Gabriele Costa

779 total citations
47 papers, 343 citations indexed

About

Gabriele Costa is a scholar working on Artificial Intelligence, Signal Processing and Computer Networks and Communications. According to data from OpenAlex, Gabriele Costa has authored 47 papers receiving a total of 343 indexed citations (citations by other indexed papers that have themselves been cited), including 32 papers in Artificial Intelligence, 19 papers in Signal Processing and 15 papers in Computer Networks and Communications. Recurrent topics in Gabriele Costa's work include Security and Verification in Computing (23 papers), Advanced Malware Detection Techniques (19 papers) and Access Control and Trust (8 papers). Gabriele Costa is often cited by papers focused on Security and Verification in Computing (23 papers), Advanced Malware Detection Techniques (19 papers) and Access Control and Trust (8 papers). Gabriele Costa collaborates with scholars based in Italy, Germany and Russia. Gabriele Costa's co-authors include Alessandro Armando, Alessio Merlo, Luca Verderame, Roberto Carbone, Fabio Martinelli, Nicola Zannone, Pierpaolo Degano, Ilaria Matteucci, Tommaso La Mantia and Fabio Massacci and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Access and Computer.

In The Last Decade

Gabriele Costa

39 papers receiving 313 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Gabriele Costa Italy 12 171 122 118 106 68 47 343
Luca Allodi Netherlands 13 435 2.5× 216 1.8× 178 1.5× 95 0.9× 82 1.2× 44 522
Abdulbasit A. Darem Saudi Arabia 11 180 1.1× 235 1.9× 199 1.7× 133 1.3× 10 0.1× 62 436
Laxmi Ahuja India 12 213 1.2× 72 0.6× 37 0.3× 93 0.9× 30 0.4× 64 362
Chetan Bansal United States 13 266 1.6× 179 1.5× 35 0.3× 137 1.3× 19 0.3× 52 439
Ilyes Jenhani Saudi Arabia 10 90 0.5× 45 0.4× 31 0.3× 127 1.2× 15 0.2× 18 295
Victor Elijah Adeyemo United Kingdom 11 266 1.6× 148 1.2× 120 1.0× 157 1.5× 23 0.3× 17 407
Le Yu Hong Kong 14 305 1.8× 192 1.6× 379 3.2× 200 1.9× 155 2.3× 24 584
Jeffrey Edgington United States 7 139 0.8× 150 1.2× 264 2.2× 91 0.9× 75 1.1× 8 568
Aziz Nanthaamornphong Thailand 9 98 0.6× 66 0.5× 20 0.2× 52 0.5× 29 0.4× 120 362

Countries citing papers authored by Gabriele Costa

Since Specialization
Citations

This map shows the geographic impact of Gabriele Costa's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Gabriele Costa with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Gabriele Costa more than expected).

Fields of papers citing papers by Gabriele Costa

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Gabriele Costa. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Gabriele Costa. The network helps show where Gabriele Costa may publish in the future.

Co-authorship network of co-authors of Gabriele Costa

This figure shows the co-authorship network connecting the top 25 collaborators of Gabriele Costa. A scholar is included among the top collaborators of Gabriele Costa based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Gabriele Costa. Gabriele Costa is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Costa, Gabriele, et al.. (2025). The Beauty and the Beast: A survey on process algebras and cybersecurity. Computer Science Review. 57. 100758–100758.
2.
Costa, Gabriele, et al.. (2025). Tackling the Gender Gap in Cybersecurity Education. 234–240. 1 indexed citations
3.
Corsaro, Carmelo, Gabriele Costa, Mariangela Latino, et al.. (2024). Wetting Behavior Driven by Surface Morphology Changes Induced by Picosecond Laser Texturing. Materials. 17(8). 1719–1719. 5 indexed citations
4.
Costa, Gabriele, et al.. (2023). LiDiTE: A Full-Fledged and Featherweight Digital Twin Framework. IEEE Transactions on Dependable and Secure Computing. 20(6). 4899–4912. 13 indexed citations
5.
Costa, Gabriele, Pierpaolo Degano, Letterio Galletta, & Simone Soderi. (2023). Formally verifying security protocols built on watermarking and jamming. Computers & Security. 128. 103133–103133. 5 indexed citations
6.
Costa, Gabriele, et al.. (2022). Automating the Generation of Cyber Range Virtual Scenarios with VSDL. Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications. 13(4). 61–80. 4 indexed citations
7.
Micaroni, Valerio, Francesca Strano, Fabio Crocetta, et al.. (2022). Project “Biodiversity MARE Tricase”: A Species Inventory of the Coastal Area of Southeastern Salento (Ionian Sea, Italy). Diversity. 14(11). 904–904. 5 indexed citations
8.
Prestipino, Santi & Gabriele Costa. (2022). Condensation and Crystal Nucleation in a Lattice Gas with a Realistic Phase Diagram. Entropy. 24(3). 419–419. 1 indexed citations
9.
Bracchi, Valentina Alice, Alessandra Savini, Antonietta Rosso, et al.. (2022). The Main Builders of Mediterranean Coralligenous: 2D and 3D Quantitative Approaches for its Identification. Frontiers in Earth Science. 10. 15 indexed citations
10.
Costa, Gabriele, et al.. (2020). Building next generation Cyber Ranges with CRACK. Computers & Security. 95. 101837–101837. 27 indexed citations
11.
Costa, Gabriele, David Basin, Chiara Bodei, Pierpaolo Degano, & Letterio Galletta. (2018). PESTS: Partial Evaluator of Simple Transition Systems. Zenodo (CERN European Organization for Nuclear Research).
12.
Carbone, Roberto, et al.. (2017). Strong Authentication for e-Banking: A Survey on European Regulations and Implementations. 480–485. 3 indexed citations
13.
Armando, Alessandro, et al.. (2015). Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module. CINECA IRIS Institutial Research Information System (University of Genoa). 41–49.
14.
Armando, Alessandro, et al.. (2014). Mobile App Security Analysis with the MAVeriC Static Analysis Module. CINECA IRIS Institutial Research Information System (University of Genoa). 4 indexed citations
15.
Armando, Alessandro, Gabriele Costa, Luca Verderame, & Alessio Merlo. (2014). Securing the "Bring Your Own Device" Paradigm. Computer. 47(6). 48–56. 17 indexed citations
16.
Armando, Alessandro, Gabriele Costa, Alessio Merlo, & Luca Verderame. (2012). Securing the “bring your own device” policy. CINECA IRIS Institutial Research Information System (University of Genoa). 3 indexed citations
17.
Costa, Gabriele & Ilaria Matteucci. (2011). Gate automata-driven run-time enforcement. Computers & Mathematics with Applications. 63(2). 518–524. 2 indexed citations
18.
Costa, Gabriele, Aliaksandr Lazouski, Fabio Martinelli, et al.. (2010). Security-by-Contract-with-Trust for Mobile Devices. HAL (Le Centre pour la Communication Scientifique Directe). 1(4). 75–91. 11 indexed citations
19.
Costa, Gabriele, Pierpaolo Degano, & Fabio Martinelli. (2010). Secure service orchestration in open networks. Journal of Systems Architecture. 57(3). 231–239. 1 indexed citations
20.
Bartoletti, Massimo, Gabriele Costa, Pierpaolo Degano, Fabio Martinelli, & Roberto Zunino. (2009). Securing Java with Local Policies.. The Journal of Object Technology. 8(4). 5–5. 15 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026