Alessandra Rizzardi

Orcid: 0000-0003-4765-5365

According to our database1, Alessandra Rizzardi authored at least 40 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Towards rapid modeling and prototyping of indoor and outdoor monitoring applications.
Sustain. Comput. Informatics Syst., January, 2024

IoT-driven blockchain to manage the healthcare supply chain and protect medical records.
Future Gener. Comput. Syst., 2024

NERO: NEural algorithmic reasoning for zeRO-day attack detection in the IoT: A hybrid approach.
Comput. Secur., 2024

ASAP: Automatic Synthesis of Attack Prototypes, an online-learning, end-to-end approach.
Comput. Networks, 2024

2023
Deep Reinforcement Learning for intrusion detection in Internet of Things: Best practices, lessons learnt, and open challenges.
Comput. Networks, November, 2023

2022
Analysis on functionalities and security features of Internet of Things related protocols.
Wirel. Networks, 2022

Securing the access control policies to the Internet of Things resources through permissioned blockchain.
Concurr. Comput. Pract. Exp., 2022

Insights into security and privacy towards fog computing evolution.
Comput. Secur., 2022

Security&privacy issues and challenges in NoSQL databases.
Comput. Networks, 2022

2021
Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middleware.
Int. J. Inf. Sec., 2021

2020
Sticky Policies: A Survey.
IEEE Trans. Knowl. Data Eng., 2020

Smart certification: protecting the originality of the product in the eyewear sector.
Internet Technol. Lett., 2020

5G In the internet of things era: An overview on security and privacy challenges.
Comput. Networks, 2020

Increasing the pervasiveness of the IoT: fog computing coupled with pub&sub and security.
Proceedings of the 2020 IEEE International Conference on Smart Internet of Things, 2020

Testing and Evaluating a Security-Aware Pub and Sub Protocol in a Fog-Driven IoT Environment.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 2020

2019
How to evaluate an Internet of Things system: Models, case studies, and real developments.
Softw. Pract. Exp., 2019

Smart transport and logistics: A Node-RED implementation.
Internet Technol. Lett., 2019

Beyond the smart things: Towards the definition and the performance assessment of a secure architecture for the Internet of Nano-Things.
Comput. Networks, 2019

2018
S<sub>2</sub> DCC: secure selective dropping congestion control in hybrid wireless multimedia sensor networks.
Wirel. Networks, 2018

Securing the smart home: A real case study.
Internet Technol. Lett., 2018

A risk assessment methodology for the Internet of Things.
Comput. Commun., 2018

REATO: REActing TO Denial of Service attacks in the Internet of Things.
Comput. Networks, 2018

Solving Interoperability within the Smart Building: A Real Test-Bed.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

2017
Performance Comparison of Reputation Assessment Techniques Based on Self-Organizing Maps in Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2017

Security towards the edge: Sticky policy enforcement for networked smart objects.
Inf. Syst., 2017

Dynamic Policies in Internet of Things: Enforcement and Synchronization.
IEEE Internet Things J., 2017

A secure ICN-IoT architecture.
Proceedings of the 2017 IEEE International Conference on Communications Workshops, 2017

2016
Security in Internet of Things: networked smart objects.
PhD thesis, 2016

A Comparative Study of Recent Wireless Sensor Network Simulators.
ACM Trans. Sens. Networks, 2016

A secure and quality-aware prototypical architecture for the Internet of Things.
Inf. Syst., 2016

AUPS: An Open Source AUthenticated Publish/Subscribe system for the Internet of Things.
Inf. Syst., 2016

Security policy enforcement for networked smart objects.
Comput. Networks, 2016

Routing behavior across WSN simulators: The AODV case study.
Proceedings of the IEEE World Conference on Factory Communication Systems, 2016

Internet of Things: Security in the Keys.
Proceedings of the 12th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2016

2015
Security, privacy and trust in Internet of Things: The road ahead.
Comput. Networks, 2015

Networked Smart Objects: Moving Data Processing Closer to the Source.
Proceedings of the Internet of Things. IoT Infrastructures, 2015

GoNe: Dealing with node behavior.
Proceedings of the IEEE 5th International Conference on Consumer Electronics - Berlin, 2015

Secure OM2M Service Platform.
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015

2014
A NFP Model for Internet of Things applications.
Proceedings of the IEEE 10th International Conference on Wireless and Mobile Computing, 2014

2013
SETA: A secure sharing of tasks in clustered wireless sensor networks.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013


  Loading...