Sfoglia per Autore

opzioni
Mostrati risultati da 1 a 20 di 368
Titolo Data di pubblicazione Autore(i) Rivista Serie Titolo libro
Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand In corso di stampa Matteo CardaioliStefano CecconelloMauro ContiStjepan PicekSimone MilaniEugen Saraci - - 31th USENIX Security Symposium
Malingering Scraper: A novel framework to reconstruct honest profiles from malingerer psychopathological tests. In corso di stampa Matteo CardaioliStefano CecconelloMerylin MonaroGiuseppe SartoriMauro Conti + - - Springer CCIS series proceedings
CENSOR - Cloud Enabled Secure IoT Architecture over SDN Paradigm In corso di stampa Mauro ContiPallavi KaliyarLAL, CHHAGAN CONCURRENCY AND COMPUTATION - -
Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey. In corso di stampa A. GhosalM. Conti IEEE COMMUNICATIONS SURVEYS AND TUTORIALS - -
Secure Static Content Delivery for CDN Using Blockchain Technology 2022 Conti M.Tricomi P. P. + - LECTURE NOTES IN ARTIFICIAL INTELLIGENCE Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
The Rise of ICS Malware: A Comparative Analysis 2022 Bernieri G.Conti M. + - LECTURE NOTES IN ARTIFICIAL INTELLIGENCE Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks 2022 Li M.Lal C.Conti M. + IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING - -
DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things 2022 Saha R.Kumar G.Conti M.Thomas R. + IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS - -
AutoSec: Secure Automotive Data Transmission Scheme for In-Vehicle Networks 2022 Ghosal A.Conti M. + - - ACM International Conference Proceeding Series
Research trends, challenges, and emerging topics in digital forensics: A review of reviews 2022 Ghosal A.Conti M. + IEEE ACCESS - -
Misinformation Detection on Social Media: Challenges and the Road Ahead 2022 Conti M. + IT PROFESSIONAL - -
Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents 2022 Orazi G.Ghosal A.Conti M. + COMPUTERS & SECURITY - -
Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution 2022 Mauro ContiMonica FedeliEleonora Losiouk + JOURNAL OF CYBERSECURITY EDUCATION, RESEARCH & PRACTICE - -
Effect of DIS Attack on 6TiSCH Network Formation 2022 Brighente A.Conti M. + IEEE COMMUNICATIONS LETTERS - -
Demystifying the Transferability of Adversarial Attacks in Computer Networks 2022 Nowroozi E.Conti M. + IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT - -
DETONAR: Detection of Routing Attacks in RPL-based IoT 2021 Agiollo A.Conti M.Kaliyar P.Pajola L. + IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT - -
Covert Channel-Based Transmitter Authentication in Controller Area Networks 2021 Conti M. + IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING - -
A Survey on Industrial Control System Testbeds and Datasets for Security Research 2021 Conti, MauroDonadel, DenisTurrin, Federico IEEE COMMUNICATIONS SURVEYS AND TUTORIALS - -
MiniV2G: An Electric Vehicle Charging Emulator 2021 Attanasio L.Conti M.Donadel D.Turrin F. - - CPSS 2021 - Proceedings of the 7th ACM Cyber-Physical System Security Workshop
USB powered devices: A survey of side-channel threats and countermeasures 2021 Spolaor, RiccardoTurrin, FedericoBonafede, RiccardoConti, Mauro + HIGH-CONFIDENCE COMPUTING - -
Mostrati risultati da 1 a 20 di 368
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile