Italian Distributed Ledger Technology Working Group

Also CINI working group on Blockchain

List of Publications

  2018 (285)
Blockchain for social good: a quantitative analysis. Bartoletti, M.; Cimoli, T.; Pompianu, L.; and Serusi, S. In GOODTECHS, pages 37–42, 2018. ACM
bibtex
SoK: Unraveling Bitcoin Smart Contracts. Atzei, N.; Bartoletti, M.; Cimoli, T.; Lande, S.; and Zunino, R. In POST, volume 10804, of Lecture Notes in Computer Science, pages 217–242, 2018. Springer
bibtex
Blockchain for social good: a quantitative analysis. Bartoletti, M.; Cimoli, T.; Pompianu, L.; and Serusi, S. CoRR, abs/1811.03424. 2018.
bibtex
SoK: unraveling Bitcoin smart contracts. Atzei, N.; Bartoletti, M.; Cimoli, T.; Lande, S.; and Zunino, R. IACR Cryptology ePrint Archive, 2018: 192. 2018.
bibtex
An Analysis of Non-standard Bitcoin Transactions. Mercanti, I.; Bistarelli, S.; and Santini, F. In CVCBT, pages 93–96, 2018. IEEE
bibtex
A Suite of Tools for the Forensic Analysis of Bitcoin Transactions: Preliminary Report. Bistarelli, S.; Mercanti, I.; and Santini, F. In Euro-Par Workshops, volume 11339, of Lecture Notes in Computer Science, pages 329–341, 2018. Springer
bibtex
A Comparative Analysis of Current Cryptocurrencies. Mauri, L.; Cimato, S.; and Damiani, E. In ICISSP, pages 127–138, 2018. SciTePress
bibtex
Fun with Bitcoin Smart Contracts. Bartoletti, M.; Cimoli, T.; and Zunino, R. In ISoLA (4), volume 11247, of Lecture Notes in Computer Science, pages 432–449, 2018. Springer
bibtex
FuturesMEX: Secure, Distributed Futures Market Exchange. Massacci, F.; Ngo, C. N.; Nie, J.; Venturi, D.; and Williams, J. In IEEE Symposium on Security and Privacy, pages 335–353, 2018. IEEE Computer Society
bibtex
Non-monotonic Security Protocols and Failures in Financial Intermediation. Massacci, F.; Ngo, C. N.; Venturi, D.; and Williams, J. In Security Protocols Workshop, volume 11286, of Lecture Notes in Computer Science, pages 45–54, 2018. Springer
bibtex
Fun with Bitcoin smart contracts. Bartoletti, M.; Cimoli, T.; and Zunino, R. IACR Cryptology ePrint Archive, 2018: 398. 2018.
bibtex
A survey on privacy in decentralized online social networks. Salve, A. D.; Mori, P.; and Ricci, L. Computer Science Review, 27: 154–176. 2018.
bibtex
On the discrete logarithm problem for prime-field elliptic curves. Amadori, A.; Pintore, F.; and Sala, M. Finite Fields and Their Applications, 51: 168–182. 2018.
bibtex
A novel weighted defence and its relaxation in abstract argumentation. Bistarelli, S.; Rossi, F.; and Santini, F. Int. J. Approx. Reasoning, 92: 66–86. 2018.
bibtex
Not only size, but also shape counts: abstract argumentation solvers are benchmark-sensitive. Bistarelli, S.; Rossi, F.; and Santini, F. J. Log. Comput., 28(1): 85–117. 2018.
bibtex
Discovering Homophily in Online Social Networks. Salve, A. D.; Guidi, B.; Ricci, L.; and Mori, P. MONET, 23(6): 1715–1726. 2018.
bibtex
Embedding a Digital Wallet to Pay-with-a-Selfie, from Functional Requirements to Prototype. Houngbo, P. J.; Hounsou, J. T.; Damiani, E.; Asal, R.; Cimato, S.; Frati, F.; and Yeun, C. Y. In AFRICATEK, volume 260, of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pages 47–56, 2018. Springer
bibtex
Embedding a Digital Wallet to Pay-with-a-Selfie, Defining the System Architecture as Blockchain Based. Houngbo, P. J.; Hounsou, J. T.; Damiani, E.; Asal, R.; Cimato, S.; Frati, F.; and Yeun, C. Y. In AFRICATEK, volume 260, of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pages 109–124, 2018. Springer
bibtex
A Cooperative-game Approach to Share Acceptability and Rank Arguments. Bistarelli, S.; Giuliodori, P.; Santini, F.; and Taticchi, C. In AI\(^3\)@AI*IA, volume 2296, of CEUR Workshop Proceedings, pages 86–90, 2018. CEUR-WS.org
bibtex
Using MetaProbLog and ConArg to compute Probabilistic Argumentation Frameworks. Bistarelli, S.; Mantadelis, T.; Santini, F.; and Taticchi, C. In AI\(^3\)@AI*IA, volume 2296, of CEUR Workshop Proceedings, pages 6–10, 2018. CEUR-WS.org
bibtex
Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything. Cimato, S.; and Damiani, E. In From Database to Cyber Security, volume 11170, of Lecture Notes in Computer Science, pages 113–124, 2018. Springer
bibtex
BitML: A Calculus for Bitcoin Smart Contracts. Bartoletti, M.; and Zunino, R. In ACM Conference on Computer and Communications Security, pages 83–100, 2018. ACM
bibtex
Studying Dynamics in Argumentation with Rob. Bistarelli, S.; Faloci, F.; Santini, F.; and Taticchi, C. In COMMA, volume 305, of Frontiers in Artificial Intelligence and Applications, pages 451–452, 2018. IOS Press
bibtex
Containerisation and Dynamic Frameworks in ICCMA'19. Bistarelli, S.; Kotthoff, L.; Santini, F.; and Taticchi, C. In SAFA@COMMA, volume 2171, of CEUR Workshop Proceedings, pages 4–9, 2018. CEUR-WS.org
bibtex
A Formal Approach to the Engineering of Domain-Specific Distributed Systems. De Nicola, R.; Ferrari, G. L.; Pugliese, R.; and Tiezzi, F. In COORDINATION, volume 10852, of Lecture Notes in Computer Science, pages 110–141, 2018. Springer
bibtex
Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions. Ostrovsky, R.; Persiano, G.; Venturi, D.; and Visconti, I. In CRYPTO (3), volume 10993, of Lecture Notes in Computer Science, pages 608–639, 2018. Springer
bibtex
Data Mining for Detecting Bitcoin Ponzi Schemes. Bartoletti, M.; Pes, B.; and Serusi, S. In CVCBT, pages 75–84, 2018. IEEE
bibtex
On Looking for Invariant Operators in Argumentation Semantics. Bistarelli, S.; Santini, F.; and Taticchi, C. In FLAIRS Conference, pages 537–540, 2018. AAAI Press
bibtex
Is Arbitrage Possible in the Bitcoin Market? (Work-In-Progress Paper). Bistarelli, S.; Cretarola, A.; Figà-Talamanca, G.; Mercanti, I.; and Patacca, M. In GECON, volume 11113, of Lecture Notes in Computer Science, pages 243–251, 2018. Springer
bibtex
Probabilistic Argumentation Frameworks with MetaProbLog and ConArg. Bistarelli, S.; Mantadelis, T.; Santini, F.; and Taticchi, C. In ICTAI, pages 675–679, 2018. IEEE
bibtex
Visualizing Bitcoin Flows of Ransomware: WannaCry One Week Later. Bistarelli, S.; Parroccini, M.; and Santini, F. In ITASEC, volume 2058, of CEUR Workshop Proceedings, 2018. CEUR-WS.org
bibtex
Some Thoughts On Well-Foundedness in Weighted Abstract Argumentation. Bistarelli, S.; and Santini, F. In KR, pages 623–624, 2018. AAAI Press
bibtex
Smart contracts vulnerabilities: a call for blockchain software engineering?. Destefanis, G.; Marchesi, M.; Ortu, M.; Tonelli, R.; Bracciali, A.; and Hierons, R. M. In IWBOSE@SANER, pages 19–25, 2018. IEEE
bibtex
On Looking for Local Expansion Invariants in Argumentation Semantics. Bistarelli, S.; Santini, F.; and Taticchi, C. CoRR, abs/1802.08328. 2018.
bibtex
Data mining for detecting Bitcoin Ponzi schemes. Bartoletti, M.; Pes, B.; and Serusi, S. CoRR, abs/1803.00646. 2018.
bibtex
BitML: a calculus for Bitcoin smart contracts. Bartoletti, M.; and Zunino, R. IACR Cryptology ePrint Archive, 2018: 122. 2018.
bibtex
Verifying liquidity of Bitcoin contracts. Bartoletti, M.; and Zunino, R. IACR Cryptology ePrint Archive, 2018: 1125. 2018.
bibtex
Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions. Ostrovsky, R.; Persiano, G.; Venturi, D.; and Visconti, I. IACR Cryptology ePrint Archive, 2018: 542. 2018.
bibtex
Few are as Good as Many: An Ontology-Based Tweet Spam Detection Approach. Halawi, B.; Mourad, A.; Otrok, H.; and Damiani, E. IEEE Access, 6: 63890–63904. 2018.
bibtex
Secure Comparison Under Ideal/Real Simulation Paradigm. Zhao, C.; Zhao, S.; Zhang, B.; Jia, Z.; Chen, Z.; and Conti, M. IEEE Access, 6: 31236–31248. 2018.
bibtex
On legal contracts, imperative and declarative smart contracts, and blockchain systems. Governatori, G.; Idelberger, F.; Milosevic, Z.; Riveret, R.; Sartor, G.; and Xu, X. Artif. Intell. Law, 26(4): 377–409. 2018.
bibtex
A labelling framework for probabilistic argumentation. Riveret, R.; Baroni, P.; Gao, Y.; Governatori, G.; Rotolo, A.; and Sartor, G. Ann. Math. Artif. Intell., 83(1): 21–71. 2018.
bibtex
Hilbert quasi-polynomial for order domains and application to coding theory. Mascia, C.; Rinaldo, G.; and Sala, M. Adv. in Math. of Comm., 12(2): 287–301. 2018.
bibtex
Preface to the BMC-CIBB 2015-16 special issue. Angelini, C.; Bracciali, A.; Gilbert, D.; and Rizzo, R. BMC Bioinformatics, 19-S(7): 201:1–201:2. 2018.
bibtex
Hashing to G2 on BLS pairing-friendly curves. Budroni, A.; and Pintore, F. ACM Comm. Computer Algebra, 52(3): 63–66. 2018.
bibtex
A Petri Nets Model for Blockchain Analysis. Pinna, A.; Tonelli, R.; Orrù, M.; and Marchesi, M. Comput. J., 61(9): 1374–1388. 2018.
bibtex
Advertising in the IoT Era: Vision and Challenges. Aksu, H.; Babun, L.; Conti, M.; Tolomei, G.; and Uluagac, A. S. IEEE Communications Magazine, 56(11): 138–144. 2018.
bibtex
Fair-RTT-DAS: A robust and efficient dynamic adaptive streaming over ICN. Conti, M.; Droms, R. E.; Hassan, M.; and Lal, C. Computer Communications, 129: 209–225. 2018.
bibtex
Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks. Jaballah, W. B.; Conti, M.; Filè, G.; Mosbah, M.; and Zemmari, A. Computer Communications, 119: 66–82. 2018.
bibtex
Modeling time, probability, and configuration constraints for continuous cloud service certification. Anisetti, M.; Ardagna, C. A.; Damiani, E.; Ioini, N. E.; and Gaudenzi, F. Computers & Security, 72: 234–254. 2018.
bibtex
On the economic significance of ransomware campaigns: A Bitcoin transactions perspective. Conti, M.; Gangwal, A.; and Ruj, S. Computers & Security, 79: 162–189. 2018.
bibtex
Security and Privacy Analysis of National Science Foundation Future Internet Architectures. Ambrosin, M.; Compagno, A.; Conti, M.; Ghali, C.; and Tsudik, G. IEEE Communications Surveys and Tutorials, 20(2): 1418–1442. 2018.
bibtex
A Survey on Security and Privacy Issues of Bitcoin. Conti, M.; E, S. K.; Lal, C.; and Ruj, S. IEEE Communications Surveys and Tutorials, 20(4): 3416–3452. 2018.
bibtex
The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis. Conti, M.; Li, Q.; Maragno, A.; and Spolaor, R. IEEE Communications Surveys and Tutorials, 20(4): 2658–2713. 2018.
bibtex
Evaluating the efficiency of Linda implementations. Buravlev, V.; De Nicola, R.; and Mezzina, C. A. Concurrency and Computation: Practice and Experience, 30(8). 2018.
bibtex
Model driven generation of mobility traces for distributed virtual environments with TRACE. Carlini, E.; Lulli, A.; and Ricci, L. Concurrency and Computation: Practice and Experience, 30(20). 2018.
bibtex
Distributed hybrid simulation of the Internet of things and smart territories. D'Angelo, G.; Ferretti, S.; and Ghini, V. Concurrency and Computation: Practice and Experience, 30(9). 2018.
bibtex
Large Scale Cooperative Virtual Environments. Ricci, L.; Iosup, A.; and Prodan, R. Concurrency and Computation: Practice and Experience, 30(20). 2018.
bibtex
Predicting the availability of users' devices in decentralized online social networks. Salve, A. D.; Guidi, B.; and Mori, P. Concurrency and Computation: Practice and Experience, 30(20). 2018.
bibtex
Blockchain-Based Decentralized Cloud/Fog Solutions: Challenges, Opportunities, and Standards. Uriarte, R. B.; and De Nicola, R. IEEE Communications Standards Magazine, 2(3): 22–28. 2018.
bibtex
A Survey on Homomorphic Encryption Schemes: Theory and Implementation. Acar, A.; Aksu, H.; Uluagac, A. S.; and Conti, M. ACM Comput. Surv., 51(4): 79:1–79:35. 2018.
bibtex
Quality Control in Crowdsourcing: A Survey of Quality Attributes, Assessment Techniques, and Assurance Actions. Daniel, F.; Kucherbaev, P.; Cappiello, C.; Benatallah, B.; and Allahbakhsh, M. ACM Comput. Surv., 51(1): 7:1–7:40. 2018.
bibtex
Combinatorial advertising internet auctions. Dimitri, N. Electronic Commerce Research and Applications, 32: 49–56. 2018.
bibtex
Fluctuation identities with continuous monitoring and their application to the pricing of barrier options. Phelan, C. E.; Marazzina, D.; Fusai, G.; and Germano, G. European Journal of Operational Research, 271(1): 210–223. 2018.
bibtex
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring. Ali, R.; Pal, A. K.; Kumari, S.; Karuppiah, M.; and Conti, M. Future Generation Comp. Syst., 84: 200–215. 2018.
bibtex
Internet of Things security and forensics: Challenges and opportunities. Conti, M.; Dehghantanha, A.; Franke, K.; and Watson, S. Future Generation Comp. Syst., 78: 544–546. 2018.
bibtex
Initial Coin Offerings and Agile Practices. Ibba, S.; Pinna, A.; Lunesu, M. I.; Marchesi, M.; and Tonelli, R. Future Internet, 10(11): 103. 2018.
bibtex
Toward Formal Models and Languages for Verifiable Multi-Robot Systems. De Nicola, R.; Di Stefano, L.; and Inverso, O. Front. Robotics and AI, 2018. 2018.
bibtex
Special Issue: Selected Papers from AI\(^\mbox\(\wedge\)\)3 2017, the 1st Workshop on Advances in Argumentation in Artificial Intelligence. Bistarelli, S.; Giacomin, M.; and Pazienza, A. Intelligenza Artificiale, 12(2): 179–180. 2018.
bibtex
Architecting the Web of Things for the fog computing era. Mäkitalo, N.; Nocera, F.; Mongiello, M.; and Bistarelli, S. IET Software, 12(5): 381–389. 2018.
bibtex
A Characterization of Verifiability and Observability in Contracts. Dimitri, N. IGTR, 20(2): 1750032. 2018.
bibtex
An efficient routing protocol for the QoS support of large-scale MANETs. Nazhad, S. H. H.; Shojafar, M.; Shamshirband, S.; and Conti, M. Int. J. Communication Systems, 31(1). 2018.
bibtex
Data-driven analysis of Bitcoin properties: exploiting the users graph. Maesa, D. D. F.; Marino, A.; and Ricci, L. I. J. Data Science and Analytics, 6(1): 63–80. 2018.
bibtex
A deterministic algorithm for the distance and weight distribution of binary nonlinear codes. Bellini, E.; and Sala, M. IJICoT, 5(1): 18–35. 2018.
bibtex
Outsourced pattern matching. Faust, S.; Hazay, C.; and Venturi, D. Int. J. Inf. Sec., 17(3): 327–346. 2018.
bibtex
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks. Wazid, M.; Das, A. K.; Odelu, V.; Kumar, N.; Conti, M.; and Jo, M. IEEE Internet of Things Journal, 5(1): 269–282. 2018.
bibtex
Improved upper bounds for the expected circuit complexity of dense systems of linear equations over GF(2). Visconti, A.; Schiavo, C. V.; and Peralta, R. Inf. Process. Lett., 137: 1–5. 2018.
bibtex
Detecting crypto-ransomware in IoT networks based on energy consumption footprint. Azmoodeh, A.; Dehghantanha, A.; Conti, M.; and Choo, K. R. J. Ambient Intelligence and Humanized Computing, 9(4): 1141–1152. 2018.
bibtex
23rd RCRA International workshop on "Experimental evaluation of algorithms for solving problems with combinatorial explosion". Bistarelli, S.; Formisano, A.; and Maratea, M. J. Exp. Theor. Artif. Intell., 30(4): 479–480. 2018.
bibtex
Preface for the special issue on Interaction and Concurrency Experience 2016. Bartoletti, M.; Henrio, L.; Knight, S.; and Vieira, H. T. J. Log. Algebr. Meth. Program., 98: 26. 2018.
bibtex
Big Data Semantics. Ceravolo, P.; Azzini, A.; Angelini, M.; Catarci, T.; Cudré-Mauroux, P.; Damiani, E.; Mazak, A.; van Keulen, M.; Jarrar, M.; Santucci, G.; Sattler, K.; Scannapieco, M.; Wimmer, M.; Wrembel, R.; and Zaraket, F. A. J. Data Semantics, 7(2): 65–85. 2018.
bibtex
The Dangers of Rooting: Data Leakage Detection in Android Applications. Casati, L.; and Visconti, A. Mobile Information Systems, 2018: 6020461:1–6020461:9. 2018.
bibtex
Editorial: Smart Objects and Technologies for Social Good (GOODTECHS 2017). Guidi, B.; Ricci, L.; and Calafate, C. T. MONET, 23(6): 1680–1681. 2018.
bibtex
Evaluation of Structural and Temporal Properties of Ego Networks for Data Availability in DOSNs. Salve, A. D.; Guidi, B.; and Ricci, L. MONET, 23(1): 155–166. 2018.
bibtex
A cryptographic and coding-theoretic perspective on the global rules of cellular automata. Mariot, L.; and Leporati, A. Natural Computing, 17(3): 487–498. 2018.
bibtex
OSSINT - Open Source Social Network Intelligence: An efficient and effective way to uncover "private" information in OSN profiles. Cascavilla, G.; Beato, F.; Burattin, A.; Conti, M.; and Mancini, L. V. Online Social Networks and Media, 6: 58–68. 2018.
bibtex
Managing social contents in Decentralized Online Social Networks: A survey. Guidi, B.; Conti, M.; Passarella, A.; and Ricci, L. Online Social Networks and Media, 7: 12–29. 2018.
bibtex
Spacetime Characterization of Real-Time Collaborative Editing. D'Angelo, G.; Iorio, A. D.; and Zacchiroli, S. PACMHCI, 2(CSCW): 41:1–41:19. 2018.
bibtex
A formal approach to modeling and verification of business process collaborations. Corradini, F.; Fornari, F.; Polini, A.; Re, B.; and Tiezzi, F. Sci. Comput. Program., 166: 35–70. 2018.
bibtex
AErlang: Empowering Erlang with attribute-based communication. De Nicola, R.; Duong, T.; Inverso, O.; and Trubiani, C. Sci. Comput. Program., 168: 71–93. 2018.
bibtex
Towards an Architecture to Guarantee Both Data Privacy and Utility in the First Phases of Digital Clinical Trials. Angeletti, F.; Chatzigiannakis, I.; and Vitaletti, A. Sensors, 18(12): 4175. 2018.
bibtex
Business-Savvy Blockchains with Gamification: A Framework for Collaborative Problem Solving. Palma, S. D.; Tamburri, D. A.; Pareschi, R.; Cerrone, C.; and van den Heuvel, W. EAI Endorsed Trans. Serious Games, 5(16): e5. 2018.
bibtex
Mine with it or sell it: the superhashing power dilemma. Bruschi, F.; Rana, V.; Gentile, L.; and Sciuto, D. SIGMETRICS Performance Evaluation Review, 46(3): 127–130. 2018.
bibtex
Guest editor's introduction: Special issue on agent-based modelling and simulation. D'Angelo, G. Simulation Modelling Practice and Theory, 83: 1–2. 2018.
bibtex
Real-time image processing systems using fuzzy and rough sets techniques. Jeon, G.; Anisetti, M.; Damiani, E.; and Monga, O. Soft Comput., 22(5): 1381–1384. 2018.
bibtex
A tour of secure software engineering solutions for connected vehicles. Bertolino, A.; Calabrò, A.; Giandomenico, F. D.; Lami, G.; Lonetti, F.; Marchetti, E.; Martinelli, F.; Matteucci, I.; and Mori, P. Software Quality Journal, 26(4): 1223–1256. 2018.
bibtex
Fiat-Shamir for highly sound protocols is instantiable. Mittelbach, A.; and Venturi, D. Theor. Comput. Sci., 740: 28–62. 2018.
bibtex
Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks. Somani, G.; Gaur, M. S.; Sanghi, D.; Conti, M.; and Rajarajan, M. IEEE Trans. Dependable Sec. Comput., 15(6): 959–973. 2018.
bibtex
MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things. Lee, P.; Yu, C.; Dargahi, T.; Conti, M.; and Bianchi, G. IEEE Trans. Information Forensics and Security, 13(8): 2031–2046. 2018.
bibtex
Drone Pilot Identification by Classifying Radio-Control Signals. Shoufan, A.; Al-Angari, H. M.; Sheikh, M. F. A.; and Damiani, E. IEEE Trans. Information Forensics and Security, 13(10): 2439–2447. 2018.
bibtex
Robust Smartphone App Identification via Encrypted Network Traffic Analysis. Taylor, V. F.; Spolaor, R.; Conti, M.; and Martinovic, I. IEEE Trans. Information Forensics and Security, 13(1): 63–78. 2018.
bibtex
Detecting Android Malware Leveraging Text Semantics of Network Flows. Wang, S.; Yan, Q.; Chen, Z.; Yang, B.; Zhao, C.; and Conti, M. IEEE Trans. Information Forensics and Security, 13(5): 1096–1109. 2018.
bibtex
A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment. Wazid, M.; Das, A. K.; Kumar, N.; Conti, M.; and Vasilakos, A. V. IEEE J. Biomedical and Health Informatics, 22(4): 1299–1309. 2018.
bibtex
Service Provisioning in Mobile Environments through Opportunistic Computing. Mascitti, D.; Conti, M.; Passarella, A.; Ricci, L.; and Das, S. K. IEEE Trans. Mob. Comput., 17(12): 2898–2911. 2018.
bibtex
DELTA: Data Extraction and Logging Tool for Android. Spolaor, R.; Santo, E. D.; and Conti, M. IEEE Trans. Mob. Comput., 17(6): 1289–1302. 2018.
bibtex
Blockchains for Business Process Management - Challenges and Opportunities. Mendling, J.; Weber, I.; van der Aalst, W. M. P.; vom Brocke, J.; Cabanillas, C.; Daniel, F.; Debois, S.; Ciccio, C. D.; Dumas, M.; Dustdar, S.; Gal, A.; García-Bañuelos, L.; Governatori, G.; Hull, R.; Rosa, M. L.; Leopold, H.; Leymann, F.; Recker, J.; Reichert, M.; Reijers, H. A.; Rinderle-Ma, S.; Solti, A.; Rosemann, M.; Schulte, S.; Singh, M. P.; Slaats, T.; Staples, M.; Weber, B.; Weidlich, M.; Weske, M.; Xu, X.; and Zhu, L. ACM Trans. Management Inf. Syst., 9(1): 4:1–4:16. 2018.
bibtex
SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN. Kumar, P.; Tripathi, M.; Nehra, A.; Conti, M.; and Lal, C. IEEE Trans. Network and Service Management, 15(4): 1545–1559. 2018.
bibtex
Elastic Symbiotic Scaling of Operators and Resources in Stream Processing Systems. Lombardi, F.; Aniello, L.; Bonomi, S.; and Querzoni, L. IEEE Trans. Parallel Distrib. Syst., 29(3): 572–585. 2018.
bibtex
Provably Secure Authenticated Key Agreement Scheme for Smart Grid. Odelu, V.; Das, A. K.; Wazid, M.; and Conti, M. IEEE Trans. Smart Grid, 9(3): 1900–1910. 2018.
bibtex
Enhancing QoE for video streaming in MANETs via multi-constraint routing. Lal, C.; Laxmi, V.; Gaur, M. S.; and Conti, M. Wireless Networks, 24(1): 235–256. 2018.
bibtex
An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme. Sepehri, M.; Trombetta, A.; Sepehri, M.; and Damiani, E. In ARES, pages 12:1–12:10, 2018. ACM
bibtex
Big Data Assurance Evaluation: An SLA-Based Approach. Ardagna, C. A.; Damiani, E.; Krotsiani, M.; Kloukinas, C.; and Spanoudakis, G. In SCC, pages 299–303, 2018. IEEE
bibtex
Continuously Non-malleable Codes with Split-State Refresh. Faonio, A.; Nielsen, J. B.; Simkin, M.; and Venturi, D. In ACNS, volume 10892, of Lecture Notes in Computer Science, pages 121–139, 2018. Springer
bibtex
Inversion of Mutually Orthogonal Cellular Automata. Mariot, L.; and Leporati, A. In ACRI, volume 11115, of Lecture Notes in Computer Science, pages 364–376, 2018. Springer
bibtex
Raising Awareness for Water Polution Based on Game Activities Using Internet of Things. Tziortzioti, C.; Andreetti, G.; Rodinò, L.; Mavrommati, I.; Vitaletti, A.; and Chatzigiannakis, I. In AmI, volume 11249, of Lecture Notes in Computer Science, pages 171–187, 2018. Springer
bibtex
Non-interactive Secure Computation from One-Way Functions. Badrinarayanan, S.; Jain, A.; Ostrovsky, R.; and Visconti, I. In ASIACRYPT (3), volume 11274, of Lecture Notes in Computer Science, pages 118–138, 2018. Springer
bibtex
A Fast and Incremental Development Life Cycle for Data Analytics as a Service. Ardagna, C. A.; Bellandi, V.; Ceravolo, P.; Damiani, E.; Martino, B. D.; D'Angelo, S.; and Esposito, A. In BigData Congress, pages 174–181, 2018. IEEE Computer Society
bibtex
Content-based Classification of Political Inclinations of Twitter Users. Giovanni, M. D.; Brambilla, M.; Ceri, S.; Daniel, F.; and Ramponi, G. In BigData, pages 4321–4327, 2018. IEEE
bibtex
Distributed Services Attestation in IoT. Conti, M.; Dushku, E.; and Mancini, L. V. In From Database to Cyber Security, volume 11170, of Lecture Notes in Computer Science, pages 261–273, 2018. Springer
bibtex
Soft Constraint Automata with Memory. Dokter, K.; Gadducci, F.; and Santini, F. In It's All About Coordination, volume 10865, of Lecture Notes in Computer Science, pages 70–85, 2018. Springer
bibtex
Open Problems in Membrane Computing and How Not to Solve Them. Leporati, A.; Manzoni, L.; Mauri, G.; Porreca, A. E.; and Zandron, C. In Enjoying Natural Computing, volume 11270, of Lecture Notes in Computer Science, pages 182–191, 2018. Springer
bibtex
Animating Multiple Instances in BPMN Collaborations: From Formal Semantics to Tool Support. Corradini, F.; Muzi, C.; Re, B.; Rossi, L.; and Tiezzi, F. In BPM, volume 11080, of Lecture Notes in Computer Science, pages 83–101, 2018. Springer
bibtex
MIDA: Multiple Instances and Data Animator. Corradini, F.; Muzi, C.; Re, B.; Rossi, L.; and Tiezzi, F. In BPM (Dissertation/Demos/Industry), volume 2196, of CEUR Workshop Proceedings, pages 86–90, 2018. CEUR-WS.org
bibtex
Context-Aware Access to Heterogeneous Resources Through On-the-Fly Mashups. Daniel, F.; Matera, M.; Quintarelli, E.; Tanca, L.; and Zaccaria, V. In CAiSE, volume 10816, of Lecture Notes in Computer Science, pages 119–134, 2018. Springer
bibtex
Checking Business Process Correctness in Apromore. Fornari, F.; Rosa, M. L.; Polini, A.; Re, B.; and Tiezzi, F. In CAiSE Forum, volume 317, of Lecture Notes in Business Information Processing, pages 114–123, 2018. Springer
bibtex
Pedigree-ing Your Big Data: Data-Driven Big Data Privacy in Distributed Environments. Cuzzocrea, A.; and Damiani, E. In CCGrid, pages 675–681, 2018. IEEE Computer Society
bibtex
The position cheating attack on inter-vehicular online gaming. Jaballah, W. B.; Conti, M.; and Palazzi, C. E. In CCNC, pages 1–6, 2018. IEEE
bibtex
Leaky CPS: Inferring Cyber Information from Physical Properties (and the other way around). Conti, M. In CPSS@AsiaCCS, pages 23–24, 2018. ACM
bibtex
All You Need is: Evading Hate Speech Detection. Gröndahl, T.; Pajola, L.; Juuti, M.; Conti, M.; and Asokan, N. In AISec@CCS, pages 2–12, 2018. ACM
bibtex
Too Long, did not Enforce: A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed Environments. Martinelli, F.; Michailidou, C.; Mori, P.; and Saracino, A. In CPSS@AsiaCCS, pages 27–37, 2018. ACM
bibtex
Evolving Bent Quaternary Functions. Picek, S.; Knezevic, K.; Mariot, L.; Jakobovic, D.; and Leporati, A. In CEC, pages 1–8, 2018. IEEE
bibtex
Scenarios for Educational and Game Activities using Internet of Things Data. Tziortzioti, C.; Mavrommati, I.; Mylonas, G.; Vitaletti, A.; and Chatzigiannakis, I. In CIG, pages 1–8, 2018. IEEE
bibtex
Semantic Support for Model Based Big Data Analytics-as-a-Service (MBDAaaS). Redavid, D.; Malerba, D.; Martino, B. D.; Esposito, A.; Ardagna, C. A.; Bellandi, V.; Ceravolo, P.; and Damiani, E. In CISIS, volume 772, of Advances in Intelligent Systems and Computing, pages 1012–1021, 2018. Springer
bibtex
Scheduling Latency-Sensitive Applications in Edge Computing. Scoca, V.; Aral, A.; Brandic, I.; De Nicola, R.; and Uriarte, R. B. In CLOSER, pages 158–168, 2018. SciTePress
bibtex
Towards Distributed SLA Management with Smart Contracts and Blockchain. Uriarte, R. B.; De Nicola, R.; and Kritikos, K. In CloudCom, pages 266–271, 2018. IEEE Computer Society
bibtex
Emergency Access Control Management Via Attribute Based Encrypted QR Codes. Belguith, S.; Gochhayat, S. P.; Conti, M.; and Russello, G. In CNS, pages 1–8, 2018. IEEE
bibtex
Spot the Difference: Your Bucket is Leaking : A Novel Methodology to Expose A/B Testing Effortlessly. Conti, M.; Gangwal, A.; Gochhayat, S. P.; and Tolomei, G. In CNS, pages 1–7, 2018. IEEE
bibtex
Defence Outsourcing in Argumentation. Arisaka, R.; and Bistarelli, S. In COMMA, volume 305, of Frontiers in Artificial Intelligence and Applications, pages 353–360, 2018. IOS Press
bibtex
The Graph Structure of Bitcoin. Maesa, D. D. F.; Marino, A.; and Ricci, L. In COMPLEX NETWORKS (2), volume 813, of Studies in Computational Intelligence, pages 547–558, 2018. Springer
bibtex
Are mHealth Apps Secure? A Case Study. Braghin, C.; Cimato, S.; and Libera, A. D. In COMPSAC (2), pages 335–340, 2018. IEEE Computer Society
bibtex
Message from the SAPSE 2018 Workshop Organizers. Cimato, S. In COMPSAC (2), pages 688, 2018. IEEE Computer Society
bibtex
Progress-Preserving Refinements of CTA. Bartoletti, M.; Bocchi, L.; and Murgia, M. In CONCUR, volume 118, of LIPIcs, pages 40:1–40:19, 2018. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik
bibtex
SONIC-MAN: A Distributed Protocol for Dynamic Community Detection and Management. Guidi, B.; Michienzi, A.; and Ricci, L. In DAIS, volume 10853, of Lecture Notes in Computer Science, pages 93–109, 2018. Springer
bibtex
Reasoning about Conditions in STIT Logic. Armgardt, M.; Lorini, E.; and Sartor, G. In DEON, pages 15–32, 2018. College Publications
bibtex
Anonymity and Confidentiality in Secure Distributed Simulation. Magnani, A.; D'Angelo, G.; Ferretti, S.; and Marzolla, M. In DS-RT, pages 1–5, 2018. IEEE Computer Society
bibtex
SEECSSim - A Parallel and Distributed Simulation Framework for Mobile Devices. Maqbool, F.; Malik, A. W.; Mahmood, I.; and D'Angelo, G. In DS-RT, pages 1–7, 2018. IEEE Computer Society
bibtex
Collaboration vs. Choreography Conformance in BPMN 2.0: From Theory to Practice. Corradini, F.; Morichetta, A.; Polini, A.; Re, B.; and Tiezzi, F. In EDOC, pages 95–104, 2018. IEEE Computer Society
bibtex
Towards Conceptual Models for Machine Learning Computations. Damiani, E.; and Frati, F. In ER, volume 11157, of Lecture Notes in Computer Science, pages 3–9, 2018. Springer
bibtex
Vulnerable open source dependencies: counting those that matter. Pashchenko, I.; Plate, H.; Ponta, S. E.; Sabetta, A.; and Massacci, F. In ESEM, pages 42:1–42:10, 2018. ACM
bibtex
SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices. Ambrosin, M.; Conti, M.; Ibrahim, A.; Sadeghi, A.; and Schunter, M. In ESORICS (1), volume 11098, of Lecture Notes in Computer Science, pages 595–617, 2018. Springer
bibtex
SILK-TV: Secret Information Leakage from Keystroke Timing Videos. Balagani, K. S.; Conti, M.; Gasti, P.; Georgiev, M.; Gurtler, T.; Lain, D.; Miller, C.; Molas, K.; Samarin, N.; Saraci, E.; Tsudik, G.; and Wu, L. In ESORICS (1), volume 11098, of Lecture Notes in Computer Science, pages 263–280, 2018. Springer
bibtex
Enhancing Usage Control for Performance: An Architecture for Systems of Systems. Gkioulos, V.; Rizos, A.; Michailidou, C.; Mori, P.; and Saracino, A. In CyberICPS/SECPRE@ESORICS, volume 11387, of Lecture Notes in Computer Science, pages 69–84, 2018. Springer
bibtex
On Symbolic Verification of Bitcoin's script Language. Klomp, R.; and Bracciali, A. In DPM/CBT@ESORICS, volume 11025, of Lecture Notes in Computer Science, pages 38–56, 2018. Springer
bibtex
Re-visiting a Test Taxonomy with Refactoring and Defect-fix Data. Counsell, S.; Swift, S.; Tonelli, R.; Marchesi, M.; and Felderer, M. In SEAA, pages 41–44, 2018. IEEE Computer Society
bibtex
A Knowledge-Based IoT Security Checker. Anisetti, M.; Asal, R.; Ardagna, C. A.; Comi, L.; Damiani, E.; and Gaudenzi, F. In Euro-Par Workshops, volume 11339, of Lecture Notes in Computer Science, pages 299–311, 2018. Springer
bibtex
A Blockchain Based System to Ensure Transparency and Reliability in Food Supply Chain. Baralla, G.; Ibba, S.; Marchesi, M.; Tonelli, R.; and Missineo, S. In Euro-Par Workshops, volume 11339, of Lecture Notes in Computer Science, pages 379–391, 2018. Springer
bibtex
ComeHere: Exploiting Ethereum for Secure Sharing of Health-Care Data. Franceschi, M.; Morelli, D.; Plans, D.; Brown, A.; Collomosse, J.; Coutts, L.; and Ricci, L. In Euro-Par Workshops, volume 11339, of Lecture Notes in Computer Science, pages 585–596, 2018. Springer
bibtex
Language-Independent Synthesis of Firewall Policies. Bodei, C.; Degano, P.; Galletta, L.; Focardi, R.; Tempesta, M.; and Veronese, L. In EuroS&P, pages 92–106, 2018. IEEE
bibtex
A Matrix Approach for Weighted Argumentation Frameworks. Bistarelli, S.; Tappini, A.; and Taticchi, C. In FLAIRS Conference, pages 507–512, 2018. AAAI Press
bibtex
A Distributed Coordination Infrastructure for Attribute-Based Interaction. Alrahman, Y. A.; De Nicola, R.; Garbi, G.; and Loreti, M. In FORTE, volume 10854, of Lecture Notes in Computer Science, pages 1–20, 2018. Springer
bibtex
Are My Arguments Trustworthy? Abstract Argumentation with Subjective Logic. Santini, F.; J\osang, A.; and Pini, M. S. In FUSION, pages 1982–1989, 2018. IEEE
bibtex
Moon Cloud: A Cloud Platform for ICT Security Governance. Anisetti, M.; Ardagna, C. A.; Gaudenzi, F.; Damiani, E.; Diomede, N.; and Tufarolo, P. In GLOBECOM, pages 1–7, 2018. IEEE
bibtex
Crowdsourcing for Reminiscence Chatbot Design. Nikitina, S.; Daniel, F.; Báez, M.; Casati, F.; and Kopanitsa, G. In HCOMP (WIP&Demo), volume 2173, of CEUR Workshop Proceedings, 2018. CEUR-WS.org
bibtex
Toward IoT-Friendly Learning Models. Damiani, E.; Gianini, G.; Ceci, M.; and Malerba, D. In ICDCS, pages 1284–1289, 2018. IEEE Computer Society
bibtex
Efficient Computation of Squarefree Separator Polynomials. Ceria, M.; Mora, T.; and Visconti, A. In ICMS, volume 10931, of Lecture Notes in Computer Science, pages 98–104, 2018. Springer
bibtex
Toward truly personal chatbots: on the development of custom conversational assistants. Daniel, F.; Matera, M.; Zaccaria, V.; and Dell'Orto, A. In SE4COG@ICSE, pages 31–36, 2018. ACM
bibtex
On measuring affects of github issues' commenters. Destefanis, G.; Ortu, M.; Bowes, D.; Marchesi, M.; and Tonelli, R. In SEmotion@ICSE, pages 14–19, 2018. ACM
bibtex
Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations. Labunets, K.; Massacci, F.; Paci, F.; Marczak, S.; and de Oliveira, F. M. In ICSE, pages 395, 2018. ACM
bibtex
Preliminary Results on the Modeling of System Level Diagnosis Problems with Abstract Argumentation. Bistarelli, S.; and Caruso, A. In ICTCS, volume 2243, of CEUR Workshop Proceedings, pages 179–190, 2018. CEUR-WS.org
bibtex
PostProcessing in Constrained Role Mining. Blundo, C.; Cimato, S.; and Siniscalchi, L. In IDEAL (1), volume 11314, of Lecture Notes in Computer Science, pages 204–214, 2018. Springer
bibtex
Enhancing Usage Control for Performance: A Proposal for Systems of Systems (Research Poster). Gkioulos, V.; Rizos, A.; Michailidou, C.; Martinelli, F.; and Mori, P. In HPCS, pages 1061–1062, 2018. IEEE
bibtex
BITKER: A P2P Kernel Client for Bitcoin. Maesa, D. D. F.; Franceschi, M.; Guidi, B.; and Ricci, L. In HPCS, pages 130–137, 2018. IEEE
bibtex
All-Implicants Neural Networks for Efficient Boolean Function Representation. Buffoni, F.; Gianini, G.; Damiani, E.; and Granitzer, M. In ICCC, pages 82–86, 2018. IEEE Computer Society
bibtex
Analysis of Shapelet Transform Usage in Traffic Event Detection. Dhanhani, A. A.; Damiani, E.; Mizouni, R.; and Wang, D. In ICCC, pages 41–48, 2018. IEEE Computer Society
bibtex
Formalising BPMN Service Interaction Patterns. Muzi, C.; Pufahl, L.; Rossi, L.; Weske, M.; and Tiezzi, F. In PoEM, volume 335, of Lecture Notes in Business Information Processing, pages 3–20, 2018. Springer
bibtex
Towards Consumer-Empowering Artificial Intelligence. Contissa, G.; Lagioia, F.; Lippi, M.; Micklitz, H.; Palka, P.; Sartor, G.; and Torroni, P. In IJCAI, pages 5150–5157, 2018. ijcai.org
bibtex
On the Distributed Computation of Load Centrality and its Application to DV Routing. Maccari, L.; Ghiro, L.; Guerrieri, A.; Montresor, A.; and Cigno, R. L. In INFOCOM, pages 2582–2590, 2018. IEEE
bibtex
RARE: Defeating side channels based on data-deduplication in cloud storage. Pooranian, Z.; Chen, K.; Yu, C.; and Conti, M. In INFOCOM Workshops, pages 444–449, 2018. IEEE
bibtex
A Fair Payment Scheme for Virtuous Community Energy Usage. Giuliodori, P.; Bistarelli, S.; and Mugnai, D. In ISAIM, 2018.
bibtex
\emphGo\emphAt: Attribute-Based Interaction in Google Go. Alrahman, Y. A.; De Nicola, R.; and Garbi, G. In ISoLA (3), volume 11246, of Lecture Notes in Computer Science, pages 288–303, 2018. Springer
bibtex
The Meaning of Adaptation: Mastering the Unforeseen?. Jähnichen, S.; De Nicola, R.; and Wirsing, M. In ISoLA (3), volume 11246, of Lecture Notes in Computer Science, pages 109–117, 2018. Springer
bibtex
Rigorous Engineering of Collective Adaptive Systems Introduction to the 2nd Track Edition. De Nicola, R.; Jähnichen, S.; and Wirsing, M. In ISoLA (3), volume 11246, of Lecture Notes in Computer Science, pages 3–12, 2018. Springer
bibtex
DReAM: Dynamic Reconfigurable Architecture Modeling. De Nicola, R.; Maggi, A.; and Sifakis, J. In ISoLA (3), volume 11246, of Lecture Notes in Computer Science, pages 13–31, 2018. Springer
bibtex
A Core Informatics Curriculum for Italian Compulsory Education. Forlizzi, L.; Lodi, M.; Lonati, V.; Mirolo, C.; Monga, M.; Montresor, A.; Morpurgo, A.; and Nardelli, E. In ISSEP, volume 11169, of Lecture Notes in Computer Science, pages 141–153, 2018. Springer
bibtex
PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain. Angelis, S. D.; Aniello, L.; Baldoni, R.; Lombardi, F.; Margheri, A.; and Sassone, V. In ITASEC, volume 2058, of CEUR Workshop Proceedings, 2018. CEUR-WS.org
bibtex
Firewall Management With FireWall Synthesizer. Bodei, C.; Degano, P.; Focardi, R.; Galletta, L.; Tempesta, M.; and Veronese, L. In ITASEC, volume 2058, of CEUR Workshop Proceedings, 2018. CEUR-WS.org
bibtex
Understanding the Twitter User Networks of Viruses and Ransomware Attacks. Puliga, M.; Caldarelli, G.; Chessa, A.; and De Nicola, R. In ITASEC, volume 2058, of CEUR Workshop Proceedings, 2018. CEUR-WS.org
bibtex
Deep and Broad Learning Based Detection of Android Malware via Network Traffic. Wang, S.; Chen, Z.; Yan, Q.; Ji, K.; Wang, L.; Yang, B.; and Conti, M. In IWQoS, pages 1–6, 2018. IEEE
bibtex
Automated Processing of Privacy Policies Under the EU General Data Protection Regulation. Contissa, G.; Docter, K.; Lagioia, F.; Lippi, M.; Micklitz, H.; Palka, P.; Sartor, G.; and Torroni, P. In JURIX, volume 313, of Frontiers in Artificial Intelligence and Applications, pages 51–60, 2018. IOS Press
bibtex
Automated Monitoring of Collaborative Working Environments for Supporting Open Innovation. Kiani, M. M.; Ceravolo, P.; Azzini, A.; and Damiani, E. In KMO, volume 877, of Communications in Computer and Information Science, pages 167–178, 2018. Springer
bibtex