Seguir
Mattia Monga
Mattia Monga
Dirección de correo verificada de unimi.it - Página principal
Título
Citado por
Citado por
Año
Detecting self-mutating malware using control-flow graph matching
D Bruschi, L Martignoni, M Monga
Detection of Intrusions and Malware & Vulnerability Assessment: Third …, 2006
3412006
Code normalization for self-mutating malware
D Bruschi, L Martignoni, M Monga
IEEE Security & Privacy 5 (2), 46-54, 2007
1212007
Synthesizing intensional behavior models by graph transformation
C Ghezzi, A Mocci, M Monga
2009 IEEE 31st International Conference on Software Engineering, 430-440, 2009
1142009
Assessing the risk of using vulnerable components
D Balzarotti, M Monga, S Sicari
Quality of Protection: Security Measurements and Metrics, 65-77, 2006
1002006
Using code normalization for fighting self-mutating malware
D Bruschi, L Martignoni, M Monga
Proceedings of the International Symposium on Secure Software Engineering, 37-44, 2006
872006
Dynamic and transparent analysis of commodity production systems
A Fattori, R Paleari, L Martignoni, M Monga
Proceedings of the 25th IEEE/ACM International Conference on Automated …, 2010
762010
Replay attack in TCG specification and solution
D Bruschi, L Cavallaro, A Lanzi, M Monga
21st Annual Computer Security Applications Conference (ACSAC'05), 11 pp.-137, 2005
76*2005
LISABETH: automated content-based signature generator for zero-day polymorphic worms
L Cavallaro, A Lanzi, L Mayer, M Monga
Proceedings of the fourth international workshop on Software engineering for …, 2008
722008
Carrying on the e-learning process with a workflow management engine
M Cesarini, M Monga, R Tedesco
Proceedings of the 2004 ACM symposium on Applied computing, 940-945, 2004
722004
A smart fuzzer for x86 executables
A Lanzi, L Martignoni, M Monga, R Paleari
Third International Workshop on Software Engineering for Secure Systems …, 2007
522007
Interaction analysis in aspect-oriented models
K Mehner, M Monga, G Taentzer
14th IEEE International Requirements Engineering Conference (RE'06), 69-78, 2006
512006
A hybrid analysis framework for detecting web application vulnerabilities
M Monga, R Paleari, E Passerini
2009 ICSE Workshop on Software Engineering for Secure Systems, 25-32, 2009
442009
Supporting interoperability and reusability of learning objects: The virtual campus approach
E Di Nitto, L Mainetti, M Monga, L Sbattella, R Tedesco
Journal of Educational Technology & Society 9 (2), 33-50, 2006
432006
An experience on verification of aspect properties
G Denaro, M Monga
Proceedings of the 4th international workshop on Principles of software …, 2001
422001
Security games for node localization through verifiable multilateration
N Basilico, N Gatti, M Monga, S Sicari
IEEE Transactions on Dependable and Secure Computing 11 (1), 72-85, 2013
402013
On race vulnerabilities in web applications
R Paleari, D Marrone, D Bruschi, M Monga
Detection of Intrusions and Malware, and Vulnerability Assessment: 5th …, 2008
382008
Informatics education in Italian secondary schools
C Bellettini, V Lonati, D Malchiodi, M Monga, A Morpurgo, M Torelli, ...
ACM Transactions on Computing Education (TOCE) 14 (2), 1-6, 2014
372014
A formal framework for specifying and verifying microservices based process flows
M Camilli, C Bellettini, L Capra, M Monga
Software Engineering and Formal Methods: SEFM 2017 Collocated Workshops …, 2018
332018
Slicing AspectJ woven code
D Balzarotti, A Castaldo, LC D’Ursi, M Monga
FOAL 2005 Proceedings, 27, 2005
322005
How challenging are Bebras tasks? An IRT analysis based on the performance of Italian students
C Bellettini, V Lonati, D Malchiodi, M Monga, A Morpurgo, M Torelli
Proceedings of the 2015 ACM conference on innovation and technology in …, 2015
302015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20