Sfoglia per Autore
Privacy on the Internet
2013 M. Cremonini, C. Braghin, C.A. Ardagna
Using semantic lifting for improving process mining : a data loss prevention system case study
2013 A. Azzini, C. Braghin, E. Damiani, F. Zavatarelli
Knowledge and business intelligence technologies in cross-enterprise environments for italian advanced mechanical industry
2013 F. Arigliano, A. Azzini, C. Braghin, A. Caforio, P. Ceravolo, E. Damiani, V. Savarino, C. Vicari, F. Zavatarelli
Online Privacy
2017 C. Braghin, M. Cremonini
Is Pokémon GO Watching You? A Survey on the Privacy-Awareness of Location-Based Apps’ Users
2017 C. Braghin, M.D. Vecchio
Are mHealth Apps Secure? : A Case Study
2018 C. Braghin, S. Cimato, A. Della Libera
Designing smart-contract based auctions
2019 C. Braghin, S. Cimato, E. Damiani, M. Baronchelli
Towards Blockchain-Based E-Voting Systems
2019 C. Braghin, S. Cimato, S.R. Cominesi, E. Damiani, L. Mauri
A Model Driven Approach for Cyber Security Scenarios Deployment
2020 C. Braghin, S. Cimato, E. Damiani, F. Frati, L. Mauri, E. Riccobene
Towards the Monitoring and Evaluation of Trainees’ Activities in Cyber Ranges
2020 C. Braghin, S. Cimato, E. Damiani, F. Frati, E. Riccobene, S. Astaneh
Towards ASM-Based Automated Formal Verification of Security Protocols
2021 C. Braghin, M. Lilli, E. Riccobene
The THREAT-ARREST Cyber Range Platform
2021 G. Hatzivasilis, S. Ioannidis, M. Smyrlis, G. Spanoudakis, F. Frati, C. Braghin, E. Damiani, H. Koshutanski, G. Tsakirakis, T. Hildebrandt, L. Goeke, S. Pape, O. Blinder, M. Vinov, G. Leftheriotis, M. Kunc, F. Oikonomou, G. Magilo, V. Petrarolo, A. Chieti, R. Bordianu
Formal proof of a vulnerability in Z-wave IoT protocol
2021 M. Lilli, C. Braghin, E. Riccobene
Dynamic and Scalable Enforcement of Access Control Policies for Big Data
2021 M. Anisetti, C.A. Ardagna, C. Braghin, E. Damiani, A. Polimeno, A. Balestrucci
Towards Trust-preserving Continuous Co-evolution of Digital Twins
2022 M. Bersani, C. Braghin, V. Cortellessa, A. Gargantini, V. Grassi, F. Lo Presti, R. Mirandola, A. Pierantonio, E. Riccobene, P. Scandurra
A model-based approach for vulnerability analysis of IoT security protocols: The Z-Wave case study
2023 C. Braghin, M. Lilli, E. Riccobene
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile