L. Baresi, C. Ghezzi, A. Mocci, and M. Monga. Proceedings of the Seventh International Workshop on
Graph Transformation and Visual Modeling Techniques
(GT-VMT 2008), volume X of Electronic Communications of the EASST, page 277--290. EASST, European Association of Software Science and
Technology, (March 2008)
A. Marchetto, M. Monga, and A. Trentini. Conference on Exploring Quantifiable Information
Technology Yields, page 63-72. IEEE Computer Society, (March 2007)
K. Mehner, M. Monga, and G. Täntzer. volume 5490 of Lecture Notes in Computer Science, chapter Analysis of Aspect-Oriented Model Weaving, page 235--263. Springer Berlin / Heidelberg, (2009)
D. Bruschi, L. Martignoni, and M. Monga. Detection of Intrusions and Malware & Vulnerability
Assessment, volume 4064 of LNCS, Springer, Berlin/Heidelberg, Berlin, Germany, (2006)
B. De Win, S. Lee, and M. Monga. ICSE Companion '08: Companion of the 30th
international conference on Software engineering, page 1067--1070. ACM, ACM, (May 2008)
K. Mehner, M. Monga, and G. Täntzer. Proceedings of 14th International Requirements
Engineering Conference RE'06, page 66--75. IEEE Computer Society, (September 2006)
A. Fattori, R. Paleari, L. Martignoni, and M. Monga. Proceedings of the 25th IEEE/ACM International
Conference on Automated Software Engineering (ASE
2010), page 417--426. Antwerp, Belgium, ACM, (September 2010)
M. Monga, R. Paleari, and E. Passerini. Proceedings of fifth international workshop on
software engineering for secure systems (SESS'09), page 25--32. IEEE CS, IEEE, (May 2009)
D. Balzarotti, and M. Monga. Proceedings of Foundations of Aspect-Oriented
Languages Workshop at AOSD 2004, page 25--29. Iowa State University, (March 2004)
C. Ghezzi, A. Mocci, and M. Monga. IWPSE '07: Ninth international workshop on
Principles of software evolution, page 98--105. ACM Press, (September 2007)
N. Gatti, M. Monga, and S. Sicari. Decision and Game Theory for Security, volume 6442 of Lecture Notes in Computer Science, Springer-Verlag Berlin Heidelberg, Berlin, Germany, (November 2010)
C. Bellettini, L. Capra, and M. Monga. Proceedings of the Workshop on Cooperative Support
for Distributed Software Engineering Processes
(CSSE'04), page 15--26. Austrian Computer Society, (September 2004)
N. Gatti, M. Monga, and S. Sicari. Ultra Modern Telecommunications and Control Systems,
2010. ICUMT'10. International Congress on, page 295--300. Moscow, Russia, IEEE, IEEE, (October 2010)Best paper award winner.
L. Cavallaro, A. Lanzi, L. Mayer, and M. Monga. Proceedings of Fourth International Workshop on
Software Engineering for Secure Systems (SESS'08), page 41--48. ACM, ACM, (May 2008)
A. Castaldo D'Ursi, L. Cavallaro, and M. Monga. FOAL'07: Proceedings of the 6th workshop on
Foundations of aspect-oriented languages, page 35--43. ACM, ACM Press, (March 2007)
G. Denaro, and M. Monga. IWPSE~'01: Proceedings of the 4th International
Workshop on Principles of Software Evolution, page 186--189. ACM, ACM Press, (September 2001)
D. Balzarotti, M. Monga, and S. Sicari. Quality of Protection: Security Measurements and
Metrics, volume 23 of Advances in Information Security, Springer, New York, (June 2006)
A. Lanzi, L. Martignoni, M. Monga, and R. Paleari. SESS'07: Proceedings of the 3$^rd$ International
Workshop on Software Engineering for Secure Systems, ACM, IEEE Computer Society, (May 2007)
D. Bruschi, M. Monga, and E. Rosti. Crimine virtuale, minaccia reale. ICT Security:
politiche e strumenti di prevenzione, volume 571.2.7 of FTI Forum per la tecnologia dell'informazione, FrancoAngeli, (2004)
R. Casero, M. Cesarini, and M. Monga. Journal of Object Technology, 3 (2):
47--55(2004)Special issue: .NET: The Programmer's Perspective:
ECOOP Workshop 2003.
S. Lee, and M. Monga. Information and Software Technology, 51 (7):
1150--1151(2009)Special Section: Software Engineering for Secure
Systems -- Software Engineering for Secure Systems.
D. Balzarotti, C. Ghezzi, and M. Monga. SEKE~'02: Proceedings of the 14th international
conference on Software engineering and knowledge
engineering, page 507--511. ACM, ACM Press, (July 2002)
R. Paleari, D. Marrone, D. Bruschi, and M. Monga. Detection of Intrusions and Malware & Vulnerability
Assessment DIMVA'08, volume 5137 of Lecture Notes in Computer Science, page 126--142. Springer Berlin / Heidelberg, (July 2008)
V. Lonati, M. Monga, A. Morpurgo, and M. Torelli. Informatics in Schools: Contributing to 21st Century
Education. Proceedings of the International
Conference on Informatics in Schools: Situation,
Evolution and Perspectives (ISSEP2011), volume 7013 of Lecture Notes in Computer Science, page 213--224. Springer-Verlag, (October 2011)
M. Monga, and S. Sicari. Proceedings of the 2nd SIGSPATIAL ACM GIS
International Workshop on Security and Privacy in
GIS and LBS (SPRINGL'09), page 63--70. New York, NY, USA, ACM SIGSPATIAL, ACM, (November 2009)
C. Bellettini, M. Camilli, L. Capra, and M. Monga. Proceedings of 7th International Workshop on
Reachability Problems (RP 2013), volume 8169 of Lecture Notes in Computer Science, page 83--95. Heidelberg, Springer, (September 2013)
C. Bellettini, M. Camilli, L. Capra, and M. Monga. Proceedings of the 14th International Symposium on
Symbolic and Numeric Algorithms for Scientific
Computing (SYNASC 2012), page 295--302. Timisoara, Romania, IEEE CS, IEEE Computer Society, (September 2012)
M. Cesarini, M. Monga, and R. Tedesco. SAC~'04: Proceedings of the 2004 ACM symposium on
Applied computing, page 940--945. ACM, ACM Press, (March 2004)
C. Ghezzi, and M. Monga. IWPSE~'02: Proceedings of the 5th International
Workshop on Principles of Software Evolution, page 22--28. ACM, ACM Press, (May 2002)
S. Lee, M. Monga, and J. Jürjens. Proceedings of the 32nd ACM/IEEE International
Conference on Software Engineering - Volume 2, page 433--434. New York, NY, USA, ACM, (2010)
M. Monga. Proceedings of the International Symposium on
Towards Peta-Bit Ultra-Networks, page 79--87. IEEE, A & I Ltd., Tokyo, (September 2003)Invited paper.
G. Cantone, M. Ferrari, M. Monga, R. Natale, and N. Pinelli. 3, chapter Modello di valutazione guidato da obiettivi e
vincoli. Elementi di verifica del modello di
valutazione., page 258--261. Iniziative Sanitarie, Roma, (May 2006)
D. Bruschi, B. De Win, S. Lee, and M. Monga. ICSE COMPANION '07: Companion to the proceedings of
the 29th International Conference on Software
Engineering, page 111--112. ACM, IEEE Computer Society, (May 2007)