Mattia Monga

Orcid: 0000-0003-4852-0067

According to our database1, Mattia Monga authored at least 83 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
ITiCSE 2024: Call for Participation.
ACM SIGCSE Bull., April, 2024

To Be Or Not To Be . . . An Algorithm: The Notion According to Students and Teachers.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

2023
ITiCSE 2023 Call for Papers.
ACM SIGCSE Bull., January, 2023

ITiCSE 2023 Preview.
ACM SIGCSE Bull., 2023

Learning Iteration for Grades 2-3: Puzzles vs. UMC in Code.org.
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 2, 2023

All Green: How Different Age Groups Solved the Same Bebras Task.
Proceedings of the Informatics in Schools. Beyond Bits and Bytes: Nurturing Informatics Intelligence in Education, 2023

Davinci Goes to Bebras: A Study on the Problem Solving Ability of GPT-3.
Proceedings of the 15th International Conference on Computer Supported Education, 2023

2022
Characterizing the Nature of Programs for educational purposes.
Proceedings of the ITiCSE 2022: Innovation and Technology in Computer Science Education, Dublin, Ireland, July 8, 2022

What We Talk About When We Talk About Programs.
Proceedings of the 2022 Working Group Reports on Innovation and Technology in Computer Science Education, 2022

How is Two Better Than One? An Observational Study on the Impact of Working in Pairs When Solving Bebras Tasks.
Proceedings of the Informatics in Schools. A Step Beyond Digital Education, 2022

2021
Programming for All: Understanding the Nature of Programs.
CoRR, 2021

2020
Differentiated Assessments for Advanced Courses that Reveal Issues with Prerequisite Skills: A Design Investigation.
Proceedings of the Working Group Reports on Innovation and Technology in Computer Science Education, 2020

Assessing How Pre-requisite Skills Affect Learning of Advanced Concepts.
Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education, 2020

2019
Situated Learning with Bebras Tasklets.
Proceedings of the Informatics in Schools. New Ideas in School Informatics, 2019

An Analysis of the Performance of Italian Schools in Bebras and in the National Student Assessment INVALSI.
Proceedings of the 2nd Systems of Assessments for Computational Thinking Learning workshop (TACKLE 2019) co-located with 14th European Conference on Technology Enhanced Learning (EC-TEL 2019), 2019

Behind the Shoulders of Bebras Teams: Analyzing How They Interact with the Platform to Solve Tasks.
Proceedings of the Computer Supported Education - 11th International Conference, 2019

How Pupils Solve Online Problems: An Analytical View.
Proceedings of the 11th International Conference on Computer Supported Education, 2019

2018
A Core Informatics Curriculum for Italian Compulsory Education.
Proceedings of the Informatics in Schools. Fundamentals of Computer Science and Software Engineering, 2018

Informatics and Computational Thinking: A Teacher Professional Development Proposal Based on Social-Constructivism.
Proceedings of the Informatics in Schools. Fundamentals of Computer Science and Software Engineering, 2018

A Platform for the Italian Bebras.
Proceedings of the 10th International Conference on Computer Supported Education, 2018

2017
A Formal Framework for Specifying and Verifying Microservices Based Process Flows.
Proceedings of the Software Engineering and Formal Methods, 2017

Nothing to Fear but Fear Itself: Introducing Recursion in Lower Secondary Schools.
Proceedings of the 2017 International Conference on Learning and Teaching in Computing and Engineering, 2017

How presentation affects the difficulty of computational thinking tasks: an IRT analysis.
Proceedings of the 17th Koli Calling Conference on Computing Education Research, 2017

Bebras as a Teaching Resource: Classifying the Tasks Corpus Using Computational Thinking Skills.
Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education, 2017

Promoting Computational Thinking Skills: Would You Use this Bebras Task?
Proceedings of the Informatics in Schools: Focus on Learning Programming, 2017

2016
Distributed CTL model checking using MapReduce: theory and practice.
Concurr. Comput. Pract. Exp., 2016

Coverability Analysis of Time Basic Petri Nets with Non-Urgent Behavior.
Proceedings of the 18th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2016

A Security Game Model for Remote Software Protection.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
How Challenging are Bebras Tasks?: An IRT Analysis Based on the Performance of Italian Students.
Proceedings of the 2015 ACM Conference on Innovation and Technology in Computer Science Education, 2015

Is Coding the Way to Go?
Proceedings of the Informatics in Schools. Curricula, Competences, and Competitions, 2015

2014
Security Games for Node Localization through Verifiable Multilateration.
IEEE Trans. Dependable Secur. Comput., 2014

Informatics Education in Italian Secondary Schools.
ACM Trans. Comput. Educ., 2014

CTL Model Checking in the Cloud Using MapReduce.
Proceedings of the 16th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2014

Extracurricular Activities for Improving the Perception of Informatics in Secondary Schools.
Proceedings of the Informatics in Schools. Teaching and Learning Perspectives, 2014

2013
Distributed CTL Model Checking in the Cloud.
CoRR, 2013

MaRDiGraS: Simplified Building of Reachability Graphs on Large Clusters.
Proceedings of the Reachability Problems - 7th International Workshop, 2013

Analysis of Aspect-Oriented Models Using Graph Transformation Systems.
Proceedings of the Aspect-Oriented Requirements Engineering, 2013

2012
State Space Exploration of RT Systems in the Cloud
CoRR, 2012

Exploring the processing of formatted texts by a kynesthetic approach.
Proceedings of the Workshop in Primary and Secondary Computing Education, 2012

Symbolic State Space Exploration of RT Systems in the Cloud.
Proceedings of the 14th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2012

2011
What's the Fun in Informatics? Working to Capture Children and Teachers into the Pleasure of Computing.
Proceedings of the Informatics in Schools. Contributing to 21st Century Education, 2011

Seventh international workshop on software engineering for secure systems: (SESS 2011).
Proceedings of the 33rd International Conference on Software Engineering, 2011

2010
A Game Theoretical Analysis of Localization Security in Wireless Sensor Networks with Adversaries
CoRR, 2010

Special issue on software engineering for secure systems.
Comput. Secur., 2010

Dynamic and transparent analysis of commodity production systems.
Proceedings of the ASE 2010, 2010

Localization security in Wireless Sensor Networks as a non-cooperative game.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2010

The 6<sup>th</sup> International Workshop on Software Engineering for Secure Systems (SESS'10).
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010

A Localization Game in Wireless Sensor Networks.
Proceedings of the Decision and Game Theory for Security, 2010

2009
Analysis of Aspect-Oriented Model Weaving.
LNCS Trans. Aspect Oriented Softw. Dev., 2009

Special section on Software Engineering for Secure Systems (SESS '07).
Inf. Softw. Technol., 2009

Assessing data quality by a cross-layer approach.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

The 5<sup>th</sup> international workshop on software engineering for secure systems (SESS'09).
Proceedings of the 31st International Conference on Software Engineering, 2009

A hybrid analysis framework for detecting web application vulnerabilities.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2009

Synthesizing intensional behavior models by graph transformation.
Proceedings of the 31st International Conference on Software Engineering, 2009

On the impact of localization data in wireless sensor networks with malicious nodes.
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, 2009

Unweaving the impact of aspect changes in AspectJ.
Proceedings of the 8th Workshop on Foundations of Aspect-Oriented Languages, 2009

2008
Using Graph Transformation Systems to Specify and Verify Data Abstractions.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2008

The fourth international workshop on software engineering for secure systems: SESS'08 -- a trusted business world.
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008

LISABETH: automated content-based signature generator for zero-day polymorphic worms.
Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, 2008

On Race Vulnerabilities in Web Applications.
Proceedings of the Detection of Intrusions and Malware, 2008

2007
Using a Stochastic Well-formed Net model for assessing a decentralized approach to configuration management.
Perform. Evaluation, 2007

Code Normalization for Self-Mutating Malware.
IEEE Secur. Priv., 2007

Efficient recovery of algebraic specifications for stateful components.
Proceedings of the 9th International Workshop on Principles of Software Evolution (IWPSE 2007), 2007

A Smart Fuzzer for x86 Executables.
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007

The 3rd International Workshop on Software Engineering for Secure Systems SESS07 - Dependable and Secure.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007

On bytecode slicing and aspectJ interferences.
Proceedings of the 6th Workshop on Foundations of Aspect-Oriented Languages, 2007

2006
Assessing the risk of using vulnerable components.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

Supporting Cooperative Software Processes in a Decentralized and Nomadic World.
IEEE Trans. Syst. Man Cybern. Part A, 2006

Supporting Interoperability and Reusability of Learning Objects: The Virtual Campus Approach.
J. Educ. Technol. Soc., 2006

Interaction Analysis in Aspect-Oriented Models.
Proceedings of the 14th IEEE International Conference on Requirements Engineering (RE 2006), 2006

Using Code Normalization for Fighting Self-Mutating Malware.
Proceedings of the 2006 IEEE International Symposium on Secure Software Engineering, 2006

Introduction to software engineering for secure systems: SESS06 - secure by design.
Proceedings of the 2006 international workshop on Software engineering for secure systems, 2006

Detecting Self-mutating Malware Using Control-Flow Graph Matching.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006

2005
Software engineering for secure systems.
ACM SIGSOFT Softw. Eng. Notes, 2005

A generic serializer for mobile devices.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Replay Attack in TCG Specification and Solution.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Managing Code Dependencies in C#.
J. Object Technol., 2004

Quantitative Assessment of a Peer-to-peer Cooperative Infrastructure Using Stochastic Well-Formed Nets.
Proceedings of the First International Workshop on Practical Applications of Stochastic Modelling, 2004

Carrying on the e-learning process with a workflow management engine.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

2002
Supporting configuration management for virtual workgroups ini a peer-to-peer setting.
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002

Freeing Cooperation from Servers Tyranny.
Proceedings of the Web Engineering and Peer-to-Peer Computing, 2002

Fostering component evolution with C# attributes.
Proceedings of the International Workshop on Principles of Software Evolution, 2002

2001
An Experience on Verification of Aspect Properties.
Proceedings of the 4th International Workshop on Principles of Software Evolution, 2001


  Loading...