Gabriele Costa
Gabriele Costa
IMT Lucca
No verified email - Homepage
TitleCited byYear
Detection of images with adult content for parental control on mobile devices?
G Amato, P Bolettieri, G Costa, F La Torre, F Martinelli
Proceedings of the 6th International Conference on Mobile Technology …, 2009
732009
Bring your own device, securely
A Armando, G Costa, A Merlo
Proceedings of the 28th annual acm symposium on applied computing, 1852-1858, 2013
612013
Formal modeling and reasoning about the android security framework
A Armando, G Costa, A Merlo
International Symposium on Trustworthy Global Computing, 64-81, 2012
402012
Extending security-by-contract with quantitative trust on mobile devices
G Costa, N Dragoni, A Lazouski, F Martinelli, F Massacci, I Matteucci
2010 International Conference on Complex, Intelligent and Software Intensive …, 2010
392010
Securing the" Bring Your Own Device" Paradigm
A Armando, G Costa, L Verderame, A Merlo
Computer 47 (6), 48-56, 2014
372014
Runtime monitoring for next generation Java ME platform
G Costa, F Martinelli, P Mori, C Schaefer, T Walter
Computers & Security 29 (1), 74-87, 2010
362010
Securing Java with Local Policies.
M Bartoletti, G Costa, P Degano, F Martinelli, R Zunino
Journal of Object Technology 8 (4), 5-32, 2009
33*2009
Enabling BYOD through secure meta-market
A Armando, G Costa, A Merlo, L Verderame
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
222014
Comparative study of haematology of two teleost fish (Mugil cephalus and Carassius auratus) from different environments and feeding habits
V Parrino, T Cappello, G Costa, C Cannavą, M Sanfilippo, F Fazio, ...
The European Zoological Journal 85 (1), 193-199, 2018
202018
Formal modeling and automatic enforcement of Bring Your Own Device policies
A Armando, G Costa, A Merlo, L Verderame
International Journal of Information Security 14 (2), 123-140, 2015
202015
Android permissions unleashed
A Armando, R Carbone, G Costa, A Merlo
2015 IEEE 28th Computer Security Foundations Symposium, 320-333, 2015
152015
Lazy security controllers
G Caravagna, G Costa, G Pardini
International Workshop on Security and Trust Management, 33-48, 2012
132012
Production, characterization and biocompatibility evaluation of collagen membranes derived from marine sponge Chondrosia reniformis Nardo, 1847
M Pozzolini, S Scarfģ, L Gallus, M Castellano, S Vicini, K Cortese, ...
Marine drugs 16 (4), 111, 2018
112018
Surface finishing operations on marbles with water jet
G Costa
Ph. D. Thesis, University of Cagliari, Italy, 2007
112007
The dynamics of a Mediterranean coralligenous sponge assemblage at decennial and millennial temporal scales
M Bertolino, G Costa, M Carella, R Cattaneo-Vietti, C Cerrano, M Pansini, ...
PloS one 12 (5), 2017
82017
Developing a NATO BYOD security policy
A Armando, G Costa, A Merlo, L Verderame, K Wrona
2016 International Conference on Military Communications and Information …, 2016
82016
SAM: the static analysis module of the MAVERIC mobile app security verification platform
A Armando, G Bocci, G Chiarelli, G Costa, G De Maglie, R Mammoliti, ...
International Conference on Tools and Algorithms for the Construction and …, 2015
82015
Flow cytometry and micro-Raman spectroscopy: Identification of hemocyte populations in the mussel Mytilus galloprovincialis (Bivalvia: Mytilidae) from Faro Lake and Tyrrhenian …
V Parrino, G Costa, C Cannavą, E Fazio, M Bonsignore, S Concetta, ...
Fish & shellfish immunology 87, 1-8, 2019
72019
Automatic security verification of mobile app configurations
G Costa, A Merlo, L Verderame, A Armando
Future Generation Computer Systems 80, 519-536, 2018
72018
Android vs. SEAndroid: An empirical assessment
A Merlo, G Costa, L Verderame, A Armando
Pervasive and Mobile Computing 30, 113-131, 2016
72016
The system can't perform the operation now. Try again later.
Articles 1–20