Federico Turrin

Orcid: 0000-0001-5660-2447

According to our database1, Federico Turrin authored at least 24 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
<i>EVScout2.0</i>: Electric Vehicle Profiling through Charging Profile.
ACM Trans. Cyber Phys. Syst., April, 2024

One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024

2023
Dataset for the paper: Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel.
Dataset, May, 2023

SENECAN: Secure KEy DistributioN OvEr CAN Through Watermarking and Jamming.
IEEE Trans. Dependable Secur. Comput., 2023

Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs.
CoRR, 2023

Beware of Pickpockets: A Practical Attack against Blocking Cards.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel.
Proceedings of the IEEE INFOCOM 2023, 2023

HoneyEVSE: An Honeypot to Emulate Electric Vehicle Supply Equipments.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

PAID: Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems.
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 2023

OpenScope-sec: An ADS-B Simulator to Support the Security Research.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Hyperloop: A Cybersecurity Perspective.
CoRR, 2022

VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks.
Proceedings of the 19th Annual IEEE International Conference on Sensing, 2022

ICSpot: A High-Interaction Honeypot for Industrial Control Systems.
Proceedings of the International Symposium on Networks, Computers and Communications, 2022

EVExchange: A Relay Attack on Electric Vehicle Charging System.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
EVScout2.0: Electric Vehicle Profiling Through Charging Profile.
CoRR, 2021

A Survey on Industrial Control System Testbeds and Datasets for Security Research.
IEEE Commun. Surv. Tutorials, 2021

Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

MiniV2G: An Electric Vehicle Charging Emulator.
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021

2020
Sorry, Shodan is not Enough! Assessing ICS Security via IXP Network Traffic Analysis.
CoRR, 2020

ALISI: a lightweight identification system based on Iroha.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Fake News Spreaders Profiling Through Behavioural Analysis.
Proceedings of the Working Notes of CLEF 2020, 2020

A Statistical Analysis Framework for ICS Process Datasets.
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020

2019
KingFisher: an Industrial Security Framework based on Variational Autoencoders.
Proceedings of the 1st Workshop on Machine Learning on Edge in Sensor Systems, 2019

Evaluation of Machine Learning Algorithms for Anomaly Detection in Industrial Networks.
Proceedings of the 5th IEEE International Symposium on Measurements & Networking, 2019


  Loading...