Publications

Publications submitted in journals of several research and technology fields, mainly related to security, IoT and CPS, and Software production.

Id Type Title Authors Venue Year
1

Thesis/

Dissertation

The GDPR Compliance Through Access Control Systems

Said Daoudagh ETD Archivio digitale delle tesi discusse presso l’Università di Pisa 2021
2 Conference proceedings /workshop GRADUATION: A GDPR-based Mutation Methodology Said Daoudag, Eda Marchetti Quality of Information and Communications Technology. QUATIC 2021. Communications in Computer and Information Science, vol 1439 2021
3 Conference proceedings /workshop BIECO Runtime Auditing Framework Antonello Calabrò, Emilia Cioroaica, Said Daoudag, Eda Marchetti 14th International Conference on Computational Intelligence in Security
for Information Systems (CISIS 2021) Advances in Intelligent Systems and Computing, vol 1400, pp. 181-191.
2021
4 Conference proceedings /workshop Basic Aspects in Redundancy-Based Intrusion Tolerance Felicita Di Giandomenico, Giulio Masetti 14th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2021) Advances in Intelligent Systems and Computing, vol 1400, pp. 192-202. 2021
5 Conference proceedings /workshop MENTORS – Monitoring Environment for System of Systems Antonello Calabrò, Said Daoudagh, Eda Marchetti Proceedings of the 17th International Conference on Web Information Systems and Technologies (WEBIST 2021), pp. 291-298 2021
6 Conference proceedings /workshop Bridging Trust in Runtime Open Evaluation Scenarios Emilia Cioroaica, Barbora Buhnova, Eda Marchetti, Daniel Schneider, Thomas Kuhn Model and Data Engineering in the Digitalization Era. MEDI 2021. Communications in Computer and Information Science, vol 1481, pp. 112-120 2021
7 Conference proceedings /workshop GROOT: A GDPR-based Combinatorial Testing Approach Said Daoudagh, Eda Marchetti The 33rd IFIP International Conference on Testing Software and Systems, Lecture Notes in Computer Science vol. 13045, pp. 210-217 2021
8 Conference proceedings /workshop Out-of-sync Schedule Robustness for Time-sensitive Networks Silviu S. Craciunas, Ramon Serna Oliver 17th IEEE International Conference on Factory Communication Systems (WFCS), pp. 75-82 2021
9 Article in Journal The Challenges of Software Cybersecurity Certification José Luis Hernández-Ramos, Sara Nieves Matheu-García, Antonio Skarmeta IEEE Security & Privacy, vol. 19, no. 1, pp. 99-102 2021
10 Article in Journal Defining the Behavior of IoT Devices Through the MUD Standard: Review, Challenges, and Research Directions José Luis Hernández-Ramos, Sara Nieves Matheu-García, Angelo Feraudo, Gianmarco Baldini, Jorge Bernal-Bernabe, Poonam Yadav, Antonio Skarmet Paolo Bellavista IEEE Access, vol. 9, pp. 126265-126285 2021
11 Conference proceedings /workshop The BIECO Conceptual Framework Towards Security and Trust in ICT Ecosystems Ricardo Peres, Lilian Adkinson, Emilia Cioroaica, Eda Marchetti, Enrico Schiavone, Sara Matheu, Ovidiu Cosma,  Radoslaw Piliszek, Jose Barata. The 33rd IFIP International Conference on Testing Software and Systems (IFIP-ICTSS) 2021
12 Article in Journal LPWAN and Embedded Machine Learning as Enablers for the Next Generation of Wearable Devices Ramon Sanchez-Iborra Sensors, Vol. 21(15), 5218 2021
13 Conference proceedings /workshop Goals within Trust-based Digital Ecosystems Emilia Cioroaica, Akanksha Purohit, Barbora Buhnova, and Daniel Schneider 2021 IEEE/ACM Joint 9th International Workshop on Software Engineering for Systems-of-Systems and 15th Workshop on Distributed Software Development, Software Ecosystems and Systems-of-Systems (SESoS/WDES), pp. 1-7 2021
14 Conference proceedings /workshop Comparison of Safety and Security Analysis Techniques Emilia Cioroaica, Smruti Ranjan Kar, and Ioannis Sorokos 14th International Conference on Computational Intelligence in Security
for Information Systems (CISIS 2021, Advances in Intelligent Systems and Computing, vol 1400, pp. 234-242.
2021
15 Conference proceedings /workshop A MDE Tool for Security Risk
Assessment of Enterprises
Enrico Schiavone, Nicola Nostro, Francesco Brancati INDUSTRY TRACK – LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 10., 2021, Florianópolis. 2021
16 Conference proceedings /workshop A Survey on the State of the Art of Vulnerability Assessment Techniques Eva Sotos Martínez, Nora M. Villanueva and Lilian Adkinson Orellana 14th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2021). Advances in Intelligent Systems and Computing, vol 1400, pp. 203-213 2021
17 Conference proceedings /workshop A Comparative Study of the Most Important Methods for Forecasting the ICT Systems Vulnerabilities O. Cosma, M. Măcelaru, P. C. Pop, C. Sabo, I. Zelina 14th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2021). Advances in Intelligent Systems and Computing, vol 1400, pp. 224-232 2021
18 Conference proceedings /workshop Data Based Message Validation as a Security Cornerstone in Loose Coupling Software Architecture Oliviu Matei, Rudolf Erdei, Daniela Delinschi, Laura Andreica 14th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2021), pp. 214-223 2021

19

Conference proceedings /workshop

The GDPR Compliance and Access Control Systems: Challenges and Research Opportunities

Said Daoudagh, Eda Marchetti

Proceedings of the 8th International Conference on Information Systems Security and Privacy – ICISSP, pp. 571-578.

2022

20

Conference proceedings /workshop

Predictive Simulation for Building Trust within Service-based Ecosystems

Emilia Cioroaica, Said Daoudagh, Eda Marchetti

The 20th International Conference on Pervasive Computing and Communications (PerCom 2022), pp. 34-37

2022

21

Other

BIECO, un approccio olistico alla cybersecurity (BIECO and holistic approach for the cybersecurity)

Eda Marchetti

Italian newspaper “il sole 24 ore” special insert “SCENARI”

2022

22

Article in Journal

On Autonomous Dynamic Software Ecosystems

Rafael Capilla,Emilia Cioroaica, Barbora Buhnova, and Jan Bosch

IEEE Transactions on Engineering Management, vol. 69, no. 6, pp. 3633-3647

2022

23

Conference proceedings /workshop

StaDRE and StaDRo: Reliability and Robustness Estimation of ML-based Forecasting using Statistical Distance Measures

Mohammed Naveed Akram, Akshatha Ambekar, Ioannis Sorokos, Koorosh Aslansefat, and Daniel Schneider

Computer Safety, Reliability, and Security. SAFECOMP, pp. 289-301

2022

24 Conference proceedings /workshop Forecasting the Number of Bugs and Vulnerabilities in Software Components using Neural Network Models Ovidiu Cosma, Petrică Pop, Cosmin Sabo, Laura Cosma 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022), pp. 159-168 2022
25 Conference proceedings /workshop An Ontology-Based Solution for Monitoring IoT Cybersecurity Said Daoudagh, Eda Marchetti, Antonello Calabrò, Filipa Ferrada, Ana Inês Oliveira, José Barata, Ricardo Peres, Francisco Marques 5th IFIP International Cross-Domain Conference, IFIPIoT 2022, pp. 158-176 2022
26 Conference proceedings /workshop A comparative study of Machine Learning algorithms for the detection of vulnerable Python libraries Laura Pérez-Vilarelle, Eva Sotos Martínez and Javier Yépez Martínez 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022), pp. 138-148 2022
27 Conference proceedings /workshop A paradigm for safe adaptation of collaborating robots E Cioroaica, B Buhnova, E Tomur Proceedings of the 17th Symposium on Software Engineering for Adaptive and Self-Managing Systems, pp. 113-119 2022
28 Conference proceedings /workshop Timing Model for Predictive Simulation of Safety-critical Systems E Cioroaica, B Blanco, J. and Rossi Proceedings of the 17th International Conference on Software Technologies – (ICSOFT), pp. 331-339 2022
29 Conference proceedings /workshop The concept of ethical digital identities E Cioroaica, B Buhnova, F Jacobi, D Schneider Proceedings of the 1st Workshop on Software Engineering for Responsible Artificial Intelligence, pp. 17-20 2022
30 Conference proceedings /workshop Towards trusting the ethical evolution of autonomous dynamic ecosystems E Cioroaica, B Buhnova, E Tomur Proceedings of the 1st Workshop on Software Engineering for Responsible Artificial Intelligence, pp. 13-16 2022
31 Conference proceedings /workshop Towards the Concept of Trust Assurance Case E Cioroaica, B Buhnova, D Schneider, I Sorokos, T Kuhn, E Tomur 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1581-1586 2022
32 Conference proceedings /workshop Defining the Threat Manufacturer Usage Description Model for Sharing Mitigation Actions Sara Nieves Matheu-García, Antonio Skarmeta 1st International Conference on 6G Networking (6GNet), pp. 1-4 2022
33 Article in Journal Federated Cyberattack Detection for Internet of Things-Enabled Smart Cities Matheu Garcia, Sara Nieves, Mármol, Enrique, Hernández Ramos, José Luis, Skarmeta, Antonio, & Baldini, Gianmarco IEEE Computer, Vol. 55(12), pp. 65-73 2022
34 Article in Journal A Formal Validation Approach for XACML 3.0 Access Control Policy. Carmine Caserio, Francesca Lonetti, Eda Marchetti: Sensors, Vol. 22(8), 2984 2022

35

Conference proceedings /workshop

Ontology Driven High Performance Messaging System for Distributed Software Platforms

Daniela Delinschi, Rudolf Erdei, Oliviu Matei

IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR)

2022

36

Conference proceedings /workshop

Orchestrator Architecture and Communication Methodology for Flexible Event Driven Message Based Communication

Rudolf Erdei, Daniela Delinschi, Emil Marian Pașca, Oliviu Matei

15th International Conference on Computational Intelligence in Security for Information Systems (CISIS)

2022

37

Conference proceedings /workshop

Deep-Learning based Trust Management with Self-Adaptation in the Internet of Behavior

H Bangui, E Cioroaica, M Ge, B Buhnova

Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, pp. 874-881

2023

38

Article in Journal

Integrating the manufacturer usage description standard in the modelling of cyber-physical systems

Sara Nieves Matheu García, Adrián Sánchez-Cabrera, Enrico Schiavone, Antonio Skarmeta

Computer Standards & Interfaces, Vol. 84, 103777

2023

39

Article in Journal

Guide in Designing an Asynchronous Performance-Centric Framework for Heterogeneous Microservices in Time-Critical Cybersecurity Applications. The BIECO Use Case

Rudolf Erdei, Emil Marian Pașca,Daniela Delinschi, Iulia Bărăian,Oliviu Matei

Expert Systems (Wiley Open Research)

2023

BIECO Project

SUBSCRIBE and become part of the BIECO community!

We don’t spam!

Share This