The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mattia Monga: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi, Mattia Monga
    Replay Attack in TCG Specification and Solution. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:127-137 [Conf]
  2. Danilo Bruschi, Lorenzo Martignoni, Mattia Monga
    Detecting Self-mutating Malware Using Control-Flow Graph Matching. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2006, pp:129-143 [Conf]
  3. Danilo Bruschi, Bart De Win, Mattia Monga
    Software engineering for secure systems. [Citation Graph (0, 0)][DBLP]
    ICSE, 2005, pp:681- [Conf]
  4. Danilo Bruschi, Bart De Win, Mattia Monga
    Software engineering for secure systems. [Citation Graph (0, 0)][DBLP]
    ICSE, 2006, pp:1007-1008 [Conf]
  5. Davide Balzarotti, Carlo Ghezzi, Mattia Monga
    Freeing Cooperation from Servers Tyranny. [Citation Graph (0, 0)][DBLP]
    NETWORKING Workshops, 2002, pp:235-246 [Conf]
  6. Katharina Mehner, Mattia Monga, Gabriele Taentzer
    Interaction Analysis in Aspect-Oriented Models. [Citation Graph (0, 0)][DBLP]
    RE, 2006, pp:66-75 [Conf]
  7. Mirko Cesarini, Mattia Monga, Roberto Tedesco
    Carrying on the e-learning process with a workflow management engine. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:940-945 [Conf]
  8. Mattia Monga, Angelo Scotto
    A generic serializer for mobile devices. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:981-985 [Conf]
  9. Davide Balzarotti, Carlo Ghezzi, Mattia Monga
    Supporting configuration management for virtual workgroups ini a peer-to-peer setting. [Citation Graph (0, 0)][DBLP]
    SEKE, 2002, pp:507-511 [Conf]
  10. Carlo Bellettini, Lorenzo Capra, Mattia Monga
    Quantitative Assessment of a Peer-to-peer Cooperative Infrastructure Using Stochastic Well-Formed Nets. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:128, n:4, pp:59-77 [Journal]
  11. Elisabetta Di Nitto, Luca Mainetti, Mattia Monga, Licia Sbattella, Roberto Tedesco
    Supporting Interoperability and Reusability of Learning Objects: The Virtual Campus Approach. [Citation Graph (0, 0)][DBLP]
    Educational Technology & Society, 2006, v:9, n:2, pp:33-50 [Journal]
  12. Riccardo Casero, Mirko Cesarini, Mattia Monga
    Managing Code Dependencies in C#. [Citation Graph (0, 0)][DBLP]
    Journal of Object Technology, 2004, v:3, n:2, pp:47-55 [Journal]
  13. Carlo Bellettini, Lorenzo Capra, Mattia Monga
    Using a Stochastic Well-formed Net model for assessing a decentralized approach to configuration management. [Citation Graph (0, 0)][DBLP]
    Perform. Eval., 2007, v:64, n:3, pp:229-246 [Journal]
  14. Davide Balzarotti, Carlo Ghezzi, Mattia Monga
    Supporting Cooperative Software Processes in a Decentralized and Nomadic World. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2006, v:36, n:6, pp:1098-1109 [Journal]
  15. Danilo Bruschi, Bart De Win, Seok-Won Lee, Mattia Monga
    The 3rd International Workshop on Software Engineering for Secure Systems SESS07 - Dependable and Secure. [Citation Graph (0, 0)][DBLP]
    ICSE Companion, 2007, pp:111-112 [Conf]

  16. On Race Vulnerabilities in Web Applications. [Citation Graph (, )][DBLP]


  17. The fourth international workshop on software engineering for secure systems: SESS'08 -- a trusted business world. [Citation Graph (, )][DBLP]


  18. LISABETH: automated content-based signature generator for zero-day polymorphic worms. [Citation Graph (, )][DBLP]


  19. Synthesizing intensional behavior models by graph transformation. [Citation Graph (, )][DBLP]


  20. The 5th international workshop on software engineering for secure systems (SESS'09). [Citation Graph (, )][DBLP]


  21. The 6th International Workshop on Software Engineering for Secure Systems (SESS'10). [Citation Graph (, )][DBLP]


  22. Efficient recovery of algebraic specifications for stateful components. [Citation Graph (, )][DBLP]


  23. Dynamic and transparent analysis of commodity production systems. [Citation Graph (, )][DBLP]


  24. On bytecode slicing and aspectJ interferences. [Citation Graph (, )][DBLP]


  25. Unweaving the impact of aspect changes in AspectJ. [Citation Graph (, )][DBLP]


  26. Assessing data quality by a cross-layer approach. [Citation Graph (, )][DBLP]


  27. Special issue on software engineering for secure systems. [Citation Graph (, )][DBLP]


  28. A Game Theoretical Analysis of Localization Security in Wireless Sensor Networks with Adversaries [Citation Graph (, )][DBLP]


  29. Dynamic and Transparent Analysis of Commodity Production Systems [Citation Graph (, )][DBLP]


Search in 0.017secs, Finished in 0.018secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002