1. CAAL: concurrency workbench, aalborg edition, in: Theoretical Aspects of Computing - ICTAC 2015 -12th International Colloquium Cali, Colombia, October 29-31, 2015, Proceedings;Andersen,2015
2. Avvenuti, M., Bernardeschi, C., De Francesco, N., Masci, P., 2012. JCSI: A tool for checking secure information flow in java card applications. Journal of Systems and Software 85, 2479–2493. URL: https://doi.org/10.1016/j.jss.2012.05.061, doi:10.1016/j.jss.2012.05.061.
3. Canfora, G., Martinelli, F., Mercaldo, F., Nardone, V., Santone, A., Visaggio, C.A., 2018. Leila: formal tool for identifying mobile malicious behaviour. IEEE Transactions on Software Engineering.
4. Detection of mobile botnet using vpn, in: Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013 Seventh International Conference on;Choi,2013
5. Formal methods meet mobile code ob-fuscation identification of code reordering technique, in: 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE);Cimitile,2017