MADAM: A Multi-Level Anomaly Detector for Android Malware G Dini, F Martinelli, A Saracino, D Sgandurra MMM-ANCS-2012, 16, 2012 | 548 | 2012 |
Madam: Effective and efficient behavior-based android malware detection and prevention A Saracino, D Sgandurra, G Dini, F Martinelli IEEE Transactions on Dependable and Secure Computing 15 (1), 83-97, 2016 | 515 | 2016 |
Bridemaid: An hybrid tool for accurate detection of android malware F Martinelli, F Mercaldo, A Saracino Proceedings of the 2017 ACM on Asia conference on computer and …, 2017 | 90 | 2017 |
Risk analysis of Android applications: A user-centric solution G Dini, F Martinelli, I Matteucci, M Petrocchi, A Saracino, D Sgandurra Future Generation Computer Systems 80, 505-518, 2018 | 72 | 2018 |
Trust aware continuous authorization for zero trust in consumer internet of things T Dimitrakos, T Dilshener, A Kravtsov, A La Marra, F Martinelli, A Rizos, ... 2020 IEEE 19th international conference on trust, security and privacy in …, 2020 | 71 | 2020 |
Implementing usage control in internet of things: a smart home use case A La Marra, F Martinelli, P Mori, A Saracino 2017 IEEE Trustcom/BigDataSE/ICESS, 1056-1063, 2017 | 59 | 2017 |
Using recurrent neural networks for continuous authentication through gait analysis G Giorgi, A Saracino, F Martinelli Pattern Recognition Letters 147, 157-163, 2021 | 55 | 2021 |
Try walking in my shoes, if you can: Accurate gait recognition through deep learning G Giorgi, F Martinelli, A Saracino, M Sheikhalishahi Computer Safety, Reliability, and Security: SAFECOMP 2017 Workshops, ASSURE …, 2017 | 40 | 2017 |
Detection of repackaged mobile applications through a collaborative approach A Aldini, F Martinelli, A Saracino, D Sgandurra Concurrency and Computation: Practice and Experience 27 (11), 2818-2838, 2015 | 38 | 2015 |
Cybsersecurity issues in robotics G Lacava, A Marotta, F Martinelli, A Saracino, A La Marra, E Gil-Uriarte, ... | 35 | 2021 |
Probabilistic contract compliance for mobile applications G Dini, F Martinelli, A Saracino, D Sgandurra 2013 International Conference on Availability, Reliability and Security, 599-606, 2013 | 35 | 2013 |
Improving MQTT by inclusion of usage control A La Marra, F Martinelli, P Mori, A Rizos, A Saracino Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2017 | 33 | 2017 |
I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of android malware F Martinelli, F Mercaldo, A Saracino, CA Visaggio 2016 14th Annual conference on privacy, security and trust (PST), 129-136, 2016 | 31 | 2016 |
Stateful data usage control for android mobile devices A Lazouski, F Martinelli, P Mori, A Saracino International Journal of Information Security 16, 345-369, 2017 | 30 | 2017 |
Privacy preserving data sharing and analysis for edge-based architectures M Sheikhalishahi, A Saracino, F Martinelli, AL Marra International Journal of Information Security 21 (1), 79-101, 2022 | 29 | 2022 |
Modeling privacy aware information sharing systems: A formal and general approach F Martinelli, A Saracino, M Sheikhalishahi 2016 IEEE Trustcom/BigDataSE/ISPA, 767-774, 2016 | 28 | 2016 |
Towards enforcing on-the-fly policies in BYOD environments G Costantino, F Martinelli, A Saracino, D Sgandurra 2013 9th International Conference on Information Assurance and Security (IAS …, 2013 | 28 | 2013 |
Fast and effective clustering of spam emails based on structural similarity M Sheikhalishahi, A Saracino, M Mejri, N Tawbi, F Martinelli International Symposium on Foundations and Practice of Security, 195-211, 2015 | 27 | 2015 |
A multi-criteria-based evaluation of android applications G Dini, F Martinelli, I Matteucci, M Petrocchi, A Saracino, D Sgandurra International Conference on Trusted Systems, 67-82, 2012 | 26 | 2012 |
Privacy-preserving text mining as a service G Costantino, A La Marra, F Martinelli, A Saracino, M Sheikhalishahi 2017 IEEE Symposium on Computers and Communications (ISCC), 890-897, 2017 | 25 | 2017 |