Pubblicazioni

1) N. Nostro, A. Ceccarelli, A. Bondavalli, F. Brancati, "Insider threat  assessment: a model-based methodology", in press at Operating Systems Review (OSR) journal

2) Massimiliano Leone Itria, Alessandro Daidone, Andrea Ceccarelli, "A Complex Event Processing Approach for Crisis-Management Systems". CoRR abs/1404.7551 (2014).

3) Andrea Ceccarelli, Tommaso Zoppi, Andrea Bondavalli, Fabio Duchi, Giuseppe Vella. "A Testbed for Evaluating Anomaly Detection Monitors Through Fault Injection". ISORC-SORT Workshop 9 June 2014

4) Antonio Bovenzi, Francesco Brancati, Stefano Russo e Andrea Bondavalli. "An OS-level Framework for Anomaly Detection in Complex Software Systems". IEEE Transaction of Dependable and  Secure Computing.

5) N. Nostro, A. Ceccarelli, A. Bondavalli and F. Brancati. "A methodology and supporting techniques for the quantitative assessment of insider threats". Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing (DISCCO '13). 2013. pp. 3

6) Bondavalli, A., Brancati, F., Ceccarelli, A., Santoro, D., & Vadursi, M. "Experimental analysis of the first order time difference of indicators used in the monitoring of complex systems". In Measurements and Networking Proceedings (M&N), 2013 IEEE International Workshop on (pp. 138-142). IEEE

7) I. Amerini, M. Barni, R. Caldelli and A. Costanzo. "Removal and injection of keypoints for SIFT-based copy-move counter-forensics". EURASIP Journal on Information Security. 2013

8) I. Amerini, M. Barni, R. Caldelli and A. Costanzo. "SIFT Keypoint Removal and Injection for Countering Matching-Based Image Forensics". IH&MMSec'13, June 17–19, 2013, Montpellier, France.

9) I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo,L. Del Tongo and G. Serra. "Copy-Move Forgery Detection and Localization by Means of Robust Clustering with J-Linkage". Signal Processing: Image Communication 2013.

10) I. Amerini, F. Battisti, R. Caldelli, M. Carli and A. Costanzo. "Exploiting Percentual Quality Issues in Coountering SIFT-Based Forensic Methods". ICASSP 2014.

11) I. Amerini, R. Caldelli, A. Del Bimbo, A. Di Fuccia, L. Saravo and A. P. Rizzo. "Copy-Move Forgery Detection from Printed Images". SPIE Digital Library. 2014

12) Improving Role-based Access to Android Applications with JCHR. S. Bistarelli, G. Costantino, F. Martinelli, F. Santini. The 3rd International Workshop on Security of Mobile Applications (IWSMA) 2014, To appear in the 3rd International Workshop.

13) Privacy-Preserving Mobility-Casting in Opportunistic Networks. G. Costantino, F. Martinelli, P. Santi. Privacy, Security and Trust (PST) 2014, To appear in Twelfth Annual International Conference.

14) I. Amerini, R. Caldelli, P. Crescenzi, A. Del Mastio, A. Marino, Blind Image Clustering based on the Normalized Cuts Criterion for camera identification, Signal Processing: Image Communication 00 (2014) 1–13

15) Irene Amerini, Rudy Becarelli, Bruno Bertini, Roberto Caldelli,Acquisition source identification through a blind image classification, "IET Image Process., pp. 1–9 - doi: 10.1049/iet-ipr.2014.0316"

16) Irene Amerini, Rudy Becarelli, Roberto Caldelli, Andrea Del Mastio, Splicing Forgeries Localization through the Use of First Digit Features, Proc. WIFS'14 IEEE Workshop on Information Forensics and Security