Diabetes mellitus affected patients classification and diagnosis through machine learning techniques F Mercaldo, V Nardone, A Santone Procedia computer science 112, 2519-2528, 2017 | 200 | 2017 |
Ransomware steals your phone. formal methods rescue it F Mercaldo, V Nardone, A Santone, CA Visaggio Formal Techniques for Distributed Objects, Components, and Systems: 36th …, 2016 | 145 | 2016 |
Human behavior characterization for driving style recognition in vehicle system F Martinelli, F Mercaldo, A Orlando, V Nardone, A Santone, AK Sangaiah Computers & Electrical Engineering 83, 102504, 2020 | 144 | 2020 |
Car hacking identification through fuzzy logic algorithms F Martinelli, F Mercaldo, V Nardone, A Santone 2017 IEEE international conference on fuzzy systems (FUZZ-IEEE), 1-7, 2017 | 123 | 2017 |
Talos: no more ransomware victims with formal methods A Cimitile, F Mercaldo, V Nardone, A Santone, CA Visaggio International Journal of Information Security 17, 719-738, 2018 | 94 | 2018 |
A “pay-how-you-drive” car insurance approach through cluster analysis MF Carfora, F Martinelli, F Mercaldo, V Nardone, A Orlando, A Santone, ... Soft Computing 23, 2863-2875, 2019 | 85 | 2019 |
Leila: formal tool for identifying mobile malicious behaviour G Canfora, F Martinelli, F Mercaldo, V Nardone, A Santone, CA Visaggio IEEE Transactions on Software Engineering 45 (12), 1230-1252, 2018 | 76 | 2018 |
Ransomware inside out F Mercaldo, V Nardone, A Santone 2016 11th International Conference on Availability, Reliability and Security …, 2016 | 74 | 2016 |
Identification of Android Malware Families with Model Checking. P Battista, F Mercaldo, V Nardone, A Santone, CA Visaggio ICISSP, 542-547, 2016 | 62 | 2016 |
Download malware? no, thanks: how formal methods can block update attacks F Mercaldo, V Nardone, A Santone, CA Visaggio Proceedings of the 4th FME Workshop on Formal Methods in Software …, 2016 | 58 | 2016 |
Who's Driving My Car? A Machine Learning based Approach to Driver Identification. F Martinelli, F Mercaldo, V Nardone, A Orlando, A Santone ICISSP, 367-372, 2018 | 44 | 2018 |
Hey malware, i can find you! F Mercaldo, V Nardone, A Santone, CA Visaggio 2016 IEEE 25th International Conference on Enabling Technologies …, 2016 | 42 | 2016 |
Formal methods meet mobile code obfuscation identification of code reordering technique A Cimitile, F Martinelli, F Mercaldo, V Nardone, A Santone 2017 IEEE 26th International conference on enabling technologies …, 2017 | 39 | 2017 |
Detecting video game-specific bad smells in unity projects A Borrelli, V Nardone, GA Di Lucca, G Canfora, M Di Penta Proceedings of the 17th international conference on mining software …, 2020 | 36 | 2020 |
Evaluating model checking for cyber threats code obfuscation identification F Martinelli, F Mercaldo, V Nardone, A Santone, AK Sangaiah, A Cimitile Journal of Parallel and Distributed Computing 119, 203-218, 2018 | 35 | 2018 |
Infer gene regulatory networks from time series data with probabilistic model checking M Ceccarelli, L Cerulo, G De Ruvo, V Nardone, A Santone 2015 IEEE/ACM 3rd FME Workshop on Formal Methods in Software Engineering, 26-32, 2015 | 32 | 2015 |
Model checking and machine learning techniques for HummingBad mobile malware detection and mitigation F Martinelli, F Mercaldo, V Nardone, A Santone, G Vaglini Simulation Modelling Practice and Theory 105, 102169, 2020 | 30 | 2020 |
Cluster analysis for driver aggressiveness identification. F Martinelli, F Mercaldo, V Nardone, A Orlando, A Santone ICISSP, 562-569, 2018 | 27 | 2018 |
Model checking for mobile android malware evolution A Cimitile, F Martinelli, F Mercaldo, V Nardone, A Santone, G Vaglini 2017 IEEE/ACM 5th International FME Workshop on Formal Methods in Software …, 2017 | 27 | 2017 |
Model checking techniques applied to satellite operational mode management V Nardone, A Santone, M Tipaldi, D Liuzza, L Glielmo IEEE Systems Journal 13 (1), 1018-1029, 2018 | 17 | 2018 |