Gabriele Costa
Gabriele Costa
IMT Lucca
No verified email - Homepage
TitleCited byYear
Detection of images with adult content for parental control on mobile devices?
G Amato, P Bolettieri, G Costa, F La Torre, F Martinelli
Proceedings of the 6th International Conference on Mobile Technology …, 2009
Bring your own device, securely
A Armando, G Costa, A Merlo
Proceedings of the 28th annual acm symposium on applied computing, 1852-1858, 2013
Formal modeling and reasoning about the android security framework
A Armando, G Costa, A Merlo
International Symposium on Trustworthy Global Computing, 64-81, 2012
Extending security-by-contract with quantitative trust on mobile devices
G Costa, N Dragoni, A Lazouski, F Martinelli, F Massacci, I Matteucci
2010 International Conference on Complex, Intelligent and Software Intensive …, 2010
Securing the" Bring Your Own Device" Paradigm
A Armando, G Costa, L Verderame, A Merlo
Computer 47 (6), 48-56, 2014
Runtime monitoring for next generation Java ME platform
G Costa, F Martinelli, P Mori, C Schaefer, T Walter
Computers & Security 29 (1), 74-87, 2010
Securing Java with Local Policies.
M Bartoletti, G Costa, P Degano, F Martinelli, R Zunino
Journal of Object Technology 8 (4), 5-32, 2009
Enabling BYOD through secure meta-market
A Armando, G Costa, A Merlo, L Verderame
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
Comparative study of haematology of two teleost fish (Mugil cephalus and Carassius auratus) from different environments and feeding habits
V Parrino, T Cappello, G Costa, C Cannavą, M Sanfilippo, F Fazio, ...
The European Zoological Journal 85 (1), 193-199, 2018
Formal modeling and automatic enforcement of Bring Your Own Device policies
A Armando, G Costa, A Merlo, L Verderame
International Journal of Information Security 14 (2), 123-140, 2015
Android permissions unleashed
A Armando, R Carbone, G Costa, A Merlo
2015 IEEE 28th Computer Security Foundations Symposium, 320-333, 2015
Lazy security controllers
G Caravagna, G Costa, G Pardini
International Workshop on Security and Trust Management, 33-48, 2012
Production, characterization and biocompatibility evaluation of collagen membranes derived from marine sponge Chondrosia reniformis Nardo, 1847
M Pozzolini, S Scarfģ, L Gallus, M Castellano, S Vicini, K Cortese, ...
Marine drugs 16 (4), 111, 2018
Surface finishing operations on marbles with water jet
G Costa
Ph. D. Thesis, University of Cagliari, Italy, 2007
The dynamics of a Mediterranean coralligenous sponge assemblage at decennial and millennial temporal scales
M Bertolino, G Costa, M Carella, R Cattaneo-Vietti, C Cerrano, M Pansini, ...
PloS one 12 (5), 2017
Developing a NATO BYOD security policy
A Armando, G Costa, A Merlo, L Verderame, K Wrona
2016 International Conference on Military Communications and Information …, 2016
SAM: the static analysis module of the MAVERIC mobile app security verification platform
A Armando, G Bocci, G Chiarelli, G Costa, G De Maglie, R Mammoliti, ...
International Conference on Tools and Algorithms for the Construction and …, 2015
Flow cytometry and micro-Raman spectroscopy: Identification of hemocyte populations in the mussel Mytilus galloprovincialis (Bivalvia: Mytilidae) from Faro Lake and Tyrrhenian …
V Parrino, G Costa, C Cannavą, E Fazio, M Bonsignore, S Concetta, ...
Fish & shellfish immunology 87, 1-8, 2019
Automatic security verification of mobile app configurations
G Costa, A Merlo, L Verderame, A Armando
Future Generation Computer Systems 80, 519-536, 2018
Android vs. SEAndroid: An empirical assessment
A Merlo, G Costa, L Verderame, A Armando
Pervasive and Mobile Computing 30, 113-131, 2016
The system can't perform the operation now. Try again later.
Articles 1–20