Domenico Vitali

According to our database1, Domenico Vitali authored at least 13 papers between 2011 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
A Novel Approach for Secure In-class Delivery of Educational Content via Mobile Routers with Functionally Enhanced Firmware.
Proceedings of the Mobile Technologies and Applications for the Internet of Things, 2018

2015
Obfuscation of Sensitive Data for Incremental Release of Network Flows.
IEEE/ACM Trans. Netw., 2015

Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers.
Int. J. Secur. Networks, 2015

2014
Bypassing Censorship: A Proven Tool against the Recent Internet Censorship in Turkey.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

2013
Mapping the File Systems Genome: rationales, technique, results and applications.
CoRR, 2013

Obsidian: A scalable and efficient framework for NetFlow obfuscation.
Proceedings of the 2013 Proceedings IEEE INFOCOM Workshops, 2013

Uniqueness of the file systems genome: Supporting arguments and massive experimental measurements.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

2012
DDoS Detection with Information Theory Metrics and Netflows - A Real Case.
Proceedings of the SECRYPT 2012, 2012

Obfuscation of sensitive data in network flows.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Large-Scale Traffic Anomaly Detection: Analysis of Real Netflow Datasets.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2012

Relieve Internet Routing Security of Public Key Infrastructure.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

2011
MhRep: Multi-hop Replication Scheme for Data Survival in Unattended Wireless Sensor Networks.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops, 2011

Replication Schemes in Unattended Wireless Sensor Networks.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011


  Loading...