Publications
Publications submitted in journals of several research and technology fields, mainly related to security, IoT and CPS, and Software production.
MENTORS – Monitoring Environment for System of Systems
MENTORS - Monitoring Environment for System of Systems Authors: Antonello Calabrò, Said Daoudagh, Eda Marchetti Document type: Publication in Conference proceedings Publication: Proceedings of the 17th International Conference on Web Information Systems and...
GRADUATION: A GDPR-based Mutation Methodology
GRADUATION: A GDPR-based Mutation Methodology Authors: Said Daoudagh, Eda Marchetti Document type: Publication in Conference proceedings/Workshop Publisher: Quality of Information and Communications Technology. QUATIC 2021. Communications in Computer and Information...
The GDPR Compliance Through Access Control Systems
Author: Said Daoudagh
BIECO, un approccio olistico alla cybersecurity (BIECO and holistic approach for the cybersecurity)
BIECO, un approccio olistico alla cybersecurity (BIECO and holistic approach for the cybersecurity) Author: Eda Marchetti Document type: Other Publisher: Italian newspaper “il sole 24 ore” special insert “SCENARI” daily (published 28th of February 2022)
The GDPR Compliance and Access Control Systems: Challenges and Research Opportunities
The GDPR Compliance and Access Control Systems: Challenges and Research Opportunities Authors: Said Daoudagh, Eda Marchetti Document type: Publication in Conference proceedings Publication: Proceedings of the 8th International Conference on Information Systems...
The BIECO Conceptual Framework Towards Security and Trust in ICT Ecosystems
The BIECO Conceptual Framework Towards Security and Trust in ICT Ecosystems Authors: Ricardo Peres, Lilian Adkinson, Emilia Cioroaica, Eda Marchetti, Enrico Schiavone, Sara Matheu, Ovidiu Cosma, Radoslaw Piliszek, Jose Barata Document type: Publication in Conference...
A MDE Tool for Security Risk Assessment of Enterprises
A MDE Tool for Security Risk Assessment of Enterprises Authors: Enrico Schiavone, Nicola Nostro, Francesco Brancati Document type: Publication in Conference proceedings Publication: INDUSTRY TRACK - LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 10. , 2021,...
On Autonomous Dynamic Software Ecosystems
The Journal paper "On Autonomous Dynamic Software Ecosystems" co-authored together with experts in the field of architecture has been accepted in the journal of IEEE Transactions on Engineering Management. Document type: Article DOI: 10.1109/tem.2021.3116873...
Bridging Trust in Runtime Open Evaluation Scenarios
Bridging Trust in Runtime Open Evaluation Scenarios Authors: Emilia Cioroaica, Barbora Buhnova, Eda Marchetti, Daniel Schneider, Thomas Kuhn Document type: Publication in Conference proceedings Publication: Model and Data Engineering in the Digitalization Era. MEDI...
Defining the behavior of IoT devices through the MUD standard: review, challenges and research directions
Authors: José L. Hernández Ramos, Sara N. Matheu, Angelo Feraudo, Gianmarco Baldini, Jorge Bernal Bernabe, Poonam Yadav, Antonio Skarmeta and Paolo Bellavista
The Challenges of Software Cybersecurity Certification
Authors: José L. Hernández-Ramos, Sara N. Matheu and Antonio Skarmeta
Basic aspects in redundancy-based intrusion tolerance
Authors: Felicita Di Giandomenico, Giulio Masetti (both ISTI-CNR Pisa)
A Survey on the State of the Art of Vulnerability Assessment Techniques
Authors: Eva Sotos Martínez, Nora M. Villanueva ,Lilian Adkinson Orellana
Data Based Message Validation as a Security Cornerstone in Loose Coupling Software Architecture
Authors: Oliviu Matei, Rudolf Erdei, Daniela Delinschi, Laura Andreica
A comparative study of the most important methods for forecasting the ICT systems vulnerabilities
Authors: Ovidiu Cosma, Mara Hajdu-Macelaru, Petrica Pop-Sitar, Cosmin Sabo, Ioana Zelina
Comparison of Safety and Security analysis techniques
Authors: Emilia Cioroaica, Smruti Ranjan Kar, and Ioannis Sorokos
BIECO Runtime Auditing Framework
Authors: Antonello Calabro, Emilia Cioroaica, Said Daoudagh, and Eda Marchetti
Goals within Trust-based Digital Ecosystems
Authors: Emilia Cioroaica, Akanksha Purohit, Barbora Buhnova, and Daniel Schneider
Bridging Trust in Runtime Open Evaluation Scenarios
Authors: Emilia Cioroaica, Barbora Buhnova, Eda Marchetti, Daniel Schneider, and Thomas Kuhn
Out-of-sync Schedule Robustness for Time-sensitive Networks
Out-of-sync Schedule Robustness for Time-sensitive Networks Authors: Silviu S. Craciunas, Ramon Serna Oliver Publication: 17th IEEE International Conference on Factory Communication Systems (WFCS) DOI: 10.1109/wfcs46889.2021.9483602
LPWAN and Embedded Machine Learning as Enablers for the Next Generation of Wearable Devices
LPWAN and Embedded Machine Learning as Enablers for the Next Generation of Wearable Devices Authors: Ramon Sanchez-Iborra Document type: Article in Journal Publication: Sensors Vol 21 Issue 15 DOI: 10.3390/s21155218