Follow
Paolo Falcarin
Paolo Falcarin
Associate Professor of Computer Science at Ca' Foscari University of Venice
Verified email at unive.it - Homepage
Title
Cited by
Cited by
Year
A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques
M Ceccato, M Di Penta, P Falcarin, F Ricca, M Torchiano, P Tonella
Empirical Software Engineering 19, 1040-1074, 2014
1092014
The effectiveness of source code obfuscation: an experimental assessment
M Ceccato, M Di Penta, J Nagra, P Falcarin, F Ricca, M Torchiano, ...
Program Comprehension, 2009. ICPC'09. IEEE 17th International Conference on …, 2009
882009
Guest Editors' Introduction: Software Protection
P Falcarin, C Collberg, M Atallah, M Jakubowski
Software, IEEE 28 (2), 24-27, 2011
782011
Dynamic context-aware business process: A rule-based approach supported by pattern identification
JF Mejia Bernal, P Falcarin, M Morisio, J Dai
25th ACM Symposium on Applied Computing (SAC), 5th Track on Dependable and …, 2010
662010
A large study on the effect of code obfuscation on the quality of java code
M Ceccato, A Capiluppi, P Falcarin, C Boldyreff
Empirical Software Engineering 20, 1486-1524, 2015
462015
Towards experimental evaluation of code obfuscation techniques
M Ceccato, M Di Penta, J Nagra, P Falcarin, F Ricca, M Torchiano, ...
Proceedings of the 4th ACM Workshop on Quality of Protection, 39-46, 2008
462008
Measuring Security Requirements for Software Security
S Islam, P Falcarin
IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS) 2011, 2011
442011
A User-Centric Service Creation Approach for Next Generation Networks
JC YELMO, JM DEL ALAMO, R TRAPERO, P FALCARIN, J YU, B CARRO, ...
ITU-T/IEEE Innovations in NGN– Future Network and Services Conference (K …, 2008
442008
User-Centric Future Internet and Telecommunication Services
C Baladron, J Aguiar, B Carro, LW Goix, A Leon Martin, P Falcarin, ...
Towards the Future Internet, 2009
432009
How professional hackers understand protected code while performing attack tasks
M Ceccato, P Tonella, C Basile, B Coppens, B De Sutter, P Falcarin, ...
2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC …, 2017
412017
Towards an efficient context-aware system: Problems and suggestions to reduce energy consumption in mobile devices
JF Mejia Bernal, L Ardito, M Morisio, P Falcarin
IEEE 9th International Conference on Mobile Business (ICMB-10), 510-514, 2010
41*2010
Synthesizing service composition models on the basis of temporal business rules
J Yu, YB Han, J Han, Y Jin, P Falcarin, M Morisio
Journal of computer science and technology 23 (6), 885-894, 2008
402008
Software architecture evolution through dynamic aop
P Falcarin, G Alonso
European Workshop on Software Architecture (EWSA-04), 57-73, 2004
402004
Situation inference for mobile users: a rule based approach
LW Goix, M Valla, L Cerami, P Falcarin
IEEE Intern. Conf. on Mobile Data Management (MDM-07), 299-303, 2007
382007
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge
M Ceccato, P Tonella, C Basile, P Falcarin, M Torchiano, B Coppens, ...
Empirical Software Engineering 24, 240-286, 2019
362019
Enabling context-aware web services: methods, architectures, and technologies
QZ Sheng, J Yu, S Dustdar
CRC Press, 2010
352010
Exploiting code mobility for dynamic binary obfuscation
P Falcarin, S Di Carlo, A Cabutto, N Garazzino, D Barberis
2011 World Congress on Internet Security (WorldCIS-2011), 114-120, 2011
342011
A meta-model for software protections and reverse engineering attacks
C Basile, D Canavese, L Regano, P Falcarin, B De Sutter
Journal of Systems and Software 150, 3-21, 2019
332019
Analysis of NGN service creation technologies
CA Licciardi, P Falcarin
Annual Review of Communications 56, 537-551, 2003
332003
Application-oriented trust in distributed computing
R Scandariato, Y Ofek, P Falcarin, M Baldi
Availability, Reliability and Security, 2008. ARES 08. Third International …, 2008
292008
The system can't perform the operation now. Try again later.
Articles 1–20