Publications

International journals

  • J21. The coming age of adversarial social bot detection, with S. Cresci, M. Petrocchi, S. Tognazzi. In First Monday Volume 26, Number 6 - 7 June 2021

  • J20. Emergent Properties, Models, and Laws of Behavioral Similarities within Groups of Twitter Users with S. Cresci, R. Di Pietro, M. Petrocchi, M. Tesconi. In Elsevier Computer Communications Volume 150, 15 January 2020, pp. 47-61

  • J19. On the capability of evolved spambots to evade detection via genetic engineering with S. Cresci, M. Petrocchi, S. Tognazzi. In Elsevier Online Social Networks and Media, 9C (2019) pp. 1-16

  • J18. Social fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling, with S. Cresci, R. Di Pietro, M. Petrocchi, M. Tesconi. In IEEE Transactions on Dependable and Secure Computing (TDSC) - ISSN:1545-5971 vol. 15 (4), pp.561-576.

  • J17. Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications, with N. Dragoni and M. Argyriou. In Security and Communication Networks Journal, Volume 2018, Article ID 4672072, September 2018.

  • J16. DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation, with M. De Donno, N. Dragoni and A. Giaretta. In Security and Communication Networks Journal, Volume 2018, Article ID 7178164, February 2018.

  • J15. A Study on Text-Score Disagreement in Online Reviews with M. Fazzolari, V. Cozza and M. Petrocchi, In Springer Cognitive Computation, Volume 9(5), pages. 689-701, October 2017.

  • J14. A language-based approach to modelling and analysis of Twitter interactions with A. Maggi, M. Petrocchi and F. Tiezzi. In Elsevier Journal of Logical and Algebraic Methods in Programming, Volume 87 February 2017 Pages 67-91.

  • J13. DNA-Inspired Online Behavioral Modeling and Its Application to Spambot Detection with S. Cresci, R. Di Pietro, M. Petrocchi, M. Tesconi. In IEEE Intelligent Systems, Volume 31 Issue 5 September-October 2016.

  • J12. Social Fingerprinting - or the Truth About You with S. Cresci, R. Di Pietro, M. Petrocchi and M. Tesconi. In ERCIM News Special theme: Cybersecurity., Vol 106 July 2016.

  • J11. Bioinspired Security Analysis of Wireless Protocols with M. Petrocchi, P. Santi. In Mobile Networks and Applications, Volume 21 Issue 1 February 2016 pages 139-148.

  • J10. Fame for sale: efficient detection of fake Twitter followers with S. Cresci, R. Di Pietro, M. Petrocchi, M. Tesconi. In Elsevier Decision Support Systems, Volume 80 December 2015 pages 56-71.

  • J09. Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers with G. Ateniese, L. V. Mancini, D. Vitali, A. Villani, G. Felici. In Inderscience International Journal on Security andNetworks, January 2015 Vol 10 Issue 3 pages137-150.

  • J08. Large-Scale Traffic Anomaly Detection: Analysis of Real Netflow Datasets with D. Vitali, A. Villani, R. Battistoni and L. V. Mancini. In Springer E-Business and Telecommunications: Communications in Computer and Information Science, 2014. LNCS 455, September 2014 pages 192-208.

  • J07. Discriminating Between the Wheat and the Chaff in Online Recommendation Systems with R. Di Pietro, M. Petrocchi and M. Tesconi. In ERCIM News Special theme: Linked Open Data., Vol 96 January 2014

  • J06. Clone Wars: Distributed Detection of Clone Attack in Mobile WSNs with M. Conti, R. Di Pietro. In Elsevier Journal of Computer and System Sciences, special issue on Wireless Networks Intrusion, Vol 80 Issue 3 April 2013 pages 654-669.

  • J05. Intrusion-resilient Integrity in Data-Centric Unattended WSNs with R. Di Pietro, C. Soriente, G. Tsudik. In Elsevier Pervasive and Mobile Computing., Volume 7 Issue 4 August 2011 pages 495-508.

  • J04. Who counterfeited my Viagra? (Probabilistic item removal detection via RFID tag cooperation) with M. Conti, R. Di Pietro. In EURASIP Journal on Wireless Communications and Networking, special issue on Security and Resilience for Smart Devices and Applications. , Volume 2011 (2011).

  • J03. eRIPP-FS: Enforcing Privacy and Security in RFID with M. Conti, R. Di Pietro, L. V. Mancini. In Wiley-Blackwell Security and Communication Networks Journal., Voume 3 Issue 1 January/February 2010 pages 58-70.

  • J02. Playing Hide-and-Seek with a Focused Mobile Adversary in Unattended Wireless Sensor Networks with R. Di Pietro, L. V. Mancini, C. Soriente, G. Tsudik. In Elsevier Journal Ad-Hoc Networks., Volume 7 Issue 8 November 2009 pages 1463-1475.

  • J01. Data Security in Unattended Sensor Networks with R. Di Pietro, L. V. Mancini, C. Soriente, G. Tsudik. In IEEE Transactions on Computers, Special Issue on Autonomic Network Computing., Volume 58 Issue 11 November 2009 pages 1500-1511.

International Conferences

  • C42. Security assessment of common open source MQTT brokers and clients, with E. Bassetti and E. Di Paolo. In Proceedings of 5th Italian conference on cybersecurity (ITASEC21). 4-7 April 2021, online.

  • C41. On the robustness of rating aggregators against injection attacks, with M. Petrocchi. In Proceedings of 2nd Multidisciplinary International Symposium on Disinformation in Open Online Media (MISDOOM2020). Leiden, The Netherlands (virtual).

  • C40. Better Safe than Sorry: an adversarial approach to improve social bot detection, with S. Cresci, M. Petrocchi, S. Tognazzi. In Proceedings of 10th ACM Conference on Web Science (WebSci '19). June 30 - July 03, 2019, Boston, Massachusetts, USA.

  • C39. Predicting Online Review Scores Across Reviewer Categories, with M. Fazzolari and M. Petrocchi. In Proceedings of 19th International Conference on Intelligent Data Engineering and Automated Learning (IDEAL). 21-23 November 2018, Madrid, Spain.

  • C38. From Reaction to Proaction: Unexplored Ways to the Detection of Evolving Spambots with S. Cresci, M. Petrocchi and S. Tognazzi. Online Social Networks and Media, Event co-located with The Web Conference, 24 April 2018, Lyon, France. WWW Companion Volume 2018: 1469-1470.

  • C37. Mining implicit data association from tripadvisor hotel reviews with V. Cozza, M. Fazzolari and M. Petrocchi. DARLI-AP 2018, co-located with EDBT/ICDT 2018 Joint Conference, Wien, March 26, 2018. Published by CEUR Workshop Proceedings.

  • C36. DNA Fingerprinting: a nature-inspired technique for spambot detection, with S. Cresci, R. Di Pietro, M. Petrocchi, A. Spognardi, and M. Tesconi. In 2nd Italian Conference on Cybersecurity ITASEC 2018. 6-9 February 2018, Milan, Italy.

  • C35. Exploiting digital DNA for the analysis of similarities in Twitter behaviours with S. Cresci, R. Di Pietro, M. Petrocchi, M. Tesconi. In 4th IEEE International Conference on Data Science and Advanced Analytics - DSAA2017, 19-21 October 2017, Tokyo Japan.

  • C34. Analysis of DDoS-Capable IoT Malwares with M. De Donno, N. Dragoni and A. Giaretta. In Proceedings of 1st IEEE International Conference on Security, Privacy, and Trust (INSERT), 3-6 September 2017, Prague, Czech Republic.

  • C33. A Taxonomy of Distributed Denial of Service Attacks with M. De Donno, N. Dragoni and A. Giaretta. In In Proceedings of the International Conference on Information Society (i-Society), 2017, IEEE.

  • C32. Security Flaws in OAuth 2.0 Framework: A Case Study with M. Argyriou and N. Dragoni. In proceedings of 3nd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2017), 12 September 2017 Trento Italy.

  • C31. The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race, with S. Cresci, R. Di Pietro, M. Petrocchi, M. Tesconi. In proceedings of the 26th International World Wide Web Conference, 2017 (WWW'2017) alt-track on WebSci, 3-7 April 2017 Perth Australia.

  • C30. Security And Privacy Issues in Healthcare Monitoring Systems: A Case Study with D. T. Handler, L. Hauge and N. Dragoni. In proceedings of 10th International Conference on Health Informatics (HEALTHINF 2017) at BIOSTEC 2017, 21-23 February 2017 Porto Portugal.

  • C29. SafeDroid: A Distributed Malware Detection Service for Android with R. Goyal, N. Dragoni and M. Argyriou. In proceedings of 9th IEEE International Conference on Service-Oriented Computing and Applications (IEEE SOCA 2016), 4-6 November 2016 Macau China.

  • C28. A matter of words: NLP for quality evaluation of Wikipedia medical articles with V. Cozza, M. Petrocchi. In proceedings of 16th International Conference on Web Engineering (ICWE2016), June 6-9 2016 Lugano Switzerland.

  • C27. Evaluation of Professional Cloud Password Management Tools with D. Schougaard, N. Dragoni. In proceedings of 2nd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2016), June 6-9 2016 Lugano Switzerland.

  • C26. Experimental measures of news personalization in Google News with V. Cozza, V. T. Hoang, M. Petrocchi. In proceedings of 2nd International Workshop on Mining the Social Web (SoWeMine 2016), June 6-9 2016 Lugano Switzerland.

  • C25. Mind The Tracker You Wear - A Security Analysis of Wearable Health Trackers with R. Goyal, N. Dragoni. In proceedings of 31th ACM/SIGAPP Symposium On Applied Computing, Health-Healthcare (ACM SAC 2016), April 4-8 2016 Pisa Italy.

  • C24. TRAP: using TaRgeted Ads to unveil Google personal Profiles with M. Conti, V. Cozza, M. Petrocchi. In proceedings of the 7th IEEE International Workshop on Information Forensics and Security (IEEE WIFS 2015), November 16-19 2015 Rome Italy.

  • C23. VISIO: Visual Approach for Singularity Detection in Recommendation Systems with A. Colantonio, R. Di Pietro, M. Petrocchi. In proceedings of 12th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2015), September 2015, Valencia, Spain.

  • C22. Twitlang(er): interactions modeling language (and interpreter) for Twitter with R. De Nicola, A. Maggi, M. Petrocchi, F. Tiezzi. In proceedings of 13th International Conference on Software Engineering and Formal Methods (SEFM 2015)., September 2015 York United Kingdom.

  • C21. Domain-specific queries and Web search personalization: some investigations with V. T. Hoang, R. De Nicola, F. Tiezzi, M. Petrocchi. In proceedings of 11th Workshop on Automated Specification and Verification of Web Systems (WWV 2015)., June 2015 Oslo Norway

  • C20. Visual Detection of Singularities in Review Platforms with A. Colantonio, R. Di Pietro, M. Petrocchi. In proceedings of 30th ACM/SIGAPP Symposium On Applied Computing - Multimedia & Visualization (ACM SAC 2015, MMV)., April 2015 Salamanca Spain (poster)

  • C19. Cryptofraglets reloaded: Bioinspired Security Modeling of a RFID Protocol and Properties with M. Petrocchi, P. Santi. In proceedings of 8th International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), Bio-inspired Wireless Network Security., December 2014 Boston Massachusetts USA.

  • C18. Improved Automatic Maturity Assessment of Wikipedia Medical Articles with R. Conti, E. Marzini, I. Matteucci, P. Mori, M. Petrocchi. In proceedings of 13th International Conference on Ontologies, DataBases, and Applications of Semantics (ODBASE 2014), October 2014 Amantea Italy.

  • C17. A Lot of Slots (outliers confinement in review-based systems) with R. Di Pietro, M. Petrocchi. In proceedings of 15th International Conference on Web Information System Engineering (WISE 2014), October 2014 Thessaloniki Greece.

  • C16. A Criticism to Society (as seen by Twitter analytics) with S. Cresci, R Di Pietro, M. Petrocchi, M. Tesconi. In the First International Workshop on Big Data Analytics for Security (DASec), June 2014 Madrid Spain.

  • C15. No NAT'd User left Behind: Fingerprinting Users behind NAT from NetFlow Records alone with N. Verde, E. Gabrielli, G. Ateniese, L. V. Mancini. In 34th International Conference on Distributed Computing Systems (ICDCS 2014), June 2014 Madrid Spain.

  • C14. Maturity assessment of Wikipedia medical articles with R. Conti, E. Marzini, I. Matteucci, P. Mori, M. Petrocchi. In 27th International Symposium on Computer-Based Medical Systems (CBMS 2014), May 2014 New York USA.

  • C13. DDoS detection with information theory metrics and netflows: a real case with D. Vitali, A.Villani, R. Battistoni and L. V. Mancini. In 9th International Conference on Security and Cryptography (Secrypt 2012), July 2012 Rome Italy.

  • C12. Relieve Internet Routing security of Public Key Infrastructure with C. Soriente, D. Vitali, A. Villani and L. V. Mancini. In 21th IEEE International Conference on Computer Communication Networks (ICCCN 2012), July 2012 Munich Germany.

  • C11. Wireless Sensor Replica Detection in Mobile Environments with M. Conti, R. Di Pietro. In 13th International Conference On Distributed Computing And Networking (ICDCN 2012), Jenuary 2012 Hong Kong China.

  • C10. MhRep: Multi-hop Replication Scheme for Data Survival in Unattended Wireless Sensor Networks with D. Vitali, L. V. Mancini and A. Villani. In Dependable Network Computing and Mobile Systems (IEEE DNCMS 2011), October 2011 Madrid Spain.

  • C09. Replication schemes in Unattended Sensor Networks with L. V. Mancini, D. Vitali. In New Technology, Mobility and Security (IFIP NTMS 2011) - Security Track, February 2011 Paris France.

  • C08. Collaborative Authentication in Unattended Sensor Networks with R. Di Pietro, C. Soriente, G. Tsudik. In ACM Conference on Wireless Network Security (ACM WiSec'09), March 2009 Zurich Swiss.

  • C07. Catch Me (If You Can): Data Survival in Unattended Sensor Networks with R. Di Pietro, L. V. Mancini, C. Soriente, G. Tsudik. In IEEE International Conference on Pervasive Computing and Communications (IEEE PerCom'08), March 2008 Hong Kong.

  • C06. FastRIPP: RFID Privacy Preserving protocol with Forward Secrecy and Fast Resynchronization with M. Conti, R. Di Pietro, L. V. Mancini. In 33th Annual Conference of the IEEE Industrial Electronics Society (IEEE IECON '07), November 2007 Taipei Taiwan.

  • C05. RoK: a Robust Key Pre-distribution Protocol for Multi-Phase Wireless Sensor Networks with C. Castelluccia. In 3rd International Conference on Security and Privacy in Communication Networks (IEEE SecureComm '07), September 2007 Nice France.

  • C04. RIPP-FS: an RFID Identification, Privacy Preserving protocol with Forward Secrecy with M. Conti, R. Di Pietro, L. V. Mancini. In 4th IEEE International Workshop on Pervasive Computing and Communication Security (IEEE PerSec '07 - PerCom '07), March 2007 New York USA.

  • C03. A Formal Framework for the performance analysis of P2P networks protocols with R. Di Pietro. In 3rd International Workshop On Hot Topics in Peer-to-Peer Systems (IEEE Hot-P2P '06), April 2006 Rhodes Grece.

  • C02. A methodology for P2P file-sharing traffic detection with A. Lucarelli, R. Di Pietro. In 2nd International Workshop on Hot Topics in Peer-to-Peer Systems (IEEE Hot-P2P '05), July 2005 San Diego California USA.

  • C01. BaRT, Balanced Randomized Tree: A scalable and distributed protocol for lookup in peer-to- peer networks with R. Di Pietro, L. V. Mancini. In 1st International Workshop on Hot Topics in Peer-to-Peer Systems (IEEE Hot-P2P '04), October 2004 Volendam Holland.

Book chapters

  • B01. Advanced Multimodal Frameworks to Support Human-Computer Interaction on Social Computing Environments with D. Avola, A. Del Buono. In IGI Global Handbook of Research on Social Computing Theory And Practice: Interdisciplinary Approaches, 2011.

Thesis

  • T01. Secure protocols for resource-constrained devices, In VDM Verlag Dr Müller Aktiengesellschaft & Co. KG., 2010