Seguir
Gabriele Lenzini
Gabriele Lenzini
Interdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of Luxembourg
Email confirmado em uni.lu
Título
Citado por
Citado por
Ano
Principles of persuasion in social engineering and their use in phishing
A Ferreira, L Coventry, G Lenzini
Human Aspects of Information Security, Privacy, and Trust: Third …, 2015
1562015
High-fidelity spherical cholesteric liquid crystal Bragg reflectors generating unclonable patterns for secure authentication
Y Geng, JH Noh, I Drevensek-Olenik, R Rupp, G Lenzini, JPF Lagerwall
Scientific reports 6 (1), 26840, 2016
1512016
Audit-based compliance control
JG Cederquist, R Corin, MAC Dekker, S Etalle, JI den Hartog, G Lenzini
International Journal of Information Security 6, 133-151, 2007
1252007
” I am Definitely Manipulated, Even When I am Aware of it. It’s Ridiculous!”-Dark Patterns from the End-User Perspective
K Bongard-Blanchy, A Rossi, S Rivas, S Doublet, V Koenig, G Lenzini
Proceedings of the 2021 ACM Designing Interactive Systems Conference, 763-776, 2021
1202021
Cholesteric liquid crystal shells as enabling material for information‐rich design and architecture
M Schwartz, G Lenzini, Y Geng, PB Rønne, PYA Ryan, JPF Lagerwall
Advanced materials 30 (30), 1707382, 2018
1112018
A logic for auditing accountability in decentralized systems
R Corin, S Etalle, J den Hartog, G Lenzini, I Staicu
Formal Aspects in Security and Trust: IFIP TC1 WG1. 7 Workshop on Formal …, 2005
1112005
An analysis of social engineering principles in effective phishing
A Ferreira, G Lenzini
2015 Workshop on Socio-Technical Aspects in Security and Trust, 9-16, 2015
712015
Context-aware Trust Evaluation Functions for Dynamic Reconfigurable Systems.
S Toivonen, G Lenzini, I Uusitalo
MTW 190, 2006
652006
Formalizing GDPR provisions in reified I/O logic: the DAPRECO knowledge base
L Robaldo, C Bartolini, M Palmirani, A Rossi, M Martoni, G Lenzini
Journal of Logic, Language and Information 29, 401-449, 2020
522020
No random, no ransom: a key to stop cryptographic ransomware
ZA Genç, G Lenzini, PYA Ryan
Detection of Intrusions and Malware, and Vulnerability Assessment: 15th …, 2018
482018
A group signature based electronic toll pricing system
X Chen, G Lenzini, S Mauw, J Pang
2012 Seventh International Conference on Availability, Reliability and …, 2012
482012
Context sensitive adaptive authentication
RJ Hulsebosch, MS Bargh, G Lenzini, PWG Ebben, SM Iacob
Smart Sensing and Context: Second European Conference, EuroSSC 2007, Kendal …, 2007
482007
An automatic SPIN validation of a safety critical railway control system
S Gnesi, G Lenzini, D Latella, C Abbaneo, A Amendola, P Marmo
Proceeding International Conference on Dependable Systems and Networks. DSN …, 2000
482000
GDPR-based user stories in the access control perspective
C Bartolini, S Daoudagh, G Lenzini, E Marchetti
International Conference on the Quality of Information and Communications …, 2019
432019
Trust-enhanced security in location-based adaptive authentication
G Lenzini, MS Bargh, B Hulsebosch
Electronic Notes in Theoretical Computer Science 197 (2), 105-119, 2008
432008
Trust management model and architecture for context-aware service platforms
R Neisse, M Wegdam, M Van Sinderen, G Lenzini
On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA …, 2007
432007
Managing trustworthiness in component-based embedded systems
G Lenzini, A Tokmakoff, J Muskens
Electronic Notes in Theoretical Computer Science 179, 143-155, 2007
412007
Towards legal compliance by correlating standards and laws with a semi-automated methodology
C Bartolini, A Giurgiu, G Lenzini, L Robaldo
BNAIC 2016: Artificial Intelligence: 28th Benelux Conference on Artificial …, 2017
382017
On deception-based protection against cryptographic ransomware
ZA Genç, G Lenzini, D Sgandurra
Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019
362019
On representing biological systems through multiset rewriting
S Bistarelli, I Cervesato, G Lenzini, R Marangoni, F Martinelli
International Conference on Computer Aided Systems Theory, 415-426, 2003
362003
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20