Seguir
Mattia Monga
Mattia Monga
Dirección de correo verificada de unimi.it - Página principal
Título
Citado por
Citado por
Año
Detecting self-mutating malware using control-flow graph matching
D Bruschi, L Martignoni, M Monga
Detection of Intrusions and Malware & Vulnerability Assessment: Third …, 2006
3562006
Code normalization for self-mutating malware
D Bruschi, L Martignoni, M Monga
IEEE Security & Privacy 5 (2), 46-54, 2007
1232007
Synthesizing intensional behavior models by graph transformation
C Ghezzi, A Mocci, M Monga
2009 IEEE 31st International Conference on Software Engineering, 430-440, 2009
1152009
Assessing the risk of using vulnerable components
D Balzarotti, M Monga, S Sicari
Quality of Protection: Security Measurements and Metrics, 65-77, 2006
1022006
Using Code Normalization for Fighting Self-Mutating Malware.
D Bruschi, L Martignoni, M Monga
ISSSE, 2006
872006
Dynamic and transparent analysis of commodity production systems
A Fattori, R Paleari, L Martignoni, M Monga
Proceedings of the 25th IEEE/ACM International Conference on Automated …, 2010
772010
Replay attack in TCG specification and solution
D Bruschi, L Cavallaro, A Lanzi, M Monga
21st Annual Computer Security Applications Conference (ACSAC'05), 11 pp.-137, 2005
75*2005
LISABETH: automated content-based signature generator for zero-day polymorphic worms
L Cavallaro, A Lanzi, L Mayer, M Monga
Proceedings of the fourth international workshop on Software engineering for …, 2008
732008
Carrying on the e-learning process with a workflow management engine
M Cesarini, M Monga, R Tedesco
Proceedings of the 2004 ACM symposium on Applied computing, 940-945, 2004
732004
A smart fuzzer for x86 executables
A Lanzi, L Martignoni, M Monga, R Paleari
Third International Workshop on Software Engineering for Secure Systems …, 2007
522007
Interaction analysis in aspect-oriented models
K Mehner, M Monga, G Taentzer
14th IEEE international requirements engineering conference (RE'06), 69-78, 2006
512006
A hybrid analysis framework for detecting web application vulnerabilities
M Monga, R Paleari, E Passerini
2009 ICSE Workshop on Software Engineering for Secure Systems, 25-32, 2009
482009
Supporting interoperability and reusability of learning objects: The virtual campus approach
E Di Nitto, L Mainetti, M Monga, L Sbattella, R Tedesco
Journal of Educational Technology & Society 9 (2), 33-50, 2006
432006
On race vulnerabilities in web applications
R Paleari, D Marrone, D Bruschi, M Monga
Detection of Intrusions and Malware, and Vulnerability Assessment: 5th …, 2008
422008
Security games for node localization through verifiable multilateration
N Basilico, N Gatti, M Monga, S Sicari
IEEE Transactions on Dependable and Secure Computing 11 (1), 72-85, 2013
412013
An experience on verification of aspect properties
G Denaro, M Monga
Proceedings of the 4th international workshop on Principles of software …, 2001
412001
Informatics education in Italian secondary schools
C Bellettini, V Lonati, D Malchiodi, M Monga, A Morpurgo, M Torelli, ...
ACM Transactions on Computing Education (TOCE) 14 (2), 1-6, 2014
392014
A formal framework for specifying and verifying microservices based process flows
M Camilli, C Bellettini, L Capra, M Monga
Software Engineering and Formal Methods: SEFM 2017 Collocated Workshops …, 2018
342018
Slicing AspectJ woven code
D Balzarotti, A Castaldo, LC D’Ursi, M Monga
FOAL 2005 Proceedings, 27, 2005
332005
How challenging are Bebras tasks? An IRT analysis based on the performance of Italian students
C Bellettini, V Lonati, D Malchiodi, M Monga, A Morpurgo, M Torelli
Proceedings of the 2015 ACM conference on innovation and technology in …, 2015
322015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20