Location privacy protection through obfuscation-based techniques CA Ardagna, M Cremonini, E Damiani, S De Capitani di Vimercati, ... IFIP annual conference on data and applications security and privacy, 47-60, 2007 | 466 | 2007 |
An obfuscation-based approach for protecting location privacy CA Ardagna, M Cremonini, SDC di Vimercati, P Samarati IEEE Transactions on Dependable and Secure Computing 8 (1), 13-27, 2009 | 328 | 2009 |
Supporting location-based conditions in access control policies CA Ardagna, M Cremonini, E Damiani, SDC di Vimercati, P Samarati Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006 | 230 | 2006 |
Evaluating information security investments from attackers perspective: the return-on-attack (ROA) M Cremonini, P Martini | 138 | 2005 |
A privacy-aware access control system CA Ardagna, M Cremonini, S De Capitani di Vimercati, P Samarati Journal of Computer Security 16 (4), 369-397, 2008 | 127 | 2008 |
Learning computer networking on open paravirtual laboratories M Anisetti, V Bellandi, A Colombo, M Cremonini, E Damiani, F Frati, ... IEEE Transactions on Education 50 (4), 302-311, 2007 | 115 | 2007 |
Mobile agents integrity for electronic commerce applications A Corradi, M Cremonini, R Montanari, C Stefanelli Information Systems 24 (6), 519-533, 1999 | 89 | 1999 |
Privacy-aware Big Data Analytics as a service for public health policies in smart cities M Anisetti, C Ardagna, V Bellandi, M Cremonini, F Frati, E Damiani Sustainable cities and society 39, 68-77, 2018 | 87 | 2018 |
Risks and benefits of signaling information system characteristics to strategic attackers M Cremonini, D Nizovtsev Journal of Management Information Systems 26 (3), 241-274, 2009 | 85 | 2009 |
Understanding and influencing attackers’ decisions: Implications for security investment strategies M Cremonini, D Nizovtsev School of Bussiness: working paper 68, 2006 | 73 | 2006 |
Coordination and access control in open distributed agent systems: The TuCSoN approach M Cremonini, A Omicini, F Zambonelli Coordination Languages and Models: 4th International Conference …, 2000 | 67 | 2000 |
Multi-agent systems on the Internet: Extending the scope of coordination towards security and topology M Cremonini, A Omicini, F Zambonelli Multi-Agent System Engineering: 9th European Workshop on Modelling …, 1999 | 64 | 1999 |
Measuring the accuracy of software vulnerability assessments: experiments with students and professionals L Allodi, M Cremonini, F Massacci, W Shim Empirical Software Engineering 25, 1063-1094, 2020 | 44 | 2020 |
Landscape-aware location-privacy protection in location-based services CA Ardagna, M Cremonini, G Gianini Journal of Systems Architecture 55 (4), 243-254, 2009 | 43 | 2009 |
Privacy-enhanced location-based access control CA Ardagna, M Cremonini, SDC Vimercati, P Samarati Handbook of database security: Applications and trends, 531-552, 2008 | 42 | 2008 |
Access control in location-based services CA Ardagna, M Cremonini, S De Capitani di Vimercati, P Samarati Privacy in location-based applications: research issues and emerging trends …, 2009 | 37 | 2009 |
A framework for financial botnet analysis M Riccardi, D Oro, J Luna, M Cremonini, M Vilanova 2010 eCrime Researchers Summit, 1-7, 2010 | 32 | 2010 |
CFD analysis of the Zimmerman's V173 stol aircraft L Piancastelli, A Gatti, L Frizziero, L Ragazzi, M Cremonini JOURNAL OF ENGINEERING AND APPLIED SCIENCES 10 (18), 8063-8070, 2015 | 26 | 2015 |
An XML-based approach to combine firewalls and web services security specifications M Cremonini, SDC di Vimercati, E Damiani, P Samarati Proceedings of the 2003 ACM Workshop on XML Security, 69-78, 2003 | 26 | 2003 |
The dorothy project: An open botnet analysis framework for automatic tracking and activity visualization M Cremonini, M Riccardi 2009 European Conference on Computer Network Defense, 52-54, 2009 | 25 | 2009 |