Sfoglia per Autore
Beware of Pickpockets: A Practical Attack against Blocking Cards
2023 Alecci, Marco; Attanasio, Luca; Brighente, Alessandro; Conti, Mauro; Losiouk, Eleonora; Ochiai, Hideki; Turrin, Federico
GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks
2023 Agiollo, A; Bardhi, E; Conti, M; Lazzeretti, R; Losiouk, E; Omicini, A
Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution
2023 Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora
Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey
2023 Bardhi, Enkeleda; Conti, Mauro; Lazzeretti, Riccardo; Losiouk, Eleonora
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics
2023 Bellizzi, Jennifer; Losiouk, Eleonora; Conti, Mauro; Colombo, Christian; Vella, Mark
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem
2023 Casagrande, Marco; Cestaro, Riccardo; Losiouk, Eleonora; Conti, Mauro; Antonioli, Daniele
The Security of Wireless Communication Protocols Used in Mobile Health Systems
2023 Losiouk, Eleonora
HolA: Holistic and Autonomous Attestation for IoT Networks
2022 Visintin, Alessandro; Toffalini, Flavio; Losiouk, Eleonora; Conti, Mauro; Zhou, Jianying
Sim2Testbed Transfer: NDN Performance Evaluation
2022 Bardhi, Enkeleda; Conti, M.; Lazzeretti, Riccardo; Losiouk, E.; Taffal, Ahmed
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem
2022 Casagrande, Marco; Losiouk, Eleonora; Conti, Mauro; Payer, Mathias; Antonioli, Daniele
What You See is Not What You Get: a Man-in-the-Middle Attack Applied to Video Channels
2022 Conti, M.; Losiouk, E.; Visintin, A.
Face Recognition Systems: Are you sure they only consider your face?
2022 Darbha, P. S.; Conti, M.; Losiouk, E.; Maiti, R. R.
Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps
2021 El-Zawawy, M. A.; Losiouk, E.; Conti, M.
ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN
2021 Benarfa, A.; Hassan, M.; Losiouk, E.; Compagno, A.; Yagoubi, M. B.; Conti, M.
Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization
2021 Ruggia, A.; Losiouk, E.; Verderame, L.; Conti, M.; Merlo, A.
ICN PATTA: ICN privacy attack through traffic analysis
2021 Bardhi, E.; Conti, M.; Lazzeretti, R.; Losiouk, E.
Contact Tracing Made Un-relay-able
2021 Casagrande, M.; Conti, M.; Losiouk, E.
Vulnerabilities in Android webview objects: Still not the end!
2021 El-Zawawy, M. A.; Losiouk, E.; Conti, M.
How do interval scales help us with better understanding IR evaluation measures?
2020 Ferrante, M.; Ferro, N.; Losiouk, E.
A Proactive Cache Privacy Attack on NDN
2020 Compagno, A.; Conti, M.; Losiouk, E.; Tsudik, G.; Valle, S.
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile