Fabio Massacci

From MaRDI portal
(Redirected from Person:861697)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Analyzing and Mitigating (with LLMs) the Security Misconfigurations of Helm Charts from Artifact Hub2025-02-18Dataset
Today's cat is tomorrow's dog: accounting for time-based changes in the labels of ML vulnerability detection approaches (Replication Package Part 2: Linux dataset)2025-02-11Dataset
Today's cat is tomorrow's dog: accounting for time-based changes in the labels of ML vulnerability detection approaches (Replication Package Part 3: OpenSSL dataset)2025-02-11Dataset
Today's cat is tomorrow's dog: accounting for time-based changes in the labels of ML vulnerability detection approaches (Replication Package Part 4: Poppler Dataset)2025-02-11Dataset
On the acceptance by code reviewers of candidate security patches suggested by Automated Program Repair tools - Dataset2024-05-04Dataset
A Case-Control Study to Measure Behavioral Risks of Malware Encounters in Organizations2024-04-15Dataset
Artefact for ``Addressing Combinatorial Experiments and Scarcity of Subjects by Provably Orthogonal and Crossover Experimental Designs2024-02-19Dataset
Artefact for ``Addressing Combinatorial Experiments and Scarcity1 of Subjects by Provably Orthogonal and Crossover2 Experimental Designs2024-02-16Dataset
Cross-ecosystem categorization: A manual-curation protocol for the categorization of Java Maven libraries along Python PyPI Topics (dataset)2024-01-10Dataset
[DEPRECATED A manually-curated categorisation of Java Maven libraries along Python PyPI Topics (dataset)]2024-01-10Dataset
A graph-based representation of the Hack Forums using Neo4j2023-08-09Dataset
Technical Leverage Analysis in the Python Ecosystem2023-07-20Dataset
Documentary sources of case studies on the issues a data protection officer faces on a daily basis2023-04-29Dataset
Cross-language corpora of privacy policies2023-03-16Dataset
Advanced Persistent Threats (APTs) campaigns database2022-11-24Dataset
Practical witness-key-agreement for blockchain-based dark pools financial trading2022-06-22Paper
Minimal disclosure in hierarchical Hippocratic databases with delegation
Computer Security – ESORICS 2005
2022-03-09Paper
Technical Leverage Dataset for Java Dependencies in Maven2022-03-04Dataset
Code Analysis Tables for Developers Interviews on Dependencies Paper2021-11-27Dataset
Database - A Calculus of Tracking: Theory and Practice2021-01-16Dataset
Strongly analytic tableaux for normal modal logics
Automated Deduction — CADE-12
2020-01-21Paper
A uniform tableaux method for nonmonotonic modal logics
Logics in Artificial Intelligence
2019-10-08Paper
Tableaux and algorithms for Propositional Dynamic Logic with Converse
Automated Deduction — Cade-13
2019-01-15Paper
Tableaux methods for access control in distributed systems
Lecture Notes in Computer Science
2019-01-15Paper
Verifying security protocols as planning in logic programming
ACM Transactions on Computational Logic
2017-06-13Paper
Runtime enforcement of security policies on black box reactive programs
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
2016-09-29Paper
Towards an independent semantics and verification technology for the HLPSL specification language2013-09-26Paper
Attacking fair-exchange protocols: parallel models vs. trace models
Electronic Notes in Theoretical Computer Science
2013-07-24Paper
A method for security governance, risk, and compliance (GRC): a goal-process approach
Foundations of Security Analysis and Design VI
2011-09-16Paper
A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems
Computer Networks
2009-10-26Paper
Matching in security-by-contract for mobile code
The Journal of Logic and Algebraic Programming
2009-07-20Paper
Trust Management
Lecture Notes in Computer Science
2007-09-25Paper
Verifying the SET purchase protocols
Journal of Automated Reasoning
2007-01-30Paper
How to fake an RSA signature by encoding modular root finding as a SAT problem
Discrete Applied Mathematics
2003-09-15Paper
scientific article; zbMATH DE number 1926618 (Why is no real title available?)2003-06-11Paper
Combining deduction and model checking into tableaux and algorithms for converse-PDL.
Information and Computation
2003-01-14Paper
scientific article; zbMATH DE number 1844576 (Why is no real title available?)2002-12-12Paper
scientific article; zbMATH DE number 1696817 (Why is no real title available?)2002-01-28Paper
Logical cryptanalysis as a SAT problem2001-10-21Paper
scientific article; zbMATH DE number 1612538 (Why is no real title available?)2001-07-01Paper
Logical cryptanalysis as a SAT problem: Encoding and analysis of the U. S. Data Encryption Standard
Journal of Automated Reasoning
2001-05-01Paper
EXPtime tableaux for ALC
Artificial Intelligence
2000-12-12Paper
The proof complexity of analytic and clausal tableaux
Theoretical Computer Science
2000-08-21Paper
Single step tableaux for modal logics. Computational properties, complexity and methodology
Journal of Automated Reasoning
2000-05-17Paper
Tableau methods for formal verification of multi-agent distributed systems
Journal Of Logic And Computation
1998-09-27Paper
scientific article; zbMATH DE number 1189106 (Why is no real title available?)1998-08-13Paper


Research outcomes over time


This page was built for person: Fabio Massacci