COSTA, GABRIELE
COSTA, GABRIELE
I.M.T. (Istituzioni, Mercati, Tecnologie) Alti Studi
A NERD DOGMA: Introducing CTF to Non-Expert Audience
2020-01-01 Costa, Gabriele; Lualdi, Martina; Ribaudo, Marina; Valenza, Andrea
A survey on multi-factor authentication for online banking in the wild
2020-01-01 Sinigaglia, F.; Carbone, R.; Costa, G.; Zannone, N.
Android Permissions Unleashed
2015-01-01 Armando, Alessandro; Carbone, Roberto; Costa, Gabriele; Merlo, Alessio
Android vs. SEAndroid: An empirical assessment
2016-01-01 Merlo, Alessio; Costa, Gabriele; Verderame, Luca; Armando, Alessandro
Automatic security verification of mobile app configurations
2018-01-01 Costa, Gabriele; Merlo, Alessio; Verderame, Luca; Armando, Alessandro
Bring your own device, securely
2013-01-01 Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio
Building next generation Cyber Ranges with CRACK
2020-01-01 Russo, E.; Costa, G.; Armando, A.
Designing a Serious Game for Cybersecurity Education
2023-01-01 Costa, Gabriele; Ribaudo, Marina
Detection of images with adult content for parental control on mobile devices
2009-01-01 Amato, G.; Bolettieri, P.; Costa, G.; la Torre, F.; Martinelli, F.
Developing a NATO BYOD security policy
2016-01-01 Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca; Wrona, Konrad
Elective temporal logic
2011-01-01 Costa, G.; Matteucci, I.
Enabling BYOD through secure meta-market
2014-01-01 Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca
Enhancing malware classification with symbolic features
2021-01-01 Siwach, C.; Costa, G.; de Nicola, R.
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
2010-01-01 Costa, G.; Dragoni, N.; Lazouski, A.; Martinelli, F.; Massacci, F.; Matteucci, I.
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
2010-01-01 Costa, G; Dragoni, N; Lazouski, A; Martinelli, F; Massacci, F; Matteucci, I
FLEX: A flexible code authentication framework for delegating mobile app customization
2016-01-01 Costa, Gabriele; Gasti, Paolo; Merlo, Alessio; Yu, Shunt-Hsi
Formal modeling and automatic enforcement of Bring Your Own Device policies
2014-01-01 Armando, A.; Costa, G.; Merlo, A.; Verderame, L.
Formal Modeling and Reasoning about the Android Security Framework
2013-01-01 Armando, Alessandro; Costa, Gabriele; Merlo, Alessio
Formally verifying security protocols built on watermarking and jamming
2023-01-01 Costa, Gabriele; Degano, Pierpaolo; Galletta, Letterio; Soderi, Simone
From Natural Projection to Partial Model Checking and Back
2018-01-01 Costa, G; Basin, D; Bodei, C; Degano, P; Galletta, L
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
A NERD DOGMA: Introducing CTF to Non-Expert Audience | 1-gen-2020 | Costa, Gabriele; Lualdi, Martina; Ribaudo, Marina; Valenza, Andrea | |
A survey on multi-factor authentication for online banking in the wild | 1-gen-2020 | Sinigaglia, F.; Carbone, R.; Costa, G.; Zannone, N. | |
Android Permissions Unleashed | 1-gen-2015 | Armando, Alessandro; Carbone, Roberto; Costa, Gabriele; Merlo, Alessio | |
Android vs. SEAndroid: An empirical assessment | 1-gen-2016 | Merlo, Alessio; Costa, Gabriele; Verderame, Luca; Armando, Alessandro | |
Automatic security verification of mobile app configurations | 1-gen-2018 | Costa, Gabriele; Merlo, Alessio; Verderame, Luca; Armando, Alessandro | |
Bring your own device, securely | 1-gen-2013 | Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio | |
Building next generation Cyber Ranges with CRACK | 1-gen-2020 | Russo, E.; Costa, G.; Armando, A. | |
Designing a Serious Game for Cybersecurity Education | 1-gen-2023 | Costa, Gabriele; Ribaudo, Marina | |
Detection of images with adult content for parental control on mobile devices | 1-gen-2009 | Amato, G.; Bolettieri, P.; Costa, G.; la Torre, F.; Martinelli, F. | |
Developing a NATO BYOD security policy | 1-gen-2016 | Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca; Wrona, Konrad | |
Elective temporal logic | 1-gen-2011 | Costa, G.; Matteucci, I. | |
Enabling BYOD through secure meta-market | 1-gen-2014 | Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca | |
Enhancing malware classification with symbolic features | 1-gen-2021 | Siwach, C.; Costa, G.; de Nicola, R. | |
Extending Security-by-Contract with Quantitative Trust on Mobile Devices | 1-gen-2010 | Costa, G.; Dragoni, N.; Lazouski, A.; Martinelli, F.; Massacci, F.; Matteucci, I. | |
Extending Security-by-Contract with Quantitative Trust on Mobile Devices | 1-gen-2010 | Costa, G; Dragoni, N; Lazouski, A; Martinelli, F; Massacci, F; Matteucci, I | |
FLEX: A flexible code authentication framework for delegating mobile app customization | 1-gen-2016 | Costa, Gabriele; Gasti, Paolo; Merlo, Alessio; Yu, Shunt-Hsi | |
Formal modeling and automatic enforcement of Bring Your Own Device policies | 1-gen-2014 | Armando, A.; Costa, G.; Merlo, A.; Verderame, L. | |
Formal Modeling and Reasoning about the Android Security Framework | 1-gen-2013 | Armando, Alessandro; Costa, Gabriele; Merlo, Alessio | |
Formally verifying security protocols built on watermarking and jamming | 1-gen-2023 | Costa, Gabriele; Degano, Pierpaolo; Galletta, Letterio; Soderi, Simone | |
From Natural Projection to Partial Model Checking and Back | 1-gen-2018 | Costa, G; Basin, D; Bodei, C; Degano, P; Galletta, L |