Paolo Falcarin

Orcid: 0000-0003-1933-5348

According to our database1, Paolo Falcarin authored at least 58 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Software Systems Compliance with the AI Act: Lessons Learned from an International Challenge.
Proceedings of the 2nd International Workshop on Responsible AI Engineering, 2024

Building a Cybersecurity Knowledge Graph with CyberGraph.
Proceedings of the IEEE/ACM International Workshop on Engineering and Cybersecurity of Critical Systems and Second IEEE/ACM International Workshop on Software Vulnerability, 2024

2022
Data quality challenges in large-scale cyber-physical systems: A systematic review.
Inf. Syst., 2022

Time-series clustering for sensor fault detection in large-scale Cyber-Physical Systems.
Comput. Networks, 2022

2020
Code Renewability for Native Software Protection.
ACM Trans. Priv. Secur., 2020

HADES: a Hybrid Anomaly Detection System for Large-Scale Cyber-Physical Systems.
Proceedings of the Fifth International Conference on Fog and Mobile Edge Computing, 2020

2019
A meta-model for software protections and reverse engineering attacks.
J. Syst. Softw., 2019

Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge.
Empir. Softw. Eng., 2019

Analysis of Obfuscated Code with Program Slicing.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

3rd International Workshop on Software Protection (SPRO 2019).
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
An Open Source Software Architecture for Smart Buildings.
Proceedings of the Intelligent Systems and Applications, 2018

2017
How professional hackers understand protected code while performing attack tasks.
Proceedings of the 25th International Conference on Program Comprehension, 2017

2016
Attack Simulation based Software Protection Assessment Method with Petri Net.
Int. J. Cyber Situational Aware., 2016

A Reference Architecture for Software Protection.
Proceedings of the 13th Working IEEE/IFIP Conference on Software Architecture, 2016

Search Based Clustering for Protecting Software with Diversified Updates.
Proceedings of the Search Based Software Engineering - 8th International Symposium, 2016

Attack simulation based software protection assessment method.
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016

The ASPIRE Framework for Software Protection.
Proceedings of the 2016 ACM Workshop on Software PROtection, 2016

2015
A large study on the effect of code obfuscation on the quality of java code.
Empir. Softw. Eng., 2015

Towards automated composition of convergent services: A survey.
Comput. Commun., 2015

An Architecture for Self-Reconfiguration of Convergent Telecom Processes.
Proceedings of the 7th IEEE/ACM International Workshop on Principles of Engineering Service-Oriented and Cloud Systems, 2015

1st International Workshop on Software Protection (SPRO 2015).
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Software Protection with Code Mobility.
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015

2014
Automated context aware composition of Advanced Telecom Services for environmental early warnings.
Expert Syst. Appl., 2014

A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques.
Empir. Softw. Eng., 2014

2013
gLCB: an energy aware context broker.
Sustain. Comput. Informatics Syst., 2013

Context data management: an architectural framework for context-aware services.
Serv. Oriented Comput. Appl., 2013

Emergency situations supported by context-aware and application streaming technologies.
Int. J. Ad Hoc Ubiquitous Comput., 2013

A model for the proteolytic regulation of LpxC in the lipopolysaccharide pathway of Escherichia coli.
Comput. Biol. Chem., 2013

2012
Code Defactoring: Evaluating the Effectiveness of Java Obfuscations.
Proceedings of the 19th Working Conference on Reverse Engineering, 2012

Natural language processing based Services Composition for Environmental management.
Proceedings of the 7th International Conference on System of Systems Engineering, 2012

Automated context aware composition for convergent services.
Proceedings of the 7th International Conference on System of Systems Engineering, 2012

An Automated User-Centered Planning Framework for Decision Support in Environmental Early Warnings.
Proceedings of the Advances in Artificial Intelligence - IBERAMIA 2012, 2012

2011
Guest Editors' Introduction: Software Protection.
IEEE Softw., 2011

Exploiting code mobility for dynamic binary obfuscation.
Proceedings of the 2011 World Congress on Internet Security, 2011

2010
Dynamic context-aware business process: a rule-based approach supported by pattern identification.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

A Visual Semantic Service Browser Supporting User-Centric Service Composition.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
The effectiveness of source code obfuscation: An experimental assessment.
Proceedings of the 17th IEEE International Conference on Program Comprehension, 2009

Weaving Business Processes and Rules: A Petri Net Approach.
Proceedings of the Information Systems: Modeling, 2009

XDM-Compatible Service Repository for User-Centric Service Creation and Discovery.
Proceedings of the IEEE International Conference on Web Services, 2009

User-Centric Future Internet and Telecommunication Services.
Proceedings of the Towards the Future Internet - A European Research Perspective, 2009

2008
Integrating User-Generated Content and Pervasive Communications.
IEEE Pervasive Comput., 2008

Communication Web Services and JAIN-SLEE Integration Challenges.
Int. J. Web Serv. Res., 2008

Synthesizing Service Composition Models on the Basis of Temporal Business Rules.
J. Comput. Sci. Technol., 2008

Personalized Service Creation and Provision for the Mobile Web.
Proceedings of the Weaving Services and People on the World Wide Web, 2008

An Approach to Domain-Specific Reuse in Service-Oriented Environments.
Proceedings of the High Confidence Software Reuse in Large Systems, 2008

Realizing an MDA and SOA Marriage for the Development of Mobile Services.
Proceedings of the Model Driven Architecture, 2008

Towards experimental evaluation of code obfuscation techniques.
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008

Application-Oriented Trust in Distributed Computing.
Proceedings of the The Third International Conference on Availability, 2008

2007
Situation Inference for Mobile Users: A Rule Based Approach.
Proceedings of the 8th International Conference on Mobile Data Management (MDM 2007), 2007

Using Temporal Business Rules to Synthesize Service Composition Process Models.
Proceedings of the ACT4SOC 2007, 2007

First International Workshop on Telecom Service Oriented Architectures (TSOA-07).
Proceedings of the Service-Oriented Computing, 2007

2006
Automated Reasoning on Aspects Interactions.
Proceedings of the 21st IEEE/ACM International Conference on Automated Software Engineering (ASE 2006), 2006

Communication Web Services Composition and Integration.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

A dynamic analysis tool for extracting UML 2 sequence diagrams.
Proceedings of the ICSOFT 2006, 2006

Remote Trust with Aspect-Oriented Programming.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2004
Dynamic evolution of distributed software architectures.
PhD thesis, 2004

Software Architecture Evolution through Dynamic AOP.
Proceedings of the Software Architecture, First European Workshop, 2004

2003
Designing the Parlay Call-Control Using ASMs.
Proceedings of the Abstract State Machines, 2003


  Loading...