Sfoglia per Autore
A model-based approach for vulnerability analysis of IoT security protocols: The Z-Wave case study
2023 C. Braghin, M. Lilli, E. Riccobene
Towards Trust-preserving Continuous Co-evolution of Digital Twins
2022 M. Bersani, C. Braghin, V. Cortellessa, A. Gargantini, V. Grassi, F. Lo Presti, R. Mirandola, A. Pierantonio, E. Riccobene, P. Scandurra
Towards ASM-Based Automated Formal Verification of Security Protocols
2021 C. Braghin, M. Lilli, E. Riccobene
The THREAT-ARREST Cyber Range Platform
2021 G. Hatzivasilis, S. Ioannidis, M. Smyrlis, G. Spanoudakis, F. Frati, C. Braghin, E. Damiani, H. Koshutanski, G. Tsakirakis, T. Hildebrandt, L. Goeke, S. Pape, O. Blinder, M. Vinov, G. Leftheriotis, M. Kunc, F. Oikonomou, G. Magilo, V. Petrarolo, A. Chieti, R. Bordianu
Formal proof of a vulnerability in Z-wave IoT protocol
2021 M. Lilli, C. Braghin, E. Riccobene
Dynamic and Scalable Enforcement of Access Control Policies for Big Data
2021 M. Anisetti, C.A. Ardagna, C. Braghin, E. Damiani, A. Polimeno, A. Balestrucci
A Model Driven Approach for Cyber Security Scenarios Deployment
2020 C. Braghin, S. Cimato, E. Damiani, F. Frati, L. Mauri, E. Riccobene
Towards the Monitoring and Evaluation of Trainees’ Activities in Cyber Ranges
2020 C. Braghin, S. Cimato, E. Damiani, F. Frati, E. Riccobene, S. Astaneh
Designing smart-contract based auctions
2019 C. Braghin, S. Cimato, E. Damiani, M. Baronchelli
Towards Blockchain-Based E-Voting Systems
2019 C. Braghin, S. Cimato, S.R. Cominesi, E. Damiani, L. Mauri
Are mHealth Apps Secure? : A Case Study
2018 C. Braghin, S. Cimato, A. Della Libera
Is Pokémon GO Watching You? A Survey on the Privacy-Awareness of Location-Based Apps’ Users
2017 C. Braghin, M.D. Vecchio
Online Privacy
2017 C. Braghin, M. Cremonini
Knowledge and business intelligence technologies in cross-enterprise environments for italian advanced mechanical industry
2013 F. Arigliano, A. Azzini, C. Braghin, A. Caforio, P. Ceravolo, E. Damiani, V. Savarino, C. Vicari, F. Zavatarelli
Using semantic lifting for improving process mining : a data loss prevention system case study
2013 A. Azzini, C. Braghin, E. Damiani, F. Zavatarelli
Privacy on the Internet
2013 M. Cremonini, C. Braghin, C.A. Ardagna
The binary perfect phylogeny with persistent characters
2012 P. Bonizzoni, C. Braghin, R. Dondi, G. Trucco
A model checking-based approach for security policy verification of mobile systems
2011 C. Braghin, N. Sharygina, K. Barone Adesi
Net privacy
2009 M. Cremonini, C. Braghin, C.A. Ardagna
Information flow security in boundary ambients
2008 C. Braghin, A. Cortesi, R. Focardi
An exact approach for solving the balanced minimum evolution problem
2008 R. Aringhieri, C. Braghin, D. Catanzaro
Automated verification of security policies in mobile code
2007 C. Braghin, N. Sharygina, K. Barone Adesi
Modeling and verification of mobile systems
2006 C. Braghin, N. Sharygina
Role-based access control for a distributed calculus
2006 C. Braghin, D. Gorla, V. Sassone
Analisi dei costi di proprietà di prodotti software nella transizione a sistemi open source
2005 B. Russo, C. Braghin, M. Ceschi, P. Gasperi, G. Succi
Defining the total cost of ownership for the transition to open source systems
2005 B. Russo, C. Braghin, P. Gasperi, A. Sillitti, G. Succi
Nesting analysis of mobile ambients
2004 C. Braghin, A. Cortesi, R. Focardi, F.L. Luccio, C. Piazza
A distributed calculus for role-based access control
2004 C. Braghin, D. Gorla, V. Sassone
Behind BANANA : design and implementation of a tool for nesting analysis of mobile ambients
2004 C. Braghin, A. Cortesi, R. Focardi, F.L. Luccio, C. Piazza
Checking integrity via CoPS and Banana : the E-commerce case study
2004 C. Braghin, C. Piazza
Information leakage detection in boundary ambients
2003 C. Braghin, A. Cortesi, R. Focardi
Complexity of nesting analysis in mobile ambients
2003 C. Braghin, A. Cortesi, R. Focardi, F.L. Luccio, C. Piazza
BANANA : a tool for boundary ambients nesting analysis
2003 C. Braghin, A. Cortesi, S. Filippone, R. Focardi, F.L. Luccio, C. Piazza
Security boundaries in mobile ambients
2002 C. Braghin, A. Cortesi, R. Focardi
Control flow analysis of mobile ambients with security boundaries
2002 C. Braghin, A. Cortesi, R. Focardi
Boundary inference for enforcing security policies in mobile ambients
2002 C. Braghin, A. Cortesi, R. Focardi, S. van Bakel
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile