Nicola Zannone

ORCID: 0000-0002-9081-5996
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Access Control and Trust
  • Information and Cyber Security
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Privacy, Security, and Data Protection
  • Business Process Modeling and Analysis
  • Service-Oriented Architecture and Web Services
  • Network Security and Intrusion Detection
  • Security and Verification in Computing
  • Advanced Malware Detection Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Spam and Phishing Detection
  • Software System Performance and Reliability
  • Software Engineering Research
  • Cloud Data Security Solutions
  • Multi-Agent Systems and Negotiation
  • Advanced Software Engineering Methodologies
  • Misinformation and Its Impacts
  • Data Quality and Management
  • User Authentication and Security Systems
  • Imbalanced Data Classification Techniques
  • Advanced Authentication Protocols Security
  • Digital and Cyber Forensics
  • Logic, Reasoning, and Knowledge
  • Distributed systems and fault tolerance

Eindhoven University of Technology
2015-2024

Institute of Electrical and Electronics Engineers
2020

Regional Municipality of Niagara
2020

IEEE Computer Society
2020

The University of Texas at San Antonio
2018

University of Trento
2004-2011

University of Toronto
2008-2009

University of Bologna
2008

10.1016/j.jnca.2019.06.017 article EN Journal of Network and Computer Applications 2019-07-03

Security requirements engineering is emerging as a branch of software engineering, spurred by the realization that security must be dealt with early on during phase. Methodologies in this field are challenging, they take into account subtle notions such trust (or lack thereof), delegation, and permission; also model entire organizations not only systems-to-be. In our previous work we introduced Secure Tropos, formal framework for modeling analyzing requirements. Tropos founded three main...

10.1109/re.2005.43 article EN 2005-01-01

10.1016/j.infsof.2008.04.004 article EN Information and Software Technology 2008-04-12

10.1016/j.dss.2014.02.002 article EN Decision Support Systems 2014-02-22

Phishing attacks are a critical and escalating cybersecurity threat in the modern digital landscape. As cybercriminals continually adapt their techniques, automated phishing detection systems have become essential for safeguarding Internet users. However, many current rely on single-analysis models, making them vulnerable to sophisticated bypass attempts by hackers. This research delves into potential of hybrid approaches, which combine multiple models enhance both robustness effectiveness...

10.1016/j.cose.2024.103736 article EN cc-by Computers & Security 2024-01-22

Data loss, i.e. the unauthorized/unwanted disclosure of data, is a major threat for modern organizations. Loss Protection (DLP) solutions in use nowadays, either employ patterns known attacks (signature-based) or try to find deviations from normal behavior (anomaly-based). While signature-based provide accurate identification and, thus, are suitable prevention these attacks, they cannot cope with unknown nor attackers who follow unusual paths (like those only insiders) carry out their...

10.1109/spw.2016.24 article EN 2016-05-01

In this study, we provide extensive analysis of the (unique) characteristics phishing and spear-phishing attacks, argue that attacks cannot be well captured by current countermeasures, identify ways forward, analyze an advanced campaign targeting white-collar workers in 32 countries.

10.1109/msec.2019.2940952 article EN IEEE Security & Privacy 2019-10-01

Phishing attacks are a main threat to organizations and individuals. Current widespread defenses based on spam filters domain blacklisting unfortunately insufficient. Prior work identifies phishing reporting as key, largely untapped resource mitigate threats. Yet, its practice suffers from very low rates generally too an uptake users. Whereas it is known that behavior affected by number of 'human factors', comprehensive view the different theories their effects (intent to) report not yet...

10.1145/3544548.3580985 article EN public-domain 2023-04-19

The importance of critical systems has been widely recognized and several efforts are devoted to integrate dependability requirements in their development process. Such result a number models, frameworks, methodologies that have proposed model assess the systems. Among them, risk analysis considers likelihood severity failures for evaluating affecting system. In our previous work, we introduced Tropos goal-risk framework, formal framework modeling, assessing, treating risks on basis...

10.1109/ares.2007.93 article EN 2007-01-01
Coming Soon ...