A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques M Ceccato, M Di Penta, P Falcarin, F Ricca, M Torchiano, P Tonella Empirical Software Engineering 19, 1040-1074, 2014 | 112 | 2014 |
The effectiveness of source code obfuscation: an experimental assessment M Ceccato, M Di Penta, J Nagra, P Falcarin, F Ricca, M Torchiano, ... Program Comprehension, 2009. ICPC'09. IEEE 17th International Conference on …, 2009 | 89 | 2009 |
Guest Editors' Introduction: Software Protection P Falcarin, C Collberg, M Atallah, M Jakubowski Software, IEEE 28 (2), 24-27, 2011 | 76 | 2011 |
Dynamic context-aware business process: A rule-based approach supported by pattern identification JF Mejia Bernal, P Falcarin, M Morisio, J Dai 25th ACM Symposium on Applied Computing (SAC), 5th Track on Dependable and …, 2010 | 66 | 2010 |
Towards experimental evaluation of code obfuscation techniques M Ceccato, M Di Penta, J Nagra, P Falcarin, F Ricca, M Torchiano, ... Proceedings of the 4th ACM Workshop on Quality of Protection, 39-46, 2008 | 47 | 2008 |
A large study on the effect of code obfuscation on the quality of java code M Ceccato, A Capiluppi, P Falcarin, C Boldyreff Empirical Software Engineering 20, 1486-1524, 2015 | 46 | 2015 |
Measuring Security Requirements for Software Security S Islam, P Falcarin IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS) 2011, 2011 | 45 | 2011 |
How professional hackers understand protected code while performing attack tasks M Ceccato, P Tonella, C Basile, B Coppens, B De Sutter, P Falcarin, ... 2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC …, 2017 | 44 | 2017 |
User-Centric Future Internet and Telecommunication Services C Baladron, J Aguiar, B Carro, LW Goix, A Leon Martin, P Falcarin, ... Towards the Future Internet, 2009 | 44 | 2009 |
A User-Centric Service Creation Approach for Next Generation Networks JC YELMO, JM DEL ALAMO, R TRAPERO, P FALCARIN, J YU, B CARRO, ... ITU-T/IEEE Innovations in NGN– Future Network and Services Conference (K …, 2008 | 44 | 2008 |
Towards an efficient context-aware system: Problems and suggestions to reduce energy consumption in mobile devices JF Mejia Bernal, L Ardito, M Morisio, P Falcarin IEEE 9th International Conference on Mobile Business (ICMB-10), 510-514, 2010 | 41* | 2010 |
Synthesizing service composition models on the basis of temporal business rules J Yu, YB Han, J Han, Y Jin, P Falcarin, M Morisio Journal of computer science and technology 23 (6), 885-894, 2008 | 40 | 2008 |
Software architecture evolution through dynamic aop P Falcarin, G Alonso European Workshop on Software Architecture (EWSA-04), 57-73, 2004 | 40 | 2004 |
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge M Ceccato, P Tonella, C Basile, P Falcarin, M Torchiano, B Coppens, ... Empirical Software Engineering 24, 240-286, 2019 | 38 | 2019 |
Situation inference for mobile users: a rule based approach LW Goix, M Valla, L Cerami, P Falcarin IEEE Intern. Conf. on Mobile Data Management (MDM-07), 299-303, 2007 | 38 | 2007 |
Enabling context-aware web services: methods, architectures, and technologies QZ Sheng, J Yu, S Dustdar CRC Press, 2010 | 36 | 2010 |
Exploiting code mobility for dynamic binary obfuscation P Falcarin, S Di Carlo, A Cabutto, N Garazzino, D Barberis 2011 World Congress on Internet Security (WorldCIS-2011), 114-120, 2011 | 34 | 2011 |
Data quality challenges in large-scale cyber-physical systems: A systematic review AA Alwan, MA Ciupala, AJ Brimicombe, SA Ghorashi, A Baravalle, ... Information Systems 105, 101951, 2022 | 33 | 2022 |
A meta-model for software protections and reverse engineering attacks C Basile, D Canavese, L Regano, P Falcarin, B De Sutter Journal of Systems and Software 150, 3-21, 2019 | 33 | 2019 |
Analysis of NGN service creation technologies CA Licciardi, P Falcarin Annual Review of Communications 56, 537-551, 2003 | 33 | 2003 |