Marinella Petrocchi

According to our database1, Marinella Petrocchi authored at least 104 papers between 2002 and 2020.

Collaborative distances:



In proceedings 
PhD thesis 





Emergent properties, models, and laws of behavioral similarities within groups of twitter users.
Comput. Commun., 2020

Emotions and Interests of Evolving Twitter Bots.
Proceedings of the 2020 IEEE Conference on Evolving and Adaptive Intelligent Systems, 2020

On the capability of evolved spambots to evade detection via genetic engineering.
Online Soc. Networks Media, 2019

An effective Decision Support System for social media listening based on cross-source sentiment analysis models.
Eng. Appl. Artif. Intell., 2019

The role of bot squads in the political propaganda on Twitter.
CoRR, 2019

Better Safe Than Sorry: An Adversarial Approach to Improve Social Bot Detection.
Proceedings of the 11th ACM Conference on Web Science, 2019

Six Things I Hate About You (in Italian) and Six Classification Strategies to More and More Effectively Find Them.
Proceedings of the Third Italian Conference on Cyber Security, 2019

Transparency in Keyword Faceted Search: An Investigation on Google Shopping.
Proceedings of the Digital Libraries: Supporting Open Science, 2019

Do You Really Follow Them? Automatic Detection of Credulous Twitter Users.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2019, 2019

Modelling of Railway Signalling System Requirements by Controlled Natural Languages: A Case Study.
Proceedings of the From Software Engineering to Formal Methods and Tools, and Back, 2019

Social Fingerprinting: Detection of Spambot Groups Through DNA-Inspired Behavioral Modeling.
IEEE Trans. Dependable Secur. Comput., 2018

Who framed Roger Reindeer? De-censorship of Facebook posts by snippet classification.
Online Soc. Networks Media, 2018

A study on online travel reviews through intelligent data analysis.
J. of IT & Tourism, 2018

Risk analysis of Android applications: A user-centric solution.
Future Gener. Comput. Syst., 2018

From Reaction to Proaction: Unexplored Ways to the Detection of Evolving Spambots.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Contrasting Fake Reviews in TripAdvisor.
Proceedings of the 26th Italian Symposium on Advanced Database Systems, 2018

Towards automatic translation of social network policies into controlled natural language.
Proceedings of the 12th International Conference on Research Challenges in Information Science, 2018

Predicting Online Review Scores Across Reviewer Categories.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2018, 2018

Mining Implicit Data Association from Tripadvisor Hotel Reviews.
Proceedings of the Workshops of the EDBT/ICDT 2018 Joint Conference (EDBT/ICDT 2018), 2018

A language-based approach to modelling and analysis of Twitter interactions.
J. Log. Algebraic Methods Program., 2017

A Study on Text-Score Disagreement in Online Reviews.
Cogn. Comput., 2017

The Paradigm-Shift of Social Spambots: Evidence, Theories, and Tools for the Arms Race.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Hate Me, Hate Me Not: Hate Speech Detection on Facebook.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017

Mining Worse and Better Opinions - Unsupervised and Agnostic Aggregation of Online Reviews.
Proceedings of the Web Engineering - 17th International Conference, 2017

Efficient Detection of Conflicts in Data Sharing Agreements.
Proceedings of the Information Systems Security and Privacy, 2017

Analysis of Data Sharing Agreements.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Exploiting Digital DNA for the Analysis of Similarities in Twitter Behaviours.
Proceedings of the 2017 IEEE International Conference on Data Science and Advanced Analytics, 2017

Bioinspired Security Analysis of Wireless Protocols.
MONET, 2016

DNA-Inspired Online Behavioral Modeling and Its Application to Spambot Detection.
IEEE Intell. Syst., 2016

Data Sharing Agreements: How to Glue Definition, Analysis and Mapping Together.
ERCIM News, 2016

Social Fingerprinting - or the Truth About You.
ERCIM News, 2016

Semi-supervised Knowledge Extraction for Detection of Drugs and Their Effects.
Proceedings of the Social Informatics - 8th International Conference, 2016

mib at SemEval-2016 Task 4a: Exploiting lexicon based features for Sentiment Analysis in Twitter.
Proceedings of the 10th International Workshop on Semantic Evaluation, 2016

Google Web Searches and Wikipedia Results: A Measurement Study.
Proceedings of the 7th Italian Information Retrieval Workshop, 2016

Spotting the Diffusion of New Psychoactive Substances over the Internet.
Proceedings of the Advances in Intelligent Data Analysis XV - 15th International Symposium, 2016

A Matter of Words: NLP for Quality Evaluation of Wikipedia Medical Articles.
Proceedings of the Web Engineering - 16th International Conference, 2016

Experimental Measures of News Personalization in Google News.
Proceedings of the Current Trends in Web Engineering, 2016

Online User Behavioural Modeling with Applications to Price Steering.
Proceedings of the 2nd International Workshop on Personalization & Recommender Systems in Financial Services, 2016

A Lifecycle for Data Sharing Agreements: How it Works Out.
Proceedings of the Privacy Technologies and Policy - 4th Annual Privacy Forum, 2016

A quality model for social networks populated with web services.
Serv. Oriented Comput. Appl., 2015

Towards safer information sharing in the cloud.
Int. J. Inf. Sec., 2015

Engineering the Lifecycle of Data Sharing Agreements.
ERCIM News, 2015

Fame for sale: Efficient detection of fake Twitter followers.
Decis. Support Syst., 2015

Domain-specific queries and Web search personalization: some investigations.
Proceedings of the Proceedings 11th International Workshop on Automated Specification and Verification of Web Systems, 2015

TRAP: Using Targeted ads to unveil Google personal profiles.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

VISIO: A Visual Approach for Singularity Detection in Recommendation Systems.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Twitlang(er): Interactions Modeling Language (and Interpreter) for Twitter.
Proceedings of the Software Engineering and Formal Methods - 13th International Conference, 2015

Visual detection of singularities in review platforms.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and Security (TELERISE 2015).
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Business Reputation of Social Networks of Web Services.
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015

Legal and Technical Perspectives in Data Sharing Agreements Definition.
Proceedings of the Privacy Technologies and Policy - Third Annual Privacy Forum, 2015

Preserving Data Privacy in e-Health.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

Automated Synthesis and Ranking of Secure BPMN Orchestrators.
Int. J. Secur. Softw. Eng., 2014

Discriminating Between the Wheat and the Chaff in Online Recommendation Systems.
ERCIM News, 2014

A Lot of Slots - Outliers Confinement in Review-Based Systems.
Proceedings of the Web Information Systems Engineering - WISE 2014, 2014

Using Incentives to Analyze Social Web Services' Behaviors.
Proceedings of the Web Information Systems Engineering - WISE 2014 Workshops, 2014

Improved Automatic Maturity Assessment of Wikipedia Medical Articles - (Short Paper).
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Conferences, 2014

A Criticism to Society (As Seen by Twitter Analytics).
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014

Maturity Assessment of Wikipedia Medical Articles.
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014

An Expertise-Driven Authoring Tool for E-Health Data Policies.
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014

Cryptofraglets Reloaded - Bioinspired Security Modeling of a RFID Protocol and Properties.
Proceedings of the 8th International Conference on Bio-inspired Information and Communications Technologies, 2014

My Data, Your Data, Our Data: Managing Privacy Preferences in Multiple Subjects Personal Data.
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014

Reputation-Based Composition of Social Web Services.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

Definition of Data Sharing Agreements - The Case of Spanish Data Protection Law.
Proceedings of the Accountability and Security in the Cloud, 2014

Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Combining declarative and procedural views in the specification and analysis of product families.
Proceedings of the 17th International Software Product Line Conference co-located workshops, 2013

PERSONA - A Personalized Data Protection Framework.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

A prototype for solving conflicts in XACML-based e-Health policies.
Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, 2013

Towards an executable algebra for product lines.
Proceedings of the 16th International Software Product Line Conference, 2012

Subjective review-based reputation.
Proceedings of the ACM Symposium on Applied Computing, 2012

A tool for the synthesis of cryptographic orchestrators.
Proceedings of the Model-Driven Security Workshop, 2012

A Multi-criteria-Based Evaluation of Android Applications.
Proceedings of the Trusted Systems, 4th International Conference, 2012

Prioritized Execution of Privacy Policies.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

Priorities-Based Review Computation.
Proceedings of the Intelligent Web Services Meet Social Computing, 2012

A Formal Support for Collaborative Data Sharing.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

Controlled data sharing in E-health.
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011

A Design Phase for Data Sharing Agreements.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks.
Comput. Commun., 2010

CNL4DSA: a controlled natural language for data sharing agreements.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Executable Specification of Cryptofraglets in Maude for Security Verification.
Proceedings of the Bioinspired Models of Network, Information, and Computing Systems, 2009

Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks.
J. Autom. Reasoning, 2008

Mobile Implementation and Formal Verification of an e-Voting System.
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008

Signed and Weighted Trust Credentials in Fraglets.
Proceedings of the 3rd International ICST Conference on Bio-Inspired Models of Network, 2008

Formal Modelling and Verification in Service-Oriented Computing.
ERCIM News, 2007

A Uniform Framework for Security and Trust Modeling and Analysis with Crypto-CCS.
Electron. Notes Theor. Comput. Sci., 2007

On Relating and Integrating Two Trust Management Frameworks.
Electron. Notes Theor. Comput. Sci., 2007

Fine Grained Access Control with Trust and Reputation Management for Globus.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Access Control Mechanisms for Fraglets.
Proceedings of the 2nd International ICST Conference on Bio-Inspired Models of Network, 2007

Towards Security Analyses of an Identity Federation Protocol for Web Services in Convergent Networks.
Proceedings of the Third Advanced International Conference on Telecommunications (AICT 2007), 2007

Formal analysis of some secure procedures for certificate delivery.
Softw. Test. Verification Reliab., 2006

A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols.
J. Autom. Lang. Comb., 2006

A Formalization of Credit and Responsibility Within the GNDC Schema.
Electron. Notes Theor. Comput. Sci., 2006

Modelling a Secure Agent with Team Automata.
Electron. Notes Theor. Comput. Sci., 2006

Crypto-fraglets: networking, biology and security.
Proceedings of the 1st International ICST Conference on Bio Inspired Models of Network, 2006

Team Automata for Security: - A Survey -.
Electron. Notes Theor. Comput. Sci., 2005

SEAS, a secure e-voting protocol: Design and implementation.
Comput. Secur., 2005

Local Management of Credits and Debits in Mobile Ad Hoc Networks.
Proceedings of the Communications and Multimedia Security, 2004

Authenticity in a Reliable Protocol for Mobile Computing.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

SEAS: A Secure E-Voting Applet System.
Proceedings of the Software Security, 2003

Compositional Verification of Secure Streamed Data: A Case Study with EMSS.
Proceedings of the Theoretical Computer Science, 8th Italian Conference, 2003

Formal Anaylsis of Some Timed Security Properties in Wireless Protocols.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2003

Compositional Verification of Integrity for Digital Stream Signature Protocols.
Proceedings of the 3rd International Conference on Application of Concurrency to System Design (ACSD 2003), 2003

Automated Analysis of Some Security Mechanisms of SCEP.
Proceedings of the Information Security, 5th International Conference, 2002