Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 200 di 547
Titolo Data di pubblicazione Autori Rivista Serie Titolo libro
Cost-effective Authenticated Solution (CAS) for 6G-Enabled Artificial Intelligence of Medical Things (AIoMT) In corso di stampa Mahmood, KhalidKumar, GulshanConti, Mauro + IEEE INTERNET OF THINGS JOURNAL - -
RANGO: A Novel Deep Learning Approach to Detect Drones Disguising from Video Surveillance Systems 2024 Brighente, AlessandroConti, Mauro + ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY - -
LightKey: Lightweight and Secure Key Agreement Protocol for Effective Communication in Internet of Vehicles 2024 Conti, Mauro + - - PProceedings of the 25th International Conference on Distributed Computing and Networking (ICDCN '24)
De-authentication using Ambient Light Sensor 2024 Conti, Mauro + IEEE ACCESS - -
Security and Privacy of Smart Waste Management Systems: A Cyber-Physical System Perspective 2024 Brighente A.Conti M.Peruzzi G.Pozzebon A. + IEEE INTERNET OF THINGS JOURNAL - -
Anonymous Federated Learning via Named-Data Networking 2024 Conti M. + FUTURE GENERATION COMPUTER SYSTEMS - -
EDIT: A data inspection tool for smart contracts temporal behavior modeling and prediction 2024 Brighente, AlessandroConti, Mauro + FUTURE GENERATION COMPUTER SYSTEMS - -
SPARQ: SYN Protection using Acyclic Redundancy check and Quartile range on P4 switches 2024 Conti, Mauro + COMPUTER COMMUNICATIONS - -
GREPHRO: Nature-inspired optimization duo for Internet-of-Things 2024 Kumar, GulshanSaha, RahulConti, MauroDevgun, Tannishtha + INTERNET OF THINGS - -
SPRITZ-PS: validation of synthetic face images using a large dataset of printed documents 2024 Nowroozi, EhsanConti, Mauro + MULTIMEDIA TOOLS AND APPLICATIONS - -
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices 2024 Lazzeretti, RiccardoConti, Mauro + IEEE SECURITY & PRIVACY - -
Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution 2023 Mauro ContiMonica FedeliEleonora Losiouk + JOURNAL OF CYBERSECURITY EDUCATION, RESEARCH & PRACTICE - -
Balancing Privacy and Accuracy in Federated Learning for Speech Emotion Recognition 2023 Nowroozi, EhsanConti, Mauro + - ANNALS OF COMPUTER SCIENCE AND INFORMATION SYSTEMS Proceedings of the 18th Conference on Computer Science and Intelligence Systems
AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation 2023 Marchiori, FrancescoConti, Mauro + - - Proceedings of 2023 IEEE International Conference on Big Data (BigData)
Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel 2023 Conti, Mauro + - - IEEE INFOCOM 2023 - IEEE Conference on Computer Communication
Going in Style: Audio Backdoors Through Stylistic Transformations 2023 Conti, Mauro + - - ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
On the Feasibility of Profiling Electric Vehicles through Charging Data 2023 Conti, Mauro + - - Inaugural International Symposium on Vehicle Security & Privacy
Time-Restricted, Verifiable, and Efficient Query Processing over Encrypted Data on Cloud 2023 Conti, Mauro + IEEE TRANSACTIONS ON SERVICES COMPUTING - -
SoK: Secure Aggregation Based on Cryptographic Schemes for Federated Learning 2023 Conti, Mauro + PROCEEDINGS ON PRIVACY ENHANCING TECHNOLOGIES - Proceedings of 23rd Privacy Enhancing Technologies Symposium
Resisting Deep Learning Models Against Adversarial Attack Transferability Via Feature Randomization 2023 Nowroozi, EhsanConti, Mauro + IEEE TRANSACTIONS ON SERVICES COMPUTING - -
STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports 2023 Marchiori F.Conti M. + - - Proceedings of the 18th International Conference on Availability, Reliability and Security (ARES '23)
HoneyEVSE: An Honeypot to emulate Electric Vehicle Supply Equipments 2023 Tommaso BianchiMauro Conti + - - Computer Security. ESORICS 2023 International Workshops
TANGO: A temporal spatial dynamic graph model for event prediction 2023 Ding D.Conti M. + NEUROCOMPUTING - -
Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions 2023 Brighente A.Conti M. + - LECTURE NOTES IN COMPUTER SCIENCE Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things 2023 Kumar, GulshanSaha, RahulConti, Mauro + CLUSTER COMPUTING - -
Beware of Pickpockets: A Practical Attack against Blocking Cards 2023 Alessandro BrighenteMauro ContiEleonora Losiouk + - - Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2023)
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning 2023 Yuan, YingConti, Mauro + DIGITAL THREATS - -
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics 2023 Losiouk, EleonoraConti, Mauro + JOURNAL OF CYBERSECURITY AND PRIVACY - -
BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication 2023 Cardaioli, MConti, MOrazi, GTricomi, PP + PERVASIVE AND MOBILE COMPUTING - -
Cryptocurrency Wallets: Assessment and Security 2023 Nowroozi E.Conti M. + - - Blockchain for Cybersecurity in Cyber-Physical Systems
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach 2023 Khan, TayyabConti, Mauro + COMPUTER COMMUNICATIONS - -
Enabling Low Sidelobe Secret Multicast Transmission for mmWave Communication: An Integrated Oblique Projection Approach 2023 Alessandro BrighenteMauro Conti + IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS - -
Light-YOLOv5: A Lightweight Drone Detector for Resource Constrained Cameras 2023 Brighente, AlessandroConti, Mauro + IEEE INTERNET OF THINGS JOURNAL - -
Are We All in a Truman Show? Spotting Instagram Crowdturfing through Self-Training 2023 Tricomi, Pier PaoloConti, Mauro + - - 32nd International Conference on Computer Communications and Networks (ICCCN)
A review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification 2023 Conti M. + IET CYBER-PHYSICAL SYSTEMS - -
Comparing the Impact of Social Media Regulations on News Consumption 2023 Galeazzi, AlessandroConti, Mauro + IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS - -
A comprehensive security and performance assessment of UAV authentication schemes 2023 Conti, MauroLazzeretti, Riccardo + SECURITY AND PRIVACY - -
If You’re Scanning This, It’s Too Late! A QR Code-Based Fuzzing Methodology to Identify Input Vulnerabilities in Mobile Apps 2023 Conti M.Donadel D. + - - Applied Cryptography and Network Security Workshops
Social Honeypot for Humans: Luring People Through Self-managed Instagram Pages 2023 Conti M.Tricomi P. P. + - - International Conference on Applied Cryptography and Network Security
Turning captchas against humanity: Captcha-based attacks in online social media 2023 Conti M.Tricomi P. P. + ONLINE SOCIAL NETWORKS AND MEDIA - -
Leveraging Social Networks for Mergers and Acquisitions Forecasting 2023 Visintin, AlessandroConti, Mauro - LECTURE NOTES IN COMPUTER SCIENCE Web Information Systems Engineering – WISE 2023
A Location-Aware and Healing Attestation Scheme for Air-Supported Internet of Vehicles 2023 Conti, Mauro + IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS - -
Honey-list based authentication protocol for industrial IoT swarms 2023 Kaliyar, PallaviConti, Mauro + COMPUTER COMMUNICATIONS - -
When the Few Outweigh the Many: Illicit Content Recognition with Few-Shot Learning 2023 Conti, M. + - - Proceedings of the 20th International Conference on Security and Cryptography SECRYPT
A Novel Review Helpfulness Measure Based on the User-Review-Item Paradigm 2023 Conti, Mauro + ACM TRANSACTIONS ON THE WEB - -
You Can't Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality 2023 Tricomi, PPNenna, FPajola, LConti, M + IEEE ACCESS - -
Anonymous, Secure, Traceable, and Efficient Decentralized Digital Forensics 2023 Conti, Mauro + IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING - -
BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks 2023 Brighente, AlessandroConti, Mauro + - - Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '23)
Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability 2023 Conti M.Marchiori F. + - - Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID '23)
Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms 2023 Tricomi P. P.Conti M. + - - Proceedings of the 15th ACM Web Science Conference 2023
Twitter Bots Influence on the Russo-Ukrainian War During the 2022 Italian General Elections 2023 De Faveri F. L.Tricomi P. P.Conti M. + - - SocialSec 2023: Security and Privacy in Social Networks and Big Data
Attribute Inference Attacks in Online Multiplayer Video Games: A Case Study on DOTA2 2023 Tricomi P. P.Conti M. + - - Proceedings of the 13th ACM Conference on Data and Application Security and Privacy
Intrusion Detection Framework for Invasive FPV Drones Using Video Streaming Characteristics 2023 Rigoni G.Levorato M.Conti M. + ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS - -
BENIGREEN: Blockchain-based Energy-Efficient Privacy-Preserving Scheme for Green IoTs 2023 Conti M.Devgun T.Saha R. + IEEE INTERNET OF THINGS JOURNAL - -
Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication 2023 Marchiori, FrancescoConti, Mauro - - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS '23)
Turning Privacy-preserving Mechanisms against Federated Learning 2023 Conti, Mauro + - - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS '23)
Secure Source Identification Scheme for Revocable Instruction Sharing in Vehicle Platoon 2023 Brighente, AlessandroConti, Mauro + IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS - -
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders 2023 Giaretta, AlbertoConti, Mauro + - - ICC 2023 - IEEE International Conference on Communications
COUNT: Blockchain framework for resource accountability in e-healthcare 2023 Saha R.Conti M.Devgun T. + COMPUTER COMMUNICATIONS - -
An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems 2023 Lal C.Conti M. + COMPUTER COMMUNICATIONS - -
QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer 2023 Tommaso BianchiAlessandro BrighenteMauro Conti + - - Vehicular Technology Conference
ADASS: Anti-Drone Audio Surveillance Sentinel via Embedded Machine Learning 2023 Brighente A.Conti M.Peruzzi G.Pozzebon A. - - 2023 IEEE Sensors Applications Symposium, SAS 2023 - Proceedings
GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks 2023 Conti, MLosiouk, E + - - Proceedings of the 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P)
The Impact of Covid-19 on Online Discussions: the Case Study of the Sanctioned Suicide Forum 2023 Sartori E.Conti M. + - - Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023
PAID: Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems 2023 Conti, Mauro + - - Proceedings of the 9th ACM Cyber-Physical System Security Workshop (CPSS '23)
Privacy-Preserving and Security in SDN-Based IoT: A Survey 2023 Lal C.Conti M. + IEEE ACCESS - -
Evaluation of Channel Hopping Strategies Against Smart Jamming Attacks 2023 Brighente, AlessandroConti, Mauro + - - ICC 2023 - IEEE International Conference on Communications
A First Look at Shill Looping in NFT Ecosystem 2023 Brighente, AlessandroConti, Mauro + - - 2023 IEEE International Workshop on Information Forensics and Security (WIFS),
Boosting Big Brother: Attacking Search Engines with Encodings 2023 Conti, Mauro + - - Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID '23)
Authenticated Message-Exchange Protocol for Fog-Assisted Vehicular Cloud Computing 2023 Conti M. + WIRELESS PERSONAL COMMUNICATIONS - -
HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN 2023 Conti M. + INTERNATIONAL JOURNAL OF INFORMATION SECURITY - -
An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF 2023 Mahmood K.Conti M. + INTERNET OF THINGS - -
PIGNUS: A Deep Learning model for IDS in industrial internet-of-things 2023 Saha R.Conti M. + COMPUTERS & SECURITY - -
A Sanitizable Access Control With Policy-Protection for Vehicular Social Networks 2023 Conti M. + IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS - -
OpenScope-sec: An ADS-B Simulator to Support the Security Research 2023 Conti M. + - - Proceedings of the 18th International Conference on Availability, Reliability and Security (ARES '23)
Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey 2023 Conti, MauroLosiouk, Eleonora + IEEE COMMUNICATIONS SURVEYS AND TUTORIALS - -
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem 2023 Casagrande, MarcoLosiouk, EleonoraConti, Mauro + - - Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '23)
Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities 2023 Kumar, GulshanSaha, RahulConti, Mauro + CLUSTER COMPUTING - -
Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks 2023 Nowroozi E.Conti M. + IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT - -
SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning 2022 Mauro ContiYing Yuan + - - SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning
An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions 2022 Brighente, AlessandroConti, Mauro + COMPUTERS & SECURITY - -
SWAP: Secure Warning Messages Authentication and Propagation in Internet of Vehicles 2022 Alessandro BrighenteMauro Conti + - - 2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)
Threat Sensitive Networking: on the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions 2022 Alessandro BrighenteMauro Conti + - - ESORICS 2022 International Workshops. ESORICS 2022. Lecture Notes in Computer Science
EVScout2.0: Electric Vehicle Profiling Through Charging Profile 2022 Brighente, AlessandroConti, MauroDonadel, DenisTurrin, Federico ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS - -
Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents 2022 Orazi G.Ghosal A.Conti M. + COMPUTERS & SECURITY - -
DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things 2022 Saha R.Kumar G.Conti M.Thomas R. + IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS - -
FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks 2022 Alessandro BrighenteMauro Conti + - - ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security
Deep Neural Networks for Direction of Arrival Estimation of Multiple Targets with Sparse Prior for Line-of-Sight Scenarios 2022 Alessandro BrighenteMauro Conti + IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY - -
AutoSec: Secure Automotive Data Transmission Scheme for In-Vehicle Networks 2022 Ghosal A.Conti M. + - - ACM International Conference Proceeding Series
The Spread of Propaganda by Coordinated Communities on Social Media 2022 Da San Martino, GiovanniConti, Mauro + - - 14th ACM Web Science Conference 2022
Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks 2022 Li M.Lal C.Conti M. + IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING - -
Face Recognition Systems: Are you sure they only consider your face? 2022 Conti M.Losiouk E. + - - Proceedings - 43rd IEEE Symposium on Security and Privacy Workshops, SPW 2022
SENECAN: Secure KEy DistributioN OvEr CAN Through Watermarking and Jamming 2022 Soderi S.Turrin F.Conti M. + IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING - -
Formal model for inter-component communication and its security in android 2022 Conti M. + COMPUTING - -
Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion 2022 Conti M. + IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY - -
Virtual Influencers in Online Social Media 2022 Conti, MTricomi, PP + IEEE COMMUNICATIONS MAGAZINE - -
An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework 2022 Nowroozi E.Conti M. + IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT - -
Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain 2022 Brighente A.Conti M. + IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT - -
VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks 2022 Alessandro BrighenteMauro Conti + - - 2022 19th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)
Should I Mine or Should I Break: On the Worthiness of Brute-Forcing Cryptocurrency Addresses 2022 Alessandro BrighenteMauro ContiEmilio Olivastri + - - 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)
COVID-19 infodemic on Facebook and containment measures in Italy, United Kingdom and New Zealand 2022 Etta, GabrieleGaleazzi, AlessandroConti, Mauro + PLOS ONE - -
The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems 2022 Apruzzese G.Pajola L.Conti M. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT - -
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem 2022 Eleonora LosioukMauro Conti + IACR TRANSACTIONS ON CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - -
A Survey on Security Challenges and Solutions in IOTA 2022 Mauro ContiGulshan KumarRahul Saha + JOURNAL OF NETWORK AND COMPUTER APPLICATIONS - -
PRaNA: PRNU-based Technique to Tell Real and Deepfake Videos Apart 2022 Conti M.Pajola L. + - - 2022 International Joint Conference on Neural Networks (IJCNN)
What You See is Not What You Get: a Man-in-the-Middle Attack Applied to Video Channels 2022 Conti M.Losiouk E.Visintin A. - - Proceedings of the ACM Symposium on Applied Computing
ICSpot: A High-Interaction Honeypot for Industrial Control Systems 2022 Conti, MauroTrolese, FrancescoTurrin, Federico - - Paper
Sim2Testbed Transfer: NDN Performance Evaluation 2022 Conti M.Losiouk E. + - - ACM International Conference Proceeding Series
Label-Only Membership Inference Attack against Node-Level Graph Neural Networks 2022 Conti M.Li J. + - - Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security
A PLS-HECC-based device authentication and key agreement scheme for smart home networks 2022 Conti M. + COMPUTER NETWORKS - -
SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones 2022 Alessandro BrighenteMauro Conti + COMPUTER NETWORKS - -
Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location Tracing 2022 Alessandro BrighenteMauro Conti + - - ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security
Misinformation Detection on Social Media: Challenges and the Road Ahead 2022 Conti M. + IT PROFESSIONAL - -
Graph Encryption for Shortest Path Queries with k Unsorted Nodes 2022 Conti, Mauro + - IEEE ... INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
Secure Static Content Delivery for CDN Using Blockchain Technology 2022 Conti M.Tricomi P. P. + - LECTURE NOTES IN ARTIFICIAL INTELLIGENCE Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Contactless Authentication for Wearable Devices Using RFID 2022 Conti M. + - - Proceedings - 2022 IEEE International Conference on Digital Health, ICDH 2022
Analyzing Price Deviations in DeFi Oracles 2022 Conti M. + - - Cryptology and Network Security: 21st International Conference, CANS 2022
Dynamic Backdoors with Global Average Pooling 2022 Conti M. + - - Proceeding - IEEE International Conference on Artificial Intelligence Circuits and Systems, AICAS 2022
EVExchange: A Relay Attack on Electric Vehicle Charging System 2022 Conti, MauroDonadel, DenisTurrin, Federico + - LECTURE NOTES IN ARTIFICIAL INTELLIGENCE Computer Security – ESORICS 2022
Privacy-Friendly De-authentication with BLUFADE: Blurred Face Detection 2022 Cardaioli, MConti, MTricomi, PP + - - 2022 IEEE International Conference on Pervasive Computing and Communications (PerCom)
Face the Truth: Interpretable Emotion Genuineness Detection 2022 Cardaioli, MatteoMiolla, AlessioConti, MauroSartori, GiuseppeMonaro, MerylinScarpazza, CristinaNavarin, Nicolo - - 2022 International Joint Conference on Neural Networks (IJCNN)
We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads 2022 Cardaioli M.Conti M. + - - Computer Security – ESORICS 2022: 27th European Symposium on Research in Computer Security
MeLSeC: A Method for Lightweight and Secure Communication in Internet of Vehicles 2022 Brighente A.Conti M. + - - 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)
Stopping Floods with Buckets: Attack and Countermeasure for IOTA Autopeering 2022 Brighente A.Conti M.Saha R. + - - 2022 IEEE International Symposium on Measurements & Networking (M&N)
Adaptive Intrusion Detection in Edge Computing using Cerebellar Model Articulation Controller and Spline Fit 2022 Kumar, GulshanSaha, RahulConti, MauroDevgun, Tannishtha + IEEE TRANSACTIONS ON SERVICES COMPUTING - -
Dynamic Super Round Based Distributed Task Scheduling for UAV Networks 2022 Halder, SubirGhosal, AmritaConti, Mauro IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS - -
The Rise of ICS Malware: A Comparative Analysis 2022 Bernieri G.Conti M. + - LECTURE NOTES IN ARTIFICIAL INTELLIGENCE Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
DeBot: A deep learning-based model for bot detection in industrial internet-of-things 2022 Kumar, GSaha, RConti, MThomas, R + COMPUTERS & ELECTRICAL ENGINEERING - -
Obfuscation detection in Android applications using deep learning 2022 Conti M. + JOURNAL OF INFORMATION SECURITY AND APPLICATIONS - -
Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems 2022 Lal, ChhaganConti, Mauro + IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING - -
Nereus: Anonymous and Secure Ride-Hailing Service based on Private Smart Contracts 2022 Li M.Lal C.Conti M.Martinelli F. + IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING - -
For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection 2022 Cardaioli M.Conti M. + - - ESORICS 2022: 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, Part III
A machine learning-based approach to detect threats in bio-cyber DNA storage systems 2022 Giaretta A.Conti M. + COMPUTER COMMUNICATIONS - -
A survey and taxonomy of consensus protocols for blockchains 2022 Saha R.Conti M. + JOURNAL OF SYSTEMS ARCHITECTURE - -
A few-shot malware classification approach for unknown family recognition using malware feature visualization 2022 Conti M. + COMPUTERS & SECURITY - -
Software defined network-based HTTP flooding attack defender 2022 Conti M. + COMPUTERS & ELECTRICAL ENGINEERING - -
Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud 2022 Conti M. + - - Information and Communications Security: 24th International Conference, ICICS 2022, Canterbury, UK, September 5–8, 2022, Proceedings
ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags 2022 Conti M. + COMPUTER NETWORKS - -
CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks 2022 Li Q.Conti M. + JOURNAL OF INFORMATION SECURITY AND APPLICATIONS - -
Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey 2022 Saha, RahulKumar, GulshanConti, Mauro + IEEE ACCESS - -
HolA: Holistic and Autonomous Attestation for IoT Networks 2022 Alessandro VisintinEleonora LosioukMauro Conti + - - Applied Cryptography and Network Security Workshops
Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand 2022 Matteo CardaioliStefano CecconelloMauro ContiStjepan PicekSimone MilaniEugen Saraci - - 31th USENIX Security Symposium
Poisoning Bearer Context Migration in O-RAN 5G Network 2022 Shojafar, MohammadBrighente, AlessandroConti, Mauro + IEEE WIRELESS COMMUNICATIONS LETTERS - -
Secure over-the-air software update for connected vehicles 2022 Ghosal A.Halder S.Conti M. COMPUTER NETWORKS - -
Demystifying the Transferability of Adversarial Attacks in Computer Networks 2022 Nowroozi E.Conti M. + IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT - -
Research trends, challenges, and emerging topics in digital forensics: A review of reviews 2022 Ghosal A.Conti M. + IEEE ACCESS - -
Effect of DIS Attack on 6TiSCH Network Formation 2022 Brighente A.Conti M. + IEEE COMMUNICATIONS LETTERS - -
Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey 2021 Li Q.Conti M. + IEEE INTERNET OF THINGS JOURNAL - -
Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack 2021 Pajola, LConti, M - - 2021 IEEE European Symposium on Security and Privacy (EuroS&P)
SPO: A Secure and Performance-aware Optimization for MapReduce Scheduling 2021 Conti M. + JOURNAL OF NETWORK AND COMPUTER APPLICATIONS - -
Cyber Forensics for CPS 2021 Conti, MauroTurrin, Federico - - Encyclopedia of Cryptography, Security and Privacy
Neuropsicologia e Machine Learning: Un algoritmo per Identificare la Dislessia Evolutiva. 2021 Giovanna PuccioPier Paolo TricomiMauro ContiAndrea Facoetti + - - Web-Conference Nazionale AIRIPA
ICN PATTA: ICN privacy attack through traffic analysis 2021 Conti M.Lazzeretti R.Losiouk E. + - - Proceedings - Conference on Local Computer Networks, LCN
Vulnerabilities in Android webview objects: Still not the end! 2021 Losiouk E.Conti M. + COMPUTERS & SECURITY - -
It's a Matter of Style: Detecting Social Bots through Writing Style Consistency 2021 Cardaioli M.Conti M. + - PROCEEDINGS - INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS Proceedings - International Conference on Computer Communications and Networks, ICCCN
BCHealth: A Novel Blockchain-based Privacy-Preserving Architecture for IoT Healthcare Applications 2021 Dargahi T.Conti M. + COMPUTER COMMUNICATIONS - -
Contact Tracing Made Un-relay-able 2021 Casagrande M.Conti M.Losiouk E. - - CODASPY 2021 - Proceedings of the 11th ACM Conference on Data and Application Security and Privacy
CrypSH: A Novel IoT Data Protection Scheme Based on BGN Cryptosystem 2021 Halder S.Conti M. IEEE TRANSACTIONS ON CLOUD COMPUTING - -
Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis 2021 Conti M.Tippenhauer N. O.Turrin F. + - PROCEEDINGS - INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS Proceedings - International Conference on Computer Communications and Networks, ICCCN
MiniV2G: An Electric Vehicle Charging Emulator 2021 Attanasio L.Conti M.Donadel D.Turrin F. - - CPSS 2021 - Proceedings of the 7th ACM Cyber-Physical System Security Workshop
Malingering Scraper: A novel framework to reconstruct honest profiles from malingerer psychopathological tests. 2021 Matteo CardaioliStefano CecconelloMerylin MonaroGiuseppe SartoriMauro Conti + - - Communications in Computer and Information Science
A threat model method for ICS malware: The TRISIS case 2021 Bernieri G.Conti M. + - - Proceedings of the 18th ACM International Conference on Computing Frontiers 2021, CF 2021
Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services 2021 Lal, ChhaganConti, Mauro + - LECTURE NOTES IN ARTIFICIAL INTELLIGENCE Security and Trust Management
FADIA: Fairness-driven collaborative remote attestation 2021 Rabbani M. M.Conti M. + - - WiSec 2021 - Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications 2021 Kumar G.Saha R.Lal C.Conti M. FUTURE GENERATION COMPUTER SYSTEMS - -
COTS Drone Detection using Video Streaming Characteristics 2021 Tippenhauer N. O.Conti M. + - - ACM International Conference Proceeding Series
An SDN-based framework for QoS routing in internet of underwater things 2021 Mohammadi R.Conti M. + TELECOMMUNICATION SYSTEMS - -
Improving password guessing via representation learning 2021 Conti M. + - - Proceedings - IEEE Symposium on Security and Privacy
SnakeGX: A Sneaky Attack Against SGX Enclaves 2021 Conti M. + - LECTURE NOTES IN ARTIFICIAL INTELLIGENCE Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey 2021 Kaliyar, PallaviConti, Mauro + ACM COMPUTING SURVEYS - -
A Survey on Industrial Control System Testbeds and Datasets for Security Research 2021 Conti, MauroDonadel, DenisTurrin, Federico IEEE COMMUNICATIONS SURVEYS AND TUTORIALS - -
Looking through walls: Inferring scenes from video-surveillance encrypted traffic 2021 Mari D.Piazzetta S. G.Pajola L.Verde S.Milani S.Conti M. + - PROCEEDINGS OF THE ... IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings
Privacy for 5G-Supported Vehicular Networks 2021 Conti, Mauro + IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY - -
Towards An Enhanced Reputation System for IOTA’s Coordicide 2021 Rahul SahaGulshan KumarAlessandro BrighenteMauro Conti - - 2021 Third International Conference on Blockchain Computing and Applications (BCCA)
Defeating Lattice-Based Data Hiding Code Via Decoding Security Hole 2021 Conti M. + IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY - -
TEL: Low-Latency Failover Traffic Engineering in Data Plane 2021 Conti M. + IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT - -
Knocking on Tangle's Doors: Security Analysis of IOTA Ports 2021 Brighente A.Conti M.Saha R. + - - Proceedings - 2021 IEEE International Conference on Blockchain, Blockchain 2021
A holistic approach to power efficiency in a clock offset based Intrusion Detection Systems for Controller Area Networks 2021 Halder S.Conti M.Das S. K. PERVASIVE AND MOBILE COMPUTING - -
5G Security Challenges and Solutions: A Review by OSI Layers 2021 Brighente A.Conti M. + IEEE ACCESS - -
Practical exchange for unique digital goods 2021 Conti M. + - - Proceedings - 3rd IEEE International Conference on Decentralized Applications and Infrastructures, DAPPS 2021
On the feasibility of crawling-based attacks against recommender systems 2021 Aiolli, FabioConti, MauroPicek, StjepanPolato, Mirko JOURNAL OF COMPUTER SECURITY - -
LEChain: A blockchain-based lawful evidence management scheme for digital forensics 2021 Li M.Conti M. + FUTURE GENERATION COMPUTER SYSTEMS - -
Tell me how you charge I will tell you where you drove to: Electric Vehicles Profiling Based on Charging-Current Demand 2021 Alessandro BrighenteMauro Conti + - - ESORICS 2021. ESORICS 2021. Lecture Notes in Computer Science
Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions 2021 Halder S.Conti M. + COMPUTER SCIENCE REVIEW - -
Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps 2021 Losiouk E.Conti M. + INTERNATIONAL JOURNAL OF INFORMATION SECURITY - -
ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN 2021 Losiouk E.Compagno A.Conti M. + INTERNATIONAL JOURNAL OF INFORMATION SECURITY - -
AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller 2021 Lal C.Conti M. + IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT - -
Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization 2021 Losiouk E.Conti M. + - - ACM International Conference Proceeding Series
USB powered devices: A survey of side-channel threats and countermeasures 2021 Spolaor, RiccardoTurrin, FedericoBonafede, RiccardoConti, Mauro + HIGH-CONFIDENCE COMPUTING - -
Eunomia: Anonymous and Secure Vehicular Digital Forensics based on Blockchain 2021 Lal C.Conti M. + IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING - -
DETONAR: Detection of Routing Attacks in RPL-based IoT 2021 Agiollo A.Conti M.Kaliyar P.Pajola L. + IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT - -
Covert Channel-Based Transmitter Authentication in Controller Area Networks 2021 Conti M. + IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING - -
Online Advertising Security: Issues, Taxonomy, and Future Directions 2021 Conti M. + IEEE COMMUNICATIONS SURVEYS AND TUTORIALS - -
A Statistical Analysis Framework for ICS Process Datasets 2020 Turrin F.Conti M. + - - CPSIOTSEC 2020 - Proceedings of the 2020 Joint Workshop on CPS and IoT Security and Privacy
BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices 2020 Conti M. + IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY - -
Collective Remote Attestation at the Internet of Things Scale: State-of-the-art and Future Challenges 2020 Ambrosin, M.Conti, M.Lazzeretti, R.Rabbani, M. + IEEE COMMUNICATIONS SURVEYS AND TUTORIALS - -
Secure over-the-air software updates in connected vehicles: A survey 2020 Halder S.Ghosal A.Conti M. COMPUTER NETWORKS - -
Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach 2020 Mauro Conti + CLUSTER COMPUTING - -
UAVs Path Deviation Attacks: Survey and Research Challenges 2020 Conti M. + - - Proceedings of the 17th IEEE International Conference on Sensing, Communication and Networking, SECON Workshops 2020
PvP: Profiling Versus Player! Exploiting Gaming Data for Player Recognition 2020 Conti M.Tricomi P. P. - LECTURE NOTES IN ARTIFICIAL INTELLIGENCE Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Mostrati risultati da 1 a 200 di 547
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile