Towards a systematic approach to memory safety: a case study integrating techniques and practices over the software development life cycle (SDLC)

Conference paper


Tonini, I., Nalli, G., Piras, L., De Matteis, P., Kapetanakis, S. and Ranise, S. 2025. Towards a systematic approach to memory safety: a case study integrating techniques and practices over the software development life cycle (SDLC). Barolli, L., Ishida, T. and Dantas, M. (ed.) 20th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing. Sharjah, United Arab Emirates 12 - 14 Nov 2025 Springer. pp. 147-159 https://doi.org/10.1007/978-3-032-10344-4_14
TypeConference paper
TitleTowards a systematic approach to memory safety: a case study integrating techniques and practices over the software development life cycle (SDLC)
AuthorsTonini, I., Nalli, G., Piras, L., De Matteis, P., Kapetanakis, S. and Ranise, S.
Abstract

Safe memory management is a crucial pillar in modern programming and cybersecurity, essential to prevent vulnerabilities and errors that can compromise the reliability and security of computer systems. Memory safety problems, as evidenced by many cases (e.g., Wannacry and Crowdstrike) can have a devastating impact on the entire Trusted Computing Base (TCB) of organisations. Despite such important issues, there is still a lack of standardised frameworks, methods, and tools able to guide software engineers in a systematic consideration and mitigation of software memory safety during the entire Software Development Life Cycle (SDLC). In this work, we propose a first attempt towards an approach that contextualises and considers, within the SDLC, main issues related to memory safety, and proposes guidelines to apply specific techniques for reducing potential memory safety risks. Specifically, our approach is pragmatic and oriented towards the industry, with the aim of helping organisations to individuate the parts where memory safety issues more often occur, and to mitigate such problems contextually to a secure SDLC. The concept of memory safety is introduced, followed by an overview of the main classes of vulnerabilities, and then by an in-depth analysis of the applicable mitigation techniques. We present our approach and a case study as an initial application of our approach, and exemplification of concepts related to it. The main contribution of this work consists in the systematization of mitigation techniques deriving from memory management problems, according to the SDLC, and in the practical demonstration of their effectiveness in a case study.

Keywordsmemory leaks; memory safety; software development life cycle
Sustainable Development Goals9 Industry, innovation and infrastructure
Middlesex University ThemeCreativity, Culture & Enterprise
Conference20th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing
Page range147-159
Proceedings TitleAdvances on P2P, Parallel, Grid, Cloud and Internet Computing: The 20th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2025). Online Conference
SeriesLecture Notes on Data Engineering and Communications Technologies
EditorsBarolli, L., Ishida, T. and Dantas, M.
ISSN2367-4512
Electronic2367-4520
ISBN
Paperback9783032103437
Electronic9783032103444
PublisherSpringer
Publication dates
Online13 Nov 2025
Print14 Dec 2025
Publication process dates
Accepted2025
Deposited13 Nov 2025
Output statusPublished
Accepted author manuscript
File Access Level
Open
Copyright Statement

This version of the contribution has been accepted for publication, after peer review (when applicable) but is not the Version of Record and does not reflect post-acceptance improvements, or any corrections. The Version of Record is available online at: http://dx.doi.org/10.1007/978-3-032-10344-4_14. Use of this Accepted Version is subject to the publisher’s Accepted Manuscript terms of use https://www.springernature.com/gp/open-research/policies/accepted-ma...

Digital Object Identifier (DOI)https://doi.org/10.1007/978-3-032-10344-4_14
Web address (URL) of conference proceedingshttps://doi.org/10.1007/978-3-032-10344-4
Permalink -

https://repository.mdx.ac.uk/item/2yx231

Restricted files

Accepted author manuscript

  • 32
    total views
  • 2
    total downloads
  • 9
    views this month
  • 0
    downloads this month

Export as

Related outputs

Predicting London’s precipitation: a spatio-temporal neural network approach
Zafar, H., Kapetanakis, S., Nalli, G. and Nguyen, K. 2025. Predicting London’s precipitation: a spatio-temporal neural network approach. Bramer, M. and Stahl, F. (ed.) 45th SGAI International Conference on Artificial Intelligence. Cambridge, UK 16 - 18 Dec 2025 Springer. pp. 179-189 https://doi.org/10.1007/978-3-032-11442-6_13
CodeTutor: personalized programming learning through automated feedback and clustering
Mogianesi, L., Amendola, D., Culmone, R. and Nalli, G. 2025. CodeTutor: personalized programming learning through automated feedback and clustering. De Santis, A., Caldirola, E. and Carretta, P. (ed.) 2024 Italian Symposium on Digital Education. University of Pavia, Italy 19 - 21 Jun 2024 Pearson. pp. 454-459
AI intelligent tutoring system tailored to the students’ personality and neurodiversity
Nalli, G., Kapetanakis, S. and Nguyen, K.A. 2025. AI intelligent tutoring system tailored to the students’ personality and neurodiversity. 24th European Conference on e‑Learning. Technical University of Denmark (DTU), Denmark 23 - 24 Oct 2025 Academic Conferences International (ACI). https://doi.org/10.34190/ecel.24.1.3792
Pre-service teachers and public speaking anxiety. Insights and possible interventions through AI and IoT
Giannandrea, L., Capolla, L.M., Gratani, F., Nalli, G. and Kapetanakis, S. 2025. Pre-service teachers and public speaking anxiety. Insights and possible interventions through AI and IoT. Ardimento, P., Di Fuccio, R., Fulantelli, G., Pecori, R., Raviolo, P., Rondonotti, M., Schicchi, D., Taibi, D. and Zaza, G. (ed.) 6th International Conference on Higher Education Learning Methodologies and Technologies Online. Rome, Italy 25 - 27 Sep 2024 Cham, Switzerland Springer. pp. 120-133 https://doi.org/10.1007/978-3-031-93999-0_8
Leveraging digital twin technology for traffic optimization: a pathway to sustainable urban transportation
Basheer, Z., Karthick, S., Pichhika, H.-C., Yerra, R.V.P., Venkataraman, H., Shah, P., Nalli, G., Trestian, R. and Comsa, I.-S. 2025. Leveraging digital twin technology for traffic optimization: a pathway to sustainable urban transportation. 20th IEEE International Symposium on Broadband Multimedia Systems and Broadcasting. Dublin, Ireland 11 - 13 Jun 2025 IEEE.
A risk assessment of information security in a diet centre business: a case study
Annahdi, T., Alkubaisy, D. and Piras, L. 2025. A risk assessment of information security in a diet centre business: a case study. Mannion, M., Mannisto, T. and Maciaszek, L. (ed.) 20th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE). Porto (Portugal) 04 - 06 Apr 2025 SCITEPRESS - Science and Technology Publications. pp. 858-867 https://doi.org/10.5220/0013488300003928
Enhancing privacy, censorship resistance, and user engagement in a blockchain-based social network
Thiha, M., Yetgin, H., Piras, L. and Al-Obeidallah, M.G. 2025. Enhancing privacy, censorship resistance, and user engagement in a blockchain-based social network. Mannion, M., Mannisto, T. and Maciaszek, L. (ed.) 20th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE). Porto (Portugal) 04 - 06 Apr 2025 SCITEPRESS - Science and Technology Publications. pp. 67-79 https://doi.org/10.5220/0013238500003928
Signature-based security analysis and detection of IoT threats in advanced message queuing protocol
Hashimyar, M.E., Aiash, M., Khoshkholghi, A. and Nalli, G. 2025. Signature-based security analysis and detection of IoT threats in advanced message queuing protocol. Network. 5 (1). https://doi.org/10.3390/network5010005
Assuring privacy of AI-powered community driven Android code vulnerability detection
Senanayake, J., Kalutarage, H., Piras, L., Al-Kadri, M.O. and Petrovski, A. 2025. Assuring privacy of AI-powered community driven Android code vulnerability detection. Garcia-Alfaro, J., Kalutarage, H., Yanai, N., Kozik, R., Ksieniewicz, P., Woźniak, M., Abie, H., Ranise, S., Verderame, L., Cambiaso, E., Ugarelli,, R., Praça, I., Katt, B., Pirbhulal, S., Shukla, A., Pawlicki, M. and Choraś, M. (ed.) 3rd International Workshop on System Security Assurance. Bydgoszcz, Poland 19 - 20 Sep 2024 Springer. pp. 457-476 https://doi.org/10.1007/978-3-031-82362-6_27
Formalizing federated learning and differential privacy for GIS systems in IIIf
Kammueller, F., Piras, L., Fields, B. and Nagarajan, R. 2025. Formalizing federated learning and differential privacy for GIS systems in IIIf. Garcia-Alfaro, J., Kalutarage, H., Yanai, N., Kozik, R., Ksieniewicz, P., Woźniak, M., Abie, H., Ranise, S., Verderame, L., Cambiaso, E., Ugarelli,, R., Praça, I., Katt, B.., Pirbhulal, S., Shukla, A., Pawlicki, M. and Choraś, M. (ed.) 3rd International Workshop on System Security Assurance. Bydgoszcz, Poland 19 - 20 Sep 2024 Springer. pp. 477-487 https://doi.org/10.1007/978-3-031-82362-6_28
Model-based gamification design with Web-Agon: an automated analysis tool for gamification
Zaw, H.K., Piras, L., Calabrese, F. and Al-Obeidallah, M.G. 2024. Model-based gamification design with Web-Agon: an automated analysis tool for gamification. 50th Euromicro Conference Series on Software Engineering and Advanced Applications. Paris, France 28 - 30 Aug 2024 IEEE. pp. 168-171 https://doi.org/10.1109/SEAA64295.2024.00033
Online application for the early detection of students at risk of failing through Artificial Intelligence
Nalli, G., Marconi, A., Karakatič, S., Brezočnik, L., Montagna, A., Amendola, D. and De Leone, R. 2024. Online application for the early detection of students at risk of failing through Artificial Intelligence. Minerva, T. and De Santis, A. (ed.) 2023 Italian Symposium on Digital Education. Reggio Emilia, Italy 13 - 15 Sep 2023 Pearson. pp. 56-62
Blockchain in e-learning platform to enhance trustworthy and sharing of micro-credentials
Bigiotti, A., Bottoni, M. and Nalli, G. 2024. Blockchain in e-learning platform to enhance trustworthy and sharing of micro-credentials. 36th International Conference on Advanced Information Systems Engineering Workshops. Limassol, Cyprus 03 - 07 Jun 2024 Cham, Switzerland. Springer. https://doi.org/10.1007/978-3-031-61003-5_1
Defendroid: real-time Android code vulnerability detection via blockchain federated neural network with XAI
Senanayake, L., Kalutarage, H., Petrovski, A., Piras, L. and Al-Kadri, M. 2024. Defendroid: real-time Android code vulnerability detection via blockchain federated neural network with XAI. Journal of Information Security and Applications. 82. https://doi.org/10.1016/j.jisa.2024.103741
Gamification of E-Learning apps via acceptance requirements analysis
Calabrese, L., Piras, L., Al-Obeidallah, M., Egbikuadje, B. and Alkubaisy, D. 2024. Gamification of E-Learning apps via acceptance requirements analysis. 19th International Conference on Evaluation of Novel Approaches to Software Engineering. Angers, France 28 - 29 Apr 2024 SCITEPRESS - Science and Technology Publications. pp. 291-298 https://doi.org/10.5220/0012550400003687
FedREVAN: real-time detection of vulnerable Android source code through federated neural network with XAI
Senanayake, J., Kalutarage, H., Petrovski, A., Al-Kadri, M.O. and Piras, L. 2024. FedREVAN: real-time detection of vulnerable Android source code through federated neural network with XAI. ESORICS Workshop on Attacks and Software Protection (WASP). The Hague, The Netherlands 25 - 29 Sep 2023 Springer. pp. 426-441 https://doi.org/10.1007/978-3-031-54129-2_25
Hybrid educational environments – using IoT to detect emotion changes during student interactions
Nalli, G., Dafoulas, G., Tsiakara, A., Langari, B., Mistry, K. and Tahmasebi Aria, F. 2023. Hybrid educational environments – using IoT to detect emotion changes during student interactions. Interaction Design and Architecture(s). 58 (1), pp. 39-52. https://doi.org/10.55612/s-5002-058-001
Online tutoring system for programming courses to improve exam pass rate
Nalli, G., Culmone, R., Perali, A. and Amendola, D. 2023. Online tutoring system for programming courses to improve exam pass rate. Journal of E-Learning and Knowledge Society. 19 (1), pp. 27-35. https://doi.org/10.20368/1971-8829/1135704
Machine Learning model for student drop-out prediction based on student engagement
Brezočnik, L., Nalli, G., De Leone, R., Val, S., Podgorelec, V. and Karakatič, S. 2023. Machine Learning model for student drop-out prediction based on student engagement. Karabegovic, I., Kovačević, A. and Mandzuka, S. (ed.) 9th International Conference on New Technologies, Development and Application. Sarajevo, Bosnia and Herzegovina 22 - 24 Jun 2023 Cham Springer. pp. 486–496 https://doi.org/10.1007/978-3-031-31066-9_54
Comparison of the effectiveness and performance of student workgroups in online wiki activities with and without AI
Nalli, G. and Smith, S. 2023. Comparison of the effectiveness and performance of student workgroups in online wiki activities with and without AI. 4th International Electronic Conference on Applied Sciences. Online 27 Oct - 10 Nov 2023 MDPI. https://doi.org/10.3390/ASEC2023-16273
Machine-learning-based software to group heterogeneous students for online peer assessment activities
Amendola, D., Nalli, G. and Miceli, C. 2023. Machine-learning-based software to group heterogeneous students for online peer assessment activities. Fulantelli, G., Burgos, D., Casalino, G., Cimitile, M., Lo Bosco, G. and Taibi, D. (ed.) 4th International Conference on Higher Education Learning Methodologies and Technologies Online. Palermo, Italy 21 - 23 Sep 2022 Cham Springer. https://doi.org/10.1007/978-3-031-29800-4_2
Android code vulnerabilities early detection using AI-powered ACVED plugin
Senanayake, J., Kalutarage, H., Al-Kadri, M.O., Petrovski, A. and Piras, L. 2023. Android code vulnerabilities early detection using AI-powered ACVED plugin. Atluri, V. and Ferrara, A. (ed.) 37th Annual IFIP WG 11.3 Conference (DBSec 2023). Sophia-Antipolis, France 19 - 21 Jul 2023 Cham, Switzerland Springer. pp. 339–357 https://doi.org/10.1007/978-3-031-37586-6_20
Labelled vulnerability dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models
Senanayake, J., Kalutarage, H., Al-Kadri, M.O., Piras, L. and Petrovski, A. 2023. Labelled vulnerability dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models. Vimercati, S. and Samarati, P. (ed.) International Conference on Security and Cryptography (SECRYPT) 2023. Rome, Italy 10 - 12 Jul 2023 SCITEPRESS - Science and Technology Publications. pp. 659-666 https://doi.org/10.5220/0012060400003555
Goal-modeling privacy-by-design patterns for supporting GDPR compliance
Al-Obeidallah, M., Piras, L., Iloanugo, O., Mouratidis, H., Alkubaisy, D and Dellagiacoma, D. 2023. Goal-modeling privacy-by-design patterns for supporting GDPR compliance. Fill, H.-G., Domínguez-Mayo, F.J., van Sinderen, M. and Maciaszek, L. (ed.) International Conference on Software Technologies (ICSOFT). Rome, Italy 10 - 12 Jul 2023 SCITEPRESS - Science and Technology Publications. pp. 361-368 https://doi.org/10.5220/0012080700003538
Android source code vulnerability detection: a systematic literature review
Senanayake, J., Kalutarage, H., Al-Kadri, M.O., Petrovski, A. and Piras, L. 2023. Android source code vulnerability detection: a systematic literature review. ACM Computing Surveys. 55 (9). https://doi.org/10.1145/3556974
Artificial Intelligence to improve learning outcomes through online collaborative activities
Nalli, G., Amendola, D. and Smith, S. 2022. Artificial Intelligence to improve learning outcomes through online collaborative activities. Fotaris, P. and Blake, A. (ed.) 21st European Conference on e-Learning. Brighton, UK 27 - 28 Oct 2022 Academic Conferences International (ACI). pp. 475-479 https://doi.org/10.34190/ecel.21.1.661
A framework for privacy and security requirements analysis and conflict resolution for supporting GDPR compliance through privacy-by-design
Alkubaisy, D., Piras, L., Al-Obeidallah, M., Cox, K. and Mouratidis, H. 2022. A framework for privacy and security requirements analysis and conflict resolution for supporting GDPR compliance through privacy-by-design. Ali, R., Kaindl, H. and Maciaszek, L. (ed.) 16th International Conference on Evaluation of Novel Approaches to Software Engineering. Virtual 26 - 27 Apr 2021 Cham Springer. pp. 67-87 https://doi.org/10.1007/978-3-030-96648-5_4
Developing secured Android applications by mitigating code vulnerabilities with machine learning
Senanayake, J., Kalutarage, H., Al-Kadri, M., Petrovski, A. and Piras, L. 2022. Developing secured Android applications by mitigating code vulnerabilities with machine learning. ACM Asia Conference on Computer and Communications Security (ASIA CCS '22). Nagasaki, Japan 30 May - 03 Jun 2022 Association for Computing Machinery (ACM). pp. 1255–1257 https://doi.org/10.1145/3488932.3527290
Supporting the individuation, analysis and gamification of software components for acceptance requirements fulfilment
Calabrese, F., Piras, L. and Giorgini, P. 2022. Supporting the individuation, analysis and gamification of software components for acceptance requirements fulfilment. Barn, B. and Sandkuhl, K (ed.) IFIP Working Conference on The Practice of Enterprise Modeling. London, UK 23 - 25 Nov 2022 Springer. pp. 33-48 https://doi.org/10.1007/978-3-031-21488-2_3
Comparative analysis of clustering algorithms and moodle plugin for creation of student heterogeneous groups in online university courses
Nalli, G., Amendola, D., Perali, A. and Mostarda, L. 2021. Comparative analysis of clustering algorithms and moodle plugin for creation of student heterogeneous groups in online university courses. Applied Sciences. 11. https://doi.org/10.3390/app11135800
Confis: a tool for privacy and security analysis and conflict resolution for supporting GDPR compliance through privacy-by-design
Alkubaisy, D., Piras, L., Al-Obeidallah, M., Cox, K. and Mouratidis, H. 2021. Confis: a tool for privacy and security analysis and conflict resolution for supporting GDPR compliance through privacy-by-design. Ali, R., Kaindl, H. and Maciaszek, L. (ed.) 16th International Conference on Evaluation of Novel Approaches to Software Engineering. Virtual 26 - 27 Apr 2021 SCITEPRESS - Science and Technology Publications. pp. 80-91 https://doi.org/10.5220/0010406100800091
Chatbot per Moodle: un assistente virtuale per i corsi universitari ad alto numero di studenti
Nalli, G. and Amendola, D. 2020. Chatbot per Moodle: un assistente virtuale per i corsi universitari ad alto numero di studenti. MoodleMoot Italia 2020. Online 26 - 28 Nov 2020 MediaTouch 2000. pp. 64-67
Privacy, security, legal and technology acceptance requirements for a GDPR compliance platform
Tsohou, A., Magkos, M., Mouratidis, H., Chrysoloras, G., Piras, L., Pavlidis, M., Debussche, J., Rotoloni, M. and Gallego-Nicasio Crespo, B. 2020. Privacy, security, legal and technology acceptance requirements for a GDPR compliance platform. 2019 International Workshop on Security and Privacy Requirements Engineering. Luxembourg City, Luxembourg 26 - 27 Sep 2019 Springer. https://doi.org/10.1007/978-3-030-42048-2_14
DEFeND DSM: a data scope management service for model-based privacy by design GDPR compliance
Piras, L., Al-Obeidallah, M., Pavlidis, M., Mouratidis, H., Tsohou, A., Magkos, E., Praitano, A., Iodice, A. and Gallego-Nicasio Crespo, B. 2020. DEFeND DSM: a data scope management service for model-based privacy by design GDPR compliance. 17th International Conference on Trust and Privacy in Digital Business. Bratislava, Slovakia 14 - 17 Sep 2020 Springer. https://doi.org/10.1007/978-3-030-58986-8_13
Improved movie recommendations based on a hybrid feature combination method
Alshammari, G., Kapetanakis, S., Alshammari, A., Polatidis, N. and Petridis, M. 2019. Improved movie recommendations based on a hybrid feature combination method. Vietnam Journal of Computer Science. 6 (3), pp. 363-376. https://doi.org/10.1142/s2196888819500192
Application of machine learning to the learning analytics of the Moodle platform to create heterogeneous groups in on-line courses
Nalli, G., Mostarda, L., Perali, A., Pilati, S. and Amendola, A. 2019. Application of machine learning to the learning analytics of the Moodle platform to create heterogeneous groups in on-line courses. Italian Journal of Educational Research. p. 156–173.
Tool per la classificazione dei sentimenti degli studenti Implicati in moduli didattici universitari in modalità e-learning
Nalli, G., Amendola, D., Schettini, C. and Galassi, R. 2019. Tool per la classificazione dei sentimenti degli studenti Implicati in moduli didattici universitari in modalità e-learning. MoodleMoot Italia 2019. Verona, Italy 05 - 07 Dec 2019 MediaTouch 2000. pp. 29-32
Design thinking and acceptance requirements for designing gamified software
Piras, L., Dellagiacoma, D., Perini, A., Susi, A., Giorgini, P. and Mylopoulos, J. 2019. Design thinking and acceptance requirements for designing gamified software. 13th International Conference on Research Challenges in Information Science. Brussels, Belgium 29 - 31 May 2019 IEEE. pp. 1-12 https://doi.org/10.1109/rcis.2019.8876973
Goal-oriented requirements engineering: an extended systematic mapping study
Horkoff, J., Aydemir, F., Cardoso, E., Li, T., Mate, A., Paja, E., Salnitri, M., Piras, L., Mylopoulos, J. and Giorgini, P. 2019. Goal-oriented requirements engineering: an extended systematic mapping study. Requirements Engineering. 24 (2), pp. 133-160. https://doi.org/10.1007/s00766-017-0280-z
DEFeND architecture: a privacy by design platform for GDPR compliance
Piras, L., Al-Obeidallah, M., Praitano, A., Tsohou, A., Mouratidis, H., Gallego-Nicasio Crespo, B., Bernard, J., Fiorani, M., Magkos, E., Castillo Sanz, A., Pavlidis, M., D'Addario, R. and Zorzino, G. 2019. DEFeND architecture: a privacy by design platform for GDPR compliance. 16th International Conference on Trust, Privacy and Security in Digital Business. Linz, Austria 26 - 29 Aug 2019 Springer. https://doi.org/10.1007/978-3-030-27813-7_6
A switching multi-level method for the long tail recommendation problem
Alshammari, G., Jorro-Aragoneses, J., Polatidis, N., Kapetanakis, S., Pimenidis, E. and Petridis, M. 2019. A switching multi-level method for the long tail recommendation problem. Journal of Intelligent & Fuzzy Systems. 37 (6), pp. 7189-7198. https://doi.org/10.3233/jifs-179331
Predicting fraud in mobile money transfer using case-based reasoning
Adedoyin, A., Kapetanakis, S., Samakovitis, G. and Petridis, M. 2017. Predicting fraud in mobile money transfer using case-based reasoning. SGAI 2017: International Conference on Innovative Techniques and Applications of Artificial Intelligence. Cambridge, United Kingdom 12 - 14 Dec 2017 Springer. https://doi.org/10.1007/978-3-319-71078-5_28
Il Blended Learning per migliorare l’efficacia della didattica universitaria: il corso di Computer Ethics
Amendola, D., Nalli, G. and De Vivo, M. 2017. Il Blended Learning per migliorare l’efficacia della didattica universitaria: il corso di Computer Ethics. EMEMITALIA 2017. Bolzano, Italy 30 Aug - 01 Sep 2017 Genova University Press.
Goal models for acceptance requirements analysis and gamification design
Piras, L., Paja, E., Giorgini, P. and Mylopoulos, J. 2017. Goal models for acceptance requirements analysis and gamification design. Mayr, H.C., Guizzardi, G., Ma, H. and Pastor, O. (ed.) 36th International Conference on Conceptual Modeling. Valencia, Spain 06 - 09 Nov 2017 Cham Springer. pp. 223-230 https://doi.org/10.1007/978-3-319-69904-2_18
Gamification solutions for software acceptance: a comparative study of requirements engineering and organizational behavior techniques
Piras, L., Paja, E., Giorgini, P., Mylopoulos, J., Cuel, R. and Ponte, D. 2017. Gamification solutions for software acceptance: a comparative study of requirements engineering and organizational behavior techniques. 11th International Conference on Research Challenges in Information Science. Brighton, UK 10 - 12 May 2017 IEEE. pp. 255-265 https://doi.org/10.1109/rcis.2017.7956544
Acceptance requirements and their gamification solutions
Piras, L., Giorgini, P. and Mylopoulos, J. 2016. Acceptance requirements and their gamification solutions. IEEE 24th International Requirements Engineering Conference. Beijing, China 12 - 16 Sep 2016 IEEE. pp. 365-370 https://doi.org/10.1109/RE.2016.43
Using gamification to incentivize sustainable urban mobility
Kazhamiakin, R., Marconi, A., Perillo, M., Pistore, M., Valetto, G., Piras, L., Avesani, F. and Perri, N. 2015. Using gamification to incentivize sustainable urban mobility. IEEE First International Smart Cities Conference. Guadalajara, Mexico 25 - 28 Oct 2015 IEEE. https://doi.org/10.1109/ISC2.2015.7366196
A portable wireless-based architecture for solving minimum digital divide problems
Fenu, G. and Piras, L. 2008. A portable wireless-based architecture for solving minimum digital divide problems. 4th International Conference on Wireless and Mobile Communications. Athens, Greece 27 Jul - 01 Aug 2008 IEEE. pp. 130-136 https://doi.org/10.1109/icwmc.2008.21