Edoardo Serra
Edoardo Serra
Verified email at boisestate.edu
Title
Cited by
Cited by
Year
Pareto-optimal adversarial defense of enterprise systems
E Serra, S Jajodia, A Pugliese, A Rullo, VS Subrahmanian
ACM Transactions on Information and System Security (TISSEC) 17 (3), 1-39, 2015
482015
A probabilistic logic of cyber deception
S Jajodia, N Park, F Pierazzi, A Pugliese, E Serra, GI Simari, ...
IEEE Transactions on Information Forensics and Security 12 (11), 2532-2544, 2017
452017
Extending the power of datalog recursion
M Mazuran, E Serra, C Zaniolo
The VLDB Journal 22 (4), 471-493, 2013
452013
Ensemble models for data-driven prediction of malware infections
C Kang, N Park, BA Prakash, E Serra, VS Subrahmanian
Proceedings of the Ninth ACM International Conference on Web Search and Data …, 2016
292016
APE: A data-driven, behavioral model-based anti-poaching engine
N Park, E Serra, T Snitch, VS Subrahmanian
IEEE Transactions on Computational Social Systems 2 (2), 15-37, 2015
262015
Behavior informatics: A new perspective
L Cao, T Joachims, C Wang, E Gaussier, J Li, Y Ou, D Luo, R Zafarani, ...
IEEE Intelligent Systems 29 (4), 62-80, 2014
262014
Pareto optimal security resource allocation for Internet of Things
A Rullo, D Midi, E Serra, E Bertino
ACM Transactions on Privacy and Security (TOPS) 20 (4), 1-30, 2017
172017
A declarative extension of horn clauses, and its significance for datalog and its applications
M Mazuran, E Serra, C Zaniolo
Theory and Practice of Logic Programming 13 (4-5), 609-623, 2013
172013
Count constraints and the inverse OLAP problem: Definition, complexity and a step toward aggregate data exchange
D Saccą, E Serra, A Guzzo
International Symposium on Foundations of Information and Knowledge Systems …, 2012
152012
Solving inverse frequent itemset mining with infrequency constraints via large-scale linear programs
A Guzzo, L Moccia, D Saccą, E Serra
ACM Transactions on Knowledge Discovery from Data (TKDD) 7 (4), 1-39, 2013
142013
Share: A stackelberg honey-based adversarial reasoning engine
S Jajodia, N Park, E Serra, VS Subrahmanian
ACM Transactions on Internet Technology (TOIT) 18 (3), 1-41, 2018
132018
Shortfall-based optimal placement of security resources for mobile IoT scenarios
A Rullo, E Serra, E Bertino, J Lobo
European Symposium on Research in Computer Security, 419-436, 2017
132017
A game of things: Strategic allocation of security resources for iot
A Rullo, D Midi, E Serra, E Bertino
2017 IEEE/ACM Second International Conference on Internet-of-Things Design …, 2017
122017
An effective approach to inverse frequent set mining
A Guzzo, D Sacca, E Serra
2009 Ninth IEEE International Conference on Data Mining, 806-811, 2009
122009
A survey of quantitative models of terror group behavior and an analysis of strategic disclosure of behavioral models
E Serra, VS Subrahmanian
IEEE Transactions on Computational Social Systems 1 (1), 66-88, 2014
112014
Strategic security resource allocation for internet of things
A Rullo, D Midi, E Serra, E Bertino
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
92016
Detecting suspicious entities in offshore leaks networks
M Joaristi, E Serra, F Spezzano
Social Network Analysis and Mining 9 (1), 1-15, 2019
62019
Inferring Bad Entities through the Panama Papers Network
M Joaristi, E Serra, F Spezzano
62018
Saving rhinos with predictive analytics
N Park, E Serra, VS Subrahmanian
IEEE Intelligent Systems 30 (4), 86-88, 2015
62015
Shortfall-based optimal security provisioning for Internet of things
A Rullo, E Serra, E Bertino, J Lobo
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
52017
The system can't perform the operation now. Try again later.
Articles 1–20