Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 20 di 44
Titolo Data di pubblicazione Autori Rivista Serie Titolo libro
Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution 2023 Mauro ContiMonica FedeliEleonora Losiouk + JOURNAL OF CYBERSECURITY EDUCATION, RESEARCH & PRACTICE - -
The Security of Wireless Communication Protocols Used in Mobile Health Systems 2023 Eleonora Losiouk - - Women in Telecommunications
Beware of Pickpockets: A Practical Attack against Blocking Cards 2023 Alessandro BrighenteMauro ContiEleonora Losiouk + - - Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2023)
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics 2023 Losiouk, EleonoraConti, Mauro + JOURNAL OF CYBERSECURITY AND PRIVACY - -
GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks 2023 Conti, MLosiouk, E + - - Proceedings of the 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P)
Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey 2023 Conti, MauroLosiouk, Eleonora + IEEE COMMUNICATIONS SURVEYS AND TUTORIALS - -
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem 2023 Casagrande, MarcoLosiouk, EleonoraConti, Mauro + - - Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '23)
Face Recognition Systems: Are you sure they only consider your face? 2022 Conti M.Losiouk E. + - - Proceedings - 43rd IEEE Symposium on Security and Privacy Workshops, SPW 2022
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem 2022 Eleonora LosioukMauro Conti + IACR TRANSACTIONS ON CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - -
HolA: Holistic and Autonomous Attestation for IoT Networks 2022 Alessandro VisintinEleonora LosioukMauro Conti + - - Applied Cryptography and Network Security Workshops
What You See is Not What You Get: a Man-in-the-Middle Attack Applied to Video Channels 2022 Conti M.Losiouk E.Visintin A. - - Proceedings of the ACM Symposium on Applied Computing
Sim2Testbed Transfer: NDN Performance Evaluation 2022 Conti M.Losiouk E. + - - ACM International Conference Proceeding Series
Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps 2021 Losiouk E.Conti M. + INTERNATIONAL JOURNAL OF INFORMATION SECURITY - -
ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN 2021 Losiouk E.Compagno A.Conti M. + INTERNATIONAL JOURNAL OF INFORMATION SECURITY - -
Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization 2021 Losiouk E.Conti M. + - - ACM International Conference Proceeding Series
Contact Tracing Made Un-relay-able 2021 Casagrande M.Conti M.Losiouk E. - - CODASPY 2021 - Proceedings of the 11th ACM Conference on Data and Application Security and Privacy
Vulnerabilities in Android webview objects: Still not the end! 2021 Losiouk E.Conti M. + COMPUTERS & SECURITY - -
ICN PATTA: ICN privacy attack through traffic analysis 2021 Conti M.Lazzeretti R.Losiouk E. + - - Proceedings - Conference on Local Computer Networks, LCN
Don't Let Next-Intent Vulnerability Be Your Next Nightmare: Type System Based Approach to Detect It in Android App 2020 Eleonora LosioukMauro Conti + INTERNATIONAL JOURNAL OF INFORMATION SECURITY - -
A Proactive Cache Privacy Attack on NDN 2020 Conti M.Losiouk E. + - - Proceedings of IEEE/IFIP Network Operations and Management Symposium 2020: Management in the Age of Softwarization and Artificial Intelligence
Mostrati risultati da 1 a 20 di 44
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile