Marinella Petrocchi

Orcid: 0000-0003-0591-877X

According to our database1, Marinella Petrocchi authored at least 132 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Online disinformation in the 2020 U.S. election: swing vs. safe states.
EPJ Data Sci., December, 2024

Unveiling News Publishers Trustworthiness Through Social Interactions.
CoRR, 2024

Evaluating Trustworthiness of Online News Publishers via Article Classification.
CoRR, 2024

ROMCIR 2024: Overview of the 4th Workshop on Reducing Online Misinformation Through Credible Information Retrieval.
Proceedings of the Advances in Information Retrieval, 2024

2023
Entropy-based detection of Twitter echo chambers.
CoRR, 2023

Demystifying Misconceptions in Social Bots Research.
CoRR, 2023

Swinging in the States: Does disinformation on Twitter mirror the US presidential election system?
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

From Online Behaviours to Images: A Novel Approach to Social Bot Detection.
Proceedings of the Computational Science - ICCS 2023, 2023

ROMCIR 2023: Overview of the 3rd Workshop on Reducing Online Misinformation Through Credible Information Retrieval.
Proceedings of the Advances in Information Retrieval, 2023

2022
Report on the 2nd Workshop on Reducing Online Misinformation through Credible Information Retrieval (ROMCIR 2022) at ECIR 2022.
SIGIR Forum, June, 2022

Guest Editorial: Advanced Computing and Blockchain Applications for Critical Industrial IoT.
IEEE Trans. Ind. Informatics, 2022

Adversarial Machine Learning for Protecting Against Online Manipulation.
IEEE Internet Comput., 2022

Bow-Tie Structures of Twitter Discursive Communities.
CoRR, 2022

A Structured Analysis of Journalistic Evaluations for News Source Reliability.
Proceedings of the Workshop Proceedings of the 16th International AAAI Conference on Web and Social Media, 2022

ROMCIR 2022: Overview of the 2nd Workshop on Reducing Online Misinformation Through Credible Information Retrieval.
Proceedings of the Advances in Information Retrieval, 2022

2021
Special Issue on Disinformation, Hoaxes and Propaganda within Online Social Networks and Media.
Online Soc. Networks Media, 2021

A behavioural analysis of credulous Twitter users.
Online Soc. Networks Media, 2021

Experience: Improving Opinion Spam Detection by Cumulative Relative Frequency Distribution.
ACM J. Data Inf. Qual., 2021

On the efficacy of old features for the detection of new bots.
Inf. Process. Manag., 2021

The coming age of adversarial social bot detection.
First Monday, 2021

Correction to: Flow of online misinformation during the peak of the COVID-19 pandemic in Italy.
EPJ Data Sci., 2021

Flow of online misinformation during the peak of the COVID-19 pandemic in Italy.
EPJ Data Sci., 2021

2020
Exploring the relation between festivals and host cities on Twitter: a study on the impacts of Lucca Comics & Games.
J. Inf. Technol. Tour., 2020

Improving Opinion Spam Detection by Cumulative Relative Frequency Distribution.
CoRR, 2020

Analysis of online misinformation during the peak of the COVID-19 pandemics in Italy.
CoRR, 2020

Emergent properties, models, and laws of behavioral similarities within groups of twitter users.
Comput. Commun., 2020

On the Robustness of Rating Aggregators Against Injection Attacks.
Proceedings of the Disinformation in Open Online Media, 2020

Presente Digitale: An Online Education System for Teachers.
Proceedings of the Bridges and Mediation in Higher Distance Education, 2020

Emotions and Interests of Evolving Twitter Bots.
Proceedings of the 2020 IEEE Conference on Evolving and Adaptive Intelligent Systems, 2020

2019
On the capability of evolved spambots to evade detection via genetic engineering.
Online Soc. Networks Media, 2019

An effective Decision Support System for social media listening based on cross-source sentiment analysis models.
Eng. Appl. Artif. Intell., 2019

The role of bot squads in the political propaganda on Twitter.
CoRR, 2019

Better Safe Than Sorry: An Adversarial Approach to Improve Social Bot Detection.
Proceedings of the 11th ACM Conference on Web Science, 2019

Six Things I Hate About You (in Italian) and Six Classification Strategies to More and More Effectively Find Them.
Proceedings of the Third Italian Conference on Cyber Security, 2019

Transparency in Keyword Faceted Search: An Investigation on Google Shopping.
Proceedings of the Digital Libraries: Supporting Open Science, 2019

Do You Really Follow Them? Automatic Detection of Credulous Twitter Users.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2019, 2019

Modelling of Railway Signalling System Requirements by Controlled Natural Languages: A Case Study.
Proceedings of the From Software Engineering to Formal Methods and Tools, and Back, 2019

2018
Social Fingerprinting: Detection of Spambot Groups Through DNA-Inspired Behavioral Modeling.
IEEE Trans. Dependable Secur. Comput., 2018

Who framed Roger Reindeer? De-censorship of Facebook posts by snippet classification.
Online Soc. Networks Media, 2018

A study on online travel reviews through intelligent data analysis.
J. Inf. Technol. Tour., 2018

Risk analysis of Android applications: A user-centric solution.
Future Gener. Comput. Syst., 2018

From Reaction to Proaction: Unexplored Ways to the Detection of Evolving Spambots.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Contrasting Fake Reviews in TripAdvisor.
Proceedings of the 26th Italian Symposium on Advanced Database Systems, 2018

Towards automatic translation of social network policies into controlled natural language.
Proceedings of the 12th International Conference on Research Challenges in Information Science, 2018

Predicting Online Review Scores Across Reviewer Categories.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2018, 2018

Mining Implicit Data Association from Tripadvisor Hotel Reviews.
Proceedings of the Workshops of the EDBT/ICDT 2018 Joint Conference (EDBT/ICDT 2018), 2018


2017
A language-based approach to modelling and analysis of Twitter interactions.
J. Log. Algebraic Methods Program., 2017

A Study on Text-Score Disagreement in Online Reviews.
Cogn. Comput., 2017

The Paradigm-Shift of Social Spambots: Evidence, Theories, and Tools for the Arms Race.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Hate Me, Hate Me Not: Hate Speech Detection on Facebook.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017

Mining Worse and Better Opinions - Unsupervised and Agnostic Aggregation of Online Reviews.
Proceedings of the Web Engineering - 17th International Conference, 2017

Efficient Detection of Conflicts in Data Sharing Agreements.
Proceedings of the Information Systems Security and Privacy, 2017

Analysis of Data Sharing Agreements.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Exploiting Digital DNA for the Analysis of Similarities in Twitter Behaviours.
Proceedings of the 2017 IEEE International Conference on Data Science and Advanced Analytics, 2017

2016
Bioinspired Security Analysis of Wireless Protocols.
Mob. Networks Appl., 2016

DNA-Inspired Online Behavioral Modeling and Its Application to Spambot Detection.
IEEE Intell. Syst., 2016

Data Sharing Agreements: How to Glue Definition, Analysis and Mapping Together.
ERCIM News, 2016

Social Fingerprinting - or the Truth About You.
ERCIM News, 2016

Semi-supervised Knowledge Extraction for Detection of Drugs and Their Effects.
Proceedings of the Social Informatics - 8th International Conference, 2016

mib at SemEval-2016 Task 4a: Exploiting lexicon based features for Sentiment Analysis in Twitter.
Proceedings of the 10th International Workshop on Semantic Evaluation, 2016

Google Web Searches and Wikipedia Results: A Measurement Study.
Proceedings of the 7th Italian Information Retrieval Workshop, 2016

Spotting the Diffusion of New Psychoactive Substances over the Internet.
Proceedings of the Advances in Intelligent Data Analysis XV - 15th International Symposium, 2016

A Matter of Words: NLP for Quality Evaluation of Wikipedia Medical Articles.
Proceedings of the Web Engineering - 16th International Conference, 2016

Experimental Measures of News Personalization in Google News.
Proceedings of the Current Trends in Web Engineering, 2016

Online User Behavioural Modeling with Applications to Price Steering.
Proceedings of the 2nd International Workshop on Personalization & Recommender Systems in Financial Services, 2016

A Lifecycle for Data Sharing Agreements: How it Works Out.
Proceedings of the Privacy Technologies and Policy - 4th Annual Privacy Forum, 2016

2015
A quality model for social networks populated with web services.
Serv. Oriented Comput. Appl., 2015

Towards safer information sharing in the cloud.
Int. J. Inf. Sec., 2015

Engineering the Lifecycle of Data Sharing Agreements.
ERCIM News, 2015

Fame for sale: Efficient detection of fake Twitter followers.
Decis. Support Syst., 2015

Domain-specific queries and Web search personalization: some investigations.
Proceedings of the Proceedings 11th International Workshop on Automated Specification and Verification of Web Systems, 2015

TRAP: Using Targeted ads to unveil Google personal profiles.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

VISIO: A Visual Approach for Singularity Detection in Recommendation Systems.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Twitlang(er): Interactions Modeling Language (and Interpreter) for Twitter.
Proceedings of the Software Engineering and Formal Methods - 13th International Conference, 2015

Visual detection of singularities in review platforms.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and Security (TELERISE 2015).
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Business Reputation of Social Networks of Web Services.
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015

Legal and Technical Perspectives in Data Sharing Agreements Definition.
Proceedings of the Privacy Technologies and Policy - Third Annual Privacy Forum, 2015

2014
Preserving Data Privacy in e-Health.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

Automated Synthesis and Ranking of Secure BPMN Orchestrators.
Int. J. Secur. Softw. Eng., 2014

Discriminating Between the Wheat and the Chaff in Online Recommendation Systems.
ERCIM News, 2014

A Lot of Slots - Outliers Confinement in Review-Based Systems.
Proceedings of the Web Information Systems Engineering - WISE 2014, 2014

Using Incentives to Analyze Social Web Services' Behaviors.
Proceedings of the Web Information Systems Engineering - WISE 2014 Workshops, 2014

Improved Automatic Maturity Assessment of Wikipedia Medical Articles - (Short Paper).
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Conferences, 2014

A Criticism to Society (As Seen by Twitter Analytics).
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014

Maturity Assessment of Wikipedia Medical Articles.
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014

An Expertise-Driven Authoring Tool for E-Health Data Policies.
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014

Cryptofraglets Reloaded - Bioinspired Security Modeling of a RFID Protocol and Properties.
Proceedings of the 8th International Conference on Bio-inspired Information and Communications Technologies, 2014

My Data, Your Data, Our Data: Managing Privacy Preferences in Multiple Subjects Personal Data.
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014

Reputation-Based Composition of Social Web Services.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

Definition of Data Sharing Agreements - The Case of Spanish Data Protection Law.
Proceedings of the Accountability and Security in the Cloud, 2014

2013
Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Combining declarative and procedural views in the specification and analysis of product families.
Proceedings of the 17th International Software Product Line Conference co-located workshops, 2013

PERSONA - A Personalized Data Protection Framework.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

A prototype for solving conflicts in XACML-based e-Health policies.
Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, 2013

2012
Towards an executable algebra for product lines.
Proceedings of the 16th International Software Product Line Conference, 2012

Subjective review-based reputation.
Proceedings of the ACM Symposium on Applied Computing, 2012

A tool for the synthesis of cryptographic orchestrators.
Proceedings of the Model-Driven Security Workshop, 2012

A Multi-criteria-Based Evaluation of Android Applications.
Proceedings of the Trusted Systems, 4th International Conference, 2012

Prioritized Execution of Privacy Policies.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

Priorities-Based Review Computation.
Proceedings of the Intelligent Web Services Meet Social Computing, 2012

A Formal Support for Collaborative Data Sharing.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
Controlled data sharing in E-health.
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011

A Design Phase for Data Sharing Agreements.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

2010
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks.
Comput. Commun., 2010

CNL4DSA: a controlled natural language for data sharing agreements.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

2009
Executable Specification of Cryptofraglets in Maude for Security Verification.
Proceedings of the Bioinspired Models of Network, Information, and Computing Systems, 2009

2008
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks.
J. Autom. Reason., 2008

Mobile Implementation and Formal Verification of an e-Voting System.
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008

Signed and Weighted Trust Credentials in Fraglets.
Proceedings of the 3rd International ICST Conference on Bio-Inspired Models of Network, 2008

2007
Formal Modelling and Verification in Service-Oriented Computing.
ERCIM News, 2007

Fine Grained Access Control with Trust and Reputation Management for Globus.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Access Control Mechanisms for Fraglets.
Proceedings of the 2nd International ICST Conference on Bio-Inspired Models of Network, 2007

Towards Security Analyses of an Identity Federation Protocol for Web Services in Convergent Networks.
Proceedings of the Third Advanced International Conference on Telecommunications (AICT 2007), 2007

2006
Formal analysis of some secure procedures for certificate delivery.
Softw. Test. Verification Reliab., 2006

A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols.
J. Autom. Lang. Comb., 2006

A Uniform Framework for Security and Trust Modeling and Analysis with Crypto-CCS.
Proceedings of the First Workshop in Information and Computer Security, 2006

On Relating and Integrating Two Trust Management Frameworks.
Proceedings of the Second International Workshop on Views on Designing Complex Architectures, 2006

Crypto-fraglets: networking, biology and security.
Proceedings of the 1st International ICST Conference on Bio Inspired Models of Network, 2006

2005
Aspects of modeling and verifying secure procedures.
PhD thesis, 2005

A Formalization of Credit and Responsibility Within the GNDC Schema.
Proceedings of the First International Workshop on Security and Trust Management, 2005

SEAS, a secure e-voting protocol: Design and implementation.
Comput. Secur., 2005

2004
Modelling a Secure Agent with Team Automata.
Proceedings of the First International Workshop on Views on Designing Complex Architectures, 2004

Team Automata for Security: - A Survey -.
Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, 2004

Local Management of Credits and Debits in Mobile Ad Hoc Networks.
Proceedings of the Communications and Multimedia Security, 2004

2003
Authenticity in a Reliable Protocol for Mobile Computing.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

SEAS: A Secure E-Voting Applet System.
Proceedings of the Software Security, 2003

Compositional Verification of Secure Streamed Data: A Case Study with EMSS.
Proceedings of the Theoretical Computer Science, 8th Italian Conference, 2003

Formal Anaylsis of Some Timed Security Properties in Wireless Protocols.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2003

Compositional Verification of Integrity for Digital Stream Signature Protocols.
Proceedings of the 3rd International Conference on Application of Concurrency to System Design (ACSD 2003), 2003

2002
Automated Analysis of Some Security Mechanisms of SCEP.
Proceedings of the Information Security, 5th International Conference, 2002


  Loading...