A survey on security for mobile devices
M La Polla, F Martinelli… - … communications surveys & …, 2012 - ieeexplore.ieee.org
Nowadays, mobile devices are an important part of our everyday lives since they enable us
to access a large variety of ubiquitous services. In recent years, the availability of these …
to access a large variety of ubiquitous services. In recent years, the availability of these …
Cyber-insurance survey
Cyber insurance is a rapidly developing area which draws more and more attention of
practitioners and researchers. Insurance, an alternative way to deal with residual risks, was …
practitioners and researchers. Insurance, an alternative way to deal with residual risks, was …
Usage control in computer security: A survey
Protecting access to digital resources is one of the fundamental problems recognized in
computer security. As yet it remains a challenging problem to work out, starting from the …
computer security. As yet it remains a challenging problem to work out, starting from the …
MADAM: a multi-level anomaly detector for android malware
Currently, in the smartphone market, Android is the platform with the highest share. Due to
this popularity and also to its open source nature, Android-based smartphones are now an …
this popularity and also to its open source nature, Android-based smartphones are now an …
Madam: Effective and efficient behavior-based android malware detection and prevention
Android users are constantly threatened by an increasing number of malicious applications
(apps), generically called malware. Malware constitutes a serious threat to user privacy …
(apps), generically called malware. Malware constitutes a serious threat to user privacy …
Subordinators: examples and applications
Foreword 1. Elements on subordinators 1.1. Definitions and first properties 1.2. The Lévy-
Khintchine formula 1.3. The renewal measure 1.4. The range of a subordinator 2 …
Khintchine formula 1.3. The renewal measure 1.4. The range of a subordinator 2 …
[PS][PS] Lectures on Glauber dynamics for discrete spin models
F Martinelli - Lectures on probability theory and statistics …, 1999 - kleine.mat.uniroma3.it
These notes have been the subject of a course I gave in the summer 1997 for the school in
probability theory in Saint Flour. I review in a self {contained way the state of the art …
probability theory in Saint Flour. I review in a self {contained way the state of the art …
Constructive proof of localization in the Anderson tight binding model
J Fröhlich, F Martinelli, E Scoppola… - … in Mathematical Physics, 1985 - Springer
We prove that, for large disorder or near the band tails, the spectrum of the Anderson tight
binding Hamiltonian with diagonal disorder consists exclusively of discrete eigenvalues. The …
binding Hamiltonian with diagonal disorder consists exclusively of discrete eigenvalues. The …
Anderson localization for Bernoulli and other singular potentials
R Carmona, A Klein, F Martinelli - Communications in Mathematical …, 1987 - Springer
We prove exponential localization in the Anderson model under very weak assumptions on
the potential distribution. In one dimension we allow any measure which is not concentrated …
the potential distribution. In one dimension we allow any measure which is not concentrated …
Classification of ransomware families with machine learning based onN-gram of opcodes
Ransomware is a special type of malware that can lock victims' screen and/or encrypt their
files to obtain ransoms, resulting in great damage to users. Mapping ransomware into …
files to obtain ransoms, resulting in great damage to users. Mapping ransomware into …