Sfoglia per Autore
Locality abstractions and security models in a Mobile Agent environment
1998 A. Corradi, M. Cremonini, C. Stefanelli
Melding abstractions with mobile agents
1998 A. Corradi, M. Cremonini, C. Stefanelli
Multi-agent systems on the internet: extending the scope of coordination towards security and topology
1999 M. Cremonini, A. Omicini, F. Zambonelli
Building mobile agent applications in HiMAT
1999 M. Cremonini, A. Omicini, F. Zambonelli
Coordination in context: Authentication, authorisation and topology in mobile agent applications
1999 M. Cremonini, A. Omicini, F. Zambonelli
Modelling network topology and mobile agent interaction: an integrated framework
1999 M. Cremonini, A. Omicini, F. Zambonelli
Mobile agents integrity for electronic commerce applications
1999 A. Corradi, M. Cremonini, R. Montanari, C. Stefanelli
Ruling agent motion in structured environments
2000 M. Cremonini, A. Omicini, F. Zambonelli
Coordination and access control in open distributed agent systems: The TuCSoN approach
2000 M. Cremonini, A. Omicini, F. Zambonelli
Using mobile agents for analyzing intrusion in computer networks
2001 J. Aslam, M. Cremonini, D. Kotz, D. Rus
An XML-based approach to combine firewalls and web services security specifications
2003 M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati
Disaster recovery planning
2003 M. Cremonini, P. Samarati
Semantics-aware perimeter protection
2004 M. Cremonini, E. Damiani, P. Samarati
Beauty and the beast: Hacking for pleasure and profit
2004 M. Cremonini
Renaissance hackery?
2004 M. Cremonini
Semantic-Aware Perimeter Protection
2004 M. Cremonini, E. Damiani, P. Samarati
Towards identity management for e-services
2005 C.A. Ardagna, E. Damiani, S. De Capitani di Vimercati, M. Cremonini, P. Samarati
Security, privacy, and trust in mobile systems
2005 A. Corallo, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, G. Elia, P. Samarati
Evaluating information security investments from attackers perspective: the return-on-attack (ROA)
2005 M. Cremonini, P. Martini
Security, privacy, and trust in mobile systems
2006 M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati
Negotiation protocols for LBAC systems
2006 C. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati
Location-based metadata and negotiation protocols for LBAC in a one-to-many scenario
2006 C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati
The architecture of a privacy-aware access control decision component
2006 C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati
Supporting location-based conditions in access control policies
2006 C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati
Network-based intrusion detection systems
2006 M. Cremonini
Contingency planning management
2006 M. Cremonini, P. Samarati
Understanding and influencing attackers’ decisions: implications for security investment strategies
2006 M. Cremonini, D. Nizovtsev
Business continuity planning
2007 M. Cremonini, P. Samarati
Role of signaling in information warfare
2007 M. Cremonini, D. Nizovtsev
Privacy-enhanced location services information
2007 C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati
Location privacy protection through obfuscation-based techniques
2007 C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati
A middleware architecture for integrating privacy preferences and location accuracy
2007 C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati
Learning computer networking on open paravirtual laboratories
2007 M. Anisetti, V. Bellandi, A. Colombo, M. Cremonini, E. Damiani, F. Frati, J.T. Hounsou, D. Rebeccani
Privacy-enhanced identity management for e-services
2007 C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, F. Frati, P. Samarati
Managing privacy in LBAC systems
2007 C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati
Location privacy in pervasive computing
2008 C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati
Privacy-enhanced location-based access control
2008 C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati
A privacy-aware access control system
2008 C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati
Privacy in the electronic society : emerging problems and solutions
2008 C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati
Balanced clustering for efficient detection of scientific plagiarism
2009 A. Ceselli, R. Cordone, M. Cremonini
Access control in location-based services
2009 C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati
Net privacy
2009 M. Cremonini, C. Braghin, C.A. Ardagna
Risks and benefits of signaling information system characteristics to strategic attackers
2009 M. Cremonini, D. Nizovtsev
Landscape-aware location-privacy protection in location-based services
2009 C.A. Ardagna, M. Cremonini, G. Gianini
A framework for financial botnet analysis
2010 M. Riccardi, D. Oro, J. Luna, M. Cremonini, M. Vilanova
The Dorothy project : an open botnet analysis framework for automatic tracking and activity visualization
2010 M. Cremonini, M. Riccardi
Managing privacy in location-based access control systems
2010 C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati
An obfuscation-based approach for protecting location privacy
2011 C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati
Modifying trust dynamics through cooperation and defection in evolving social networks
2011 L. Allodi, L. Chiodi, M. Cremonini
The asymmetric diffusion of trust between communities: simulations in dynamic social networks
2011 L. Allodi, L. Chiodi, M. Cremonini
Business continuity planning
2012 M. Cremonini, P. Samarati
Privacy on the Internet
2013 M. Cremonini, C. Braghin, C.A. Ardagna
Self-organizing techniques for knowledge diffusion in dynamic social networks
2014 L. Allodi, L. Chiodi, M. Cremonini
A game theoretic approach to vulnerability patching
2015 G. Gianini, M. Cremonini, A. Rainini, G. Lena Cota, L. Ghemmogne Fossi
0-day vulnerabilities and cybercrime
2015 J. Armin, P. Foti, M. Cremonini
Cloud security risk management
2016 M. Cremonini
Introducing serendipity in a social network model of knowledge diffusion
2016 M. Cremonini
Big Data Platform for Public Health Policies
2017 M. Anisetti, V. Bellandi, M. Cremonini, E. Damiani, J. Maggesi
Models and Methods for the Analysis of the Diffusion of Skills in Social Networks
2017 A. Ceselli, M. Cremonini, C. Simeone
Use of random topics as practical control signals in a social network model
2017 F. Casamassima, M. Cremonini
Online Privacy
2017 C. Braghin, M. Cremonini
Controllability of social networks and the strategic use of random information
2017 M. Cremonini, F. Casamassima
Privacy-aware Big Data Analytics as a Service for Public Health Policies in Smart Cities
2018 M. Anisetti, C. Ardagna, V. Bellandi, M. Cremonini, F. Frati, E. Damiani
The effect of security education and expertise on security assessments: the case of software vulnerabilities
2018 L. Allodi, M. Cremonini, F. Massacci, W. Shim
Productivity and patterns of activity in bug bounty programs: Analysis of hackerone and Google vulnerability research
2019 D. Luna, L. Allodi, M. Cremonini
Improving hearing healthcare with big data analytics of real-time hearing aid data
2019 J.H. Christensen, N.H. Pontoppidan, M. Anisetti, V. Bellandi, M. Cremonini
Big Data Analytics in Healthcare: Design and Implementation for a Hearing Aid Case
2019 M. Cremonini, J.H. Christensen, M.K. Petersen, N.H. Pontoppidan
The coevolution of contagion and behavior with increasing and decreasing awareness
2019 S. Maghool, N. Maleki-Jirsaraei, M. Cremonini
Cloud Security Risk Management
2020 M. Cremonini
Measuring the accuracy of software vulnerability assessments: experiments with students and professionals
2020 L. Allodi, M. Cremonini, F. Massacci, W. Shim
The Unknown of the Pandemic: An Agent-based Model of Final Phase Risks
2020 M. Cremonini, S. Maghool
The Unknown of the Pandemic: An Agent-Based Model of Final Phase Risks
2020 M. Cremonini, S. Maghool
The dynamical formation of ephemeral groups on networks and their effects on epidemics spreading
2022 M. Cremonini, S. Maghool
Fondamenti di data science : Python, R e open data
2023 M. Cremonini
A Critical Take on Privacy in a Datafied Society
2023 M. Cremonini
Data visualization : Grafici, dashboard e mappe con Python
2023 M. Cremonini
The New Frontiers of Social Simulation in the Data Science Era: An Introduction to the Proceedings
2023 F. Renzini, C. Debernardi, F. Bianchi, M. Cremonini, F. Squazzoni
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile