Nome |
# |
Privacy Aware Data Deduplication for Side Channel in Cloud Storage, file e14fb26a-ddf4-3de1-e053-1705fe0ac030
|
374
|
Fair-RTT-DAS: A robust and efficient dynamic adaptive streaming over ICN, file e14fb26b-8199-3de1-e053-1705fe0ac030
|
196
|
Predicting Twitter Users' Political Orientation: An Application to the Italian Political Scenario, file e14fb26e-4d2e-3de1-e053-1705fe0ac030
|
172
|
Analyzing Android Encrypted Network Traffic to Identify User Actions, file e14fb26c-e562-3de1-e053-1705fe0ac030
|
84
|
You Can't Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality, file 13120ef0-421a-46b5-a2b7-ed377d9e5c5d
|
48
|
Robust Smartphone App Identification via Encrypted Network Traffic Analysis, file e14fb26c-e293-3de1-e053-1705fe0ac030
|
43
|
Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution, file ccdc0b8d-bc55-4bdf-bc31-eb1a11ab4403
|
36
|
Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain, file 60fb0336-a378-4495-938b-5fe39ae0123d
|
23
|
SENECAN: Secure KEy DistributioN OvEr CAN Through Watermarking and Jamming, file b761018d-06b2-4f6c-88ef-ced31968bdfe
|
22
|
Context-based Co-presence detection techniques: A survey, file e14fb26e-82ef-3de1-e053-1705fe0ac030
|
22
|
Fast multi-hop broadcast of alert messages in VANETs: An analytical model, file e14fb26b-7bf9-3de1-e053-1705fe0ac030
|
17
|
Malingering Scraper: A novel framework to reconstruct honest profiles from malingerer psychopathological tests., file 6847ff4c-ce8f-45d5-9117-b13edfb6e8c8
|
14
|
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks., file e14fb26c-8a50-3de1-e053-1705fe0ac030
|
14
|
Poisoning Bearer Context Migration in O-RAN 5G Network, file d10f129f-6f8f-4816-a049-a5ad67b46e48
|
12
|
Deep Neural Networks for Direction of Arrival Estimation of Multiple Targets with Sparse Prior for Line-of-Sight Scenarios, file f083c984-57b7-4eb9-89c5-66ca7f982a9b
|
11
|
Data Security Awareness: metodi e strumenti per promuoverla nella scuola secondaria. Il caso del progetto Edu4Sec., file e14fb26e-11c8-3de1-e053-1705fe0ac030
|
10
|
Whac-A-Mole: Smart Node Positioning in Clone Attack in Wireless Sensor Networks, file e14fb26e-e57d-3de1-e053-1705fe0ac030
|
9
|
Adapting the system to users based on implicit data: Ethical risks and possible solutions, file 6546d0b0-ba8f-489d-96e0-91dd32301012
|
8
|
An ICN-Based Authentication Protocol for a Simplified LTE Architecture, file e14fb26a-7fcb-3de1-e053-1705fe0ac030
|
8
|
Fast multi-hop broadcast of alert messages in VANETs: An analytical model, file e14fb26e-7bdb-3de1-e053-1705fe0ac030
|
8
|
The impact of malicious nodes positioning on vehicular alert messaging system, file e14fb26e-b492-3de1-e053-1705fe0ac030
|
8
|
The Impact of Covid-19 on Online Discussions: the Case Study of the Sanctioned Suicide Forum, file fda9d2b8-8a0c-455b-86d3-e6e26763d5d6
|
8
|
5G Security Challenges and Solutions: A Review by OSI Layers, file 53696b21-167b-44f7-9881-6b22f1014baf
|
7
|
QoE Degradation Attack in Dynamic Adaptive Streaming over ICN, file e14fb26b-7e9f-3de1-e053-1705fe0ac030
|
6
|
Efficient Physical Intrusion Detection in Internet of Things: A Node Deployment Approach, file e14fb26b-a8d7-3de1-e053-1705fe0ac030
|
6
|
Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities, file e14fb26b-d119-3de1-e053-1705fe0ac030
|
6
|
Anonymous Federated Learning via Named-Data Networking, file 2cc08c67-dd2c-43f3-9acf-3e522131d5e9
|
5
|
COVID-19 infodemic on Facebook and containment measures in Italy, United Kingdom and New Zealand, file 468aeb55-69cc-43a9-8be8-4966e30c7cde
|
4
|
Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location Tracing, file 617e46b0-df8e-4058-80b8-f3bdeb4edff8
|
3
|
Covert lie detection using keyboard dynamics, file cdd12827-26c6-4798-b1ab-f4de18046880
|
3
|
Why Snoopy loves online services: An Analysis of (lack of) Privacy in Online Services., file e14fb269-d81f-3de1-e053-1705fe0ac030
|
3
|
Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey, file 8253b305-6f26-4fd4-b0ba-40aaa9c82c19
|
2
|
Selfrando: Securing the Tor Browser against De-anonymization Exploits, file a3b6c20b-c65a-4389-b21a-d0c83d1f1980
|
2
|
Towards An Enhanced Reputation System for IOTA’s Coordicide, file a84960fd-3009-40fa-ac57-3b0f4747d18d
|
2
|
Privacy-Aware Caching in Information-Centric Networking., file e14fb26c-7e1b-3de1-e053-1705fe0ac030
|
2
|
A Survey on Security Challenges and Solutions in IOTA, file e14fb26f-c642-3de1-e053-1705fe0ac030
|
2
|
Security and Privacy of Smart Waste Management Systems: A Cyber-Physical System Perspective, file 0f11783c-2b6d-4233-8fc0-547ade3514c2
|
1
|
SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones, file 3aa3c6c4-d39b-42a3-980f-0651043ff475
|
1
|
The online identity detection via keyboard dynamics, file 53027a4b-5e28-41b6-b13f-3d1d516ca232
|
1
|
Enabling Low Sidelobe Secret Multicast Transmission for mmWave Communication: An Integrated Oblique Projection Approach, file 5775dabf-eb2b-4a87-9311-8baaeba4cbfc
|
1
|
Should I Mine or Should I Break: On the Worthiness of Brute-Forcing Cryptocurrency Addresses, file 7a9fe52f-6c98-4b38-8736-57c1f37ddffb
|
1
|
SWAP: Secure Warning Messages Authentication and Propagation in Internet of Vehicles, file 8e091ed1-baa3-4ab1-9fde-69741338590c
|
1
|
The Spread of Propaganda by Coordinated Communities on Social Media, file 9b5abbe9-fb15-416c-9a1d-76c66d9003e4
|
1
|
Threat Sensitive Networking: on the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions, file a7138123-3744-4e47-bf4d-ff689e6e7a0b
|
1
|
Face the Truth: Interpretable Emotion Genuineness Detection, file a9a1a267-ca27-4558-8f4f-658f844f0b42
|
1
|
Tell me how you charge I will tell you where you drove to: Electric Vehicles Profiling Based on Charging-Current Demand, file c11714d6-8003-4338-9788-1e5799e6ede4
|
1
|
FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks, file c25bf5c9-9769-48ec-9ff7-887d809219f6
|
1
|
Advertising in the IoT Era: Vision and Challenges, file e14fb26a-cc86-3de1-e053-1705fe0ac030
|
1
|
EnergIoT: A solution to improve network lifetime of IoT devices, file e14fb26a-ddf3-3de1-e053-1705fe0ac030
|
1
|
The impact of malicious nodes positioning on vehicular alert messaging system, file e14fb26e-b491-3de1-e053-1705fe0ac030
|
1
|
VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks, file f5ca484d-dd5a-4621-9a6b-d358c0275d3d
|
1
|
Totale |
1.215 |