Nicola Zannone

Orcid: 0000-0002-9081-5996

According to our database1, Nicola Zannone authored at least 167 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cognition in Social Engineering Empirical Research: A Systematic Literature Review.
ACM Trans. Comput. Hum. Interact., April, 2024

2023
An Approach to Trade-off Privacy and Classification Accuracy in Machine Learning Processes.
Proceedings of the 31st Symposium of Advanced Database Systems, 2023

Privacy-Preserving Multi-Party Access Control for Third-Party UAV Services.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

Data Sharing in Social Networks.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

Towards A High-interaction Physics-aware Honeynet for Industrial Control Systems.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

Investigating the Resolution of Vulnerable Dependencies with Dependabot Security Updates.
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023

Impact Analysis of Coordinated Cyber-Physical Attacks via Statistical Model Checking: A Case Study.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2023

The Peculiar Case of Tailored Phishing against SMEs: Detection and Collective DefenseMechanisms at a Small IT Company.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

The Influence of Human Factors on the Intention to Report Phishing Emails.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

ICS Honeypot Interactions: A Latitudinal Study.
Proceedings of the IEEE International Conference on Big Data, 2023

A Comprehensive Study on Third-Party User Tracking in Mobile Applications.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

Mitigating Privilege Misuse in Access Control through Anomaly Detection.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

HoneyICS: A High-interaction Physics-aware Honeynet for Industrial Control Systems.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

Towards Obfuscation of Programmable Logic Controllers.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Association Rule Mining Meets Regression Analysis: An Automated Approach to Unveil Systematic Biases in Decision-Making Processes.
J. Cybersecur. Priv., March, 2022

A decision-support framework for data anonymization with application to machine learning processes.
Inf. Sci., 2022

Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system.
Int. J. Inf. Sec., 2022

Editorial: 2021 editors' pick: Computer science.
Frontiers Comput. Sci., 2022

Poster: A Flexible Relationship-Based Access Control Policy Generator.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

PICO: privacy-preserving access control in IoT scenarios through incomplete information.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022

Investigating the Effect of Phishing Believability on Phishing Reporting.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

ReLOG: A Unified Framework for Relationship-Based Access Control over Graph Databases.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022

2021
Privacy-preserving policy evaluation in multi-party access control.
J. Comput. Secur., 2021

Comparing Classifiers' Performance under Differential Privacy.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Dissecting Social Engineering Attacks Through the Lenses of Cognition.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021

Not a Free Lunch, But a Cheap One: On Classifiers Performance on Anonymized Datasets.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

Combining Text and Visual Features to Improve the Identification of Cloned Webpages for Early Phishing Detection.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
A Latitudinal Study on the Use of Sequential and Concurrency Patterns in Deviance Mining.
Proceedings of the Complex Pattern Mining - New Challenges, Methods and Applications, 2020

The Need for New Antiphishing Measures Against Spear-Phishing Attacks.
IEEE Secur. Priv., 2020

A survey on multi-factor authentication for online banking in the wild.
Comput. Secur., 2020

Privacy Preserving Statistical Detection of Adversarial Instances.
Proceedings of the 29th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2020

On the Comparison of Classifiers' Construction over Private Inputs.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Handling Incomplete Information in Policy Evaluation using Attribute Similarity.
Proceedings of the Second IEEE International Conference on Trust, 2020

A Toolkit for Security Awareness Training Against Targeted Phishing.
Proceedings of the Information Systems Security - 16th International Conference, 2020

Don't Forget the Human: a Crowdsourced Approach to Automate Response and Containment Against Spear Phishing Attacks.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

IFTTT Privacy Checker.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2020

Predictive Analytics to Prevent Voice over IP International Revenue Sharing Fraud.
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020

SoK: engineering privacy-aware high-tech systems.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Testing the effectiveness of tailored phishing techniques in industry and academia: a field experiment.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Access control in Internet-of-Things: A survey.
J. Netw. Comput. Appl., 2019

A framework for the extended evaluation of ABAC policies.
Cybersecur., 2019

Discovering reliable evidence of data misuse by exploiting rule redundancy.
Comput. Secur., 2019

Privacy-Preserving Multi-Party Access Control.
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019

Using Provenance for Secure Data Fusion in Cooperative Systems.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

On Attribute Retrieval in ABAC.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

An Authorization Framework for Cooperative Intelligent Transport Systems.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2019

Unveiling Systematic Biases in Decisional Processes: An Application to Discrimination Discovery.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Predicting Critical Behaviors in Business Process Executions: When Evidence Counts.
Proceedings of the Business Process Management Forum, 2019

Hierarchical Clustering for Discrimination Discovery: A Top-Down Approach.
Proceedings of the 2nd IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2019

2018
Discovering anomalous frequent patterns from partially ordered event logs.
J. Intell. Inf. Syst., 2018

Survey on Access Control for Community-Centered Collaborative Systems.
ACM Comput. Surv., 2018

Linking data and process perspectives for conformance analysis.
Comput. Secur., 2018

Security and privacy for innovative automotive applications: A survey.
Comput. Commun., 2018

Multi-Party Access Control: Requirements, State of the Art and Open Challenges.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Efficient Extended ABAC Evaluation.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

A Lazy Approach to Access Control as a Service (ACaaS) for IoT: An AWS Case Study.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Behavior analysis in the medical sector: theory and practice.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Economic incentives on DNSSEC deployment: Time to move from quantity to quality.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Feature Selection for Anomaly Detection in Vehicular Ad Hoc Networks.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Towards a Systematic Process-aware Behavioral Analysis for Security.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Towards Adaptive Access Control.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

From Security-by-Design to the Identification of Security-Critical Deviations in Process Executions.
Proceedings of the Information Systems in the Big Data Era, 2018

2017
Formal analysis of XACML policies using SMT.
Comput. Secur., 2017

On the Use of Hierarchical Subtrace Mining for Efficient Local Process Model Mining.
Proceedings of the 7th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2017), 2017

Mining Local Process Models and Their Correlations.
Proceedings of the Data-Driven Process Discovery and Analysis, 2017

APD tool: Mining Anomalous Patterns from Event Logs.
Proceedings of the BPM Demo Track and BPM Dissertation Award co-located with 15th International Conference on Business Process Modeling (BPM 2017), 2017

2016
A severity-based quantification of data leakages in database systems.
J. Comput. Secur., 2016

Flow-based reputation with uncertainty: evidence-based subjective logic.
Int. J. Inf. Sec., 2016

A Hybrid Framework for Data Loss Prevention and Detection.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Subgraph Mining for Anomalous Pattern Discovery in Event Logs.
Proceedings of the New Frontiers in Mining Complex Patterns - 5th International Workshop, 2016

Collaborative Access Decisions: Why Has My Decision Not Been Enforced?
Proceedings of the Information Systems Security - 12th International Conference, 2016

Data Governance and Transparency for Collaborative Systems.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

A Policy Framework for Data Fusion and Derived Data Control.
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016

An Authorization Service for Collaborative Situation Awareness.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Risk-based Analysis of Business Process Executions.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Role Mining with Missing Values.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Conviviality-driven access control policy.
Requir. Eng., 2015

SAFAX - An Extensible Authorization Service for Cloud Environments.
Frontiers ICT, 2015

An anomaly analysis framework for database systems.
Comput. Secur., 2015

Pre-Distribution of Certificates for Pseudonymous Broadcast Authentication in VANET.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

Constructing Probable Explanations of Nonconformity: A Data-Aware and History-Based Approach.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2015

Preventing Information Inference in Access Control.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Analysis of XACML Policies with SMT.
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015

2014
GEM: A distributed goal evaluation algorithm for trust management.
Theory Pract. Log. Program., 2014

Data minimisation in communication protocols: a formal analysis framework and application to identity management.
Int. J. Inf. Sec., 2014

Understanding Computer Security.
Frontiers ICT, 2014

A reference model for reputation systems.
Decis. Support Syst., 2014

History-Based Construction of Alignments for Conformance Checking: Formalization and Implementation.
Proceedings of the Data-Driven Process Discovery and Analysis, 2014

History-based Construction of Log-Process Alignments for Conformance Checking: Discovering What Really Went Wrong.
Proceedings of the 4th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2014), 2014

Reduction of access control decisions.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Data Leakage Quantification.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

CollAC: Collaborative access control.
Proceedings of the 2014 International Conference on Collaboration Technologies and Systems, 2014

POSTER: Analyzing Access Control Policies with SMT.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Requirements engineering within a large-scale security-oriented research project: lessons learned.
Requir. Eng., 2013

Privacy-Aware Web Service Composition and Ranking.
Int. J. Web Serv. Res., 2013

Privacy Analysis of User Behavior Using Alignments.
it Inf. Technol., 2013

A Semantic Security Framework for Systems of Systems.
Int. J. Cooperative Inf. Syst., 2013

Controlling Break-the-Glass through Alignment.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Database Anomalous Activities - Detection and Quantification.
Proceedings of the SECRYPT 2013, 2013

Privacy Implications of Privacy Settings and Tagging in Facebook.
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013

Symbolic Privacy Analysis through Linkability and Detectability.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

PERSONA - A Personalized Data Protection Framework.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

Are On-Line Personae Really Unlinkable?
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

TRIPLEX: verifying data minimisation in communication systems.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Data reliability in home healthcare services.
Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, 2013

The POLIPO Security Framework.
Proceedings of the Situation Awareness with Systems of Systems, 2013

2012
Flow-Based Reputation: More than Just Ranking.
Int. J. Inf. Technol. Decis. Mak., 2012

Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

Impact of ICT on Home Healthcare.
Proceedings of the ICT Critical Infrastructures and Society, 2012

Policy Administration in Tag-Based Authorization.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

Measuring Privacy Compliance Using Fitness Metrics.
Proceedings of the Business Process Management - 10th International Conference, 2012

Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Organizational Patterns for Security and Dependability: From Design to Application.
Int. J. Secur. Softw. Eng., 2011

Engineering and verifying agent-oriented requirements augmented by business constraints with <i>B</i>-Tropos.
Auton. Agents Multi Agent Syst., 2011

Purpose Control: Did You Process the Data for the Intended Purpose?
Proceedings of the Secure Data Management - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, 2011

A Security Framework for Systems of Systems.
Proceedings of the POLICY 2011, 2011

Formal Privacy Analysis of Communication Protocols for Identity Management.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Security Risk Management by Qualitative Vulnerability Analysis.
Proceedings of the Third International Workshop on Security Measurements and Metrics, 2011

Measuring Privacy Compliance with Process Specifications.
Proceedings of the Third International Workshop on Security Measurements and Metrics, 2011

Poster: protecting information in systems of systems.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank.
Proceedings of the Social Modeling for Requirements Engineering., 2011

2010
Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology.
Proceedings of the Advances in Intelligent Information Systems, 2010

A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities.
Requir. Eng., 2010

A Flexible Architecture for Privacy-Aware Trust Management.
J. Theor. Appl. Electron. Commer. Res., 2010

Towards Data Protection Compliance.
Proceedings of the SECRYPT 2010, 2010

Modeling Identity-Related Properties and Their Privacy Strength.
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010

2009
Towards the development of privacy-aware systems.
Inf. Softw. Technol., 2009

The Si* Modeling Framework: Metamodel and Applications.
Int. J. Softw. Eng. Knowl. Eng., 2009

How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns.
Artif. Intell. Law, 2009

POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy.
Proceedings of the POLICY 2009, 2009

A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations.
Proceedings of the Conceptual Modeling, 2009

Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Security Agent-Oriented Requirements Engineering - the SI* Modeling Language and the Secure Tropos Methodology.
VDM, ISBN: 978-3-639-17654-4, 2009

2008
An evaluation of business solutions in manufacturing enterprises.
Int. J. Bus. Intell. Data Min., 2008

S&D Pattern Deployment at Organizational Level: A Prototype for Remote Healthcare System.
Proceedings of the 4th International Workshop on Security and Trust Management, 2008

Requirements model generation to support requirements elicitation: the Secure Tropos experience.
Autom. Softw. Eng., 2008

Why Eliciting and Managing Legal Requirements Is Hard.
Proceedings of the First International Workshop on Requirements Engineering and Law, 2008

A Model-Driven Approach for the Specification and Analysis of Access Control Policies.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

Towards an Integrated Framework for Model-Driven Security Engineering.
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008

Formal Analysis of BPMN Via a Translation into COWS.
Proceedings of the Coordination Models and Languages, 10th International Conference, 2008

Perceived risk assessment.
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008

Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach.
Proceedings of the The Third International Conference on Availability, 2008

2007
From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach.
Int. J. Softw. Eng. Knowl. Eng., 2007

Computer-aided Support for Secure Tropos.
Autom. Softw. Eng., 2007

Goal-Equivalent Secure Business Process Re-engineering.
Proceedings of the Service-Oriented Computing, 2007

How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach.
Proceedings of the Eleventh International Conference on Artificial Intelligence and Law, 2007

-Tropos.
Proceedings of the Computational Logic in Multi-Agent Systems, 8th International Workshop, 2007

Reasoning About Risk in Agent's Deliberation Process: A Jadex Implementation.
Proceedings of the Agent-Oriented Software Engineering VIII, 8th International Workshop, 2007

From Trust to Dependability through Risk Analysis.
Proceedings of the The Second International Conference on Availability, 2007

2006
Hierarchical hippocratic databases with minimal disclosure for virtual organizations.
VLDB J., 2006

Requirements engineering for trust management: model, methodology, and reasoning.
Int. J. Inf. Sec., 2006

Detecting Conflicts of Interest.
Proceedings of the 14th IEEE International Conference on Requirements Engineering (RE 2006), 2006

Creating Objects in the Flexible Authorization Framework.
Proceedings of the Data and Applications Security XX, 2006

Designing Security Requirements Models Through Planning.
Proceedings of the Advanced Information Systems Engineering, 18th International Conference, 2006

2005
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation.
Comput. Stand. Interfaces, 2005

Maintaining privacy on derived objects.
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005

ST-Tool: A CASE Tool for Security Requirements Engineering.
Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005), 29 August, 2005

Modeling Security Requirements Through Ownership, Permission and Delegation.
Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005), 29 August, 2005

Modeling Social and Individual Trust in Requirements Engineering Methodologies.
Proceedings of the Trust Management, Third International Conference, 2005

ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements.
Proceedings of the Trust Management, Third International Conference, 2005

Security and Trust Requirements Engineering.
Proceedings of the Foundations of Security Analysis and Design III, 2005

Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation.
Proceedings of the Computer Security, 2005

2004
Privacy Is Linking Permission to Purpose.
Proceedings of the Security Protocols, 2004

Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning.
Proceedings of the Trust Management, Second International Conference, 2004

Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures.
Proceedings of the Public Key Infrastructure, 2004


  Loading...