Follow
Marco Cremonini
Title
Cited by
Cited by
Year
Location privacy protection through obfuscation-based techniques
CA Ardagna, M Cremonini, E Damiani, S De Capitani di Vimercati, ...
IFIP annual conference on data and applications security and privacy, 47-60, 2007
4662007
An obfuscation-based approach for protecting location privacy
CA Ardagna, M Cremonini, SDC di Vimercati, P Samarati
IEEE Transactions on Dependable and Secure Computing 8 (1), 13-27, 2009
3282009
Supporting location-based conditions in access control policies
CA Ardagna, M Cremonini, E Damiani, SDC di Vimercati, P Samarati
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
2302006
Evaluating information security investments from attackers perspective: the return-on-attack (ROA)
M Cremonini, P Martini
1382005
A privacy-aware access control system
CA Ardagna, M Cremonini, S De Capitani di Vimercati, P Samarati
Journal of Computer Security 16 (4), 369-397, 2008
1282008
Learning computer networking on open paravirtual laboratories
M Anisetti, V Bellandi, A Colombo, M Cremonini, E Damiani, F Frati, ...
IEEE Transactions on Education 50 (4), 302-311, 2007
1152007
Mobile agents integrity for electronic commerce applications
A Corradi, M Cremonini, R Montanari, C Stefanelli
Information Systems 24 (6), 519-533, 1999
891999
Privacy-aware Big Data Analytics as a service for public health policies in smart cities
M Anisetti, C Ardagna, V Bellandi, M Cremonini, F Frati, E Damiani
Sustainable cities and society 39, 68-77, 2018
872018
Risks and benefits of signaling information system characteristics to strategic attackers
M Cremonini, D Nizovtsev
Journal of Management Information Systems 26 (3), 241-274, 2009
852009
Understanding and influencing attackers’ decisions: Implications for security investment strategies
M Cremonini, D Nizovtsev
School of Bussiness: working paper 68, 2006
732006
Coordination and access control in open distributed agent systems: The TuCSoN approach
M Cremonini, A Omicini, F Zambonelli
Coordination Languages and Models: 4th International Conference …, 2000
662000
Multi-agent systems on the Internet: Extending the scope of coordination towards security and topology
M Cremonini, A Omicini, F Zambonelli
Multi-Agent System Engineering: 9th European Workshop on Modelling …, 1999
641999
Measuring the accuracy of software vulnerability assessments: experiments with students and professionals
L Allodi, M Cremonini, F Massacci, W Shim
Empirical Software Engineering 25, 1063-1094, 2020
432020
Landscape-aware location-privacy protection in location-based services
CA Ardagna, M Cremonini, G Gianini
Journal of Systems Architecture 55 (4), 243-254, 2009
432009
Privacy-enhanced location-based access control
CA Ardagna, M Cremonini, SDC Vimercati, P Samarati
Handbook of database security: Applications and trends, 531-552, 2008
422008
Access control in location-based services
CA Ardagna, M Cremonini, S De Capitani di Vimercati, P Samarati
Privacy in location-based applications: research issues and emerging trends …, 2009
372009
A framework for financial botnet analysis
M Riccardi, D Oro, J Luna, M Cremonini, M Vilanova
2010 eCrime Researchers Summit, 1-7, 2010
322010
CFD analysis of the Zimmerman's V173 stol aircraft
L Piancastelli, A Gatti, L Frizziero, L Ragazzi, M Cremonini
JOURNAL OF ENGINEERING AND APPLIED SCIENCES 10 (18), 8063-8070, 2015
262015
An XML-based approach to combine firewalls and web services security specifications
M Cremonini, SDC di Vimercati, E Damiani, P Samarati
Proceedings of the 2003 ACM Workshop on XML Security, 69-78, 2003
262003
The dorothy project: An open botnet analysis framework for automatic tracking and activity visualization
M Cremonini, M Riccardi
2009 European Conference on Computer Network Defense, 52-54, 2009
252009
The system can't perform the operation now. Try again later.
Articles 1–20