A survey on security for mobile devices M La Polla, F Martinelli, D Sgandurra IEEE communications surveys & tutorials 15 (1), 446-471, 2012 | 735 | 2012 |
MADAM: a multi-level anomaly detector for android malware G Dini, F Martinelli, A Saracino, D Sgandurra International Conference on Mathematical Methods, Models, and Architectures …, 2012 | 533 | 2012 |
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention A Saracino, D Sgandurra, G Dini, F Martinelli IEEE Transactions on Dependable and Secure Computing, 2016 | 446 | 2016 |
Lightweight classification of IoT malware based on image recognition J Su, DV Vasconcellos, S Prasad, D Sgandurra, Y Feng, K Sakurai 2018 IEEE 42Nd annual computer software and applications conference (COMPSAC …, 2018 | 335 | 2018 |
Automated dynamic analysis of ransomware: Benefits, limitations and use for detection D Sgandurra, L Muñoz-González, R Mohsen, EC Lupu arXiv preprint arXiv:1609.03020, 2016 | 320 | 2016 |
Cloud security is not (just) virtualization security: a short paper M Christodorescu, R Sailer, DL Schales, D Sgandurra, D Zamboni Proceedings of the 2009 ACM workshop on Cloud computing security, 97-102, 2009 | 292 | 2009 |
Evolution of attacks, threat models, and solutions for virtualized systems D Sgandurra, E Lupu ACM Computing Surveys (CSUR) 48 (3), 1-38, 2016 | 114 | 2016 |
Exact inference techniques for the analysis of Bayesian attack graphs L Muñoz-González, D Sgandurra, M Barrère, EC Lupu IEEE Transactions on Dependable and Secure Computing 16 (2), 231-244, 2017 | 96 | 2017 |
Risk analysis of Android applications: A user-centric solution G Dini, F Martinelli, I Matteucci, M Petrocchi, A Saracino, D Sgandurra | 65 | 2016 |
Hierarchical, model-based risk management of critical infrastructures F Baiardi, C Telmon, D Sgandurra Reliability Engineering & System Safety 94 (9), 1403-1415, 2009 | 65 | 2009 |
A new security middleware architecture based on fog computing and cloud to support IoT constrained devices W Razouk, D Sgandurra, K Sakurai Proceedings of the 1st international conference on internet of things and …, 2017 | 61 | 2017 |
Efficient attack graph analysis through approximate inference L Munoz-Gonzalez, D Sgandurra, A Paudice, EC Lupu ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-30, 2017 | 57 | 2017 |
Building trustworthy intrusion detection through vm introspection F Baiardi, D Sgandurra Third International Symposium on Information Assurance and Security, 209-214, 2007 | 52 | 2007 |
Automating the assessment of ICT risk F Baiardi, F Corò, F Tonelli, D Sgandurra Journal of Information Security and Applications 19 (3), 182-193, 2014 | 45 | 2014 |
Towards a Framework for Testing the Security of IoT Devices Consistently G Lally, D Sgandurra International Workshop on Emerging Technologies for Authorization and …, 2018 | 40 | 2018 |
Detection of repackaged mobile applications through a collaborative approach A Aldini, F Martinelli, A Saracino, D Sgandurra Concurrency and Computation: Practice and Experience 27 (11), 2818–2838, 2015 | 36 | 2015 |
On deception-based protection against cryptographic ransomware ZA Genç, G Lenzini, D Sgandurra Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019 | 34 | 2019 |
Assessing ict risk through a monte carlo method F Baiardi, D Sgandurra Environment Systems and Decisions 33, 486-499, 2013 | 33 | 2013 |
Securing a community cloud F Baiardi, D Sgandurra 2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010 | 31 | 2010 |
Secure computing resource allocation framework for open fog computing J Jiang, L Tang, K Gu, WJ Jia The Computer Journal 63 (4), 567-592, 2020 | 30 | 2020 |