default search action
Andrea Tundis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c34]Andrej Pastorek, Andrea Tundis:
Navigating the landscape of IoT security and associated risks in critical infrastructures. ARES 2024: 112:1-112:7 - [c33]Jonas Gunkel, Andrea Tundis, Max Mühlhäuser:
The Story of Mobility: Combining State Space Models and Transformers for Multi-Step Trajectory Prediction. HuMob-Challenge@SIGSPATIAL 2024: 19-24 - 2023
- [j13]Andrea Tundis, Ahmed Ali Shams, Max Mühlhäuser:
From the detection towards a pyramidal classification of terrorist propaganda. J. Inf. Secur. Appl. 79: 103646 (2023) - 2022
- [j12]Andrea Tundis, Samuel Ruppert, Max Mühlhäuser:
A Feature-driven Method for Automating the Assessment of OSINT Cyber Threat Sources. Comput. Secur. 113: 102576 (2022) - [j11]Daniel Bouskela, Alberto Falcone, Alfredo Garro, Audrey Jardin, Martin Otter, Nguyen Thuy, Andrea Tundis:
Formal requirements modeling for cyber-physical systems engineering: an integrated solution based on FORM-L and Modelica. Requir. Eng. 27(1): 1-30 (2022) - 2021
- [j10]Andrea Tundis, Maksim Melnik, Hashim Naveed, Max Mühlhäuser:
A social media-based over layer on the edge for handling emergency-related events. Comput. Electr. Eng. 96(Part): 107570 (2021) - [j9]Andrea Tundis, Muhammad Uzair, Max Mühlhäuser:
An IoT-based context-aware model for danger situations detection. Comput. Electr. Eng. 96(Part): 107571 (2021) - [c32]Andrea Tundis, Soujanya Nemalikanti, Max Mühlhäuser:
Fighting organized crime by automatically detecting money laundering-related financial transactions. ARES 2021: 38:1-38:10 - [c31]Andrea Tundis, Eric Marc Modo Nga, Max Mühlhäuser:
An exploratory analysis on the impact of Shodan scanning tool on the network attacks. ARES 2021: 39:1-39:10 - 2020
- [j8]Andrea Tundis, Leon Böck, Victoria Stanilescu, Max Mühlhäuser:
Experiencing the Detection of Radicalized Criminals on Facebook Social Network and Data-related Issues. J. Cyber Secur. Mobil. 9(2): 203-236 (2020) - [j7]Andrea Tundis, Humayun Kaleem, Max Mühlhäuser:
Detecting and Tracking Criminals in the Real World through an IoT-Based System. Sensors 20(13): 3795 (2020) - [c30]Andrea Tundis, Gaurav Mukherjee, Max Mühlhäuser:
Mixed-code text analysis for the detection of online hidden propaganda. ARES 2020: 76:1-76:7 - [c29]Andrea Tundis, Samuel Ruppert, Max Mühlhäuser:
On the Automated Assessment of Open-Source Cyber Threat Intelligence Sources. ICCS (2) 2020: 453-467 - [c28]Andrea Tundis, Ahmed Ali Shams, Max Mühlhäuser:
Concepts of a Pyramidal Model for Assessing Internet-based Terrorist Propaganda. NCA 2020: 1-4 - [c27]Andrea Tundis, Muhammad Uzair, Max Mühlhäuser:
Human Physical Status detection related to Danger Situations based on Smartwatch and Smartphone. Networking 2020: 564-568
2010 – 2019
- 2019
- [j6]Andrea Tundis, Max Mühlhäuser:
Properties modelling as design by contract for cyber-physical systems: an example in the smart grid domain. Int. J. Simul. Process. Model. 14(2): 120-136 (2019) - [j5]Andrea Tundis, Faizan Ali, Max Mühlhäuser:
A Feature-Based Model for the Identification of Electrical Devices in Smart Environments. Sensors 19(11): 2611 (2019) - [c26]Andrea Tundis, Leon Böck, Victoria Stanilescu, Max Mühlhäuser:
Limits in the data for detecting criminals on social media. ARES 2019: 51:1-51:8 - [c25]Andrea Tundis, Archit Jain, Gaurav Bhatia, Max Mühlhäuser:
Similarity Analysis of Criminals on Social Networks: An Example on Twitter. ICCCN 2019: 1-9 - [c24]Andrea Tundis, Humayun Kaleem, Max Mühlhäuser:
Tracking Criminal Events through IoT Devices and an Edge Computing Approach. ICCCN 2019: 1-6 - [c23]Rolf Egert, Andrea Tundis, Max Mühlhäuser:
On the simulation of smart grid environments. SummerSim 2019: 17:1-17:12 - [r2]Alfredo Garro, Max Mühlhäuser, Andrea Tundis, Stefano Mariani, Andrea Omicini, Giuseppe Vizzari:
Intelligent Agents and Environment. Encyclopedia of Bioinformatics and Computational Biology (1) 2019: 309-314 - [r1]Alfredo Garro, Max Mühlhäuser, Andrea Tundis, Matteo Baldoni, Cristina Baroglio, Federico Bergenti, Paolo Torroni:
Intelligent Agents: Multi-Agent Systems. Encyclopedia of Bioinformatics and Computational Biology (1) 2019: 315-320 - 2018
- [j4]Angelo Furfaro, Teresa Gallo, Alfredo Garro, Domenico Saccà, Andrea Tundis:
Cybersecurity compliance analysis as a service: Requirements specification and application scenarios. Concurr. Comput. Pract. Exp. 30(12) (2018) - [c22]Václav Jirovský, Andrej Pastorek, Max Mühlhäuser, Andrea Tundis:
Cybercrime and Organized Crime. ARES 2018: 61:1-61:5 - [c21]Andrea Tundis, Wojciech Mazurczyk, Max Mühlhäuser:
A review of network vulnerabilities scanning tools: types, capabilities and functioning. ARES 2018: 65:1-65:10 - [c20]Andrea Tundis, Gaurav Bhatia, Archit Jain, Max Mühlhäuser:
Supporting the Identification and the Assessment of Suspicious Users on Twitter Social Media. NCA 2018: 1-10 - 2017
- [c19]Andrea Tundis, Alfredo Garro, Teresa Gallo, Domenico Saccà, Simona Citrigno, Sabrina Graziano, Max Mühlhäuser:
Systemic Risk Modeling and Evaluation through Simulation and Bayesian Networks. ARES 2017: 12:1-12:10 - [c18]Andrea Tundis, Rolf Egert, Max Mühlhäuser:
Attack Scenario Modeling for Smart Grids Assessment through Simulation. ARES 2017: 13:1-13:10 - [c17]Andrea Tundis, Alfredo Garro, Teresa Gallo, Domenico Saccà, Simona Citrigno, Sabrina Graziano, Max Mühlhäuser:
Systemic Risk Analysis Through SE Methods And Techniques. CIISE 2017: 101-104 - [c16]Rolf Egert, Carlos Garcia Cordero, Andrea Tundis, Max Mühlhäuser:
HOLEG: A simulator for evaluating resilient energy networks based on the Holon analogy. DS-RT 2017: 43-50 - [c15]Andrea Tundis, Max Mühlhäuser:
A multi-language approach towards the identification of suspicious users on social networks. ICCST 2017: 1-6 - [c14]Andrea Tundis, Rolf Egert, Max Mühlhäuser:
Applying a Properties Modeling approach for monitoring Smart Grids. ICNSC 2017: 714-719 - [c13]Rolf Egert, Andrea Tundis, Florian Volk, Max Mühlhäuser:
An integrated tool for supporting the design and virtual evaluation of smart grids. SmartGridComm 2017: 259-264 - [e4]Davide Fierro, Alfredo Garro, Guido Guizzi, Lucio Tirone, Andrea Tundis:
Proceedings of the 3rd INCOSE Italia Conference on Systems Engineering, Naples, Italy, November 22-24, 2017. CEUR Workshop Proceedings 2010, CEUR-WS.org 2017 [contents] - [e3]Andrea D'Ambrogio, Robson E. De Grande, Alfredo Garro, Andrea Tundis:
21st IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, DS-RT 2017, Rome, Italy, October 18-20, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-4028-9 [contents] - 2016
- [c12]Simona Citrigno, Angelo Furfaro, Teresa Gallo, Alfredo Garro, Sabrina Graziano, Domenico Saccà, Andrea Tundis:
Extending GOReM Through the RAMSoS Method for Supporting Modeling and Virtual Evaluation of the Systemic Risk. CIISE 2016: 16-25 - [c11]Alfredo Garro, Andrea Tundis, Daniel Bouskela, Audrey Jardin, Nguyen Thuy, Martin Otter, Lena Buffoni, Peter Fritzson, Martin Sjölund, Wladimir Schamai, Hans Olsson:
On formal cyber physical system properties modeling: A new temporal logic language and a Modelica-based solution. ISSE 2016: 1-8 - [c10]Angelo Furfaro, Teresa Gallo, Alfredo Garro, Domenico Saccà, Andrea Tundis:
ResDevOps: A Software Engineering Framework for Achieving Long-Lasting Complex Systems. RE 2016: 246-255 - [e2]Eugenio Brusa, Andrea D'Ambrogio, Alfredo Garro, Lucio Tirone, Andrea Tundis:
Proceedings of the 2nd INCOSE Italia Conference on Systems Engineering, Turin, Italy, November 14-16, 2016. CEUR Workshop Proceedings 1728, CEUR-WS.org 2016 [contents] - 2015
- [j3]Alfredo Garro, Andrea Tundis:
On the Reliability Analysis of Systems and SoS: The RAMSAS Method and Related Extensions. IEEE Syst. J. 9(1): 232-241 (2015) - [c9]Alfredo Garro, Andrea Tundis:
Modeling of system properties: Research challenges and promising solutions. ISSE 2015: 324-331 - [c8]Francesco Buccafurri, Lidia Fotia, Angelo Furfaro, Alfredo Garro, Matteo Giacalone, Andrea Tundis:
An analytical processing approach to supporting cyber security compliance assessment. SIN 2015: 46-53 - 2014
- [j2]Lena Rogovchenko-Buffoni, Andrea Tundis, Muhammed Zoheb Hossain, Mattias Nyberg, Peter Fritzson:
An integrated toolchain for model based functional safety analysis. J. Comput. Sci. 5(3): 408-414 (2014) - [j1]Alfredo Garro, Johannes Groß, Marius Riestenpatt gen. Richter, Andrea Tundis:
Reliability analysis of an Attitude Determination and Control System (ADCS) through the RAMSAS method. J. Comput. Sci. 5(3): 439-449 (2014) - [c7]Angelo Furfaro, Alfredo Garro, Andrea Tundis:
Towards Security as a Service (SecaaS): On the modeling of Security Services for Cloud Computing. ICCST 2014: 1-6 - [c6]Alfredo Garro, Andrea Tundis:
RAMSAS4Modelica: a simulation-driven method for system dependability analysis centered on the modelica language and related tools. SpringSim (TMS-DEVS) 2014: 29 - [e1]Vincenzo Arrichiello, Andrea D'Ambrogio, Alfredo Garro, Carlo Leardi, Carlo Poloni, Andrea Tundis:
Proceedings of the INCOSE Italia Conference on Systems Engineering, CIISE 2014, Rome, Italy, November 24-25, 2014. CEUR Workshop Proceedings 1300, CEUR-WS.org 2014 [contents] - 2013
- [c5]Lena Rogovchenko-Buffoni, Andrea Tundis, Peter Fritzson, Alfredo Garro:
Modeling System Requirements in Modelica: Definition and Comparison of Candidate Approaches. EOOLT 2013: 15-24 - 2012
- [c4]Alfredo Garro, Andrea Tundis:
Enhancing the RAMSAS Method for System Reliability Analysis - An Exploitation in the Automotive Domain. SIMULTECH 2012: 328-333 - [c3]Alfredo Garro, Andrea Tundis:
A model-based method for system reliability analysis. SpringSim (TMS-DEVS) 2012: 2 - [c2]Alfredo Garro, Andrea Tundis:
Modeling and simulation for system reliability analysis: The RAMSAS method. SoSE 2012: 155-160 - 2011
- [c1]Francesco De Luca, Andrea Tundis, Alfredo Garro:
PROCE: an agent-based PROcess Composition and execution Environment. WOA 2011: 171-174
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-18 19:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint