BPMN: An introduction to the standard M Chinosi, A Trombetta Computer Standards & Interfaces 34 (1), 124-134, 2012 | 1099 | 2012 |
Privacy-aware role-based access control Q Ni, E Bertino, J Lobo, C Brodie, CM Karat, J Karat, A Trombeta ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-31, 2010 | 499 | 2010 |
A multidimensional critical state analysis for detecting intrusions in SCADA systems A Carcano, A Coletta, M Guglielmi, M Masera, IN Fovino, A Trombetta IEEE Transactions on Industrial Informatics 7 (2), 179-186, 2011 | 339 | 2011 |
Modbus/DNP3 state-based intrusion detection system IN Fovino, A Carcano, TDL Murel, A Trombetta, M Masera 2010 24th IEEE International Conference on Advanced Information Networking …, 2010 | 215 | 2010 |
Design and implementation of a secure modbus protocol IN Fovino, A Carcano, M Masera, A Trombetta Critical Infrastructure Protection III: Third Annual IFIP WG 11.10 …, 2009 | 181 | 2009 |
A framework for modeling and evaluating automatic semantic reconciliation A Gal, A Anaby-Tavor, A Trombetta, D Montesi The VLDB Journal 14, 50-67, 2005 | 174 | 2005 |
An experimental investigation of malware attacks on SCADA systems IN Fovino, A Carcano, M Masera, A Trombetta International Journal of Critical Infrastructure Protection 2 (4), 139-145, 2009 | 150 | 2009 |
State-based network intrusion detection systems for SCADA protocols: a proof of concept A Carcano, IN Fovino, M Masera, A Trombetta Critical Information Infrastructures Security: 4th International Workshop …, 2010 | 101 | 2010 |
Imprecision and user preferences in multimedia queries: A generic algebraic approach P Ciaccia, D Montesi, W Penzo, A Trombetta International Symposium on Foundations of Information and Knowledge Systems …, 2000 | 50 | 2000 |
Optimal comparison strategies in Ulam's searching game with two errors D Mundici, A Trombetta Theoretical Computer Science 182 (1-2), 217-232, 1997 | 42 | 1997 |
Scada malware, a proof of concept A Carcano, IN Fovino, M Masera, A Trombetta Critical Information Infrastructure Security: Third International Workshop …, 2009 | 39 | 2009 |
Privacy-preserving updates to anonymous and confidential databases A Trombetta, W Jiang, E Bertino, L Bossi IEEE Transactions on Dependable and Secure Computing 8 (4), 578-587, 2010 | 36 | 2010 |
An event-driven integrative framework enabling information notification among manufacturing resources GE Modoni, A Trombetta, M Veniero, M Sacco, D Mourtzis International Journal of Computer Integrated Manufacturing 32 (3), 241-252, 2019 | 34 | 2019 |
ComfOnt: a semantic framework for indoor comfort and energy saving in smart homes D Spoladore, A Mahroo, A Trombetta, M Sacco Electronics 8 (12), 1449, 2019 | 31 | 2019 |
Introducing privacy in a hospital information system S Braghin, A Coen-Porisini, P Colombo, S Sicari, A Trombetta Proceedings of the fourth international workshop on software engineering for …, 2008 | 28 | 2008 |
Semantic based events signaling for AAL systems GE Modoni, M Veniero, A Trombetta, M Sacco, S Clemente Journal of Ambient Intelligence and Humanized Computing 9, 1311-1325, 2018 | 25 | 2018 |
DOMUS: A domestic ontology managed ubiquitous system D Spoladore, A Mahroo, A Trombetta, M Sacco Journal of Ambient Intelligence and Humanized Computing 13 (6), 3037-3052, 2022 | 23 | 2022 |
Supporting robust and secure interactions in open domains through recovery of trust negotiations AC Squicciarini, A Trombetta, E Bertino 27th International Conference on Distributed Computing Systems (ICDCS'07), 57-57, 2007 | 21 | 2007 |
Integrating privacy policies into business processes M Chinosi, A Trombetta Journal of Research and Practice in Information Technology 41 (2), 155-170, 2009 | 20 | 2009 |
Modeling and validating BPMN diagrams M Chinosi, A Trombetta 2009 IEEE Conference on Commerce and Enterprise Computing, 353-360, 2009 | 19 | 2009 |