Publications & Journals

Journals 

Casolare, R., De Dominicis, C., Iadarola, G., Martinelli, F., Mercaldo, F. & Santone, A. (2021), “Dynamic Mobile Malware Detection through System Call-based Image representation”, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol. 12, No. 1, pp. 44-63, DOI: 10.22667/JOWUA.2021.03.31.044.

Casolare, R., Di Giacomo, U., Martinelli, F., Mercaldo, F. & Santone, A. (2021), “Android Collusion Detection by means of Audio Signal Analysis with Machine Learning techniques”,  Procedia Computer Science, Vol, 192, pp. 2340-2346, DOI: 10.1016/j.procs.2021.08.224.

Chevalier, Y., Fenzl, F., & Kolomeets, M., & Rieke, R., & Chechulin, A., & Krauß, C. (2021), “Cyberattack detection in vehicles using characteristic functions, artificial neural networks, and visual analysis”, Informatics and Automation (SPIIRAS Proceedings), Vol. 24, No. 4, pp. 845-868, DOI: 10.15622/ia.20.4.4 .

Di Giacomo, U., Casolare, R., Eigner, O., Martinelli, F., Mercaldo, F., Priebe, T. & Santone, A. (2021), “Exploiting Supervised Machine Learning for Driver Detection in a Real-World Environment”,  Procedia Computer Science, Vol. 192, pp.2440-2449, DOI: 10.1016/j.procs.2021.09.013.

Iadarola, G., Martinelli, F., Mercaldo, F. & Santone, A. (2021), “Towards an interpretable deep learning model for mobile malware detection and family identification”, Computers & Security, Vol. 105, pp. 102198, DOI: 10.1016/j.cose.2021.102198.

Iadarola, G., Martinelli, F., Mercaldo, F., & Santone, A. (2020), “Call Graph and Model Checking for Fine-Grained Android Malicious Behaviour Detection”, Applied Sciences, Vol 10, No. 22, pp.7975, DOI: 10.3390/app10227975.

Zelle, D., Plappert, C., Rieke, R., Scheuermann, D., & KrauB, C. (2022), “ThreatSurf: A method for automated Threat Surface assessment in automotive cybersecurity engineering,” Microprocessors & Microsytems, Vol. 90, pp.104461, DOI: 10.1016/j.micpro.2022.104461.

Conference 

Buschlinger, L., Rieke, R., Sarda, S. & Krauß, C. (2022), “Decision Tree-Based Rule Derivation for Intrusion Detection in Safety-Critical Automotive Systems”,  Proceedings of the 30th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP), Valladolid, Spain, 09-11 March, pp. 246-254, DOI: 10.1109/PDP55904.2022.00046.

Casolare, R., Ciaramella, G., Martinelli, F., Mercaldo, F. & Santone, A. (2021), “Steælergon: A framework for injecting colluding malicious payload in android applications”, Proceedings of the 16th International Conference on Availability, Reliability and Security, Vienna, Austria, 17–21 August, pp. 1-7, DOI: 10.1145/3465481.3470077.

Casolare, R., Iadarola, G., Martinelli, F., Mercaldo, F. & Santone, A. (2021), “Mobile Family Detection through Audio Signals Classification”, Proceedings of the 18th International Conference on Security and Cryptography, Paris, France, 6-8 July, pp. 479-486, DOI: 10.5220/0010543504790486.

Casolare, R., Martinelli, F., Mercaldo, F. & Santone, A. (2021), “Colluding Covert Channel for Malicious Information Exfiltration in Android Environment”, Proceedings of the 7th International Conference on Information Systems Security and Privacy – ForSE, Vienna, Austria, 11-13 February, pp. 811-818, DOI: 10.5220/0010396708110818.

Fenzl, F., Rieke, R. & Dominik, A. (2021), “In-vehicle detection of targeted CAN bus attacks”, Proceedings of the 16th International Conference on Availability, Reliability and Security, Vienna, Austria, 17–21 August, pp.1-7, DOI: 10.1145/3465481.3465755.

Fenzl, F., Gail F., Jäger,  L., Plappert, C., Rieke, R., Dimitrakos, T., Hariri, A., & Joumaa, H. (2023), “A Policy-driven Architecture for Security Incident Mitigation in Connected Vehicles”, Proceedings of the 40th Symposium on Cryptography and Information Security, Kitakyushu, Japan, 24 January.

Iadarola, G., Casolare, R., Martinelli, F., Mercaldo, F.,   Peluso C.  & Santone, A.  (2021), “A Semi-Automated Explainability-Driven Approach for Malware Analysis through Deep Learning,”, Proceedings of the International Joint Conference on Neural Networks (IJCNN), Shenzhen, China, 18-22 July, pp. 1-8, DOI: 10.1109/IJCNN52387.2021.9533803.

Madi, A., Stan, O., Sirdey, R. & Gouy-Pailler, C. (2022), “SecTL: Secure and Verifiable Transfer Learning-based inference”, Proceedings of the 8th International Conference on Information Systems Security and Privacy – ICISSP, 9-11 February, pp. 220-229, DOI: 10.5220/0010987700003120.

Micale, D., Costantino, G., Matteucci, I., Fenzl, F., Rieke, R. & Patanè, G. (2022), “CAHOOT: a Context-Aware veHicular intrusiOn detectiOn sysTem,” Proceedings of the 3rd International Workshop on Machine Learning for Trust, Security and Privacy in Computing and Communications (MLTrustCom 2022), in conjunction with the IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Wuhan, China, 20 March, pp. 1211-1218, DOI: 10.1109/TrustCom56396.2022.00168

Moulouel, K., Arbane, M., Chibani, A., Khodabandelou G. & Amirat, Y. (2022), “Stream Reasoning approach for Anticipating Human Activities in Ambient Intelligence environments”, Proceedings of the IEEE 34th International Conference on Tools with Artificial Intelligence (ICTAI), Macao, China, 2 November, pp. 666-671, DOI: 10.1109/ICTAI56018.2022.00103.

Moulouel, K., Chibani, A., Abdelkawy, H., & Amirat, Y. (2022), “Hybrid approach for anticipating human activities in Ambient Intelligence environments,” Proceedings of the  IEEE 18th International Conference on Automation Science and Engineering (CASE), Mexico City, Mexico, 20-24 August, pp. 2006-2011, DOI: 10.1109/CASE49997.2022.9926669.

Plappert, C., Fenzl, F., Rieke, R., Matteucci, I., Costantino, G. & De Vincenzi, M. (2022), SECPAT: Security Patterns for Resilient Automotive E / E Architectures”,  Proceedings of the 30th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP), Valladolid, Spain, 09-11 March, pp. 255-264, DOI: 10.1109/pdp55904.2022.00047.

Plappert, C., Fuchs, A. & Heddergott, R. (2022), “Analysis and Evaluation of Hardware Trust Anchors in the Automotive Domain”, Proceedings of the 17th International Conference on Availability, Reliability and Security, Vienna, Austria, 23–26 August, pp. 1-11, DOI: 10.1145/3538969.3538995.

Plappert, C., Jäger, L. & Fuchs, A. (2021), “Secure role and rights management for automotive access and feature activation”, Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, Hong Kong, China, 7-11 June, pp. 227-241, DOI: 10.1145/3433210.3437521.

Plappert, C., Stancke, J. and Jäger, L. (2022), “Towards a Privacy-Aware Electric Vehicle Architecture”,  Proceedings of the 30th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP), Valladolid, Spain, 09-11 March, pp. 265-274, DOI: 10.1109/PDP55904.2022.00048.

Plappert, C., Zelle, D.  Gadacz, H., Rieke, R.,  Scheuermann, D.  & Krauß, C. (2021), “Attack Surface Assessment for Cybersecurity Engineering in the Automotive Domain,” Proceedings of the 29th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), Valladolid, Spain, 3 October, pp. 266-275, DOI: 10.1109/PDP52278.2021.00050.

Zelle, D., Lauser, T., Kern, D. & Krauß, C. (2021), “Analyzing and securing SOME/IP automotive services with formal and practical methods”,  Proceedings of the 16th International Conference on Availability, Reliability and Security,  Vienna, Austria, 17–21 August, pp. 1-20, DOI: 10.1145/3465481.3465748.

Book Publications

Dimitrakos, T., Lopez, J., Martinelli, F. (2023), (ed.), Collaborative Approaches for Cyber Security in Cyber-Physical Systems, Springer, Cham, AG, ISBN: 9783031160875, DOI: 10.1007/978-3-031-16088-2.

Fenzl, F., Plappert, C., Rieke, R., Zelle, D., Costantino, G., De Vincenzi, M., & Matteucci, I. (2023), “Collaborative Security Patterns for Automotive Electrical/Electronic Architectures”, pp.  63–97. In Collaborative Approaches for Cyber Security in Cyber-Physical Systems, Dimitrakos, T., Lopez, J., Martinelli, F. (eds), Advanced Sciences and Technologies for Security Applications. Springer, Cham, DOI: 10.1007/978-3-031-16088-2_4.