Luigi V. Mancini
Orcid: 0000-0003-4859-2191
According to our database1,
Luigi V. Mancini
authored at least 162 papers
between 1986 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Comput. Electron. Agric., January, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Adversarial Challenges in Network Intrusion Detection Systems: Research Insights and Future Prospects.
CoRR, 2024
CoRR, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
2023
IEEE Trans. Inf. Forensics Secur., 2023
2022
Evading behavioral classifiers: a comprehensive analysis on evading ransomware detection techniques.
Neural Comput. Appl., 2022
TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding.
CoRR, 2022
MaleficNet: Hiding Malware into Deep Neural Networks Using Spread-Spectrum Channel Coding.
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
2021
Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks.
IEEE Intell. Syst., 2021
Evaluating the Robustness of Geometry-Aware Instance-Reweighted Adversarial Training.
CoRR, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Emerg. Top. Comput., 2020
Proceedings of the Network and System Security - 14th International Conference, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020
2019
Proceedings of the 6th International Conference on Software Defined Systems, 2019
Proceedings of the 6th International Conference on Software Defined Systems, 2019
Proceedings of the 6th International Conference on Software Defined Systems, 2019
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019
2018
OSSINT - Open Source Social Network Intelligence: An efficient and effective way to uncover "private" information in OSN profiles.
Online Soc. Networks Media, 2018
Have You Stolen My Model? Evasion Attacks Against Deep Neural Network Watermarking Techniques.
CoRR, 2018
CoRR, 2018
Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecture.
Proceedings of the International Conference on Military Communications and Information Systems, 2018
Proceedings of the From Database to Cyber Security, 2018
2017
SOF on Trial. The Technical and Legal Value of Battlefield Digital Forensics in Court.
Proceedings of the Information Systems Security - 13th International Conference, 2017
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, 2016
Proceedings of the Service-Oriented and Cloud Computing, 2016
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016
2015
IEEE/ACM Trans. Netw., 2015
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers.
Int. J. Secur. Networks, 2015
No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track User Position.
CoRR, 2015
No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position.
Proceedings of the Network and System Security - 9th International Conference, 2015
Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2014
Bypassing Censorship: A Proven Tool against the Recent Internet Censorship in Turkey.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014
No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014
2013
Telecommun. Syst., 2013
CoRR, 2013
Proceedings of the 2013 Proceedings IEEE INFOCOM Workshops, 2013
Uniqueness of the file systems genome: Supporting arguments and massive experimental measurements.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
2012
DDoS Detection with Information Theory Metrics and Netflows - A Real Case.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2012
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012
2011
IEEE Trans. Dependable Secur. Comput., 2011
IEEE Trans. Dependable Secur. Comput., 2011
Secur. Commun. Networks, 2011
MhRep: Multi-hop Replication Scheme for Data Survival in Unattended Wireless Sensor Networks.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops, 2011
Proceedings of the 4th IFIP International Conference on New Technologies, 2011
2010
The smallville effect: social ties make mobile networks more secure against node capture attack.
Proceedings of the 8th ACM International Workshop on Mobility Management & Wireless Access, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Secur. Commun. Networks, 2009
EURASIP J. Wirel. Commun. Netw., 2009
Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks.
Ad Hoc Networks, 2009
Proceedings of the Wired/Wireless Internet Communications, 7th International Conference, 2009
Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN.
Proceedings of the Security and Privacy in Communication Networks, 2009
Proceedings of the Public Key Infrastructures, Services and Applications, 2009
2008
Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary.
IACR Cryptol. ePrint Arch., 2008
Concurr. Comput. Pract. Exp., 2008
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008
2007
J. Comput. Secur., 2007
ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks.
Ad Hoc Networks, 2007
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks.
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2007
Towards threat-adaptive dynamic fragment replication in large scale distributed systems.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the Bio-Inspired Computing and Communication, 2007
Proceedings of the Spatial Data on the Web, Modeling and Management., 2007
2006
Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks.
Wirel. Networks, 2006
Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, 2006
Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, 2006
Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN.
Proceedings of the IEEE International Conference on Systems, 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006
Proceedings of the 10th IEEE International Symposium on Distributed Simulation and Real-Time Applications (DS-RT 2006), 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
2005
Short Paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
A Blind Method for Digital Watermarking Attacks.
Proceedings of the Internet and Multimedia Systems and Applications, 2005
2004
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004
Towards a formal model for security policies specification and validation in the selinux system.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004
Towards a secure dynamic allocation of files in large scale distributed file systems.
Proceedings of the International Workshop on Hot Topics in Peer-to-Peer Systems, 2004
BaRT, balanced randomized tree: a scalable and distributed protocol for lookup in peer-to-peer networks.
Proceedings of the International Workshop on Hot Topics in Peer-to-Peer Systems, 2004
Proceedings of the Computer Security, 2004
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004
2003
Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems.
IEEE Trans. Parallel Distributed Syst., 2003
Commun. ACM, 2003
Ad Hoc Networks, 2003
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003
A Time Driven Methodology for Key Dimensioning in Multicast Communications.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003
LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks.
Proceedings of the 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 2003
2002
Secure Selective Exclusion in Ad Hoc Wireless Network.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
Proceedings of the 2002 Workshop on Principles of Mobile Computing, 2002
Proceedings of the Foundations of Software Science and Computation Structures, 2002
Proceedings of the Formal Aspects of Security, First International Conference, 2002
Proceedings of the Computer Security, 2002
2001
Proceedings of the GETGRATS Closing Workshop 2001, Bordeaux, France, June 22-23, 2001, 2001
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001
Foundations for a Graph-Based Approach to the Specification of Access Control Policies.
Proceedings of the Foundations of Software Science and Computation Structures, 2001
2000
IEEE Trans. Knowl. Data Eng., 2000
Distributed Parallel Databases, 2000
Proceedings of the Parallel and Distributed Processing, 2000
Proceedings of the Computer Security, 2000
Proceedings of the CCS 2000, 2000
Proceedings of the 4th Annual Linux Showcase & Conference 2000, 2000
1999
IEEE Trans. Parallel Distributed Syst., 1999
GAMMA on DEC 2114x with Efficient Flow Control.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999
1998
IEEE Trans. Knowl. Data Eng., 1998
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998
Deadlock Detection in the Face of Transaction and Data Dependencies in Advanced Transaction Models.
Proceedings of the Application and Theory of Petri Nets 1998, 1998
1997
Two Implementation Relations and the Correctness of Communicating Replicated Processes.
Formal Aspects Comput., 1997
Proceedings of the 11th International Parallel Processing Symposium (IPPS '97), 1997
Flexible Commit Protocols for Advanced Transaction Processing.
Proceedings of the Advanced Transaction Models and Architectures, 1997
1996
Proceedings of the Computer Security, 1996
Secure Locking Protocols for Multilevel Database Management Systems.
Proceedings of the Database Security Volume X, 1996
Proceedings of the CCS '96, 1996
1995
Real Time Syst., 1995
1994
Real Time Syst., 1994
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994
Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems.
Proceedings of the Computer Security, 1994
1993
1992
Microprocess. Microsystems, 1992
Garbage Collection and Reachability
Proceedings of the Persistent Object Systems, 1992
Specification of Concurrency Control in Persistent Programming Languages.
Proceedings of the Persistent Object Systems, 1992
1991
Comput. J., 1991
Proceedings of the Tenth Symposium on Reliable Distributed Systems, 1991
Proceedings of the Tenth Symposium on Reliable Distributed Systems, 1991
1989
PhD thesis, 1989
Replication within atomic actions and conversations: a case study in fault-tolerance duality.
Proceedings of the Nineteenth International Symposium on Fault-Tolerant Computing, 1989
1988
A Technique for Subclassing and its Implementation Exploiting Polymorphic Procedures.
Softw. Pract. Exp., 1988
Hoare logic of distributed redundant systems.
Comput. Syst. Sci. Eng., 1988
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 1988
1986
Proceedings of the 14th ACM Annual Conference on Computer Science, 1986