• 2937
    Citations - based on content available in repository [source: Scopus]
20032024

Content available in repository

Filter
Chapter

Search results

  • 2020

    A latitudinal study on the use of sequential and concurrency patterns in deviance mining

    Genga, L., Potena, D., Chiorrini, A., Diamantini, C. & Zannone, N., 1 Jan 2020, Complex Pattern Mining. Appice, A., Ceci, M., Loglisci, C., Manco, G., Masciari, E. & Ras, Z. (eds.). Cham: Springer, p. 103-119 17 p. (Studies in Computational Intelligence; vol. 880).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

    2 Citations (Scopus)
    6 Downloads (Pure)
  • 2015

    Privacy-aware web service composition and ranking

    Costante, E., Paci, F. & Zannone, N., 28 Feb 2015, Standards and Standardization: Concepts, Methodologies, Tools, and Applications. IGI Global, p. 1653-1675 23 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

    1 Citation (Scopus)
  • 2013

    The POLIPO security framework

    Trivellato, D., Etalle, S., Luit, E. J. & Zannone, N., 2013, Situation Awareness with Systems of Systems. Laar, van de, P., Tretmans, J. & Borth, M. (eds.). New York: Springer, p. 189-208 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

    4 Downloads (Pure)
  • 2011

    Detecting conflicts between functional and security requirements with Secure Tropos: John Rusnak and the Allied Irish Bank (Chapter 9)

    Massacci, F. & Zannone, N., 2011, Social Modeling for Requirements Engineering. Giorgini, P., Maiden, N., Mylopoulos, J. & Yu, E. (eds.). Cambridge MA: MIT Press, p. 337-362

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    2 Downloads (Pure)
  • 2010

    Security requirements engineering : the SI* modeling language and the Secure Tropos methodology

    Massacci, F., Mylopoulos, J. & Zannone, N., 2010, Advances in Intelligent Information Systems. Ras, Z. W. & Tsay, L-S. (eds.). Berlin: Springer, p. 147-174 (Studies in Computational Intelligence; vol. 265).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    38 Citations (Scopus)
    2 Downloads (Pure)
  • 2007

    An ontology for secure socio-technical systems

    Massacci, F., Mylopoulos, J. & Zannone, N., 2007, Handbook of Ontologies for Business Interaction. Rittgen, P. (ed.). Idea Group, p. 188-207

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    35 Citations (Scopus)
    2 Downloads (Pure)
  • 2006

    Modelling security and trust with Secure Tropos

    Giorgini, P., Mouratidis, H. & Zannone, N., 2006, Integrating Security and Software Engineering: Advances and Future Vision. Mouratidis, H. & Giorgini, P. (eds.). Idea Group, p. 160-189

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    51 Citations (Scopus)
    2 Downloads (Pure)