Sfoglia per Autore
Cost-effective Authenticated Solution (CAS) for 6G-Enabled Artificial Intelligence of Medical Things (AIoMT)
In corso di stampa Mahmood, Khalid; Obaidat, Mohammad S.; Shamshad, Salman; Alenazi, Mohammed J. F.; Kumar, Gulshan; Anisi, Mohammad Hossein; Conti, Mauro
RANGO: A Novel Deep Learning Approach to Detect Drones Disguising from Video Surveillance Systems
2024 Han, Jin; Ren, Yun-feng; Brighente, Alessandro; Conti, Mauro
LightKey: Lightweight and Secure Key Agreement Protocol for Effective Communication in Internet of Vehicles
2024 Vasudev, Harsha; Shariq, Mohd; Dwivedi, Sanjeev Kumar; Conti, Mauro
De-authentication using Ambient Light Sensor
2024 Gangwal, Ankit; Paliwal, Aashish; Conti, Mauro
Security and Privacy of Smart Waste Management Systems: A Cyber-Physical System Perspective
2024 Brighente, A.; Conti, M.; Renzone, G. D.; Peruzzi, G.; Pozzebon, A.
Anonymous Federated Learning via Named-Data Networking
2024 Agiollo, A.; Bardhi, E.; Conti, M.; Dal Fabbro, N.; Lazzeretti, R.
EDIT: A data inspection tool for smart contracts temporal behavior modeling and prediction
2024 De Salve, Andrea; Brighente, Alessandro; Conti, Mauro
SPARQ: SYN Protection using Acyclic Redundancy check and Quartile range on P4 switches
2024 Shirsath, Vaishali A.; Chandane, Madhav M.; Lal, Chhagan; Conti, Mauro
GREPHRO: Nature-inspired optimization duo for Internet-of-Things
2024 Kumar, Gulshan; Saha, Rahul; Conti, Mauro; Devgun, Tannishtha; Thomas, Reji
SPRITZ-PS: validation of synthetic face images using a large dataset of printed documents
2024 Nowroozi, Ehsan; Habibi, Yoosef; Conti, Mauro
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices
2024 Cayir, Derin; Acar, Abbas; Lazzeretti, Riccardo; Angelini, Marco; Conti, Mauro; Uluagac, Selcuk
Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution
2023 Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora
Balancing Privacy and Accuracy in Federated Learning for Speech Emotion Recognition
2023 Mohammadi, Samaneh; Mohammadi, Mohammadreza; Sinaei, Sima; Balador, Ali; Nowroozi, Ehsan; Flammini, Francesco; Conti, Mauro
AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation
2023 Perrina, Filippo; Marchiori, Francesco; Conti, Mauro; Verde, Nino Vincenzo
Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel
2023 Spolaor, Riccardo; Liu, Hao; Turrin, Federico; Conti, Mauro; Cheng, Xiuzhen
Going in Style: Audio Backdoors Through Stylistic Transformations
2023 Koffas, Stefanos; Pajola, Luca; Picek, Stjepan; Conti, Mauro
On the Feasibility of Profiling Electric Vehicles through Charging Data
2023 Gangwal, Ankit; Jain, Aakash; Conti, Mauro
Time-Restricted, Verifiable, and Efficient Query Processing over Encrypted Data on Cloud
2023 Li, Meng; Gao, Jianbo; Zhu, Liehuang; Zhang, Zijian; Lal, Chhagan; Conti, Mauro
SoK: Secure Aggregation Based on Cryptographic Schemes for Federated Learning
2023 Mansouri, Mohamad; Önen, Melek; Ben Jaballah, Wafa; Conti, Mauro
Resisting Deep Learning Models Against Adversarial Attack Transferability Via Feature Randomization
2023 Nowroozi, Ehsan; Mohammadi, Mohammadreza; Golmohammadi, Pargol; Mekdad, Yassine; Conti, Mauro; Uluagac, A. Selcuk
STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports
2023 Marchiori, F.; Conti, M.; Verde, N. V.
HoneyEVSE: An Honeypot to emulate Electric Vehicle Supply Equipments
2023 Baldo, Massimiliano; Bianchi, Tommaso; Conti, Mauro; Trevisan, Alessio; Turrin, Federico
TANGO: A temporal spatial dynamic graph model for event prediction
2023 Wang, Z.; Ding, Ding; Ren, M.; Conti, M.
Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions
2023 de Vos, A.; Brighente, A.; Conti, M.
RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things
2023 Goyat, Rekha; Kumar, Gulshan; Saha, Rahul; Conti, Mauro; Thomas, Reji; Kim, Tai-hoon
Beware of Pickpockets: A Practical Attack against Blocking Cards
2023 Alecci, Marco; Attanasio, Luca; Brighente, Alessandro; Conti, Mauro; Losiouk, Eleonora; Ochiai, Hideki; Turrin, Federico
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning
2023 Yuan, Ying; Apruzzese, Giovanni; Conti, Mauro
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics
2023 Bellizzi, Jennifer; Losiouk, Eleonora; Conti, Mauro; Colombo, Christian; Vella, Mark
BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication
2023 Cardaioli, M; Conti, M; Orazi, G; Tricomi, Pp; Tsudik, G
Cryptocurrency Wallets: Assessment and Security
2023 Nowroozi, E.; Seyedshoari, S.; Mekdad, Y.; Savas, E.; Conti, M.
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach
2023 Khan, Tayyab; Singh, Karan; Shariq, Mohd; Ahmad, Khaleel; Savita, K. S.; Ahmadian, Ali; Salahshour, Soheil; Conti, Mauro
Enabling Low Sidelobe Secret Multicast Transmission for mmWave Communication: An Integrated Oblique Projection Approach
2023 He, Miao; Ni, Jianbing; Li, Meng; Brighente, Alessandro; Conti, Mauro
Light-YOLOv5: A Lightweight Drone Detector for Resource Constrained Cameras
2023 Han, Jin; Cao, Ran; Brighente, Alessandro; Conti, Mauro
Are We All in a Truman Show? Spotting Instagram Crowdturfing through Self-Training
2023 Tricomi, Pier Paolo; Tarahomi, Sousan; Cattai, Christian; Martini, Francesco; Conti, Mauro
A review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification
2023 Alrowaili, Y.; Saxena, N.; Srivastava, A.; Conti, M.; Burnap, P.
Comparing the Impact of Social Media Regulations on News Consumption
2023 Etta, Gabriele; Cinelli, Matteo; Galeazzi, Alessandro; Valensise, Carlo Michele; Quattrociocchi, Walter; Conti, Mauro
A comprehensive security and performance assessment of UAV authentication schemes
2023 Mekdad, Yassine; Aris, Ahmet; Acar, Abbas; Conti, Mauro; Lazzeretti, Riccardo; Fergougui, Abdeslam El; Uluagac, Selcuk
If You’re Scanning This, It’s Too Late! A QR Code-Based Fuzzing Methodology to Identify Input Vulnerabilities in Mobile Apps
2023 Carboni, F.; Conti, M.; Donadel, D.; Sciacco, M.
Social Honeypot for Humans: Luring People Through Self-managed Instagram Pages
2023 Bardi, S.; Conti, M.; Pajola, L.; Tricomi, P. P.
Turning captchas against humanity: Captcha-based attacks in online social media
2023 Conti, M.; Pajola, L.; Tricomi, P. P.
Leveraging Social Networks for Mergers and Acquisitions Forecasting
2023 Visintin, Alessandro; Conti, Mauro
A Location-Aware and Healing Attestation Scheme for Air-Supported Internet of Vehicles
2023 El-Zawawy, Mohamed A.; Lal, Chhagan; Conti, Mauro
Honey-list based authentication protocol for industrial IoT swarms
2023 El-Zawawy, Mohamed A.; Kaliyar, Pallavi; Conti, Mauro; Katsikas, Sokratis
When the Few Outweigh the Many: Illicit Content Recognition with Few-Shot Learning
2023 Cascavilla, G.; Catolino, G.; Conti, M.; Mellios, D.; Tamburri, D.
A Novel Review Helpfulness Measure Based on the User-Review-Item Paradigm
2023 Pajola, Luca; Chen, Dongkai; Conti, Mauro; Subrahmanian, V. S.
You Can't Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality
2023 Tricomi, Pp; Nenna, F; Pajola, L; Conti, M; Gamberi, L
Anonymous, Secure, Traceable, and Efficient Decentralized Digital Forensics
2023 Li, Meng; Shen, Yanzhe; Ye, Guixin; He, Jialing; Zheng, Xin; Zhang, Zijian; Zhu, Liehuang; Conti, Mauro
BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks
2023 Lotto, Alessandro; Singh, Vaibhav; Ramasubramanian, Bhaskar; Brighente, Alessandro; Conti, Mauro; Poovendran, Radha
Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability
2023 Alecci, M.; Conti, M.; Marchiori, F.; Martinelli, L.; Pajola, L.
Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms
2023 Tricomi, P. P.; Chilese, M.; Conti, M.; Sadeghi, A. -R.
Twitter Bots Influence on the Russo-Ukrainian War During the 2022 Italian General Elections
2023 De Faveri, F. L.; Cosuti, L.; Tricomi, P. P.; Conti, M.
Attribute Inference Attacks in Online Multiplayer Video Games: A Case Study on DOTA2
2023 Tricomi, P. P.; Facciolo, L.; Apruzzese, G.; Conti, M.
Intrusion Detection Framework for Invasive FPV Drones Using Video Streaming Characteristics
2023 Alsoliman, A.; Rigoni, G.; Callegaro, D.; Levorato, M.; Pinotti, C. M.; Conti, M.
BENIGREEN: Blockchain-based Energy-Efficient Privacy-Preserving Scheme for Green IoTs
2023 Goyat, R.; Kumar, G.; Conti, M.; Devgun, T.; Saha, R.; Thomas, R.
Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication
2023 Marchiori, Francesco; Conti, Mauro
Turning Privacy-preserving Mechanisms against Federated Learning
2023 Arazzi, Marco; Conti, Mauro; Nocera, Antonino; Picek, Stjepan
Secure Source Identification Scheme for Revocable Instruction Sharing in Vehicle Platoon
2023 Zhao, Yanan; Yu, Haiyang; Liang, Yuhao; Brighente, Alessandro; Conti, Mauro; Sun, Jianfei; Ren, Yilong
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders
2023 Zhu, Yuhui; Chen, Zhenxiang; Yan, Qiben; Wang, Shanshan; Giaretta, Alberto; Li, Enlong; Peng, Lizhi; Zhao, Chuan; Conti, Mauro
COUNT: Blockchain framework for resource accountability in e-healthcare
2023 Kumar, G.; Saha, R.; Conti, M.; Devgun, T.; Goyat, R.; Rodrigues, J. J. P. C.
An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems
2023 Kumar, A.; Singh, K.; Shariq, M.; Lal, C.; Conti, M.; Amin, R.; Chaudhry, S. A.
QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer
2023 Bianchi, Tommaso; Asokraj, Surudhi; Brighente, Alessandro; Conti, Mauro; Poovendran, Radha
ADASS: Anti-Drone Audio Surveillance Sentinel via Embedded Machine Learning
2023 Brighente, A.; Conti, M.; Peruzzi, G.; Pozzebon, A.
GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks
2023 Agiollo, A; Bardhi, E; Conti, M; Lazzeretti, R; Losiouk, E; Omicini, A
The Impact of Covid-19 on Online Discussions: the Case Study of the Sanctioned Suicide Forum
2023 Sartori, E.; Pajola, L.; Martino, G. D. S.; Conti, M.
PAID: Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems
2023 Teng, Ko Zheng; Limbasiya, Trupil; Turrin, Federico; Aung, Yan Lin; Chattopadhyay, Sudipta; Zhou, Jianying; Conti, Mauro
Privacy-Preserving and Security in SDN-Based IoT: A Survey
2023 Ahmadvand, H.; Lal, C.; Hemmati, H.; Sookhak, M.; Conti, M.
Evaluation of Channel Hopping Strategies Against Smart Jamming Attacks
2023 Bout, Emilie; Bout, Valentin; Brighente, Alessandro; Conti, Mauro; Loscri, Valeria
A First Look at Shill Looping in NFT Ecosystem
2023 Gangwal, Ankit; Thirupathi, Apoorva; Brighente, Alessandro; Conti, Mauro
Boosting Big Brother: Attacking Search Engines with Encodings
2023 Boucher, Nicholas; Pajola, Luca; Shumailov, Ilia; Anderson, Ross; Conti, Mauro
Authenticated Message-Exchange Protocol for Fog-Assisted Vehicular Cloud Computing
2023 Rana, S.; Mishra, D.; Lal, C.; Conti, M.
HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN
2023 Mohammadi, R.; Lal, C.; Conti, M.
An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF
2023 Zahoor, A.; Mahmood, K.; Shamshad, S.; Saleem, M. A.; Ayub, M. F.; Conti, M.; Das, A. K.
PIGNUS: A Deep Learning model for IDS in industrial internet-of-things
2023 Jayalaxmi, P. L. S.; Saha, R.; Kumar, G.; Alazab, M.; Conti, M.; Cheng, X.
A Sanitizable Access Control With Policy-Protection for Vehicular Social Networks
2023 Zhao, Y.; Yu, H.; Liang, Y.; Conti, M.; Bazzi, W.; Ren, Y.
OpenScope-sec: An ADS-B Simulator to Support the Security Research
2023 Cestaro, R.; Conti, M.; Mancini, E.; Turrin, F.
Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey
2023 Bardhi, Enkeleda; Conti, Mauro; Lazzeretti, Riccardo; Losiouk, Eleonora
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem
2023 Casagrande, Marco; Cestaro, Riccardo; Losiouk, Eleonora; Conti, Mauro; Antonioli, Daniele
Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities
2023 Goyat, Rekha; Kumar, Gulshan; Saha, Rahul; Conti, Mauro
Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
2023 Nowroozi, E.; Mohammadi, M.; Savas, E.; Mekdad, Y.; Conti, M.
SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning
2022 Apruzzese, Giovanni; Conti, Mauro; Yuan, Ying
An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions
2022 Bang, Ankur O.; Rao, Udai Pratap; Visconti, Andrea; Brighente, Alessandro; Conti, Mauro
SWAP: Secure Warning Messages Authentication and Propagation in Internet of Vehicles
2022 Brighente, Alessandro; Conti, Mauro; Vasudev, Harsha
Threat Sensitive Networking: on the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions
2022 De Vos, Adriaan; Brighente, Alessandro; Conti, Mauro
EVScout2.0: Electric Vehicle Profiling Through Charging Profile
2022 Brighente, Alessandro; Conti, Mauro; Donadel, Denis; Turrin, Federico
Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents
2022 Koutsokostas, V.; Lykousas, N.; Apostolopoulos, T.; Orazi, G.; Ghosal, A.; Casino, F.; Conti, M.; Patsakis, C.
DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things
2022 Saha, R.; Kumar, G.; Conti, M.; Devgun, T.; Kim, T. -H.; Alazab, M.; Thomas, R.
FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks
2022 Bout, Emilie; Brighente, Alessandro; Conti, Mauro; Loscrì, Valeria
Deep Neural Networks for Direction of Arrival Estimation of Multiple Targets with Sparse Prior for Line-of-Sight Scenarios
2022 Xu, Saiqin; Brighente, Alessandro; Chen, Baixiao; Conti, Mauro; Cheng, Xiancheng; Zhu, Dongchen
AutoSec: Secure Automotive Data Transmission Scheme for In-Vehicle Networks
2022 Limbasiya, T.; Ghosal, A.; Conti, M.
The Spread of Propaganda by Coordinated Communities on Social Media
2022 Hristakieva, Kristina; Cresci, Stefano; Da San Martino, Giovanni; Conti, Mauro; Nakov, Preslav
Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks
2022 Li, M.; Chen, Y.; Kumar, N.; Lal, C.; Conti, M.; Alazab, M.
Face Recognition Systems: Are you sure they only consider your face?
2022 Darbha, P. S.; Conti, M.; Losiouk, E.; Maiti, R. R.
SENECAN: Secure KEy DistributioN OvEr CAN Through Watermarking and Jamming
2022 Soderi, S.; Colelli, R.; Turrin, F.; Pascucci, F.; Conti, M.
Formal model for inter-component communication and its security in android
2022 El-Zawawy, M. A.; Faruki, P.; Conti, M.
Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion
2022 Li, M.; Gao, J.; Zhu, L.; Zhang, Z.; Lal, C.; Conti, M.; Alazab, M.
Virtual Influencers in Online Social Media
2022 Conti, M; Gathani, J; Tricomi, Pp
An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework
2022 Nowroozi, E.; Abhishek, ; Mohammadi, M.; Conti, M.
Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain
2022 El-Zawawy, M. A.; Brighente, A.; Conti, M.
VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks
2022 Soderi, Simone; Brighente, Alessandro; Turrin, Federico; Conti, Mauro
Should I Mine or Should I Break: On the Worthiness of Brute-Forcing Cryptocurrency Addresses
2022 Brighente, Alessandro; Camaioni, Martina; Conti, Mauro; Olivastri, Emilio
COVID-19 infodemic on Facebook and containment measures in Italy, United Kingdom and New Zealand
2022 Etta, Gabriele; Galeazzi, Alessandro; Hutchings, Jamie Ray; James Smith, Connor Stirling; Conti, Mauro; Quattrociocchi, Walter; Riva, Giulio Valentino Dalla
The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems
2022 Apruzzese, G.; Pajola, L.; Conti, M.
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem
2022 Casagrande, Marco; Losiouk, Eleonora; Conti, Mauro; Payer, Mathias; Antonioli, Daniele
A Survey on Security Challenges and Solutions in IOTA
2022 Conti, Mauro; Kumar, Gulshan; Nerurkar, Pranav; Saha, Rahul; Vigneri, Luigi
PRaNA: PRNU-based Technique to Tell Real and Deepfake Videos Apart
2022 Amerini, I.; Conti, M.; Giacomazzi, P.; Pajola, L.
What You See is Not What You Get: a Man-in-the-Middle Attack Applied to Video Channels
2022 Conti, M.; Losiouk, E.; Visintin, A.
ICSpot: A High-Interaction Honeypot for Industrial Control Systems
2022 Conti, Mauro; Trolese, Francesco; Turrin, Federico
Sim2Testbed Transfer: NDN Performance Evaluation
2022 Bardhi, Enkeleda; Conti, M.; Lazzeretti, Riccardo; Losiouk, E.; Taffal, Ahmed
Label-Only Membership Inference Attack against Node-Level Graph Neural Networks
2022 Conti, M.; Li, J.; Picek, S.; Xu, J.
A PLS-HECC-based device authentication and key agreement scheme for smart home networks
2022 Pirayesh, J.; Giaretta, A.; Conti, M.; Keshavarzi, P.
SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones
2022 El-Zawawy, Mohamed A.; Brighente, Alessandro; Conti, Mauro
Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location Tracing
2022 Brighente, Alessandro; Sciancalepore, Savio; Conti, Mauro
Misinformation Detection on Social Media: Challenges and the Road Ahead
2022 Ahvanooey, M. T.; Zhu, M. X.; Mazurczyk, W.; Choo, K. -K. R.; Conti, M.; Zhang, J.
Graph Encryption for Shortest Path Queries with k Unsorted Nodes
2022 Li, Meng; Gao, Jianbo; Zhang, Zijian; Fu, Chaoping; Lal, Chhagan; Conti, Mauro
Secure Static Content Delivery for CDN Using Blockchain Technology
2022 Conti, M.; Vinod, P.; Tricomi, P. P.
Contactless Authentication for Wearable Devices Using RFID
2022 Bellandi, V.; Ceravolo, P.; Conti, M.; Ehsanpour, M.
Analyzing Price Deviations in DeFi Oracles
2022 Gangwal, A.; Valluri, R.; Conti, M.
Dynamic Backdoors with Global Average Pooling
2022 Koffas, S.; Picek, S.; Conti, M.
EVExchange: A Relay Attack on Electric Vehicle Charging System
2022 Conti, Mauro; Donadel, Denis; Poovendran, Radha; Turrin, Federico
Privacy-Friendly De-authentication with BLUFADE: Blurred Face Detection
2022 Cardaioli, M; Conti, M; Tricomi, Pp; Tsudik, G
Face the Truth: Interpretable Emotion Genuineness Detection
2022 Cardaioli, Matteo; Miolla, Alessio; Conti, Mauro; Sartori, Giuseppe; Monaro, Merylin; Scarpazza, Cristina; Navarin, Nicolo
We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads
2022 Balagani, K.; Cardaioli, M.; Cecconello, S.; Conti, M.; Tsudik, G.
MeLSeC: A Method for Lightweight and Secure Communication in Internet of Vehicles
2022 Brighente, A.; Conti, M.; Vasudev, H.
Stopping Floods with Buckets: Attack and Countermeasure for IOTA Autopeering
2022 Brighente, A.; Conti, M.; Kumar, G.; Ghanbari, R.; Saha, R.
Adaptive Intrusion Detection in Edge Computing using Cerebellar Model Articulation Controller and Spline Fit
2022 Kumar, Gulshan; Saha, Rahul; Conti, Mauro; Thomas, Reji; Devgun, Tannishtha; Rodrigues, Joel
Dynamic Super Round Based Distributed Task Scheduling for UAV Networks
2022 Halder, Subir; Ghosal, Amrita; Conti, Mauro
The Rise of ICS Malware: A Comparative Analysis
2022 Mekdad, Y.; Bernieri, G.; Conti, M.; El Fergougui, A.
DeBot: A deep learning-based model for bot detection in industrial internet-of-things
2022 Jayalaxmi, Pls; Kumar, G; Saha, R; Conti, M; Kim, Th; Thomas, R
Obfuscation detection in Android applications using deep learning
2022 Conti, M.; Vinod, P.; Vitella, A.
Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems
2022 Li, Meng; Chen, Yifei; Zhu, Liehaung; Zhang, Zijian; Ni, Jianbing; Lal, Chhagan; Conti, Mauro
Nereus: Anonymous and Secure Ride-Hailing Service based on Private Smart Contracts
2022 Li, M.; Chen, Y.; Lal, C.; Conti, M.; Martinelli, F.; Alazab, M.
For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection
2022 Cardaioli, M.; Conti, M.; Ravindranath, A.
A machine learning-based approach to detect threats in bio-cyber DNA storage systems
2022 Tavella, F.; Giaretta, A.; Conti, M.; Balasubramaniam, S.
A survey and taxonomy of consensus protocols for blockchains
2022 Singh, A.; Kumar, G.; Saha, R.; Conti, M.; Alazab, M.; Thomas, R.
A few-shot malware classification approach for unknown family recognition using malware feature visualization
2022 Conti, M.; Khandhar, S.; Vinod, P.
Software defined network-based HTTP flooding attack defender
2022 Mohammadi, R.; Lal, C.; Conti, M.; Sharma, L.
Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud
2022 Li, M.; Zhang, M.; Gao, J.; Lal, C.; Conti, M.; Alazab, M.
ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags
2022 Shariq, M.; Singh, K.; Lal, C.; Conti, M.; Khan, T.
CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks
2022 Taleby Ahvanooey, M.; Zhu, M. X.; Mazurczyk, W.; Li, Q.; Kilger, M.; Choo, K. -K. R.; Conti, M.
Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey
2022 Jayalaxmi, P. L. S.; Saha, Rahul; Kumar, Gulshan; Conti, Mauro; Kim, Tai-Hoon
HolA: Holistic and Autonomous Attestation for IoT Networks
2022 Visintin, Alessandro; Toffalini, Flavio; Losiouk, Eleonora; Conti, Mauro; Zhou, Jianying
Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand
2022 Cardaioli, Matteo; Cecconello, Stefano; Conti, Mauro; Picek, Stjepan; Milani, Simone; Saraci, Eugen
Poisoning Bearer Context Migration in O-RAN 5G Network
2022 Soltani, Sanaz; Shojafar, Mohammad; Brighente, Alessandro; Conti, Mauro; Tafazolli, Rahim
Secure over-the-air software update for connected vehicles
2022 Ghosal, A.; Halder, S.; Conti, M.
Demystifying the Transferability of Adversarial Attacks in Computer Networks
2022 Nowroozi, E.; Mekdad, Y.; Berenjestanaki, M. H.; Conti, M.; EL Fergougui, A.
Research trends, challenges, and emerging topics in digital forensics: A review of reviews
2022 Casino, F.; Dasaklis, T. K.; Spathoulas, G.; Anagnostopoulos, M.; Ghosal, A.; Borocz, I.; Solanas, A.; Conti, M.; Patsakis, C.
Effect of DIS Attack on 6TiSCH Network Formation
2022 Kalita, A.; Brighente, A.; Khatua, M.; Conti, M.
Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey
2021 Ahvanooey, M. T.; Zhu, M. X.; Li, Q.; Mazurczyk, W.; Choo, K. R.; Gupta, B. B.; Conti, M.
Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack
2021 Pajola, L; Conti, M
SPO: A Secure and Performance-aware Optimization for MapReduce Scheduling
2021 Maleki, N.; Rahmani, A. M.; Conti, M.
Cyber Forensics for CPS
2021 Conti, Mauro; Turrin, Federico
Neuropsicologia e Machine Learning: Un algoritmo per Identificare la Dislessia Evolutiva.
2021 Puccio, Giovanna; Tricomi, PIER PAOLO; Franceschini, Sandro; Bertoni, Sara; Conti, Mauro; Facoetti, Andrea
ICN PATTA: ICN privacy attack through traffic analysis
2021 Bardhi, E.; Conti, M.; Lazzeretti, R.; Losiouk, E.
Vulnerabilities in Android webview objects: Still not the end!
2021 El-Zawawy, M. A.; Losiouk, E.; Conti, M.
It's a Matter of Style: Detecting Social Bots through Writing Style Consistency
2021 Cardaioli, M.; Conti, M.; Sorbo, A. D.; Fabrizio, E.; Laudanna, S.; Visaggio, C. A.
BCHealth: A Novel Blockchain-based Privacy-Preserving Architecture for IoT Healthcare Applications
2021 Mohammad Hossein, K.; Esmaeili, M. E.; Dargahi, T.; Khonsari, A.; Conti, M.
Contact Tracing Made Un-relay-able
2021 Casagrande, M.; Conti, M.; Losiouk, E.
CrypSH: A Novel IoT Data Protection Scheme Based on BGN Cryptosystem
2021 Halder, S.; Conti, M.
Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis
2021 Barbieri, G.; Conti, M.; Tippenhauer, N. O.; Turrin, F.
MiniV2G: An Electric Vehicle Charging Emulator
2021 Attanasio, L.; Conti, M.; Donadel, D.; Turrin, F.
Malingering Scraper: A novel framework to reconstruct honest profiles from malingerer psychopathological tests.
2021 Cardaioli, Matteo; Cecconello, Stefano; Monaro, Merylin; Sartori, Giuseppe; Conti, Mauro; Orrù, Graziella
A threat model method for ICS malware: The TRISIS case
2021 Mekdad, Y.; Bernieri, G.; Conti, M.; Fergougui, A. E.
Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services
2021 Chen, Yifei; Li, Meng; Zheng, Shuli; Lal, Chhagan; Conti, Mauro
FADIA: Fairness-driven collaborative remote attestation
2021 Mansouri, M.; Jaballah, W. B.; Onen, M.; Rabbani, M. M.; Conti, M.
Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications
2021 Kumar, G.; Saha, R.; Lal, C.; Conti, M.
COTS Drone Detection using Video Streaming Characteristics
2021 Alsoliman, A.; Rigoni, G.; Levorato, M.; Pinotti, C.; Tippenhauer, N. O.; Conti, M.
An SDN-based framework for QoS routing in internet of underwater things
2021 Mohammadi, R.; Nazari, A.; Nassiri, M.; Conti, M.
Improving password guessing via representation learning
2021 Pasquini, D.; Gangwal, A.; Ateniese, G.; Bernaschi, M.; Conti, M.
SnakeGX: A Sneaky Attack Against SGX Enclaves
2021 Toffalini, F.; Graziano, M.; Conti, M.; Zhou, J.
Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey
2021 Bang, Ankur O.; Rao, Udai Pratap; Kaliyar, Pallavi; Conti, Mauro
A Survey on Industrial Control System Testbeds and Datasets for Security Research
2021 Conti, Mauro; Donadel, Denis; Turrin, Federico
Looking through walls: Inferring scenes from video-surveillance encrypted traffic
2021 Mari, D.; Piazzetta, S. G.; Bordin, S.; Pajola, L.; Verde, S.; Milani, S.; Conti, M.
Privacy for 5G-Supported Vehicular Networks
2021 Li, Meng; Zhu, Liehuang; Zhang, Zijian; Lal, Chhagan; Conti, Mauro; Martinelli, Fabio
Towards An Enhanced Reputation System for IOTA’s Coordicide
2021 Saha, Rahul; Gulshan, Kumar; Brighente, Alessandro; Conti, Mauro
Defeating Lattice-Based Data Hiding Code Via Decoding Security Hole
2021 Wang, Y. -G.; Zhu, G.; Li, J.; Conti, M.; Huang, J.
TEL: Low-Latency Failover Traffic Engineering in Data Plane
2021 Mostafaei, H.; Shojafar, M.; Conti, M.
Knocking on Tangle's Doors: Security Analysis of IOTA Ports
2021 Brighente, A.; Conti, M.; Kumar, G.; Ghanbari, R.; Saha, R.
A holistic approach to power efficiency in a clock offset based Intrusion Detection Systems for Controller Area Networks
2021 Halder, S.; Conti, M.; Das, S. K.
5G Security Challenges and Solutions: A Review by OSI Layers
2021 Sullivan, S.; Brighente, A.; Kumar, S. A. P.; Conti, M.
Practical exchange for unique digital goods
2021 Ersoy, O.; Genc, Z. A.; Erkin, Z.; Conti, M.
On the feasibility of crawling-based attacks against recommender systems
2021 Aiolli, Fabio; Conti, Mauro; Picek, Stjepan; Polato, Mirko
LEChain: A blockchain-based lawful evidence management scheme for digital forensics
2021 Li, M.; Lal, C.; Conti, M.; Hu, D.
Tell me how you charge I will tell you where you drove to: Electric Vehicles Profiling Based on Charging-Current Demand
2021 Brighente, Alessandro; Conti, Mauro; Sadaf, Izza
Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions
2021 Bhardwaj, A.; Mangat, V.; Vig, R.; Halder, S.; Conti, M.
Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps
2021 El-Zawawy, M. A.; Losiouk, E.; Conti, M.
ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN
2021 Benarfa, A.; Hassan, M.; Losiouk, E.; Compagno, A.; Yagoubi, M. B.; Conti, M.
AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller
2021 Ravi, N.; Shalinie, S. M.; Lal, C.; Conti, M.
Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization
2021 Ruggia, A.; Losiouk, E.; Verderame, L.; Conti, M.; Merlo, A.
USB powered devices: A survey of side-channel threats and countermeasures
2021 Liu, Hao; Spolaor, Riccardo; Turrin, Federico; Bonafede, Riccardo; Conti, Mauro
Eunomia: Anonymous and Secure Vehicular Digital Forensics based on Blockchain
2021 Li, M.; Chen, Y.; Lal, C.; Conti, M.; Alazab, M.; Hu, D.
DETONAR: Detection of Routing Attacks in RPL-based IoT
2021 Agiollo, A.; Conti, M.; Kaliyar, P.; Lin, T.; Pajola, L.
Covert Channel-Based Transmitter Authentication in Controller Area Networks
2021 Ying, X.; Bernieri, G.; Conti, M.; Bushnell, L.; Poovendran, R.
Online Advertising Security: Issues, Taxonomy, and Future Directions
2021 Pooranian, Z.; Conti, M.; Haddadi, H.; Tafazolli, R.
A Statistical Analysis Framework for ICS Process Datasets
2020 Turrin, F.; Erba, A.; Tippenhauer, N. O.; Conti, M.
BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices
2020 Saxena, N.; Conti, M.; Choo, K. -K. R.; Chaudhari, N. S.
Collective Remote Attestation at the Internet of Things Scale: State-of-the-art and Future Challenges
2020 Ambrosin, M.; Conti, M.; Lazzeretti, R.; Rabbani, M.; Ranise, S.
Secure over-the-air software updates in connected vehicles: A survey
2020 Halder, S.; Ghosal, A.; Conti, M.
Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach
2020 Taheri, Rahim; Javidan, Reza; Shojafar, Mohammad; P, Vinod; Conti, Mauro
UAVs Path Deviation Attacks: Survey and Research Challenges
2020 Sorbelli, F. B.; Conti, M.; Pinotti, C. M.; Rigoni, G.
PvP: Profiling Versus Player! Exploiting Gaming Data for Player Recognition
2020 Conti, M.; Tricomi, P. P.
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile