ACKNOWLEDGMENTS
This work has been partially supported by H2020
EU-funded projects NeCS and C3ISP and EIT-Digital
Project HII and PRIN “Governing Adaptive and Un-
planned Systems of Systems” and the EU project Cy-
berSure 734815.
REFERENCES
Arthur, D., Manthey, B., and R
¨
oglin, H. (2009). k-means
has polynomial smoothed complexity. In Foundations
of Computer Science, 2009. FOCS’09. 50th Annual
IEEE Symposium on, pages 405–414. IEEE.
Battista, P., Mercaldo, F., Nardone, V., Santone, A., and
Visaggio, C. A. (2016). Identification of android mal-
ware families with model checking. In ICISSP, pages
542–547.
Boquete, L., Rodr
´
ıguez-Ascariz, J. M., Barea, R., Cantos,
J., Miguel-Jim
´
enez, J. M., and Ortega, S. (2010). Data
acquisition, analysis and transmission platform for a
pay-as-you-drive system. Sensors, 10(6):5395–5408.
Canfora, G., Medvet, E., Mercaldo, F., and Visaggio, C. A.
(2016). Acquiring and analyzing app metrics for ef-
fective mobile malware detection. In Proceedings of
the 2016 ACM on International Workshop on Security
And Privacy Analytics, pages 50–57. ACM.
Canfora, G., Mercaldo, F., Visaggio, C. A., and Di Notte, P.
(2014). Metamorphic malware detection using code
metrics. Information Security Journal: A Global Per-
spective, 23(3):57–67.
Choi, S., Kim, J., Kwak, D., Angkititrakul, P., and Han-
sen, J. H. (2007). Analysis and classification of dri-
ver behavior using in-vehicle can-bus information. In
Biennial Workshop on DSP for In-Vehicle and Mobile
Systems, pages 17–19.
Cimitile, A., Martinelli, F., and Mercaldo, F. (2017). Ma-
chine learning meets ios malware: Identifying mali-
cious applications on apple environment. In ICISSP,
pages 487–492.
Desyllas, P. and Sako, M. (2013). Profiting from business
model innovation: Evidence from pay-as-you-drive
auto insurance. Research Policy, 42(1):101–116.
Enev, M., Takakuwa, A., Koscher, K., and Kohno,
T. (2016). Automobile driver fingerprinting.
Proceedings on Privacy Enhancing Technologies,
2016(1):34–50.
Har-Peled, S. and Kushal, A. (2007). Smaller coresets for
k-median and k-means clustering. Discrete & Com-
putational Geometry, 37(1):3–19.
Jain, A. K. (2010). Data clustering: 50 years beyond k-
means. Pattern recognition letters, 31(8):651–666.
Kantor, S. and St
´
arek, T. (2014). Design of algorithms
for payment telematics systems evaluating driver’s
driving style. Transactions on Transport Sciences,
7(1):9.
Kaufman, L. and Rousseeuw, P. J. (2009). Finding groups
in data: an introduction to cluster analysis, volume
344. John Wiley & Sons.
Kedar-Dongarkar, G. and Das, M. (2012). Driver classifi-
cation for optimization of energy usage in a vehicle.
Procedia Computer Science, 8:388–393.
Kwak, B. I., Woo, J., and Kim, H. K. (2016). Know your
master: Driver profiling-based anti-theft method. In
PST 2016.
MacQueen, J. et al. (1967). Some methods for classification
and analysis of multivariate observations. In Procee-
dings of the fifth Berkeley symposium on mathematical
statistics and probability, volume 1, pages 281–297.
Oakland, CA, USA.
Marotta, A., Martinelli, F., Nanni, S., Orlando, A., and
Yautsiukhin, A. (2017). Cyber-insurance survey.
Computer Science Review.
Martinelli, F., Mercaldo, F., Nardone, V., Orlando, A., and
Santone, A. (2018). Who’s driving my car? a machine
learning based approach to driver identification. In
ICISSP.
Martinelli, F., Mercaldo, F., Nardone, V., and Santone, A.
(2017). Car hacking identification through fuzzy lo-
gic algorithms. In Fuzzy Systems (FUZZ-IEEE), IEEE
International Conference on. IEEE. IEEE.
Mehar, A., Chandra, S., and Velmurugan, S. (2013). Speed
and acceleration characteristics of different types of
vehicles on multi-lane highways. European Trans-
port, 55:1825–3997.
Meng, X., Lee, K. K., and Xu, Y. (2006). Human driving
behavior recognition based on hidden markov models.
In Robotics and Biomimetics, 2006. ROBIO’06. IEEE
International Conference on, pages 274–279. IEEE.
Mercaldo, F., Nardone, V., Santone, A., and Visaggio,
C. A. (2016). Download malware? no, thanks. how
formal methods can block update attacks. In For-
mal Methods in Software Engineering (FormaliSE),
2016 IEEE/ACM 4th FME Workshop on, pages 22–
28. IEEE.
Miyajima, C., Nishiwaki, Y., Ozawa, K., Wakita, T., Itou,
K., Takeda, K., and Itakura, F. (2007). Driver mo-
deling based on driving behavior and its evaluation
in driver identification. Proceedings of the IEEE,
95(2):427–437.
Nishiwaki, Y., Ozawa, K., Wakita, T., Miyajima, C., Itou,
K., and Takeda, K. (2007). Driver identification based
on spectral analysis of driving behavioral signals. In
Advances for In-Vehicle and Mobile Systems, pages
25–34. Springer.
Tselentis, D. I., Yannis, G., and Vlahogianni, E. I. (2016).
Innovative insurance schemes: pay as/how you drive.
Transportation Research Procedia, 14:362–371.
Van Ly, M., Martin, S., and Trivedi, M. M. (2013). Driver
classification and driving style recognition using iner-
tial sensors. In Intelligent Vehicles Symposium (IV),
2013 IEEE, pages 1040–1045. IEEE.
Wakita, T., Ozawa, K., Miyajima, C., Igarashi, K., Ka-
tunobu, I., Takeda, K., and Itakura, F. (2006).
Driver identification using driving behavior signals.