Vittoria Nardone

Orcid: 0000-0001-7888-6620

According to our database1, Vittoria Nardone authored at least 41 papers between 2015 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Video Game Bad Smells: What They Are and How Developers Perceive Them.
ACM Trans. Softw. Eng. Methodol., July, 2023

UnityLint: A Bad Smell Detector for Unity.
Proceedings of the 31st IEEE/ACM International Conference on Program Comprehension, 2023

2022
Driver Identification Through Formal Methods.
IEEE Trans. Intell. Transp. Syst., 2022

Problems and Solutions in Applying Continuous Integration and Delivery to 20 Open-Source Cyber-Physical Systems.
Proceedings of the 19th IEEE/ACM International Conference on Mining Software Repositories, 2022

2020
Model checking and machine learning techniques for <i>HummingBad</i> mobile malware detection and mitigation.
Simul. Model. Pract. Theory, 2020

Human behavior characterization for driving style recognition in vehicle system.
Comput. Electr. Eng., 2020

Detecting Video Game-Specific Bad Smells in Unity Projects.
Proceedings of the MSR '20: 17th International Conference on Mining Software Repositories, 2020

Colluding Android Apps Detection via Model Checking.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

2019
LEILA: Formal Tool for Identifying Mobile Malicious Behaviour.
IEEE Trans. Software Eng., 2019

A "pay-how-you-drive" car insurance approach through cluster analysis.
Soft Comput., 2019

Model Checking Techniques Applied to Satellite Operational Mode Management.
IEEE Syst. J., 2019

Model Checking Based Approach for Compliance Checking.
Inf. Technol. Control., 2019

Formal Verification of Radio Communication Management in Railway Systems Using Model Checking Technique.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

Exploiting Model Checking for Mobile Botnet Detection.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

Machine Learning to Identify Gender via Hair Elements.
Proceedings of the International Joint Conference on Neural Networks, 2019

Model Checking to Detect the Hummingbad Malware.
Proceedings of the Intelligent Distributed Computing XIII, 2019

Spyware Detection using Temporal Logic.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Can Machine Learning Predict Soccer Match Results?
Proceedings of the 11th International Conference on Agents and Artificial Intelligence, 2019

2018
Evaluating model checking for cyber threats code obfuscation identification.
J. Parallel Distributed Comput., 2018

Talos: no more ransomware victims with formal methods.
Int. J. Inf. Sec., 2018

Safety Critical Systems Formal Verification Using Execution Traces.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018

Real-Time Driver Behaviour Characterization Through Rule-Based Machine Learning.
Proceedings of the Computer Safety, Reliability, and Security, 2018

Context-Awareness Mobile Devices for Traffic Incident Prevention.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018

Cluster Analysis for Driver Aggressiveness Identification.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Who's Driving My Car? A Machine Learning based Approach to Driver Identification.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Identifying Insecure Features in Android Applications using Model Checking.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

2017
Formal Methods Meet Mobile Code Obfuscation Identification of Code Reordering Technique.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

Diabetes Mellitus Affected Patients Classification and Diagnosis through Machine Learning Techniques.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017

Model Checking for Mobile Android Malware Evolution.
Proceedings of the 5th IEEE/ACM International FME Workshop on Formal Methods in Software Engineering, 2017

"Mirror, Mirror on the Wall, Who is the Fairest One of All?" - Machine Learning versus Model Checking: A Comparison between Two Static Techniques for Malware Family Identification.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Identifying Mobile Repackaged Applications through Formal Methods.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Car hacking identification through fuzzy logic algorithms.
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017

How Discover a Malware using Model Checking.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Malware and Formal Methods: Rigorous Approaches for detecting Malicious Behaviour.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Model Checking to Support Action Controls in the Purchasing Process.
Proceedings of the 25th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2016

Hey Malware, I Can Find You!
Proceedings of the 25th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2016

Download malware? no, thanks: how formal methods can block update attacks.
Proceedings of the 4th FME Workshop on Formal Methods in Software Engineering, 2016

Identification of Android Malware Families with Model Checking.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Ransomware Steals Your Phone. Formal Methods Rescue It.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2016

Ransomware Inside Out.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Infer Gene Regulatory Networks from Time Series Data with Probabilistic Model Checking.
Proceedings of the 3rd IEEE/ACM FME Workshop on Formal Methods in Software Engineering, 2015


  Loading...