Luigi V. Mancini

Orcid: 0000-0003-4859-2191

According to our database1, Luigi V. Mancini authored at least 162 papers between 1986 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
OliVaR: Improving olive variety recognition using deep neural networks.
Comput. Electron. Agric., January, 2024

DARD: Deceptive Approaches for Robust Defense Against IP Theft.
IEEE Trans. Inf. Forensics Secur., 2024

FedComm: Federated Learning as a Medium for Covert Communication.
IEEE Trans. Dependable Secur. Comput., 2024

Adversarial Challenges in Network Intrusion Detection Systems: Research Insights and Future Prospects.
CoRR, 2024

Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem.
CoRR, 2024

Have You Poisoned My Data? Defending Neural Networks Against Data Poisoning.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
DOLOS: A Novel Architecture for Moving Target Defense.
IEEE Trans. Inf. Forensics Secur., 2023

Minerva: A File-Based Ransomware Detector.
CoRR, 2023

2022
Reliable detection of compressed and encrypted data.
Neural Comput. Appl., 2022

Evading behavioral classifiers: a comprehensive analysis on evading ransomware detection techniques.
Neural Comput. Appl., 2022

TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding.
CoRR, 2022

MaleficNet: Hiding Malware into Deep Neural Networks Using Spread-Spectrum Channel Coding.
Proceedings of the Computer Security - ESORICS 2022, 2022

PassFlow: Guessing Passwords with Generative Flows.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks.
IEEE Intell. Syst., 2021

Evaluating the Robustness of Geometry-Aware Instance-Reweighted Adversarial Training.
CoRR, 2021

MalPhase: Fine-Grained Malware Detection Using Network Flow Data.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
SARA: Secure Asynchronous Remote Attestation for IoT Systems.
IEEE Trans. Inf. Forensics Secur., 2020

A Novel Stealthy Attack to Gather SDN Configuration-Information.
IEEE Trans. Emerg. Top. Comput., 2020

EnCoD: Distinguishing Compressed and Encrypted File Fragments.
Proceedings of the Network and System Security - 14th International Conference, 2020

The Naked Sun: Malicious Cooperation Between Benign-Looking Processes.
Proceedings of the Applied Cryptography and Network Security, 2020

Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020

2019
Evasion Attacks Against Watermarking Techniques found in MLaaS Systems.
Proceedings of the 6th International Conference on Software Defined Systems, 2019

RADIS: Remote Attestation of Distributed IoT Services.
Proceedings of the 6th International Conference on Software Defined Systems, 2019

Multi-Covert Channel Attack in the Cloud.
Proceedings of the 6th International Conference on Software Defined Systems, 2019

Remote Attestation as a Service for IoT.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

2018
OSSINT - Open Source Social Network Intelligence: An efficient and effective way to uncover "private" information in OSN profiles.
Online Soc. Networks Media, 2018

Have You Stolen My Model? Evasion Attacks Against Deep Neural Network Watermarking Techniques.
CoRR, 2018

Initial Reference Architecture of an Intelligent Autonomous Agent for Cyber Defense.
CoRR, 2018

Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecture.
Proceedings of the International Conference on Military Communications and Information Systems, 2018

Distributed Services Attestation in IoT.
Proceedings of the From Database to Cyber Security, 2018

2017
SOF on Trial. The Technical and Legal Value of Battlefield Digital Forensics in Court.
Proceedings of the Information Systems Security - 13th International Conference, 2017

Know Your Enemy: Stealth Configuration-Information Gathering in SDN.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

2016
Analyzing Android Encrypted Network Traffic to Identify User Actions.
IEEE Trans. Inf. Forensics Secur., 2016

AHEAD: A New Architecture for Active Defense.
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, 2016

FedUp! Cloud Federation as a Service.
Proceedings of the Service-Oriented and Cloud Computing, 2016

Anonymity in an Electronic Society: A Survey.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016

2015
Obfuscation of Sensitive Data for Incremental Release of Network Flows.
IEEE/ACM Trans. Netw., 2015

Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers.
Int. J. Secur. Networks, 2015

No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track User Position.
CoRR, 2015

No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position.
Proceedings of the Network and System Security - 9th International Conference, 2015

Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Boten ELISA: A novel approach for botnet C&C in Online Social Networks.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Bypassing Censorship: A Proven Tool against the Recent Internet Censorship in Turkey.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

2013
Preserving privacy against external and internal threats in WSN data aggregation.
Telecommun. Syst., 2013

Mapping the File Systems Genome: rationales, technique, results and applications.
CoRR, 2013

Obsidian: A scalable and efficient framework for NetFlow obfuscation.
Proceedings of the 2013 Proceedings IEEE INFOCOM Workshops, 2013

Uniqueness of the file systems genome: Supporting arguments and massive experimental measurements.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

2012
DDoS Detection with Information Theory Metrics and Netflows - A Real Case.
Proceedings of the SECRYPT 2012, 2012

Obfuscation of sensitive data in network flows.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Large-Scale Traffic Anomaly Detection: Analysis of Real Netflow Datasets.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2012

Relieve Internet Routing Security of Public Key Infrastructure.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

2011
Securing Topology Maintenance Protocols for Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2011

Distributed Detection of Clone Attacks in Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2011

Secure topology maintenance and events collection in WSNs.
Secur. Commun. Networks, 2011

MhRep: Multi-hop Replication Scheme for Data Survival in Unattended Wireless Sensor Networks.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops, 2011

Replication Schemes in Unattended Wireless Sensor Networks.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

2010
eRIPP-FS: Enforcing privacy and security in RFID.
Secur. Commun. Networks, 2010

Hierarchies of keys in secure multicast communications.
J. Comput. Secur., 2010

The smallville effect: social ties make mobile networks more secure against node capture attack.
Proceedings of the 8th ACM International Workshop on Mobility Management & Wireless Access, 2010

Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Data Security in Unattended Wireless Sensor Networks.
IEEE Trans. Computers, 2009

Privacy-preserving robust data aggregation in wireless sensor networks.
Secur. Commun. Networks, 2009

Distributed data source verification in wireless sensor networks.
Inf. Fusion, 2009

Mobility and Cooperation to Thwart Node Capture Attacks in MANETs.
EURASIP J. Wirel. Commun. Netw., 2009

Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks.
Ad Hoc Networks, 2009

The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks.
Proceedings of the Wired/Wireless Internet Communications, 7th International Conference, 2009

Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN.
Proceedings of the Security and Privacy in Communication Networks, 2009

Resource Management with X.509 Inter-domain Authorization Certificates (InterAC).
Proceedings of the Public Key Infrastructures, Services and Applications, 2009

2008
Redoubtable Sensor Networks.
ACM Trans. Inf. Syst. Secur., 2008

Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary.
IACR Cryptol. ePrint Arch., 2008

Scalable and Efficient Provable Data Possession.
IACR Cryptol. ePrint Arch., 2008

Special Issue: Hot Topics in Peer-to-Peer Systems.
Concurr. Comput. Pract. Exp., 2008

Emergent properties: detection of the node-capture attack in mobile wireless sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

A Live Digital Forensic system for Windows networks.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Catch Me (If You Can): Data Survival in Unattended Sensor Networks.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

2007
Robust RSA distributed signatures for large-scale long-lived ad hoc networks.
J. Comput. Secur., 2007

ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks.
Ad Hoc Networks, 2007

RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks.
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2007

Towards threat-adaptive dynamic fragment replication in large scale distributed systems.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

Addressing interoperability issues in access control models.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

Bio-Inspired Topology Maintenance Protocols for Secure Wireless Sensor Networks.
Proceedings of the Bio-Inspired Computing and Communication, 2007

Information Hiding for Spatial and Geographical Data.
Proceedings of the Spatial Data on the Web, Modeling and Management., 2007

2006
Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks.
Wirel. Networks, 2006

Efficient and Adaptive Threshold Signatures for Ad hoc networks.
Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, 2006

Preface.
Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, 2006

Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN.
Proceedings of the IEEE International Conference on Systems, 2006

Sensor Networks that Are Provably Resilient.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

A robust watermarking system based on <i>SVD</i> compression.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Secure Cooperative Channel Establishment inWireless Sensor Networks.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

A Secure and Efficient Large Scale Distributed System for Data Sharing.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

Scheduling Hard-Real-Time Tasks with Backup Phasing Delay.
Proceedings of the 10th IEEE International Symposium on Distributed Simulation and Real-Time Applications (DS-RT 2006), 2006

Addressing the shortcomings of one-way chains.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Graph-based specification of access control policies.
J. Comput. Syst. Sci., 2005

Short Paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

A Blind Method for Digital Watermarking Attacks.
Proceedings of the Internet and Multimedia Systems and Applications, 2005

2004
Key management for high bandwidth secure multicast.
J. Comput. Secur., 2004

Connectivity properties of secure wireless sensor networks.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004

Towards a formal model for security policies specification and validation in the selinux system.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

Administrative scope in the graph-based framework.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004

Towards a secure dynamic allocation of files in large scale distributed file systems.
Proceedings of the International Workshop on Hot Topics in Peer-to-Peer Systems, 2004

BaRT, balanced randomized tree: a scalable and distributed protocol for lookup in peer-to-peer networks.
Proceedings of the International Workshop on Hot Topics in Peer-to-Peer Systems, 2004

A Host Intrusion Prevention System for Windows Operating Systems.
Proceedings of the Computer Security, 2004

Information Flow Analysis for File Systems and Databases Using Labels.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

2003
Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems.
IEEE Trans. Parallel Distributed Syst., 2003

Security and privacy issues of handheld and wearable wireless devices.
Commun. ACM, 2003

Providing secrecy in key management protocols for large wireless sensors networks.
Ad Hoc Networks, 2003

A Reliable Key Authentication Schema for Secure Multicast Communications.
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003

A Time Driven Methodology for Key Dimensioning in Multicast Communications.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Random key-assignment for secure Wireless Sensor Networks.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks.
Proceedings of the 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 2003

2002
A graph-based formalism for RBAC.
ACM Trans. Inf. Syst. Secur., 2002

Remus: a security-enhanced operating system.
ACM Trans. Inf. Syst. Secur., 2002

Secure Selective Exclusion in Ad Hoc Wireless Network.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Efficient and secure keys management for wireless mobile communications.
Proceedings of the 2002 Workshop on Principles of Mobile Computing, 2002

Conflict Detection and Resolution in Access Control Policy Specifications.
Proceedings of the Foundations of Software Science and Computation Structures, 2002

Formal Specification for Fast Automatic IDS Training.
Proceedings of the Formal Aspects of Security, First International Conference, 2002

Decidability of Safety in Graph-Based Models for Access Control.
Proceedings of the Computer Security, 2002

2001
Graph Transformations for the Specification of Access Control Policies.
Proceedings of the GETGRATS Closing Workshop 2001, Bordeaux, France, June 22-23, 2001, 2001

On the specification and evolution of access control policies.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

Foundations for a Graph-Based Approach to the Specification of Access Control Policies.
Proceedings of the Foundations of Software Science and Computation Structures, 2001

2000
ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems.
IEEE Trans. Knowl. Data Eng., 2000

Flexible Transaction Dependencies in Database Systems.
Distributed Parallel Databases, 2000

Workshop on Personal Computer Based Networks of Workstation.
Proceedings of the Parallel and Distributed Processing, 2000

A Formal Model for Role-Based Access Control Using Graph Transformation.
Proceedings of the Computer Security, 2000

Operating system enhancements to prevent the misuse of system calls.
Proceedings of the CCS 2000, 2000

Enhancements to the Linux Kernel for Blocking Buffer Overflow Based Attacks.
Proceedings of the 4th Annual Linux Showcase & Conference 2000, 2000

1999
Fault-Tolerant Rate-Monotonic First-Fit Scheduling in Hard-Real-Time Systems.
IEEE Trans. Parallel Distributed Syst., 1999

GAMMA on DEC 2114x with Efficient Flow Control.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

1998
Advanced Transaction Processing in Multilevel Secure File Stores.
IEEE Trans. Knowl. Data Eng., 1998

A Fair Locking Protocol for Multilevel Secure Databases.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

Deadlock Detection in the Face of Transaction and Data Dependencies in Advanced Transaction Models.
Proceedings of the Application and Theory of Petri Nets 1998, 1998

1997
Two Implementation Relations and the Correctness of Communicating Replicated Processes.
Formal Aspects Comput., 1997

Fault-Tolerant Deadline-Monotonic Algorithm for Scheduling Hard-Real-Time Tasks.
Proceedings of the 11th International Parallel Processing Symposium (IPPS '97), 1997

Flexible Commit Protocols for Advanced Transaction Processing.
Proceedings of the Advanced Transaction Models and Architectures, 1997

1996
Secure Concurrency Control in MLS Databases with Two Versions of Data.
Proceedings of the Computer Security, 1996

Secure Locking Protocols for Multilevel Database Management Systems.
Proceedings of the Database Security Volume X, 1996

An Advanced Commit Protocol for MLS Distributed Database Systems.
Proceedings of the CCS '96, 1996

1995
Increasing Processor Utilization in Hard-Real-Time Systems with Checkpoints.
Real Time Syst., 1995

1994
Scheduling Algorithms for Fault-Tolerance in Hard-Real-Time Systems.
Real Time Syst., 1994

Collecting garbage in multilevel secure object stores.
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994

Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems.
Proceedings of the Computer Security, 1994

1993
The Duality of Fault-tolerant System Structures.
Softw. Pract. Exp., 1993

Modelling Replicated Processing.
Proceedings of the PARLE '93, 1993

1992
Fault-tolerant LPT task scheduling in multiprocessor systems.
Microprocess. Microsystems, 1992

Garbage Collection and Reachability
Proceedings of the Persistent Object Systems, 1992

Specification of Concurrency Control in Persistent Programming Languages.
Proceedings of the Persistent Object Systems, 1992

1991
Fault-Tolerant Reference Counting for Garbage Collection in Distributed Systems.
Comput. J., 1991

Copying Garbage Collection for Distributed Object Stores.
Proceedings of the Tenth Symposium on Reliable Distributed Systems, 1991

Formalising Replicated Distributed Processing.
Proceedings of the Tenth Symposium on Reliable Distributed Systems, 1991

1989
Reliability issues in the design of distributed object-based architectures.
PhD thesis, 1989

Synchronizing events in replicated systems.
J. Syst. Softw., 1989

Proving Correctness Properties of a Replicated Synchronous Program.
Comput. J., 1989

Replication within atomic actions and conversations: a case study in fault-tolerance duality.
Proceedings of the Nineteenth International Symposium on Fault-Tolerant Computing, 1989

1988
A Technique for Subclassing and its Implementation Exploiting Polymorphic Procedures.
Softw. Pract. Exp., 1988

Hoare logic of distributed redundant systems.
Comput. Syst. Sci. Eng., 1988

Towards a Theory of Replicated Processing.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 1988

1986
Modular Redundancy in a Message Passing System.
IEEE Trans. Software Eng., 1986

Formal specification of N-modular redundancy.
Proceedings of the 14th ACM Annual Conference on Computer Science, 1986


  Loading...