Gabriele Costa
Gabriele Costa
IMT Lucca
Nessuna email verificata - Home page
TitoloCitata daAnno
Detection of images with adult content for parental control on mobile devices?
G Amato, P Bolettieri, G Costa, F La Torre, F Martinelli
Proceedings of the 6th International Conference on Mobile Technology …, 2009
Bring your own device, securely
A Armando, G Costa, A Merlo
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 1852-1858, 2013
Formal modeling and reasoning about the android security framework
A Armando, G Costa, A Merlo
International Symposium on Trustworthy Global Computing, 64-81, 2012
Extending security-by-contract with quantitative trust on mobile devices
G Costa, N Dragoni, A Lazouski, F Martinelli, F Massacci, I Matteucci
2010 International Conference on Complex, Intelligent and Software Intensive …, 2010
Securing the" Bring Your Own Device" Paradigm
A Armando, G Costa, L Verderame, A Merlo
Computer 47 (6), 48-56, 2014
Runtime monitoring for next generation java me platform
G Costa, F Martinelli, P Mori, C Schaefer, T Walter
Computers & Security 29 (1), 74-87, 2010
Securing Java with Local Policies.
M Bartoletti, G Costa, P Degano, F Martinelli, R Zunino
Journal of Object Technology 8 (4), 5-32, 2009
Enabling BYOD through secure meta-market
A Armando, G Costa, A Merlo, L Verderame
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
Formal modeling and automatic enforcement of Bring Your Own Device policies
A Armando, G Costa, A Merlo, L Verderame
International Journal of Information Security 14 (2), 123-140, 2015
Comparative study of haematology of two teleost fish (Mugil cephalus and Carassius auratus) from different environments and feeding habits
V Parrino, T Cappello, G Costa, C Cannavà, M Sanfilippo, F Fazio, ...
The European Zoological Journal 85 (1), 193-199, 2018
Android permissions unleashed
A Armando, R Carbone, G Costa, A Merlo
2015 IEEE 28th Computer Security Foundations Symposium, 320-333, 2015
Lazy security controllers
G Caravagna, G Costa, G Pardini
International Workshop on Security and Trust Management, 33-48, 2012
Production, characterization and biocompatibility evaluation of collagen membranes derived from marine sponge chondrosia reniformis nardo, 1847
M Pozzolini, S Scarfì, L Gallus, M Castellano, S Vicini, K Cortese, ...
Marine drugs 16 (4), 111, 2018
Developing a NATO BYOD security policy
A Armando, G Costa, A Merlo, L Verderame, K Wrona
2016 International Conference on Military Communications and Information …, 2016
SAM: the static analysis module of the MAVERIC mobile app security verification platform
A Armando, G Bocci, G Chiarelli, G Costa, G De Maglie, R Mammoliti, ...
International Conference on Tools and Algorithms for the Construction and …, 2015
Flow cytometry and micro-Raman spectroscopy: Identification of hemocyte populations in the mussel Mytilus galloprovincialis (Bivalvia: Mytilidae) from Faro Lake and Tyrrhenian …
V Parrino, G Costa, C Cannavà, E Fazio, M Bonsignore, S Concetta, ...
Fish & shellfish immunology 87, 1-8, 2019
Automatic security verification of mobile app configurations
G Costa, A Merlo, L Verderame, A Armando
Future Generation Computer Systems 80, 519-536, 2018
The dynamics of a Mediterranean coralligenous sponge assemblage at decennial and millennial temporal scales
M Bertolino, G Costa, M Carella, R Cattaneo-Vietti, C Cerrano, M Pansini, ...
PloS one 12 (5), e0177945, 2017
Android vs. SEAndroid: An empirical assessment
A Merlo, G Costa, L Verderame, A Armando
Pervasive and Mobile Computing 30, 113-131, 2016
Green data centers
R Basmadjian, P Bouvry, G Costa, L Gyarmati, D Kliazovich, S Lafond, ...
Large-Scale Distributed Systems and Energy Efficiency: A Holistic View, 159-196, 2015
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20