Personal information

Verified email domains

Activities

Employment (2)

University of Verona: Verona, Veneto, IT

2018-12-28 to present | Associate Professor (Department of Informatics)
Employment
Source: Self-asserted source
Federica Paci

University of Southampton: Southampton, Hampshire, GB

2015-01-31 to 2018-12-27 | Lecturer in Cyber Security (School of Electronics and Computer Science)
Employment
Source: Self-asserted source
Federica Paci

Works (50 of 79)

Items per page:
Page 1 of 2

A Comprehensive Study on Third-Party User Tracking in Mobile Applications

2023-08-29 | Conference paper
Contributors: Federica Paci; Jacopo Pizzoli; Nicola Zannone
Source: check_circle
Crossref

HoneyICS: A High-interaction Physics-aware Honeynet for Industrial Control Systems

2023-08-29 | Conference paper
Contributors: Marco Lucchese; Francesco Lupia; Massimo Merro; Federica Paci; Nicola Zannone; Angelo Furfaro
Source: check_circle
Crossref

Mitigating Privilege Misuse in Access Control through Anomaly Detection

2023-08-29 | Conference paper
Contributors: Gelareh Hasel Mehri; Inez L. Wester; Federica Paci; Nicola Zannone
Source: check_circle
Crossref

Towards A High-interaction Physics-aware Honeynet for Industrial Control Systems

2023-03-27 | Conference paper
Contributors: Marco Lucchese; Massimo Merro; Federica Paci; Nicola Zannone
Source: check_circle
Crossref

IFTTT Privacy Checker

2020 | Book chapter
Contributors: Federica Paci; Davide Bianchin; Elisa Quintarelli; Nicola Zannone
Source: check_circle
Crossref

Riskio: A Serious Game for Cyber Security Awareness and Education

Computers & Security
2020-08 | Journal article
Contributors: Stephen Hart; Andrea Margheri; Federica Paci; Vladimiro Sassone
Source: check_circle
Crossref

Selecting a Secure Cloud Provider—An Empirical Study and Multi Criteria Approach

Information
2020-05-11 | Journal article
Contributors: Sebastian Pape; Federica Paci; Jan Jürjens; Fabio Massacci
Source: check_circle
Crossref

Fuzzy-based approach to assess and prioritize privacy risks

Soft Computing
2019 | Journal article
EID:

2-s2.0-85064511444

Contributors: Hart, S.; Ferrara, A.L.; Paci, F.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Survey on access control for community-centered collaborative systems

ACM Computing Surveys
2018 | Journal article
EID:

2-s2.0-85040704657

Contributors: Paci, F.; Squicciarini, A.; Zannone, N.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Towards Adaptive Access Control

2018 | Book chapter
Contributors: Luciano Argento; Andrea Margheri; Federica Paci; Vladimiro Sassone; Nicola Zannone
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

A Distributed Access Control System for Cloud Federations

Proceedings - International Conference on Distributed Computing Systems
2017 | Conference paper
EID:

2-s2.0-85027262594

Contributors: Alansari, S.; Paci, F.; Sassone, V.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Decentralised Runtime Monitoring for Access Control Systems in Cloud Federations

Proceedings - International Conference on Distributed Computing Systems
2017 | Conference paper
EID:

2-s2.0-85027276122

Contributors: Ferdous, M.S.; Margheri, A.; Paci, F.; Yang, M.; Sassone, V.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

EEVi-framework for evaluating the effectiveness of visualization in cyber-security

2016 11th International Conference for Internet Technology and Secured Transactions, ICITST 2016
2017 | Conference paper
EID:

2-s2.0-85016062179

Contributors: Sethi, A.; Paci, F.; Wills, G.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations

Empirical Software Engineering
2017 | Journal article
EID:

2-s2.0-85013679299

Contributors: Labunets, K.; Massacci, F.; Paci, F.; Marczak, S.; de Oliveira, F.M.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

On the equivalence between graphical and tabular representations for security risk assessment

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2017 | Book
EID:

2-s2.0-85013889638

Contributors: Labunets, K.; Massacci, F.; Paci, F.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Privacy-Preserving Access Control in Cloud Federations

IEEE International Conference on Cloud Computing, CLOUD
2017 | Conference paper
EID:

2-s2.0-85032229886

Contributors: Alansari, S.; Paci, F.; Margheri, A.; Sassone, V.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Towards empirical evaluation of automated risk assessment methods

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2017 | Book
EID:

2-s2.0-85014881280

Contributors: Gadyatskaya, O.; Labunets, K.; Paci, F.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Which security catalogue is better for novices?

5th International Workshop on Empirical Requirements Engineering, EmpiRE 2015 - Proceedings
2016 | Conference paper
EID:

2-s2.0-84965112956

Contributors: Labunets, K.; Paci, F.; Massacci, F.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Evolution of security engineering artifacts: A state of the art survey

Transportation Systems and Engineering: Concepts, Methodologies, Tools, and Applications
2015 | Book chapter
EID:

2-s2.0-84958944583

Contributors: Felderer, M.; Katt, B.; Kalb, P.; Jürjens, J.; Ochoa, M.; Paci, F.; Tran, L.M.S.; Tun, T.T.; Yskout, K.; Scandariato, R. et al.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Preliminary experiments on the relative comprehensibility of tabular and graphical risk models

SESAR Innovation Days
2015 | Conference paper
EID:

2-s2.0-85018214522

Contributors: Labunets, K.; Li, Y.; Massacci, F.; Paci, F.; Ragosta, M.; Solhaug, B.; Stølen, K.; Tedeschid, A.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Preventing information inference in access control

Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
2015 | Conference paper
EID:

2-s2.0-84957699678

Contributors: Paci, F.; Zannone, N.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Privacy-aware web service composition and ranking

Standards and Standardization: Concepts, Methodologies, Tools, and Applications
2015 | Book chapter
EID:

2-s2.0-84959239156

Contributors: Costante, E.; Paci, F.; Zannone, N.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

The role of catalogues of threats and security controls in security risk assessment: An empirical study with atm professionals

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2015 | Book
EID:

2-s2.0-84930426757

Contributors: De Gramatica, M.; Labunets, K.; Massacci, F.; Paci, F.; Tedeschi, A.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

A first empirical evaluation framework for security risk assessment methods in the ATM domain

SIDs 2014 - Proceedings of the SESAR Innovation Days
2014 | Conference paper
EID:

2-s2.0-84925851491

Contributors: Labunets, K.; Massacci, F.; Paci, F.; Ragosta, M.; Solhaug, B.; Stølen, K.; Tedeschi, A.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

An experiment on comparing textual vs. visual industrial methods for security risk assessment

2014 IEEE 4th International Workshop on Empirical Requirements Engineering, EmpiRE 2014 - Proceedings
2014 | Conference paper
EID:

2-s2.0-84928137931

Contributors: Labunets, K.; Paci, F.; Massacci, F.; Ruprai, R.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Assessing a requirements evolution approach: Empirical studies in the air traffic management domain

Journal of Systems and Software
2014 | Journal article
EID:

2-s2.0-84905864021

Contributors: Massacci, F.; Paci, F.; Tran, L.M.S.; Tedeschi, A.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

EMFASE - An empirical framework for security design and economic trade-off

Proceedings - 9th International Conference on Availability, Reliability and Security, ARES 2014
2014 | Conference paper
EID:

2-s2.0-84920551508

Contributors: Massacci, F.; Paci, F.; Solhaug, B.; Tedeschi, A.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Empirical assessment of security requirements and architecture: Lessons learned

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014 | Book
EID:

2-s2.0-84924939676

Contributors: Scandariato, R.; Paci, F.; Tran, L.M.S.; Labunets, K.; Yskout, K.; Massacci, F.; Joosen, W.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

PriMa: A comprehensive approach to privacy protection in social network sites

Annales des Telecommunications/Annals of Telecommunications
2014 | Journal article
EID:

2-s2.0-84895064361

Contributors: Squicciarini, A.C.; Paci, F.; Sundareswaran, S.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Security triage: A report of a lean security requirements methodology for cost-effective security analysis

2014 IEEE 4th International Workshop on Empirical Requirements Engineering, EmpiRE 2014 - Proceedings
2014 | Conference paper
EID:

2-s2.0-84928107846

Contributors: Giacalone, M.; Mammoliti, R.; Massacci, F.; Paci, F.; Perugino, R.; Selli, C.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Security triage: An industrial case study on the effectiveness of a lean methodology to identify security requirements

International Symposium on Empirical Software Engineering and Measurement
2014 | Conference paper
EID:

2-s2.0-84907843002

Contributors: Giacalone, M.; Paci, F.; Mammoliti, R.; Perugino, R.; Massacci, F.; Selli, C.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

An experimental comparison of two risk-based security methods

International Symposium on Empirical Software Engineering and Measurement
2013 | Conference paper
EID:

2-s2.0-84893299161

Contributors: Labunets, K.; Massacci, F.; Paci, F.; Tran, L.M.S.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Combining goal-oriented and problem-oriented requirements engineering methods

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013 | Book
EID:

2-s2.0-84885729075

Contributors: Beckers, K.; Faßbender, S.; Heisel, M.; Paci, F.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Detecting insider threats: A trust-aware framework

Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013
2013 | Conference paper
EID:

2-s2.0-84892384466

Contributors: Paci, F.; Fernandez-Gago, C.; Moyano, F.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

PERSONA - A personalized data protection framework

IFIP Advances in Information and Communication Technology
2013 | Book
EID:

2-s2.0-84979085003

Contributors: Egea, M.; Paci, F.; Petrocchi, M.; Zannone, N.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Privacy-aware web service composition and ranking

International Journal of Web Services Research
2013 | Journal article
EID:

2-s2.0-84923105484

Contributors: Costante, E.; Paci, F.; Zannone, N.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Privacy-aware web service composition and ranking

Proceedings - IEEE 20th International Conference on Web Services, ICWS 2013
2013 | Conference paper
EID:

2-s2.0-84891791089

Contributors: Constante, E.; Paci, F.; Zannone, N.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

A tool for managing evolving security requirements

Lecture Notes in Business Information Processing
2012 | Book
EID:

2-s2.0-84861130052

Contributors: Bergmann, G.; Massacci, F.; Paci, F.; Tun, T.T.; Varró, D.; Yu, Y.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Assessing a requirements evolution approach: Empirical studies in the Air Traffic Management domain

2012 2nd IEEE International Workshop on Empirical Requirements Engineering, EmpiRE 2012 - Proceedings
2012 | Conference paper
EID:

2-s2.0-84870822124

Contributors: Massacci, F.; Nagaraj, D.; Paci, F.; Tran, L.M.S.; Tedeschi, A.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

How to select a security requirements method? A comparative study with students and practitioners

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012 | Book
EID:

2-s2.0-84868373023

Contributors: Massacci, F.; Paci, F.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Java card architecture for autonomous yet secure evolution of smart cards applications

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012 | Book
EID:

2-s2.0-84861649376

Contributors: Gadyatskaya, O.; Massacci, F.; Paci, F.; Stankevich, S.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Managing evolution by orchestrating requirements and testing engineering processes

Proceedings - IEEE 5th International Conference on Software Testing, Verification and Validation, ICST 2012
2012 | Conference paper
EID:

2-s2.0-84862333016

Contributors: Paci, F.; Massacci, F.; Bouquet, F.; Debricon, S.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

A load time policy checker for open multi-application smart cards

Proceedings - 2011 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2011
2011 | Conference paper
EID:

2-s2.0-80052393172

Contributors: Dragoni, N.; Lostal, E.; Gadyatskaya, O.; Massacci, F.; Paci, F.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

A tool for managing evolving security requirements

CEUR Workshop Proceedings
2011 | Conference paper
EID:

2-s2.0-84890630304

Contributors: Bergmann, G.; Massacci, F.; Paci, F.; Tun, T.; Varró, D.; Yu, Y.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

ACCONV - An access control model for conversational Web services

ACM Transactions on the Web
2011 | Journal article
EID:

2-s2.0-80051928978

Contributors: Paci, F.; Mecella, M.; Ouzzani, M.; Bertino, E.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

An extended ontology for security requirements

Lecture Notes in Business Information Processing
2011 | Book
EID:

2-s2.0-79960330560

Contributors: Massacci, F.; Mylopoulos, J.; Paci, F.; Tun, T.T.; Yu, Y.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Computer aided threat identification

Proceedings - 13th IEEE International Conference on Commerce and Enterprise Computing, CEC 2011
2011 | Conference paper
EID:

2-s2.0-80455127276

Contributors: Asnar, Y.; Li, T.; Massacci, F.; Paci, F.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Dynamic resiliency to changes

Trustworthy Internet
2011 | Conference paper
EID:

2-s2.0-85042150329

Contributors: Massacci, F.; Paci, F.; Gadyatskaya, O.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Managing changes with legacy security engineering processes

Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011
2011 | Conference paper
EID:

2-s2.0-80052908846

Contributors: Felix, E.; Delande, O.; Massacci, F.; Paci, F.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier

Orchestrating security and system engineering for evolving systems (invited paper)

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2011 | Book
EID:

2-s2.0-80054083164

Contributors: Massacci, F.; Bouquet, F.; Fourneret, E.; Jurjens, J.; Lund, M.S.; Madelénat, S.; Muehlberg, J.; Paci, F.; Paul, S.; Piessens, F. et al.
Source: Self-asserted source
Federica Paci via Scopus - Elsevier
Items per page:
Page 1 of 2

Peer review (1 review for 1 publication/grant)

Review activity for International journal of information security. (1)