Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 20 di 44
Titolo Data di pubblicazione Autori Rivista Serie Titolo libro
Beware of Pickpockets: A Practical Attack against Blocking Cards 2023 Alessandro BrighenteMauro ContiEleonora Losiouk + - - Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2023)
GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks 2023 Conti, MLosiouk, E + - - Proceedings of the 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P)
Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution 2023 Mauro ContiMonica FedeliEleonora Losiouk + JOURNAL OF CYBERSECURITY EDUCATION, RESEARCH & PRACTICE - -
Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey 2023 Conti, MauroLosiouk, Eleonora + IEEE COMMUNICATIONS SURVEYS AND TUTORIALS - -
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics 2023 Losiouk, EleonoraConti, Mauro + JOURNAL OF CYBERSECURITY AND PRIVACY - -
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem 2023 Casagrande, MarcoLosiouk, EleonoraConti, Mauro + - - Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '23)
The Security of Wireless Communication Protocols Used in Mobile Health Systems 2023 Eleonora Losiouk - - Women in Telecommunications
HolA: Holistic and Autonomous Attestation for IoT Networks 2022 Alessandro VisintinEleonora LosioukMauro Conti + - - Applied Cryptography and Network Security Workshops
Sim2Testbed Transfer: NDN Performance Evaluation 2022 Conti M.Losiouk E. + - - ACM International Conference Proceeding Series
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem 2022 Eleonora LosioukMauro Conti + IACR TRANSACTIONS ON CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - -
What You See is Not What You Get: a Man-in-the-Middle Attack Applied to Video Channels 2022 Conti M.Losiouk E.Visintin A. - - Proceedings of the ACM Symposium on Applied Computing
Face Recognition Systems: Are you sure they only consider your face? 2022 Conti M.Losiouk E. + - - Proceedings - 43rd IEEE Symposium on Security and Privacy Workshops, SPW 2022
Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps 2021 Losiouk E.Conti M. + INTERNATIONAL JOURNAL OF INFORMATION SECURITY - -
ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN 2021 Losiouk E.Compagno A.Conti M. + INTERNATIONAL JOURNAL OF INFORMATION SECURITY - -
Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization 2021 Losiouk E.Conti M. + - - ACM International Conference Proceeding Series
ICN PATTA: ICN privacy attack through traffic analysis 2021 Conti M.Lazzeretti R.Losiouk E. + - - Proceedings - Conference on Local Computer Networks, LCN
Contact Tracing Made Un-relay-able 2021 Casagrande M.Conti M.Losiouk E. - - CODASPY 2021 - Proceedings of the 11th ACM Conference on Data and Application Security and Privacy
Vulnerabilities in Android webview objects: Still not the end! 2021 Losiouk E.Conti M. + COMPUTERS & SECURITY - -
How do interval scales help us with better understanding IR evaluation measures? 2020 Ferrante M.Ferro N.Losiouk E. INFORMATION RETRIEVAL - -
A Proactive Cache Privacy Attack on NDN 2020 Conti M.Losiouk E. + - - Proceedings of IEEE/IFIP Network Operations and Management Symposium 2020: Management in the Age of Softwarization and Artificial Intelligence
Mostrati risultati da 1 a 20 di 44
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile