Sfoglia per Autore
The New Frontiers of Social Simulation in the Data Science Era: An Introduction to the Proceedings
2023 F. Renzini, C. Debernardi, F. Bianchi, M. Cremonini, F. Squazzoni
Data visualization : Grafici, dashboard e mappe con Python
2023 M. Cremonini
A Critical Take on Privacy in a Datafied Society
2023 M. Cremonini
Fondamenti di data science : Python, R e open data
2023 M. Cremonini
The dynamical formation of ephemeral groups on networks and their effects on epidemics spreading
2022 M. Cremonini, S. Maghool
The Unknown of the Pandemic: An Agent-Based Model of Final Phase Risks
2020 M. Cremonini, S. Maghool
The Unknown of the Pandemic: An Agent-based Model of Final Phase Risks
2020 M. Cremonini, S. Maghool
Cloud Security Risk Management
2020 M. Cremonini
Measuring the accuracy of software vulnerability assessments: experiments with students and professionals
2020 L. Allodi, M. Cremonini, F. Massacci, W. Shim
The coevolution of contagion and behavior with increasing and decreasing awareness
2019 S. Maghool, N. Maleki-Jirsaraei, M. Cremonini
Big Data Analytics in Healthcare: Design and Implementation for a Hearing Aid Case
2019 M. Cremonini, J.H. Christensen, M.K. Petersen, N.H. Pontoppidan
Productivity and patterns of activity in bug bounty programs: Analysis of hackerone and Google vulnerability research
2019 D. Luna, L. Allodi, M. Cremonini
Improving hearing healthcare with big data analytics of real-time hearing aid data
2019 J.H. Christensen, N.H. Pontoppidan, M. Anisetti, V. Bellandi, M. Cremonini
The effect of security education and expertise on security assessments: the case of software vulnerabilities
2018 L. Allodi, M. Cremonini, F. Massacci, W. Shim
Privacy-aware Big Data Analytics as a Service for Public Health Policies in Smart Cities
2018 M. Anisetti, C. Ardagna, V. Bellandi, M. Cremonini, F. Frati, E. Damiani
Controllability of social networks and the strategic use of random information
2017 M. Cremonini, F. Casamassima
Online Privacy
2017 C. Braghin, M. Cremonini
Big Data Platform for Public Health Policies
2017 M. Anisetti, V. Bellandi, M. Cremonini, E. Damiani, J. Maggesi
Use of random topics as practical control signals in a social network model
2017 F. Casamassima, M. Cremonini
Models and Methods for the Analysis of the Diffusion of Skills in Social Networks
2017 A. Ceselli, M. Cremonini, C. Simeone
Introducing serendipity in a social network model of knowledge diffusion
2016 M. Cremonini
Cloud security risk management
2016 M. Cremonini
0-day vulnerabilities and cybercrime
2015 J. Armin, P. Foti, M. Cremonini
A game theoretic approach to vulnerability patching
2015 G. Gianini, M. Cremonini, A. Rainini, G. Lena Cota, L. Ghemmogne Fossi
Self-organizing techniques for knowledge diffusion in dynamic social networks
2014 L. Allodi, L. Chiodi, M. Cremonini
Privacy on the Internet
2013 M. Cremonini, C. Braghin, C.A. Ardagna
Business continuity planning
2012 M. Cremonini, P. Samarati
The asymmetric diffusion of trust between communities: simulations in dynamic social networks
2011 L. Allodi, L. Chiodi, M. Cremonini
Modifying trust dynamics through cooperation and defection in evolving social networks
2011 L. Allodi, L. Chiodi, M. Cremonini
An obfuscation-based approach for protecting location privacy
2011 C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati
The Dorothy project : an open botnet analysis framework for automatic tracking and activity visualization
2010 M. Cremonini, M. Riccardi
Managing privacy in location-based access control systems
2010 C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati
A framework for financial botnet analysis
2010 M. Riccardi, D. Oro, J. Luna, M. Cremonini, M. Vilanova
Landscape-aware location-privacy protection in location-based services
2009 C.A. Ardagna, M. Cremonini, G. Gianini
Access control in location-based services
2009 C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati
Risks and benefits of signaling information system characteristics to strategic attackers
2009 M. Cremonini, D. Nizovtsev
Net privacy
2009 M. Cremonini, C. Braghin, C.A. Ardagna
Balanced clustering for efficient detection of scientific plagiarism
2009 A. Ceselli, R. Cordone, M. Cremonini
Location privacy in pervasive computing
2008 C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati
Privacy-enhanced location-based access control
2008 C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati
Privacy in the electronic society : emerging problems and solutions
2008 C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati
A privacy-aware access control system
2008 C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati
Managing privacy in LBAC systems
2007 C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati
Learning computer networking on open paravirtual laboratories
2007 M. Anisetti, V. Bellandi, A. Colombo, M. Cremonini, E. Damiani, F. Frati, J.T. Hounsou, D. Rebeccani
A middleware architecture for integrating privacy preferences and location accuracy
2007 C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati
Location privacy protection through obfuscation-based techniques
2007 C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati
Business continuity planning
2007 M. Cremonini, P. Samarati
Privacy-enhanced location services information
2007 C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati
Role of signaling in information warfare
2007 M. Cremonini, D. Nizovtsev
Privacy-enhanced identity management for e-services
2007 C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, F. Frati, P. Samarati
Understanding and influencing attackers’ decisions: implications for security investment strategies
2006 M. Cremonini, D. Nizovtsev
Contingency planning management
2006 M. Cremonini, P. Samarati
Network-based intrusion detection systems
2006 M. Cremonini
The architecture of a privacy-aware access control decision component
2006 C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati
Security, privacy, and trust in mobile systems
2006 M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati
Location-based metadata and negotiation protocols for LBAC in a one-to-many scenario
2006 C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati
Negotiation protocols for LBAC systems
2006 C. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati
Supporting location-based conditions in access control policies
2006 C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati
Evaluating information security investments from attackers perspective: the return-on-attack (ROA)
2005 M. Cremonini, P. Martini
Towards identity management for e-services
2005 C.A. Ardagna, E. Damiani, S. De Capitani di Vimercati, M. Cremonini, P. Samarati
Security, privacy, and trust in mobile systems
2005 A. Corallo, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, G. Elia, P. Samarati
Beauty and the beast: Hacking for pleasure and profit
2004 M. Cremonini
Renaissance hackery?
2004 M. Cremonini
Semantic-Aware Perimeter Protection
2004 M. Cremonini, E. Damiani, P. Samarati
Semantics-aware perimeter protection
2004 M. Cremonini, E. Damiani, P. Samarati
Disaster recovery planning
2003 M. Cremonini, P. Samarati
An XML-based approach to combine firewalls and web services security specifications
2003 M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati
Using mobile agents for analyzing intrusion in computer networks
2001 J. Aslam, M. Cremonini, D. Kotz, D. Rus
Coordination and access control in open distributed agent systems: The TuCSoN approach
2000 M. Cremonini, A. Omicini, F. Zambonelli
Ruling agent motion in structured environments
2000 M. Cremonini, A. Omicini, F. Zambonelli
Mobile agents integrity for electronic commerce applications
1999 A. Corradi, M. Cremonini, R. Montanari, C. Stefanelli
Modelling network topology and mobile agent interaction: an integrated framework
1999 M. Cremonini, A. Omicini, F. Zambonelli
Building mobile agent applications in HiMAT
1999 M. Cremonini, A. Omicini, F. Zambonelli
Coordination in context: Authentication, authorisation and topology in mobile agent applications
1999 M. Cremonini, A. Omicini, F. Zambonelli
Multi-agent systems on the internet: extending the scope of coordination towards security and topology
1999 M. Cremonini, A. Omicini, F. Zambonelli
Melding abstractions with mobile agents
1998 A. Corradi, M. Cremonini, C. Stefanelli
Locality abstractions and security models in a Mobile Agent environment
1998 A. Corradi, M. Cremonini, C. Stefanelli
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile