ACM Symposium on Principles of Distributed Computing, 1999

Building Mobile Agent Applications in HiMAT.
Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, 1999

Multi-agent Systems on the Internet: Extending the Scope of Coordination towards Security and Topology.
Proceedings of the MultiAgent System Engineering, 1999

Mobile agents and security: protocols for integrity.
Proceedings of the Distributed Applications and Interoperable Systems II, Second IFIP WG 6.1 International Working Conference on Distributed Applications and Interoperable Systems, June 28, 1999

Coordination in Context: Authentication, Authorisation and Topology in Mobile Agent Applications.
Proceedings of the Coordination Languages and Models, Third International Conference, 1999

Locality Abstraction and Security Models in a Mobile Agent Environment.
Proceedings of the 7th Workshop on Enabling Technologies (WETICE '98), 1998

Melding Abstractions with Mobile Agents.
Proceedings of the Cooperative Information Agents II, 1998