| A survey on multi-factor authentication for online banking in the wild F Sinigaglia, R Carbone, G Costa, N Zannone Computers & Security 95, 101745, 2020 | 116 | 2020 |
| Detection of images with adult content for parental control on mobile devices? G Amato, P Bolettieri, G Costa, F La Torre, F Martinelli Proceedings of the 6th International Conference on Mobile Technology …, 2009 | 86 | 2009 |
| Bring your own device, securely A Armando, G Costa, A Merlo Proceedings of the 28th annual acm symposium on applied computing, 1852-1858, 2013 | 81 | 2013 |
| Waf-a-mole: evading web application firewalls through adversarial machine learning L Demetrio, A Valenza, G Costa, G Lagorio Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1745-1752, 2020 | 67 | 2020 |
| Building next generation cyber ranges with crack E Russo, G Costa, A Armando Computers & Security 95, 101837, 2020 | 63 | 2020 |
| Securing the" bring your own device" paradigm A Armando, G Costa, L Verderame, A Merlo Computer 47 (6), 48-56, 2014 | 57 | 2014 |
| Formal modeling and reasoning about the android security framework A Armando, G Costa, A Merlo International Symposium on Trustworthy Global Computing, 64-81, 2012 | 46 | 2012 |
| Runtime monitoring for next generation java me platform G Costa, F Martinelli, P Mori, C Schaefer, T Walter Computers & Security 29 (1), 74-87, 2010 | 40 | 2010 |
| Extending Security-by-Contract with quantitative trust on mobile devices G Costa, N Dragoni, A Lazouski, F Martinelli, F Massacci, I Matteucci 2010 International Conference on Complex, Intelligent and Software Intensive …, 2010 | 38 | 2010 |
| Automating the generation of cyber range virtual scenarios with VSDL G Costa, E Russo, A Armando arXiv preprint arXiv:2001.06681, 2020 | 36 | 2020 |
| Securing Java with local policies M Bartoletti, G Costa, P Degano, F Martinelli, R Zunino Journal of Object Technology 8 (4), 5-32, 2009 | 36* | 2009 |
| Scenario design and validation for next generation cyber ranges E Russo, G Costa, A Armando 2018 IEEE 17th International Symposium on Network Computing and Applications …, 2018 | 35 | 2018 |
| Enabling BYOD through secure meta-market A Armando, G Costa, A Merlo, L Verderame Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014 | 35 | 2014 |
| The main builders of Mediterranean coralligenous: 2D and 3D quantitative approaches for its identification VA Bracchi, P Bazzicalupo, L Fallati, AG Varzi, A Savini, MP Negri, ... Frontiers in Earth Science 10, 910522, 2022 | 33 | 2022 |
| Lidite: a full-fledged and featherweight digital twin framework E Russo, G Costa, G Longo, A Armando, A Merlo IEEE Transactions on Dependable and Secure Computing 20 (6), 4899-4912, 2023 | 27 | 2023 |
| Android permissions unleashed A Armando, R Carbone, G Costa, A Merlo 2015 IEEE 28th Computer Security Foundations Symposium, 320-333, 2015 | 27 | 2015 |
| Formal modeling and automatic enforcement of Bring Your Own Device policies A Armando, G Costa, A Merlo, L Verderame International Journal of Information Security 14 (2), 123-140, 2015 | 27 | 2015 |
| Covert channel attack to federated learning systems G Costa, F Pinelli, S Soderi, G Tolomei arXiv preprint arXiv:2104.10561, 2021 | 24 | 2021 |
| Security-by-Contract-with-Trust for mobile devices G Costa, A Lazouski, F Martinelli, I Matteucci, V Issarny, R Saadi, ... Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2010 | 21 | 2010 |
| WAF-A-MoLE: An adversarial tool for assessing ML-based WAFs A Valenza, L Demetrio, G Costa, G Lagorio SoftwareX 11, 100367, 2020 | 20 | 2020 |