Citation Impact
Citing Papers
Deepfake detection using deep learning methods: A systematic and comprehensive review
2023 Standout
A study of android application security
2011 Standout
TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
2010 Standout
Permission re-delegation: attacks and defenses
2011 Standout
Predicting the impacts of epidemic outbreaks on global supply chains: A simulation-based analysis on the coronavirus outbreak (COVID-19/SARS-CoV-2) case
2020 Standout
Beyond Adoption: A New Framework for Theorizing and Evaluating Nonadoption, Abandonment, and Challenges to the Scale-Up, Spread, and Sustainability of Health and Care Technologies
2017 Standout
Smart tourism: foundations and developments
2015 Standout
Practical reasoning for very expressive description logics
2000
Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach
2017 Standout
Advances in Risk Analysis with Big Data
2017
A Survey of Self Organisation in Future Cellular Networks
2012
Big Data Analytics in Operations Management
2017 Standout
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
2010 Standout
Literature review of Industry 4.0 and related technologies
2018 Standout
FlowFox
2012
Industry 4.0: state of the art and future trends
2018 Standout
Internet of things and supply chain management: a literature review
2017 Standout
Analyzing Regulatory Rules for Privacy and Security Requirements
2008
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications
2017 Standout
What Will 5G Be?
2014 Standout
Security, privacy and trust in Internet of Things: The road ahead
2014 Standout
Design Considerations for Building Distributed Supply Chain Management Systems Based on Cloud Computing
2015
Context Aware Computing for The Internet of Things: A Survey
2013 Standout
Internet of things: Vision, applications and research challenges
2012 Standout
Experiences from using a UML-based method for trust analysis in an industrial project on electronic procurement
2010
A Survey on Security for Mobile Devices
2012
Internet of Things in Industries: A Survey
2014 Standout
An overview on smart contracts: Challenges, advances and platforms
2019 Standout
20 years of Electronic Commerce Research
2021 Standout
How does hotel employees’ satisfaction with the organization’s COVID-19 responses affect job insecurity and job performance?
2020 Standout
Next Generation 5G Wireless Networks: A Comprehensive Survey
2016 Standout
The Internet of Things: Review and theoretical framework
2019 Standout
Android Security: A Survey of Issues, Malware Penetration, and Defenses
2014 Standout
Blockchain challenges and opportunities: a survey
2018 Standout
INFO: An efficient optimization algorithm based on weighted mean of vectors
2022 Standout
Security Requirements Engineering: A Framework for Representation and Analysis
2008 Standout
Blockchain-oriented dynamic modelling of smart contract design and execution in the supply chain
2019 Standout
Business process modelling challenges and solutions: a literature review
2014
A review of definitions and measures of system resilience
2015 Standout
A Survey on Context-Aware Mobile and Wireless Networking: On Networking and Computing Environments' Integration
2012
FlowDroid
2014 Standout
You are what you include
2012 Standout
TaintDroid
2014 Standout
Internet of Things security: A survey
2017 Standout
An Overview of Tableau Algorithms for Description Logics
2001
Collaboration and Trust in Healthcare Innovation: The eDiaMoND Case Study
2005
Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines
2010
Quire: Lightweight Provenance for Smart Phone Operating Systems
2011
Long-range communications in unlicensed bands: the rising stars in the IoT and smart city scenarios
2016 Standout
Enforcing privacy in e-commerce by balancing anonymity and trust
2011
Pellet: A practical OWL-DL reasoner
2007 Standout
The internet of things: a survey
2014 Standout
Experimental comparison of attack trees and misuse cases for security threat identification
2008
FlowDroid
2014 Standout
Big Data and cloud computing: innovation opportunities and challenges
2016 Standout
Data Quality Matters: A Case Study on Data Label Correctness for Security Bug Report Prediction
2021
Understanding big data analytics capabilities in supply chain management: Unravelling the issues, challenges and implications for practice
2017 Standout
Works of Fabio Massacci being referenced
Exptime Tableaux for ALC.
1996
Requirements Engineering meets trust management: Model, methodology, and reasoning
2004
Reactive non-interference for a browser model
2011
Requirements engineering for trust management: model, methodology, and reasoning
2006
Combining Deduction and Model Checking into Tableaux and Algorithms for Converse-PDL
2000
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
2005
Delta-Bench: Differential Benchmark for Static Analysis Security Testing Tools
2017
Security Events and Vulnerability Data for Cybersecurity Risk Estimation
2017
A survey of autonomic communications
2006
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
2010
Modeling security requirements through ownership, permission and delegation
2005
Security-by-Contract (S x C) for Software and Services of Mobile Systems
2009
Retaliation: Can We Live with Flaws?
2006
Verifying the SET Purchase Protocols
2006
How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns
2008
Security-by-contract on the .NET platform
2008
Detecting conflicts between functional and security requirements with Secure Tropos: John Rusnak and the Allied Irish Bank (Chapter 9)
2011