Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 20 di 44
Titolo Data di pubblicazione Autori Rivista Serie Titolo libro
GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks 2023 Conti, MLosiouk, E + - - Proceedings of the 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P)
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics 2023 Losiouk, EleonoraConti, Mauro + JOURNAL OF CYBERSECURITY AND PRIVACY - -
Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey 2023 Conti, MauroLosiouk, Eleonora + IEEE COMMUNICATIONS SURVEYS AND TUTORIALS - -
Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution 2023 Mauro ContiMonica FedeliEleonora Losiouk + JOURNAL OF CYBERSECURITY EDUCATION, RESEARCH & PRACTICE - -
The Security of Wireless Communication Protocols Used in Mobile Health Systems 2023 Eleonora Losiouk - - Women in Telecommunications
Beware of Pickpockets: A Practical Attack against Blocking Cards 2023 Alessandro BrighenteMauro ContiEleonora Losiouk + - - Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2023)
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem 2023 Casagrande, MarcoLosiouk, EleonoraConti, Mauro + - - Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '23)
Sim2Testbed Transfer: NDN Performance Evaluation 2022 Conti M.Losiouk E. + - - ACM International Conference Proceeding Series
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem 2022 Eleonora LosioukMauro Conti + IACR TRANSACTIONS ON CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - -
Face Recognition Systems: Are you sure they only consider your face? 2022 Conti M.Losiouk E. + - - Proceedings - 43rd IEEE Symposium on Security and Privacy Workshops, SPW 2022
HolA: Holistic and Autonomous Attestation for IoT Networks 2022 Alessandro VisintinEleonora LosioukMauro Conti + - - Applied Cryptography and Network Security Workshops
What You See is Not What You Get: a Man-in-the-Middle Attack Applied to Video Channels 2022 Conti M.Losiouk E.Visintin A. - - Proceedings of the ACM Symposium on Applied Computing
ICN PATTA: ICN privacy attack through traffic analysis 2021 Conti M.Lazzeretti R.Losiouk E. + - - Proceedings - Conference on Local Computer Networks, LCN
ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN 2021 Losiouk E.Compagno A.Conti M. + INTERNATIONAL JOURNAL OF INFORMATION SECURITY - -
Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps 2021 Losiouk E.Conti M. + INTERNATIONAL JOURNAL OF INFORMATION SECURITY - -
Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization 2021 Losiouk E.Conti M. + - - ACM International Conference Proceeding Series
Contact Tracing Made Un-relay-able 2021 Casagrande M.Conti M.Losiouk E. - - CODASPY 2021 - Proceedings of the 11th ACM Conference on Data and Application Security and Privacy
Vulnerabilities in Android webview objects: Still not the end! 2021 Losiouk E.Conti M. + COMPUTERS & SECURITY - -
Proactive Cache Privacy Attack on NDN 2020 Mauro ContiEleonora Losiouk + - - NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium
How do interval scales help us with better understanding IR evaluation measures? 2020 Ferrante M.Ferro N.Losiouk E. INFORMATION RETRIEVAL - -
Mostrati risultati da 1 a 20 di 44
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile