Publications
Publications submitted in journals of several research and technology fields, mainly related to security, IoT and CPS, and Software production.
Id | Type | Title | Authors | Venue | Year |
1 |
Thesis/ Dissertation |
Said Daoudagh | ETD Archivio digitale delle tesi discusse presso l’Università di Pisa | 2021 | |
2 | Conference proceedings /workshop | GRADUATION: A GDPR-based Mutation Methodology | Said Daoudag, Eda Marchetti | Quality of Information and Communications Technology. QUATIC 2021. Communications in Computer and Information Science, vol 1439 | 2021 |
3 | Conference proceedings /workshop | BIECO Runtime Auditing Framework | Antonello Calabrò, Emilia Cioroaica, Said Daoudag, Eda Marchetti | 14th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2021) Advances in Intelligent Systems and Computing, vol 1400, pp. 181-191. |
2021 |
4 | Conference proceedings /workshop | Basic Aspects in Redundancy-Based Intrusion Tolerance | Felicita Di Giandomenico, Giulio Masetti | 14th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2021) Advances in Intelligent Systems and Computing, vol 1400, pp. 192-202. | 2021 |
5 | Conference proceedings /workshop | MENTORS – Monitoring Environment for System of Systems | Antonello Calabrò, Said Daoudagh, Eda Marchetti | Proceedings of the 17th International Conference on Web Information Systems and Technologies (WEBIST 2021), pp. 291-298 | 2021 |
6 | Conference proceedings /workshop | Bridging Trust in Runtime Open Evaluation Scenarios | Emilia Cioroaica, Barbora Buhnova, Eda Marchetti, Daniel Schneider, Thomas Kuhn | Model and Data Engineering in the Digitalization Era. MEDI 2021. Communications in Computer and Information Science, vol 1481, pp. 112-120 | 2021 |
7 | Conference proceedings /workshop | GROOT: A GDPR-based Combinatorial Testing Approach | Said Daoudagh, Eda Marchetti | The 33rd IFIP International Conference on Testing Software and Systems, Lecture Notes in Computer Science vol. 13045, pp. 210-217 | 2021 |
8 | Conference proceedings /workshop | Out-of-sync Schedule Robustness for Time-sensitive Networks | Silviu S. Craciunas, Ramon Serna Oliver | 17th IEEE International Conference on Factory Communication Systems (WFCS), pp. 75-82 | 2021 |
9 | Article in Journal | The Challenges of Software Cybersecurity Certification | José Luis Hernández-Ramos, Sara Nieves Matheu-García, Antonio Skarmeta | IEEE Security & Privacy, vol. 19, no. 1, pp. 99-102 | 2021 |
10 | Article in Journal | Defining the Behavior of IoT Devices Through the MUD Standard: Review, Challenges, and Research Directions | José Luis Hernández-Ramos, Sara Nieves Matheu-García, Angelo Feraudo, Gianmarco Baldini, Jorge Bernal-Bernabe, Poonam Yadav, Antonio Skarmet Paolo Bellavista | IEEE Access, vol. 9, pp. 126265-126285 | 2021 |
11 | Conference proceedings /workshop | The BIECO Conceptual Framework Towards Security and Trust in ICT Ecosystems | Ricardo Peres, Lilian Adkinson, Emilia Cioroaica, Eda Marchetti, Enrico Schiavone, Sara Matheu, Ovidiu Cosma, Radoslaw Piliszek, Jose Barata. | The 33rd IFIP International Conference on Testing Software and Systems (IFIP-ICTSS) | 2021 |
12 | Article in Journal | LPWAN and Embedded Machine Learning as Enablers for the Next Generation of Wearable Devices | Ramon Sanchez-Iborra | Sensors, Vol. 21(15), 5218 | 2021 |
13 | Conference proceedings /workshop | Goals within Trust-based Digital Ecosystems | Emilia Cioroaica, Akanksha Purohit, Barbora Buhnova, and Daniel Schneider | 2021 IEEE/ACM Joint 9th International Workshop on Software Engineering for Systems-of-Systems and 15th Workshop on Distributed Software Development, Software Ecosystems and Systems-of-Systems (SESoS/WDES), pp. 1-7 | 2021 |
14 | Conference proceedings /workshop | Comparison of Safety and Security Analysis Techniques | Emilia Cioroaica, Smruti Ranjan Kar, and Ioannis Sorokos | 14th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2021, Advances in Intelligent Systems and Computing, vol 1400, pp. 234-242. |
2021 |
15 | Conference proceedings /workshop | A MDE Tool for Security Risk Assessment of Enterprises |
Enrico Schiavone, Nicola Nostro, Francesco Brancati | INDUSTRY TRACK – LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 10., 2021, Florianópolis. | 2021 |
16 | Conference proceedings /workshop | A Survey on the State of the Art of Vulnerability Assessment Techniques | Eva Sotos Martínez, Nora M. Villanueva and Lilian Adkinson Orellana | 14th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2021). Advances in Intelligent Systems and Computing, vol 1400, pp. 203-213 | 2021 |
17 | Conference proceedings /workshop | A Comparative Study of the Most Important Methods for Forecasting the ICT Systems Vulnerabilities | O. Cosma, M. Măcelaru, P. C. Pop, C. Sabo, I. Zelina | 14th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2021). Advances in Intelligent Systems and Computing, vol 1400, pp. 224-232 | 2021 |
18 | Conference proceedings /workshop | Data Based Message Validation as a Security Cornerstone in Loose Coupling Software Architecture | Oliviu Matei, Rudolf Erdei, Daniela Delinschi, Laura Andreica | 14th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2021), pp. 214-223 | 2021 |
19 |
Conference proceedings /workshop |
The GDPR Compliance and Access Control Systems: Challenges and Research Opportunities |
Said Daoudagh, Eda Marchetti |
Proceedings of the 8th International Conference on Information Systems Security and Privacy – ICISSP, pp. 571-578. |
2022 |
20 |
Conference proceedings /workshop |
Predictive Simulation for Building Trust within Service-based Ecosystems |
Emilia Cioroaica, Said Daoudagh, Eda Marchetti |
The 20th International Conference on Pervasive Computing and Communications (PerCom 2022), pp. 34-37 |
2022 |
21 |
Other |
BIECO, un approccio olistico alla cybersecurity (BIECO and holistic approach for the cybersecurity) |
Eda Marchetti |
Italian newspaper “il sole 24 ore” special insert “SCENARI” |
2022 |
22 |
Article in Journal |
Rafael Capilla,Emilia Cioroaica, Barbora Buhnova, and Jan Bosch |
IEEE Transactions on Engineering Management, vol. 69, no. 6, pp. 3633-3647 |
2022 |
|
23 |
Conference proceedings /workshop |
Mohammed Naveed Akram, Akshatha Ambekar, Ioannis Sorokos, Koorosh Aslansefat, and Daniel Schneider |
Computer Safety, Reliability, and Security. SAFECOMP, pp. 289-301 |
2022 |
|
24 | Conference proceedings /workshop | Forecasting the Number of Bugs and Vulnerabilities in Software Components using Neural Network Models | Ovidiu Cosma, Petrică Pop, Cosmin Sabo, Laura Cosma | 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022), pp. 159-168 | 2022 |
25 | Conference proceedings /workshop | An Ontology-Based Solution for Monitoring IoT Cybersecurity | Said Daoudagh, Eda Marchetti, Antonello Calabrò, Filipa Ferrada, Ana Inês Oliveira, José Barata, Ricardo Peres, Francisco Marques | 5th IFIP International Cross-Domain Conference, IFIPIoT 2022, pp. 158-176 | 2022 |
26 | Conference proceedings /workshop | A comparative study of Machine Learning algorithms for the detection of vulnerable Python libraries | Laura Pérez-Vilarelle, Eva Sotos Martínez and Javier Yépez Martínez | 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022), pp. 138-148 | 2022 |
27 | Conference proceedings /workshop | A paradigm for safe adaptation of collaborating robots | E Cioroaica, B Buhnova, E Tomur | Proceedings of the 17th Symposium on Software Engineering for Adaptive and Self-Managing Systems, pp. 113-119 | 2022 |
28 | Conference proceedings /workshop | Timing Model for Predictive Simulation of Safety-critical Systems | E Cioroaica, B Blanco, J. and Rossi | Proceedings of the 17th International Conference on Software Technologies – (ICSOFT), pp. 331-339 | 2022 |
29 | Conference proceedings /workshop | The concept of ethical digital identities | E Cioroaica, B Buhnova, F Jacobi, D Schneider | Proceedings of the 1st Workshop on Software Engineering for Responsible Artificial Intelligence, pp. 17-20 | 2022 |
30 | Conference proceedings /workshop | Towards trusting the ethical evolution of autonomous dynamic ecosystems | E Cioroaica, B Buhnova, E Tomur | Proceedings of the 1st Workshop on Software Engineering for Responsible Artificial Intelligence, pp. 13-16 | 2022 |
31 | Conference proceedings /workshop | Towards the Concept of Trust Assurance Case | E Cioroaica, B Buhnova, D Schneider, I Sorokos, T Kuhn, E Tomur | 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1581-1586 | 2022 |
32 | Conference proceedings /workshop | Defining the Threat Manufacturer Usage Description Model for Sharing Mitigation Actions | Sara Nieves Matheu-García, Antonio Skarmeta | 1st International Conference on 6G Networking (6GNet), pp. 1-4 | 2022 |
33 | Article in Journal | Federated Cyberattack Detection for Internet of Things-Enabled Smart Cities | Matheu Garcia, Sara Nieves, Mármol, Enrique, Hernández Ramos, José Luis, Skarmeta, Antonio, & Baldini, Gianmarco | IEEE Computer, Vol. 55(12), pp. 65-73 | 2022 |
34 | Article in Journal | A Formal Validation Approach for XACML 3.0 Access Control Policy. | Carmine Caserio, Francesca Lonetti, Eda Marchetti: | Sensors, Vol. 22(8), 2984 | 2022 |
35 |
Conference proceedings /workshop |
Ontology Driven High Performance Messaging System for Distributed Software Platforms |
Daniela Delinschi, Rudolf Erdei, Oliviu Matei |
IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR) |
2022 |
36 |
Conference proceedings /workshop |
Rudolf Erdei, Daniela Delinschi, Emil Marian Pașca, Oliviu Matei |
15th International Conference on Computational Intelligence in Security for Information Systems (CISIS) |
2022 |
|
37 |
Conference proceedings /workshop |
Deep-Learning based Trust Management with Self-Adaptation in the Internet of Behavior |
H Bangui, E Cioroaica, M Ge, B Buhnova |
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, pp. 874-881 |
2023 |
38 |
Article in Journal |
Integrating the manufacturer usage description standard in the modelling of cyber-physical systems |
Sara Nieves Matheu García, Adrián Sánchez-Cabrera, Enrico Schiavone, Antonio Skarmeta |
Computer Standards & Interfaces, Vol. 84, 103777 |
2023 |
39 |
Article in Journal |
Rudolf Erdei, Emil Marian Pașca,Daniela Delinschi, Iulia Bărăian,Oliviu Matei |
Expert Systems (Wiley Open Research) |
2023 |