ESSecA: An automated expert system for threat modelling and penetration testing for IoT ecosystems M Rak, G Salzillo, D Granata Computers and Electrical Engineering 99, 107721, 2022 | 46 | 2022 |
Systematic analysis of automated threat modelling techniques: Comparison of open-source tools D Granata, M Rak Software Quality Journal 32 (1), 125-161, 2024 | 16 | 2024 |
Design and Development of a Technique for the Automation of the Risk Analysis Process in IT Security. D Granata, M Rak CLOSER, 87-98, 2021 | 15 | 2021 |
Security in IoT Pairing & Authentication protocols, a Threat Model, a Case Study Analysis. D Granata, M Rak, G Salzillo, U Barbato ITASEC, 207-218, 2021 | 13 | 2021 |
Threat modeling of edge-based IoT applications M Ficco, D Granata, M Rak, G Salzillo International conference on the quality of information and communications …, 2021 | 12 | 2021 |
Risk analysis automation process in it security for cloud applications D Granata, M Rak, G Salzillo International Conference on Cloud Computing and Services Science, 47-68, 2021 | 10 | 2021 |
MetaSenD: a security enabled development life cycle Meta-model D Granata, M Rak, G Salzillo Proceedings of the 17th International Conference on Availability …, 2022 | 8 | 2022 |
Automated generation of 5G fine-grained threat models: A systematic approach G Daniele, R Massimiliano, M Wissam IEEE Access, 2023 | 6 | 2023 |
MAVLink protocol for unmanned aerial vehicle: Vulnerabilities analysis M Ficco, R Palmiero, M Rak, D Granata 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2022 | 6 | 2022 |
A semantic methodology for security controls verification in public administration business processes M Rak, D Granata, B Di Martino, L Colucci Cante Computational Intelligence in Security for Information Systems Conference …, 2022 | 6 | 2022 |
Automated threat modelling and risk analysis in e-Government using BPMN D Granata, M Rak, G Salzillo, G Di Guida, S Petrillo Connection Science 35 (1), 2284645, 2023 | 5 | 2023 |
Automated threat modeling approaches: Comparison of open source tools D Granata, M Rak, G Salzillo International Conference on the Quality of Information and Communications …, 2022 | 5 | 2022 |
GDPR compliance through standard security controls: An automated approach D Granata, M Mastroianni, M Rak, P Cantiello, G Salzillo Journal of High Speed Networks, 1-28, 2024 | 4 | 2024 |
Towards HybridgeCAN, a hybrid bridged CAN platform for automotive security testing D Granata, M Rak, G Salzillo 2021 IEEE International Conference on Cyber Security and Resilience (CSR …, 2021 | 3 | 2021 |
A systematic approach for threat and vulnerability analysis of unmanned aerial vehicles M Ficco, D Granata, F Palmieri, M Rak Internet of Things 26, 101180, 2024 | 2 | 2024 |
Semi-Automatic PenTest Methodology based on Threat-Model: The IoT Brick Case Study GP Rimoli, D Granata, M Ficco 2023 IEEE International Conference on Cloud Computing Technology and Science …, 2023 | 1 | 2023 |
Leveraging Threat Modelling for Effective Penetration Testing in 5G Systems L Chianese, D Granata, P Palmiero, M Rak 2024 IEEE International Conference on Cyber Security and Resilience (CSR …, 2024 | | 2024 |
Advancing ESSecA: a step forward in Automated Penetration Testing M Rak, F Moretta, D Granata Proceedings of the 19th International Conference on Availability …, 2024 | | 2024 |
Navigating IoT Complexity: Developing Datasets for Smart-Home Device Interactions M Rak, D Granata, A Esposito, A Ferretti International Conference on Complex, Intelligent, and Software Intensive …, 2024 | | 2024 |
Systematic Threat Modelling of High-Performance Computing Systems: The V: HPCCRI Case Study. R Elia, D Granata, M Rak CLOSER, 327-337, 2024 | | 2024 |