Gabriele Costa
Gabriele Costa
Verified email at
Cited by
Cited by
Detection of images with adult content for parental control on mobile devices?
G Amato, P Bolettieri, G Costa, F La Torre, F Martinelli
Proceedings of the 6th International Conference on Mobile Technology …, 2009
Bring your own device, securely
A Armando, G Costa, A Merlo
Proceedings of the 28th annual acm symposium on applied computing, 1852-1858, 2013
Securing the" bring your own device" paradigm
A Armando, G Costa, L Verderame, A Merlo
Computer 47 (6), 48-56, 2014
Formal modeling and reasoning about the android security framework
A Armando, G Costa, A Merlo
International Symposium on Trustworthy Global Computing, 64-81, 2012
Extending Security-by-Contract with quantitative trust on mobile devices
G Costa, N Dragoni, A Lazouski, F Martinelli, F Massacci, I Matteucci
2010 International Conference on Complex, Intelligent and Software Intensive …, 2010
Runtime monitoring for next generation java me platform
G Costa, F Martinelli, P Mori, C Schaefer, T Walter
Computers & Security 29 (1), 74-87, 2010
Securing Java with local policies
M Bartoletti, C Gabriele, M Fabio, Z Roberto
Measurement of D*+/-meson production in jets from pp collisions at sqrt (s)= 7 TeV with the ATLAS detector
ATLAS collaboration
arXiv preprint arXiv:1112.4432, 2011
Measurements of the [... formula...] production cross sections in association with jets with the ATLAS detector
G Aad, B Abbott, J Abdallah, SA Khalek, R Aben, B Abi, M Abolins, ...
The European physical journal. C, Particles and fields 75 (2), 2015
Enabling BYOD through secure meta-market
A Armando, G Costa, A Merlo, L Verderame
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
Formal modeling and automatic enforcement of Bring Your Own Device policies
A Armando, G Costa, A Merlo, L Verderame
International Journal of Information Security 14 (2), 123-140, 2015
Effect of diabetes/hyperglycemia on the rat retinal adenosinergic system
J Vindeirinho, GN Costa, MB Correia, C Cavadas, PF Santos
PloS one 8 (6), e67499, 2013
Android permissions unleashed
A Armando, R Carbone, G Costa, A Merlo
2015 IEEE 28th Computer Security Foundations Symposium, 320-333, 2015
Security-by-contract-with-trust for mobile devices
G Costa, A Lazouski, F Martinelli, I Matteucci, V Issarny, R Saadi, ...
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2010
A survey on multi-factor authentication for online banking in the wild
F Sinigaglia, R Carbone, G Costa, N Zannone
Computers & Security 95, 101745, 2020
Scenario design and validation for next generation cyber ranges
E Russo, G Costa, A Armando
2018 IEEE 17th International Symposium on Network Computing and Applications …, 2018
Lazy security controllers
G Caravagna, G Costa, G Pardini
International Workshop on Security and Trust Management, 33-48, 2012
Underlying event characteristics and their dependence on jet size of charged-particle jet events in collisions at with the ATLAS detector
G Aad, B Abbott, J Abdallah, SA Khalek, AA Abdelalim, B Abi, M Abolins, ...
Physical Review D 86 (7), 072004, 2012
Building next generation cyber ranges with CRACK
E Russo, G Costa, A Armando
Computers & Security 95, 101837, 2020
Developing a NATO BYOD security policy
A Armando, G Costa, A Merlo, L Verderame, K Wrona
2016 International Conference on Military Communications and Information …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20