Id | Type | Title | Authors | Venue | Year |
1 | Thesis/ Dissertation | The GDPR Compliance Through Access Control Systems | Said Daoudagh | ETD Archivio digitale delle tesi discusse presso l’Università di Pisa | 2021 |
2 | Conference proceedings /workshop | GRADUATION: A GDPR-based Mutation Methodology | Said Daoudag, Eda Marchetti | Quality of Information and Communications Technology. QUATIC 2021. Communications in Computer and Information Science, vol 1439 | 2021 |
3 | Conference proceedings /workshop | BIECO Runtime Auditing Framework | Antonello Calabrò, Emilia Cioroaica, Said Daoudag, Eda Marchetti | 14th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2021) Advances in Intelligent Systems and Computing, vol 1400, pp. 181-191. | 2021 |
4 | Conference proceedings /workshop | Basic Aspects in Redundancy-Based Intrusion Tolerance | Felicita Di Giandomenico, Giulio Masetti | 14th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2021) Advances in Intelligent Systems and Computing, vol 1400, pp. 192-202. | 2021 |
5 | Conference proceedings /workshop | MENTORS – Monitoring Environment for System of Systems | Antonello Calabrò, Said Daoudagh, Eda Marchetti | Proceedings of the 17th International Conference on Web Information Systems and Technologies (WEBIST 2021), pp. 291-298 | 2021 |
6 | Conference proceedings /workshop | Bridging Trust in Runtime Open Evaluation Scenarios | Emilia Cioroaica, Barbora Buhnova, Eda Marchetti, Daniel Schneider, Thomas Kuhn | Model and Data Engineering in the Digitalization Era. MEDI 2021. Communications in Computer and Information Science, vol 1481, pp. 112-120 | 2021 |
7 | Conference proceedings /workshop | GROOT: A GDPR-based Combinatorial Testing Approach | Said Daoudagh, Eda Marchetti | The 33rd IFIP International Conference on Testing Software and Systems, Lecture Notes in Computer Science vol. 13045, pp. 210-217 | 2021 |
8 | Conference proceedings /workshop | The GDPR Compliance and Access Control Systems: Challenges and Research Opportunities | Said Daoudagh, Eda Marchetti | Proceedings of the 8th International Conference on Information Systems Security and Privacy – ICISSP, pp. 571-578. | 2022 |
9 | Conference proceedings /workshop | Predictive Simulation for Building Trust within Service-based Ecosystems | Emilia Cioroaica, Said Daoudagh, Eda Marchetti | The 20th International Conference on Pervasive Computing and Communications (PerCom 2022), pp. 34-37 | 2022 |
10 | Other | BIECO, un approccio olistico alla cybersecurity (BIECO and holistic approach for the cybersecurity) | Eda Marchetti | Italian newspaper “il sole 24 ore” special insert “SCENARI” | 2022 |
11 | Conference proceedings /workshop | Out-of-sync Schedule Robustness for Time-sensitive Networks | Silviu S. Craciunas, Ramon Serna Oliver | 17th IEEE International Conference on Factory Communication Systems (WFCS), pp. 75-82 | 2021 |
12 | Article in Journal | The Challenges of Software Cybersecurity Certification | José Luis Hernández-Ramos, Sara Nieves Matheu-García, Antonio Skarmeta | IEEE Security & Privacy, vol. 19, no. 1, pp. 99-102 | 2021 |
13 | Article in Journal | Defining the Behavior of IoT Devices Through the MUD Standard: Review, Challenges, and Research Directions | José Luis Hernández-Ramos, Sara Nieves Matheu-García, Angelo Feraudo, Gianmarco Baldini, Jorge Bernal-Bernabe, Poonam Yadav, Antonio Skarmet Paolo Bellavista | IEEE Access, vol. 9, pp. 126265-126285 | 2021 |
14 | Conference proceedings /workshop | The BIECO Conceptual Framework Towards Security and Trust in ICT Ecosystems | Ricardo Peres, Lilian Adkinson, Emilia Cioroaica, Eda Marchetti, Enrico Schiavone, Sara Matheu, Ovidiu Cosma, Radoslaw Piliszek, Jose Barata. | The 33rd IFIP International Conference on Testing Software and Systems (IFIP-ICTSS) | 2021 |
15 | Article in Journal | LPWAN and Embedded Machine Learning as Enablers for the Next Generation of Wearable Devices | Ramon Sanchez-Iborra | Sensors, Vol. 21(15), 5218 | 2021 |
16 | Conference proceedings /workshop | Goals within Trust-based Digital Ecosystems | Emilia Cioroaica, Akanksha Purohit, Barbora Buhnova, and Daniel Schneider | 2021 IEEE/ACM Joint 9th International Workshop on Software Engineering for Systems-of-Systems and 15th Workshop on Distributed Software Development, Software Ecosystems and Systems-of-Systems (SESoS/WDES), pp. 1-7 | 2021 |
17 | Conference proceedings /workshop | Comparison of Safety and Security Analysis Techniques | Emilia Cioroaica, Smruti Ranjan Kar, and Ioannis Sorokos | 14th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2021, Advances in Intelligent Systems and Computing, vol 1400, pp. 234-242. | 2021 |
18 | Article in Journal | On Autonomous Dynamic Software Ecosystems | Rafael Capilla,Emilia Cioroaica, Barbora Buhnova, and Jan Bosch | IEEE Transactions on Engineering Management, vol. 69, no. 6, pp. 3633-3647 | 2022 |
19 | Conference proceedings /workshop | A MDE Tool for Security Risk Assessment of Enterprises | Enrico Schiavone, Nicola Nostro, Francesco Brancati | INDUSTRY TRACK – LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 10., 2021, Florianópolis. | 2021 |
20 | Conference proceedings /workshop | A Survey on the State of the Art of Vulnerability Assessment Techniques | Eva Sotos Martínez, Nora M. Villanueva and Lilian Adkinson Orellana | 14th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2021). Advances in Intelligent Systems and Computing, vol 1400, pp. 203-213 | 2021 |
21 | Conference proceedings /workshop | A Comparative Study of the Most Important Methods for Forecasting the ICT Systems Vulnerabilities | O. Cosma, M. Măcelaru, P. C. Pop, C. Sabo, I. Zelina | 14th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2021). Advances in Intelligent Systems and Computing, vol 1400, pp. 224-232 | 2021 |
22 | Conference proceedings /workshop | StaDRE and StaDRo: Reliability and Robustness Estimation of ML-based Forecasting using Statistical Distance Measures | Mohammed Naveed Akram, Akshatha Ambekar, Ioannis Sorokos, Koorosh Aslansefat, and Daniel Schneider | Computer Safety, Reliability, and Security. SAFECOMP 2022, pp. 289-301 | 2022 |
23 | Conference proceedings /workshop | Data Based Message Validation as a Security Cornerstone in Loose Coupling Software Architecture | Oliviu Matei, Rudolf Erdei, Daniela Delinschi, Laura Andreica | 14th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2021), pp. 214-223 | 2021 |
24 | Conference proceedings /workshop | Forecasting the Number of Bugs and Vulnerabilities in Software Components using Neural Network Models | Ovidiu Cosma, Petrică Pop, Cosmin Sabo, Laura Cosma | 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022), pp. 159-168 | 2022 |
25 | Conference proceedings /workshop | An Ontology-Based Solution for Monitoring IoT Cybersecurity | Said Daoudagh, Eda Marchetti, Antonello Calabrò, Filipa Ferrada, Ana Inês Oliveira, José Barata, Ricardo Peres, Francisco Marques | 5th IFIP International Cross-Domain Conference, IFIPIoT 2022, pp. 158-176 | 2022 |
26 | Conference proceedings /workshop | A comparative study of Machine Learning algorithms for the detection of vulnerable Python libraries | Laura Pérez-Vilarelle, Eva Sotos Martínez and Javier Yépez Martínez | 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022), pp. 138-148 | 2022 |
27 | Conference proceedings /workshop | A paradigm for safe adaptation of collaborating robots | E Cioroaica, B Buhnova, E Tomur | Proceedings of the 17th Symposium on Software Engineering for Adaptive and Self-Managing Systems, pp. 113-119 | 2022 |
28 | Conference proceedings /workshop | Timing Model for Predictive Simulation of Safety-critical Systems | E Cioroaica, B Blanco, J. and Rossi | Proceedings of the 17th International Conference on Software Technologies – (ICSOFT), pp. 331-339 | 2022 |
29 | Conference proceedings /workshop | The concept of ethical digital identities | E Cioroaica, B Buhnova, F Jacobi, D Schneider | Proceedings of the 1st Workshop on Software Engineering for Responsible Artificial Intelligence, pp. 17-20 | 2022 |
30 | Conference proceedings /workshop | Towards trusting the ethical evolution of autonomous dynamic ecosystems | E Cioroaica, B Buhnova, E Tomur | Proceedings of the 1st Workshop on Software Engineering for Responsible Artificial Intelligence, pp. 13-16 | 2022 |
31 | Conference proceedings /workshop | Towards the Concept of Trust Assurance Case | E Cioroaica, B Buhnova, D Schneider, I Sorokos, T Kuhn, E Tomur | 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1581-1586 | 2022 |
32 | Conference proceedings /workshop | Deep-Learning based Trust Management with Self-Adaptation in the Internet of Behavior | H Bangui, E Cioroaica, M Ge, B Buhnova | Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, pp. 874-881 | 2023 |
33 | Article in Journal | Integrating the manufacturer usage description standard in the modelling of cyber-physical systems | Sara Nieves Matheu García, Adrián Sánchez-Cabrera, Enrico Schiavone, Antonio Skarmeta | Computer Standards & Interfaces, Vol. 84, 103777 | 2024 |
34 | Conference proceedings /workshop | Defining the Threat Manufacturer Usage Description Model for Sharing Mitigation Actions | Sara Nieves Matheu-García, Antonio Skarmeta | 1st International Conference on 6G Networking (6GNet), pp. 1-4 | 2022 |
35 | Article in Journal | Federated Cyberattack Detection for Internet of Things-Enabled Smart Cities | Matheu Garcia, Sara Nieves, Mármol, Enrique, Hernández Ramos, José Luis, Skarmeta, Antonio, & Baldini, Gianmarco | IEEE Computer, Vol. 55(12), pp. 65-73 | 2022 |
36 | Article in Journal | A Formal Validation Approach for XACML 3.0 Access Control Policy. | Carmine Caserio, Francesca Lonetti, Eda Marchetti: | Sensors, Vol. 22(8), 2984 | 2022 |