Maurantonio Caprolu

Orcid: 0000-0001-8237-0539

According to our database1, Maurantonio Caprolu authored at least 22 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Watch Nearby! Privacy Analysis of the People Nearby Service of Telegram.
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024

Characterizing Polkadot's Transactions Ecosystem: methodology, tools, and insights.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2024

2023
Characterizing the 2022- Russo-Ukrainian Conflict Through the Lenses of Aspect-Based Sentiment Analysis: Dataset, Methodology, and Key Findings.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

Account Clustering in the Polkadot Network: Heuristic, Experiments, and Insights.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

Understanding Polkadot Through Graph Analysis: Transaction Model, Network Properties, and Insights.
Proceedings of the Financial Cryptography and Data Security, 2023

UBIC-A Blockchain-Less Cryptocurrency.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2023

2022
Characterizing the 2022 Russo-Ukrainian Conflict Through the Lenses of Aspect-Based Sentiment Analysis: Dataset, Methodology, and Preliminary Findings.
CoRR, 2022

Analysis of Polkadot: Architecture, Internals, and Contradictions.
Proceedings of the IEEE International Conference on Blockchain, 2022

2021
New Dimensions of Information Warfare
Advances in Information Security 84, Springer, ISBN: 978-3-030-60617-6, 2021

Foundations, Properties, and Security Applications of Puzzles: A Survey.
ACM Comput. Surv., 2021

A Novel Framework for the Analysis of Unknown Transactions in Bitcoin: Theory, Model, and Experimental Results.
CoRR, 2021

Short-Range Audio Channels Security: Survey of Mechanisms, Applications, and Research Challenges.
IEEE Commun. Surv. Tutorials, 2021

Cryptomining makes noise: Detecting cryptojacking via Machine Learning.
Comput. Commun., 2021

Beyond SolarWinds: The Systemic Risks of Critical Infrastructures, State of Play, Future Directions.
Proceedings of the Italian Conference on Cybersecurity, 2021

Analysis and Patterns of Unknown Transactions in Bitcoin.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

2020
Vessels Cybersecurity: Issues, Challenges, and the Road Ahead.
IEEE Commun. Mag., 2020

New Dimensions of Information Warfare: The Economic Pillar - Fintech and Cryptocurrencies.
Proceedings of the Risks and Security of Internet and Systems, 2020

2019
FORTRESS: An Efficient and Distributed Firewall for Stateful Data Plane SDN.
Secur. Commun. Networks, 2019

Crypto Mining Makes Noise.
CoRR, 2019

Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open Issues.
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019

Intrusion Detection at the Network Edge: Solutions, Limitations, and Future Directions.
Proceedings of the Edge Computing - EDGE 2019, 2019

Edge Computing Perspectives: Architectures, Technologies, and Open Security Issues.
Proceedings of the 3rd IEEE International Conference on Edge Computing, 2019


  Loading...