Scarica il contatto come vcard Foto

Docente a contratto e/o collaboratore didattico
Docente a contratto e/o collaboratore didattico (Scuola Master e Formazione Permanente)

Pubblicazioni più recenti

Pedone, I.; Atzeni, A.; Canavese, D.; Lioy, A. (2021)
Towards a complete software stack to integrate Quantum Key Distribution in a cloud environment. In: IEEE ACCESS, vol. 9, pp. 115270-115291. ISSN 2169-3536 Download fulltext
ATZENI, ANDREA; Diaz, Fernando; Lopez, Francisco; Marcelli, Andrea; Sanchez, Antonio; ... (2020)
The Rise of Android Banking Trojans. In: IEEE POTENTIALS, vol. 39, pp. 13-18. ISSN 0278-6648 Download fulltext
Atzeni, Andrea; Díaz, Fernando; Marcelli, Andrea; Sánchez, Antonio; Squillero, Giovanni; ... (2018)
Countering Android Malware: a Scalable Semi-Supervised Approach for Family-Signature Generation. In: IEEE ACCESS, pp. 59540-59556. ISSN 2169-3536 Download fulltext
Atzeni, Andrea; Faily, S.; Galloni, R. (2018)
Usable security. In: Encyclopedia of Information Science and Technology, Fourth Edition / S.N., Hershey, PA, IGI GLOBAL, pp. 5004-5013. ISBN: 9781522522560
Atzeni, Andrea; Marcelli, Andrea; Muroni, Francesco; Squillero, Giovanni (2017)
HAIT: Heap Analyzer with Input Tracing. In: SECRYPT 2017, Madrid, Spain, 24-26 Luglio 2017, pp. 327-334. ISBN: 978-989-758-259-2
Berbecaru, DIANA GRATIELA; Atzeni, Andrea; DE BENEDICTIS, Marco; Smiraglia, Paolo (2017)
Towards Stronger Data Security in an eID Management Infrastructure. In: PDP-2017: 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing, St. Petersburg (Russia), 06-08 March 2017, pp. 391-395. ISBN: 978-1-5090-6058-0
Smiraglia, Paolo; De Benedictis, Marco; Atzeni, Andrea; Lioy, Antonio; Pucciarelli, ... (2017)
The FICEP Infrastructure - How we deployed the Italian eIDAS Node in the cloud. In: e-Democracy 2017: Privacy-Preserving, Secure, Intelligent e-Government Services, Athens (Greece), December 14-15, 2017, pp. 196-210
Atzeni, Andrea; Su, Tao; Baltatu, Madalina; D'Alessandro, Rosalia; Pessiva, Giovanni (2015)
Android Apps Risk Evaluation: a methodology. In: ICST TRANSACTIONS ON UBIQUITOUS ENVIRONMENTS, vol. 1, pp. 1-18. ISSN 2032-9377 Download fulltext
Atzeni A.; Lioy A. (2015)
Authentication. In: Encyclopedia of Information Science and Technology / M. Khosrow-Pour, S.L., IGI Global, pp. 4239-4247. ISBN: 9781466658882
Atzeni A.; Smiraglia P.; Siringo A. (2015)
Hard clues in soft environments: The Cloud's influence on digital forensics. In: Handbook of Research on Security Considerations in Cloud Computing / Kashif Munir, Mubarak S. Al-Mutairi, Lawan A. Mohammed, S.L., IGI Global, pp. 258-284. ISBN: 9781466683877
A. Atzeni;T. Su;M. Baltatu;R. D'Alessandro;G. Pessiva (2014)
How Dangerous is Your Android App? An Evaluation Methodology. In: 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, London, United Kingdom, 02/12/2014-05/12/2014, pp. 130-139
Atzeni, Andrea; Su, Tao; Montanaro, Teodoro (2014)
Lightweight Formal Verification in Real World, A Case Study. In: WISSE 2014: 4th International Workshop on Information Systems Security Engineering, Thessaloniki (Greece), 17 June 2014, pp. 335-342. ISSN 1865-1348
Atzeni A.; Lyle J.; Faily S. (2014)
Developing secure‚ unified multi−device and multi−domain platforms: a case study from the webinos project. In: Architectures and Protocols for Secure Information Technology / A. Ruiz-Martinez, R. Marin-Lopez, F. Pereniguez-Garcia, S.L., IGI Global, pp. 310-333. ISBN: 1466645148
Shamal, Faily; John, Lyle; Ivan, Fléchais; Atzeni, Andrea; Cameroni, Cesare; Hans, ... (2014)
Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework. In: HCI'14: 28th Int. BCS Human Computer Interaction Conference 2014, Southport (UK), 9-12 September 2014, pp. 189-194 Download fulltext
Su T.; Lyle J.;Atzeni A.;Faily S.; Virji H.; Ntanos C.; Botsikas C. (2013)
Continuous integration for web-based software infrastructures: lessons learned on the webinos project. In: HVC-2013: Ninth Haifa Verification Conference, Haifa (Israel), 5-7/11/2013, pp. 145-150. ISSN 0302-9743
Lyle J.; Paverd A.; King-Lacroix J. ; Atzeni A.; Virji H.; Flechais I.; Faily S. (2013)
Personal PKI for the smart device era. In: 9th European Workshop EuroPKI 2012, Pisa (Italy), September 13-14, 2012, pp. 69-84. ISBN: 9783642400117
Faily S.; Lyle J.; Flechais I.; Atzeni A.; Cameroni C.; Myrhaug H.; Goker A.; Kleinfeld ... (2013)
Policies in Context: Factors Influencing the Elicitation and Categorisation of Context−Sensitive Security Policies. In: HUPS-2013: workshop on Home Usable Privacy and Security, Newcastle (UK), 24-26/7/2013
Faily S.; Lyle J.; Paul A.; Atzeni A.; Blomme D.; Desruelle H.; and Bangalore K. (2012)
Requirements Sensemaking using Concept Maps. In: HCSE-2012: 4th International Conference on Human-Centred Software Engineering, Toulouse (France), October 29-31, 2012, pp. 217-232. ISSN 0302-9743. ISBN: 9783642343476
Faily S.; Lyle J.; Namiluko C.; Atzeni A.; Cameroni C. (2012)
Model-driven architectural risk analysis using architectural and contextualised attack patterns. In: MDSec 2012: Workshop on Model-Driven Security, at the 15th ACM/IEEE International Conference on Model Driven Engineering Languages and System, Innsbruck (Austria), October 1-5, 2012. ISBN: 9781450318068
Atzeni A.; Faily S.; Lyle J.; Cameroni C.; Flechais I. (2011)
Here's Johnny: a methodology for developing attacker personas. In: ARES-2011: 6th Int. Conf. on Availability, Reliability and Security, Vienna (Austria), 22-26 August 2011, pp. 722-727. ISBN: 9781457709791
Vedi tutte le pubblicazioni su Porto@Iris