[go: up one dir, main page]

Follow
Gabriele Costa
Gabriele Costa
Verified email at imtlucca.it
Title
Cited by
Cited by
Year
A survey on multi-factor authentication for online banking in the wild
F Sinigaglia, R Carbone, G Costa, N Zannone
Computers & Security 95, 101745, 2020
1162020
Detection of images with adult content for parental control on mobile devices?
G Amato, P Bolettieri, G Costa, F La Torre, F Martinelli
Proceedings of the 6th International Conference on Mobile Technology …, 2009
862009
Bring your own device, securely
A Armando, G Costa, A Merlo
Proceedings of the 28th annual acm symposium on applied computing, 1852-1858, 2013
812013
Waf-a-mole: evading web application firewalls through adversarial machine learning
L Demetrio, A Valenza, G Costa, G Lagorio
Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1745-1752, 2020
672020
Building next generation cyber ranges with crack
E Russo, G Costa, A Armando
Computers & Security 95, 101837, 2020
632020
Securing the" bring your own device" paradigm
A Armando, G Costa, L Verderame, A Merlo
Computer 47 (6), 48-56, 2014
572014
Formal modeling and reasoning about the android security framework
A Armando, G Costa, A Merlo
International Symposium on Trustworthy Global Computing, 64-81, 2012
462012
Runtime monitoring for next generation java me platform
G Costa, F Martinelli, P Mori, C Schaefer, T Walter
Computers & Security 29 (1), 74-87, 2010
402010
Extending Security-by-Contract with quantitative trust on mobile devices
G Costa, N Dragoni, A Lazouski, F Martinelli, F Massacci, I Matteucci
2010 International Conference on Complex, Intelligent and Software Intensive …, 2010
382010
Automating the generation of cyber range virtual scenarios with VSDL
G Costa, E Russo, A Armando
arXiv preprint arXiv:2001.06681, 2020
362020
Securing Java with local policies
M Bartoletti, G Costa, P Degano, F Martinelli, R Zunino
Journal of Object Technology 8 (4), 5-32, 2009
36*2009
Scenario design and validation for next generation cyber ranges
E Russo, G Costa, A Armando
2018 IEEE 17th International Symposium on Network Computing and Applications …, 2018
352018
Enabling BYOD through secure meta-market
A Armando, G Costa, A Merlo, L Verderame
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
352014
The main builders of Mediterranean coralligenous: 2D and 3D quantitative approaches for its identification
VA Bracchi, P Bazzicalupo, L Fallati, AG Varzi, A Savini, MP Negri, ...
Frontiers in Earth Science 10, 910522, 2022
332022
Lidite: a full-fledged and featherweight digital twin framework
E Russo, G Costa, G Longo, A Armando, A Merlo
IEEE Transactions on Dependable and Secure Computing 20 (6), 4899-4912, 2023
272023
Android permissions unleashed
A Armando, R Carbone, G Costa, A Merlo
2015 IEEE 28th Computer Security Foundations Symposium, 320-333, 2015
272015
Formal modeling and automatic enforcement of Bring Your Own Device policies
A Armando, G Costa, A Merlo, L Verderame
International Journal of Information Security 14 (2), 123-140, 2015
272015
Covert channel attack to federated learning systems
G Costa, F Pinelli, S Soderi, G Tolomei
arXiv preprint arXiv:2104.10561, 2021
242021
Security-by-Contract-with-Trust for mobile devices
G Costa, A Lazouski, F Martinelli, I Matteucci, V Issarny, R Saadi, ...
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2010
212010
WAF-A-MoLE: An adversarial tool for assessing ML-based WAFs
A Valenza, L Demetrio, G Costa, G Lagorio
SoftwareX 11, 100367, 2020
202020
The system can't perform the operation now. Try again later.
Articles 1–20