default search action
Michele Bezzi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Antonino Sabetta, Serena Elisa Ponta, Rocío Cabrera Lozoya, Michele Bezzi, Tommaso Sacchetti, Matteo Greco, Gergö Balogh, Péter Hegedüs, Rudolf Ferenc, Ranindya Paramitha, Ivan Pashchenko, Aurora Papotti, Ákos Milánkovich, Fabio Massacci:
Known Vulnerabilities of Open Source Projects: Where Are the Fixes? IEEE Secur. Priv. 22(2): 49-59 (2024) - [j14]Michele Bezzi:
Large Language Models and Security. IEEE Secur. Priv. 22(2): 60-68 (2024) - 2021
- [j13]Claudio A. Ardagna, Valerio Bellandi, Ernesto Damiani, Michele Bezzi, Cédric Hébert:
Big Data Analytics-as-a-Service: Bridging the gap between security experts and data scientists. Comput. Electr. Eng. 93: 107215 (2021) - [j12]Rocío Cabrera Lozoya, Arnaud Baumann, Antonino Sabetta, Michele Bezzi:
Commit2Vec: Learning Distributed Representations of Code Changes. SN Comput. Sci. 2(3): 150 (2021) - [j11]Claudio Agostino Ardagna, Valerio Bellandi, Michele Bezzi, Paolo Ceravolo, Ernesto Damiani, Cédric Hébert:
Model-Based Big Data Analytics-as-a-Service: Take Big Data to the Next Level. IEEE Trans. Serv. Comput. 14(2): 516-529 (2021)
2010 – 2019
- 2019
- [c25]Serena Elisa Ponta, Henrik Plate, Antonino Sabetta, Michele Bezzi, Cédric Dangremont:
A manually-curated dataset of fixes to vulnerabilities of open-source software. MSR 2019: 383-387 - [i5]Serena Elisa Ponta, Henrik Plate, Antonino Sabetta, Michele Bezzi, Cédric Dangremont:
A Manually-Curated Dataset of Fixes to Vulnerabilities of Open-Source Software. CoRR abs/1902.02595 (2019) - [i4]Rocío Cabrera Lozoya, Arnaud Baumann, Antonino Sabetta, Michele Bezzi:
Commit2Vec: Learning Distributed Representations of Code Changes. CoRR abs/1911.07605 (2019) - 2018
- [c24]Antonino Sabetta, Michele Bezzi:
A Practical Approach to the Automatic Classification of Security-Relevant Commits. ICSME 2018: 579-582 - [i3]Antonino Sabetta, Michele Bezzi:
A Practical Approach to the Automatic Classification of Security-Relevant Commits. CoRR abs/1807.02458 (2018) - 2017
- [j10]Nadia Metoui, Michele Bezzi, Alessandro Armando:
Risk-Based Privacy-Aware Access Control for Threat Detection Systems. Trans. Large Scale Data Knowl. Centered Syst. 36: 1-30 (2017) - [c23]Claudio A. Ardagna, Valerio Bellandi, Paolo Ceravolo, Ernesto Damiani, Michele Bezzi, Cédric Hébert:
A Model-Driven Methodology for Big Data Analytics-as-a-Service. BigData Congress 2017: 105-112 - 2016
- [c22]Nadia Metoui, Michele Bezzi, Alessandro Armando:
Trust and Risk-Based Access Control for Privacy Preserving Threat Detection Systems. FDSE 2016: 285-304 - [c21]Nadia Metoui, Michele Bezzi:
Differential Privacy Based Access Control. OTM Conferences 2016: 962-974 - 2015
- [j9]Volkmar Lotz, Francesco Di Cerbo, Michele Bezzi, Samuel Paul Kaluvuri, Antonino Sabetta, Slim Trabelsi:
Security Certification for Service-Based Business Ecosystems. Comput. J. 58(4): 709-723 (2015) - [j8]Alessandro Armando, Michele Bezzi, Nadia Metoui, Antonino Sabetta:
Risk-Based Privacy-Aware Information Disclosure. Int. J. Secur. Softw. Eng. 6(2): 70-89 (2015) - [c20]Slim Trabelsi, Francesco Di Cerbo, Laurent Gomez, Michele Bezzi:
A Privacy Preserving Framework for Mobile and Cloud. MOBILESoft 2015: 160-161 - [c19]Alessandro Armando, Michele Bezzi, Francesco Di Cerbo, Nadia Metoui:
Balancing Trust and Risk in Access Control. OTM Conferences 2015: 660-676 - 2014
- [c18]Alessandro Armando, Michele Bezzi, Nadia Metoui, Antonino Sabetta:
Risk-Aware Information Disclosure. DPM/SETOP/QASA 2014: 266-276 - [c17]Michele Bezzi, Frances Cleary, Luca Compagna:
From Research Results to Strategy: A Mapping Exercise. ISSE 2014: 256-264 - [c16]Samuel Paul Kaluvuri, Michele Bezzi, Yves Roudier:
A Quantitative Analysis of Common Criteria Certification Practice. TrustBus 2014: 132-143 - [p3]Marco Anisetti, Claudio A. Ardagna, Michele Bezzi, Ernesto Damiani, Samuel Paul Kaluvuri, Antonino Sabetta:
A Certification-Aware Service-Oriented Architecture. Advanced Web Services 2014: 147-170 - [e3]Robert Meersman, Hervé Panetto, Alok Mishra, Rafael Valencia-García, António Lucas Soares, Ioana Ciuciu, Fernando Ferri, Georg Weichhart, Thomas Moser, Michele Bezzi, Henry C. B. Chan:
On the Move to Meaningful Internet Systems: OTM 2014 Workshops - Confederated International Workshops: OTM Academy, OTM Industry Case Studies Program, C&TC, EI2N, INBAST, ISDE, META4eS, MSC and OnToContent 2014, Amantea, Italy, October 27-31, 2014. Proceedings. Lecture Notes in Computer Science 8842, Springer 2014, ISBN 978-3-662-45549-4 [contents] - 2013
- [c15]Marco Anisetti, Claudio A. Ardagna, Michele Bezzi, Ernesto Damiani, Antonino Sabetta:
Machine-Readable Privacy Certificates for Services. OTM Conferences 2013: 434-450 - [c14]Francesco Di Cerbo, Slim Trabelsi, Thomas Steingruber, Gabriella Dodero, Michele Bezzi:
Sticky policies for mobile devices. SACMAT 2013: 257-260 - [c13]Samuel Paul Kaluvuri, Michele Bezzi, Yves Roudier:
Bringing Common Criteria Certification to Web Services. SERVICES 2013: 98-102 - [i2]Marco Anisetti, Claudio A. Ardagna, Michele Bezzi, Ernesto Damiani, Antonino Sabetta:
Machine-Readable Privacy Certificates for Services. CoRR abs/1307.6980 (2013) - 2012
- [j7]Michele Bezzi, Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati, Roberto Sassi:
Modeling and preventing inferences from sensitive value distributions in data release. J. Comput. Secur. 20(4): 393-436 (2012) - [c12]Francesco Di Cerbo, Michele Bezzi, Samuel Paul Kaluvuri, Antonino Sabetta, Slim Trabelsi, Volkmar Lotz:
Towards a Trustworthy Service Marketplace for the Future Internet. Future Internet Assembly 2012: 105-116 - [p2]Florian Marienfeld, Edzard Höfig, Michele Bezzi, Matthias Flügge, Jonas Pattberg, Gabriel Serme, Achim D. Brucker, Philip Robinson, Stephen Dawson, Wolfgang Theilmann:
Service Levels, Security, and Trust. Handbook of Service Description 2012: 295-326 - 2011
- [c11]Michele Bezzi, Samuel Paul Kaluvuri, Antonino Sabetta:
Ensuring trust in service consumption through security certification. QASBA 2011: 40-43 - [c10]Michele Bezzi, Slim Trabelsi:
Data Usage Control in the Future Internet Cloud. Future Internet Assembly 2011: 223-235 - [p1]Michele Bezzi, Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati:
Data Privacy. Privacy and Identity Management for Life 2011: 157-179 - 2010
- [j6]Angelo Arleo, Thierry Nieus, Michele Bezzi, Anna D'Errico, Egidio D'Angelo, Olivier J. M. D. Coenen:
How Synaptic Release Probability Shapes Neuronal Transmission: Information-Theoretic Analysis in a Cerebellar Granule Cell. Neural Comput. 22(8): 2031-2058 (2010) - [j5]Michele Bezzi:
An information theoretic approach for privacy metrics. Trans. Data Priv. 3(3): 199-215 (2010) - [c9]Michele Bezzi:
Expressing privacy metrics as one-symbol information. EDBT/ICDT Workshops 2010 - [c8]Slim Trabelsi, Eric Weil, Alessandro Sorniotti, Stuart Short, Michele Bezzi:
Privacy-aware policy matching. ISCC 2010: 302-307 - [c7]Michele Bezzi, Sabrina De Capitani di Vimercati, Giovanni Livraga, Pierangela Samarati:
Protecting Privacy of Sensitive Value Distributions in Data Release. STM 2010: 255-270 - [e2]Michele Bezzi, Penny Duquenoy, Simone Fischer-Hübner, Marit Hansen, Ge Zhang:
Privacy and Identity Management for Life - 5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, Nice, France, September 7-11, 2009, Revised Selected Papers. IFIP Advances in Information and Communication Technology 320, Springer 2010, ISBN 978-3-642-14281-9 [contents]
2000 – 2009
- 2009
- [c6]Slim Trabelsi, Vincent Salzgeber, Michele Bezzi, Gilles Montagnon:
Data disclosure risk evaluation. CRiSIS 2009: 35-72 - [c5]Michele Bezzi, Gilles Montagnon, Vincent Salzgeber, Slim Trabelsi:
Sharing Data for Public Security. PrimeLife 2009: 188-197 - 2008
- [c4]Michele Bezzi, Jean-Christophe R. Pazzaglia:
The Anonymity vs. Utility Dilemma. ISSE 2008: 99-107 - [e1]Spyros Antonatos, Michele Bezzi, Elisa Boschi, Brian Trammell, William Yurcik:
Proceedings of the 1st ACM workshop on Network Data Anonymization, NDA 2008, Alexandria, VA, USA, October 31, 2008. ACM 2008, ISBN 978-1-60558-301-3 [contents] - 2007
- [j4]Michele Bezzi:
Quantifying the information transmitted in a single stimulus. Biosyst. 89(1-3): 4-9 (2007) - [c3]Michele Bezzi:
An entropy based method for measuring anonymity. SecureComm 2007: 28-32 - [c2]Michele Bezzi, Robin Groenevelt, Frederick Schlereth:
Analyzing and Modelling Office Activities. WETICE 2007: 104-105 - [i1]Michele Bezzi, Robin Groenevelt:
Towards understanding and modelling office daily life. CoRR abs/0706.1926 (2007) - 2005
- [c1]Egidio D'Angelo, Thierry Nieus, Michele Bezzi, Angelo Arleo, Olivier J. M. D. Coenen:
Modeling Synaptic Transmission and Quantifying Information Transfer in the Granular Layer of the Cerebellum. IWANN 2005: 107-114 - 2004
- [j3]Michele Bezzi, Thierry Nieus, Olivier J. M. D. Coenen, Egidio D'Angelo:
An integrate-and-fire model of a cerebellar granule cell. Neurocomputing 58-60: 593-598 (2004) - 2002
- [j2]Michele Bezzi, Mathew E. Diamond, Alessandro Treves:
Redundancy and Synergy Arising from Pairwise Correlations in Neuronal Ensembles. J. Comput. Neurosci. 12(3): 165-174 (2002) - [j1]Michele Bezzi, Inés Samengo, Stefan Leutgeb, Sheri J. Mizumori:
Measuring Information Spatial Densities. Neural Comput. 14(2): 405-420 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint