IdTypeTitleAuthorsVenueYear
1Thesis/ DissertationThe GDPR Compliance Through Access Control SystemsSaid DaoudaghETD Archivio digitale delle tesi discusse presso l’Università di Pisa2021
2Conference proceedings /workshopGRADUATION: A GDPR-based Mutation MethodologySaid Daoudag, Eda MarchettiQuality of Information and Communications Technology. QUATIC 2021. Communications in Computer and Information Science, vol 14392021
3Conference proceedings /workshopBIECO Runtime Auditing FrameworkAntonello Calabrò, Emilia Cioroaica, Said Daoudag, Eda Marchetti14th International Conference on Computational Intelligence in Security
for Information Systems (CISIS 2021) Advances in Intelligent Systems and Computing, vol 1400, pp. 181-191.
2021
4Conference proceedings /workshopBasic Aspects in Redundancy-Based Intrusion ToleranceFelicita Di Giandomenico, Giulio Masetti14th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2021) Advances in Intelligent Systems and Computing, vol 1400, pp. 192-202.2021
5Conference proceedings /workshopMENTORS – Monitoring Environment for System of SystemsAntonello Calabrò, Said Daoudagh, Eda MarchettiProceedings of the 17th International Conference on Web Information Systems and Technologies (WEBIST 2021), pp. 291-2982021
6Conference proceedings /workshopBridging Trust in Runtime Open Evaluation ScenariosEmilia Cioroaica, Barbora Buhnova, Eda Marchetti, Daniel Schneider, Thomas KuhnModel and Data Engineering in the Digitalization Era. MEDI 2021. Communications in Computer and Information Science, vol 1481, pp. 112-1202021
7Conference proceedings /workshopGROOT: A GDPR-based Combinatorial Testing ApproachSaid Daoudagh, Eda MarchettiThe 33rd IFIP International Conference on Testing Software and Systems, Lecture Notes in Computer Science vol. 13045, pp. 210-2172021
8Conference proceedings /workshopThe GDPR Compliance and Access Control Systems: Challenges and Research OpportunitiesSaid Daoudagh, Eda MarchettiProceedings of the 8th International Conference on Information Systems Security and Privacy – ICISSP, pp. 571-578.2022
9Conference proceedings /workshopPredictive Simulation for Building Trust within Service-based EcosystemsEmilia Cioroaica, Said Daoudagh, Eda MarchettiThe 20th International Conference on Pervasive Computing and Communications (PerCom 2022), pp. 34-372022
10OtherBIECO, un approccio olistico alla cybersecurity (BIECO and holistic approach for the cybersecurity)Eda MarchettiItalian newspaper “il sole 24 ore” special insert “SCENARI”2022
11Conference proceedings /workshopOut-of-sync Schedule Robustness for Time-sensitive NetworksSilviu S. Craciunas, Ramon Serna Oliver17th IEEE International Conference on Factory Communication Systems (WFCS), pp. 75-822021
12Article in JournalThe Challenges of Software Cybersecurity CertificationJosé Luis Hernández-Ramos, Sara Nieves Matheu-García, Antonio SkarmetaIEEE Security & Privacy, vol. 19, no. 1, pp. 99-1022021
13Article in JournalDefining the Behavior of IoT Devices Through the MUD Standard: Review, Challenges, and Research DirectionsJosé Luis Hernández-Ramos, Sara Nieves Matheu-García, Angelo Feraudo, Gianmarco Baldini, Jorge Bernal-Bernabe, Poonam Yadav, Antonio Skarmet Paolo BellavistaIEEE Access, vol. 9, pp. 126265-1262852021
14Conference proceedings /workshopThe BIECO Conceptual Framework Towards Security and Trust in ICT EcosystemsRicardo Peres, Lilian Adkinson, Emilia Cioroaica, Eda Marchetti, Enrico Schiavone, Sara Matheu, Ovidiu Cosma,  Radoslaw Piliszek, Jose Barata.The 33rd IFIP International Conference on Testing Software and Systems (IFIP-ICTSS)2021
15Article in JournalLPWAN and Embedded Machine Learning as Enablers for the Next Generation of Wearable DevicesRamon Sanchez-IborraSensors, Vol. 21(15), 52182021
16Conference proceedings /workshopGoals within Trust-based Digital EcosystemsEmilia Cioroaica, Akanksha Purohit, Barbora Buhnova, and Daniel Schneider2021 IEEE/ACM Joint 9th International Workshop on Software Engineering for Systems-of-Systems and 15th Workshop on Distributed Software Development, Software Ecosystems and Systems-of-Systems (SESoS/WDES), pp. 1-72021
17Conference proceedings /workshopComparison of Safety and Security Analysis TechniquesEmilia Cioroaica, Smruti Ranjan Kar, and Ioannis Sorokos14th International Conference on Computational Intelligence in Security
for Information Systems (CISIS 2021, Advances in Intelligent Systems and Computing, vol 1400, pp. 234-242.
2021
18Article in JournalOn Autonomous Dynamic Software EcosystemsRafael Capilla,Emilia Cioroaica, Barbora Buhnova, and Jan BoschIEEE Transactions on Engineering Management, vol. 69, no. 6, pp. 3633-36472022
19Conference proceedings /workshopA MDE Tool for Security Risk
Assessment of Enterprises
Enrico Schiavone, Nicola Nostro, Francesco BrancatiINDUSTRY TRACK – LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 10., 2021, Florianópolis.2021
20Conference proceedings /workshopA Survey on the State of the Art of Vulnerability Assessment TechniquesEva Sotos Martínez, Nora M. Villanueva and Lilian Adkinson Orellana14th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2021). Advances in Intelligent Systems and Computing, vol 1400, pp. 203-2132021
21Conference proceedings /workshopA Comparative Study of the Most Important Methods for Forecasting the ICT Systems VulnerabilitiesO. Cosma, M. Măcelaru, P. C. Pop, C. Sabo, I. Zelina14th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2021). Advances in Intelligent Systems and Computing, vol 1400, pp. 224-2322021
22Conference proceedings /workshopStaDRE and StaDRo: Reliability and Robustness Estimation of ML-based Forecasting using Statistical Distance MeasuresMohammed Naveed Akram, Akshatha Ambekar, Ioannis Sorokos, Koorosh Aslansefat, and Daniel SchneiderComputer Safety, Reliability, and Security. SAFECOMP 2022, pp. 289-3012022
23Conference proceedings /workshopData Based Message Validation as a Security Cornerstone in Loose Coupling Software ArchitectureOliviu Matei, Rudolf Erdei, Daniela Delinschi, Laura Andreica14th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2021), pp. 214-2232021
24Conference proceedings /workshopForecasting the Number of Bugs and Vulnerabilities in Software Components using Neural Network ModelsOvidiu Cosma, Petrică Pop, Cosmin Sabo, Laura Cosma15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022), pp. 159-1682022
25Conference proceedings /workshopAn Ontology-Based Solution for Monitoring IoT CybersecuritySaid Daoudagh, Eda Marchetti, Antonello Calabrò, Filipa Ferrada, Ana Inês Oliveira, José Barata, Ricardo Peres, Francisco Marques5th IFIP International Cross-Domain Conference, IFIPIoT 2022, pp. 158-1762022
26Conference proceedings /workshopA comparative study of Machine Learning algorithms for the detection of vulnerable Python librariesLaura Pérez-Vilarelle, Eva Sotos Martínez and Javier Yépez Martínez15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022), pp. 138-1482022
27Conference proceedings /workshopA paradigm for safe adaptation of collaborating robotsE Cioroaica, B Buhnova, E TomurProceedings of the 17th Symposium on Software Engineering for Adaptive and Self-Managing Systems, pp. 113-1192022
28Conference proceedings /workshopTiming Model for Predictive Simulation of Safety-critical SystemsE Cioroaica, B Blanco, J. and RossiProceedings of the 17th International Conference on Software Technologies – (ICSOFT), pp. 331-3392022
29Conference proceedings /workshopThe concept of ethical digital identitiesE Cioroaica, B Buhnova, F Jacobi, D SchneiderProceedings of the 1st Workshop on Software Engineering for Responsible Artificial Intelligence, pp. 17-202022
30Conference proceedings /workshopTowards trusting the ethical evolution of autonomous dynamic ecosystemsE Cioroaica, B Buhnova, E TomurProceedings of the 1st Workshop on Software Engineering for Responsible Artificial Intelligence, pp. 13-162022
31Conference proceedings /workshopTowards the Concept of Trust Assurance CaseE Cioroaica, B Buhnova, D Schneider, I Sorokos, T Kuhn, E Tomur2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1581-15862022
32Conference proceedings /workshopDeep-Learning based Trust Management with Self-Adaptation in the Internet of BehaviorH Bangui, E Cioroaica, M Ge, B BuhnovaProceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, pp. 874-8812023
33Article in JournalIntegrating the manufacturer usage description standard in the modelling of cyber-physical systemsSara Nieves Matheu García, Adrián Sánchez-Cabrera, Enrico Schiavone, Antonio SkarmetaComputer Standards & Interfaces, Vol. 84, 1037772024
34Conference proceedings /workshopDefining the Threat Manufacturer Usage Description Model for Sharing Mitigation ActionsSara Nieves Matheu-García, Antonio Skarmeta1st International Conference on 6G Networking (6GNet), pp. 1-42022
35Article in JournalFederated Cyberattack Detection for Internet of Things-Enabled Smart CitiesMatheu Garcia, Sara Nieves, Mármol, Enrique, Hernández Ramos, José Luis, Skarmeta, Antonio, & Baldini, GianmarcoIEEE Computer, Vol. 55(12), pp. 65-732022
36Article in JournalA Formal Validation Approach for XACML 3.0 Access Control Policy.Carmine Caserio, Francesca Lonetti, Eda Marchetti:Sensors, Vol. 22(8), 29842022
Share This