Antonella Santone
Antonella Santone
Unknown affiliation
Verified email at unisannio.it
Title
Cited by
Cited by
Year
Ransomware steals your phone. formal methods rescue it
F Mercaldo, V Nardone, A Santone, CA Visaggio
International Conference on Formal Techniques for Distributed Objects …, 2016
872016
Selective mu-calculus and formula-based equivalence of transition systems
R Barbuti, N De Francesco, A Santone, G Vaglini
Journal of Computer and System Sciences 59 (3), 537-556, 1999
731999
Car hacking identification through fuzzy logic algorithms
F Martinelli, F Mercaldo, V Nardone, A Santone
2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1-7, 2017
532017
Diabetes mellitus affected patients classification and diagnosis through machine learning techniques
F Mercaldo, V Nardone, A Santone
Procedia computer science 112, 2519-2528, 2017
512017
Human behavior characterization for driving style recognition in vehicle system
F Martinelli, F Mercaldo, A Orlando, V Nardone, A Santone, AK Sangaiah
Computers & Electrical Engineering 83, 102504, 2020
492020
Ransomware inside out
F Mercaldo, V Nardone, A Santone
2016 11th International Conference on Availability, Reliability and Security …, 2016
482016
Identification of Android Malware Families with Model Checking.
P Battista, F Mercaldo, V Nardone, A Santone, CA Visaggio
ICISSP, 542-547, 2016
412016
De novo reconstruction of gene regulatory networks from time series data, an approach based on formal methods
M Ceccarelli, L Cerulo, A Santone
Methods 69 (3), 298-305, 2014
392014
Talos: no more ransomware victims with formal methods
A Cimitile, F Mercaldo, V Nardone, A Santone, CA Visaggio
International Journal of Information Security 17 (6), 719-738, 2018
382018
Abstract reduction in directed model checking ccs processes
A Santone, G Vaglini
Acta informatica 49 (5), 313-341, 2012
372012
Ant colony optimization for deadlock detection in concurrent systems
G Francesca, A Santone, G Vaglini, ML Villani
2011 IEEE 35th Annual Computer Software and Applications Conference, 108-117, 2011
362011
Clone detection through process algebras and java bytecode
A Santone
Proceedings of the 5th International Workshop on Software Clones, 73-74, 2011
352011
Leila: formal tool for identifying mobile malicious behaviour
G Canfora, F Martinelli, F Mercaldo, V Nardone, A Santone, CA Visaggio
IEEE Transactions on Software Engineering 45 (12), 1230-1252, 2018
312018
Download malware? no, thanks: how formal methods can block update attacks
F Mercaldo, V Nardone, A Santone, CA Visaggio
Proceedings of the 4th FME Workshop on Formal Methods in Software …, 2016
312016
Infer gene regulatory networks from time series data with probabilistic model checking
M Ceccarelli, L Cerulo, G De Ruvo, V Nardone, A Santone
2015 IEEE/ACM 3rd FME Workshop on Formal Methods in Software Engineering, 26-32, 2015
312015
Heuristic search+ local model checking in selective mu-calculus
A Santone
IEEE Transactions on Software Engineering 29 (6), 510-523, 2003
312003
Hey malware, i can find you!
F Mercaldo, V Nardone, A Santone, CA Visaggio
2016 IEEE 25th International Conference on Enabling Technologies …, 2016
302016
DELFIN+: An efficient deadlock detection tool for CCS processes
S Gradara, A Santone, ML Villani
Journal of Computer and System Sciences 72 (8), 1397-1412, 2006
282006
Automatic verification of concurrent systems using a formula-based compositional approach
A Santone
Acta Informatica 38 (8), 531-564, 2002
282002
Heuristic search for equivalence checking
N De Francesco, G Lettieri, A Santone, G Vaglini
Software & Systems Modeling 15 (2), 513-530, 2016
272016
The system can't perform the operation now. Try again later.
Articles 1–20