Mauro Conti
Orcid: 0000-0002-3612-1934Affiliations:
- University of Padua, Italy
According to our database1,
Mauro Conti
authored at least 681 papers
between 1989 and 2025.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2022, "for contributions to communications network security".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on scopus.com
-
on orcid.org
-
on d-nb.info
On csauthors.net:
Bibliography
2025
Proc. Priv. Enhancing Technol., 2025
J. Netw. Comput. Appl., 2025
Future Gener. Comput. Syst., 2025
Beyond the west: Revealing and bridging the gap between Western and Chinese phishing website detection.
Comput. Secur., 2025
2024
IEEE Trans. Mob. Comput., December, 2024
Decentralized and Privacy-Preserving Smart Parking With Secure Repetition and Full Verifiability.
IEEE Trans. Mob. Comput., December, 2024
IEEE Netw., November, 2024
Clust. Comput., November, 2024
Evaporative Angle: A Generative Approach to Mitigate Jamming Attacks in DOA Estimation.
IEEE Wirel. Commun. Lett., October, 2024
XAITrafficIntell: Interpretable Cyber Threat Intelligence for Darknet Traffic Analysis.
J. Netw. Syst. Manag., October, 2024
SFC-NIDS: a sustainable and explainable flow filtering based concept drift-driven security approach for network introspection.
Clust. Comput., October, 2024
SPRITZ-PS: validation of synthetic face images using a large dataset of printed documents.
Multim. Tools Appl., August, 2024
Cost-Effective Authenticated Solution (CAS) for 6G-Enabled Artificial Intelligence of Medical Things (AIoMT).
IEEE Internet Things J., July, 2024
Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities.
Clust. Comput., July, 2024
Introduction to the Special Issue on Integrity of Multimedia and Multimodal Data in Internet of Things.
ACM Trans. Multim. Comput. Commun. Appl., June, 2024
RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things.
Clust. Comput., June, 2024
IEEE Trans. Knowl. Data Eng., May, 2024
Secure Source Identification Scheme for Revocable Instruction Sharing in Vehicle Platoon.
IEEE Trans. Intell. Transp. Syst., May, 2024
RANGO: A Novel Deep Learning Approach to Detect Drones Disguising from Video Surveillance Systems.
ACM Trans. Intell. Syst. Technol., April, 2024
ACM Trans. Cyber Phys. Syst., April, 2024
Internet Things, April, 2024
IEEE Trans. Intell. Transp. Syst., March, 2024
IEEE Internet Things J., March, 2024
Future Gener. Comput. Syst., March, 2024
A Location-Aware and Healing Attestation Scheme for Air-Supported Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., February, 2024
Enabling Low Sidelobe Secret Multicast Transmission for mmWave Communication: An Integrated Oblique Projection Approach.
IEEE Trans. Wirel. Commun., January, 2024
VAIDANSHH: Adaptive DDoS detection for heterogeneous hosts in vehicular environments.
Veh. Commun., 2024
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization.
IEEE Trans. Serv. Comput., 2024
Time-Restricted, Verifiable, and Efficient Query Processing Over Encrypted Data on Cloud.
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Secur. Priv., 2024
Fingerprint membership and identity inference against generative adversarial networks.
Pattern Recognit. Lett., 2024
AALMOND: Decentralized Adaptive Access Control of Multiparty Data Sharing in Industrial Networks.
IEEE Internet Things J., 2024
Security and Privacy of Smart Waste Management Systems: A Cyber-Physical System Perspective.
IEEE Internet Things J., 2024
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices.
IEEE Secur. Priv., 2024
IACR Cryptol. ePrint Arch., 2024
EDIT: A data inspection tool for smart contracts temporal behavior modeling and prediction.
Future Gener. Comput. Syst., 2024
Lights Toward Adversarial Machine Learning: The Achilles Heel of Artificial Intelligence.
IEEE Intell. Syst., 2024
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors Using Machine Learning.
DTRAP, 2024
Revealing The Secret Power: How Algorithms Can Influence Content Visibility on Social Media.
CoRR, 2024
CoRR, 2024
The Impact of SBOM Generators on Vulnerability Assessment in Python: A Comparison and a Novel Approach.
CoRR, 2024
MoRSE: Bridging the Gap in Cybersecurity Expertise with Retrieval Augmented Generation.
CoRR, 2024
Your Car Tells Me Where You Drove: A Novel Path Inference Attack via CAN Bus and OBD-II Data.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks.
CoRR, 2024
A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols.
CoRR, 2024
Comput. Secur., 2024
SPARQ: SYN Protection using Acyclic Redundancy check and Quartile range on P4 switches.
Comput. Commun., 2024
Comput. Commun., 2024
SYNTROPY: TCP SYN DDoS attack detection for Software Defined Network based on Rényi entropy.
Comput. Networks, 2024
Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing.
Comput. Networks, 2024
LFGurad: A Defense against Label Flipping Attack in Federated Learning for Vehicular Network.
Comput. Networks, 2024
vDefender: An explainable and introspection-based approach for identifying emerging malware behaviour at hypervisor-layer in virtualization environment.
Comput. Electr. Eng., 2024
IEEE Access, 2024
"Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages.
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the 2024 ACM Workshop on Wireless Security and Machine Learning, 2024
CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems.
Proceedings of the 2024 ACM Workshop on Wireless Security and Machine Learning, 2024
Proceedings of the 2024 ACM Workshop on Wireless Security and Machine Learning, 2024
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024
Proceedings of the 20th International Conference on Wireless and Mobile Computing, 2024
"They Will Adapt": Improving Anomaly Detection on IoT Networks Through Continuous Learning.
Proceedings of the 20th International Conference on Wireless and Mobile Computing, 2024
Privacy-Preserving Data Aggregation with Public Verifiability Against Internal Adversaries.
Proceedings of the 33rd USENIX Security Symposium, 2024
It Doesn't Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
Proceedings of the Natural Language Processing and Information Systems, 2024
Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments.
Proceedings of the 10th IEEE International Conference on Network Softwarization, 2024
Proceedings of the Eighteenth International AAAI Conference on Web and Social Media, 2024
Covert & Side Stories: Threats Evolution in Traditional and Modern Technologies.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
LightKey: Lightweight and Secure Key Agreement Protocol for Effective Communication in Internet of Vehicles.
Proceedings of the 25th International Conference on Distributed Computing and Networking, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Secure, Available, Verifiable, and Efficient Range Query Processing on Outsourced Datasets.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Work-in-Progress: Crash Course: Can (Under Attack) Autonomous Driving Beat Human Drivers?
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
Proceedings of the 2024 Workshop on Artificial Intelligence and Security, 2024
Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of Language Models.
Proceedings of the 2024 Workshop on Artificial Intelligence and Security, 2024
Proceedings of the Applied Cryptography and Network Security, 2024
One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
ACM Trans. Web, November, 2023
Comput. Commun., November, 2023
BENIGREEN: Blockchain-Based Energy-Efficient Privacy-Preserving Scheme for Green IoT.
IEEE Internet Things J., September, 2023
A review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification.
IET Cyper-Phys. Syst.: Theory & Appl., September, 2023
Comput. Secur., September, 2023
Comput. Commun., September, 2023
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach.
Comput. Commun., September, 2023
Online Soc. Networks Media, July, 2023
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics.
J. Cybersecur. Priv., July, 2023
Internet Things, July, 2023
Neurocomputing, July, 2023
Employing Deep Ensemble Learning for Improving the Security of Computer Networks Against Adversarial Attacks.
IEEE Trans. Netw. Serv. Manag., June, 2023
IEEE Trans. Netw. Serv. Manag., June, 2023
Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain.
IEEE Trans. Netw. Serv. Manag., June, 2023
Guest Editorial: Cyber-Physical Threats and Solutions for Autonomous Transportation Systems.
IEEE Trans. Ind. Informatics, June, 2023
Comput. Ind., June, 2023
An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems.
Comput. Commun., May, 2023
Dataset for the paper: Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel.
Dataset, May, 2023
Deep Neural Networks for Direction of Arrival Estimation of Multiple Targets With Sparse Prior for Line-of-Sight Scenarios.
IEEE Trans. Veh. Technol., April, 2023
Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion.
IEEE Trans. Veh. Technol., April, 2023
Intrusion Detection Framework for Invasive FPV Drones Using Video Streaming Characteristics.
ACM Trans. Cyber Phys. Syst., April, 2023
Int. J. Inf. Sec., April, 2023
IEEE Wirel. Commun. Lett., March, 2023
Proc. Priv. Enhancing Technol., January, 2023
Wirel. Pers. Commun., 2023
IEEE Trans. Wirel. Commun., 2023
Adaptive Intrusion Detection in Edge Computing Using Cerebellar Model Articulation Controller and Spline Fit.
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Comput. Soc. Syst., 2023
BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication.
Pervasive Mob. Comput., 2023
SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model.
IACR Cryptol. ePrint Arch., 2023
Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey.
ACM Comput. Surv., 2023
BlindSage: Label Inference Attacks against Node-level Vertical Federated Graph Neural Networks.
CoRR, 2023
EPUF: A Novel Scheme Based on Entropy Features of Latency-based DRAM PUFs Providing Lightweight Authentication in IoT Networks.
CoRR, 2023
CoRR, 2023
Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations.
CoRR, 2023
Temporal Dynamics of Coordinated Online Behavior: Stability, Archetypes, and Influence.
CoRR, 2023
CoRR, 2023
IEEE Commun. Surv. Tutorials, 2023
IEEE Access, 2023
The Impact of Covid-19 on Online Discussions: the Case Study of the Sanctioned Suicide Forum.
Proceedings of the ACM Web Conference 2023, 2023
BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023
Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms.
Proceedings of the 15th ACM Web Science Conference 2023, 2023
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Twitter Bots Influence on the Russo-Ukrainian War During the 2022 Italian General Elections.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the IEEE Sensors Applications Symposium, 2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the 18th Conference on Computer Science and Intelligence Systems, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
PAID: Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems.
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 2023
Attribute Inference Attacks in Online Multiplayer Video Games: A Case Study on DOTA2.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation.
Proceedings of the IEEE International Conference on Big Data, 2023
If You're Scanning This, It's Too Late! A QR Code-Based Fuzzing Methodology to Identify Input Vulnerabilities in Mobile Apps.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
Proceedings of the Applied Cryptography and Network Security, 2023
STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
IEEE Trans. Netw. Serv. Manag., December, 2022
SPRITZ-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents.
Dataset, September, 2022
Dataset, March, 2022
SEnD: A Social Network Friendship Enhanced Decentralized System to Circumvent Censorships.
IEEE Trans. Serv. Comput., 2022
IEEE/ACM Trans. Netw., 2022
IEEE Trans. Netw. Serv. Manag., 2022
DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2022
Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks.
IEEE Trans. Green Commun. Netw., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IEEE Trans. Cloud Comput., 2022
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions.
J. Netw. Comput. Appl., 2022
J. Netw. Comput. Appl., 2022
J. Comput. Secur., 2022
IT Prof., 2022
J. Inf. Secur. Appl., 2022
CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks.
J. Inf. Secur. Appl., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Fast Multi-party Private Set Operations in the Star Topology from Secure ANDs and ORs.
IACR Cryptol. ePrint Arch., 2022
On the Vulnerability of Data Points under Multiple Membership Inference Attacks and Target Models.
CoRR, 2022
ICSSIM-A Framework for Building Industrial Control Systems Security Simulation Testbeds.
CoRR, 2022
SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks.
CoRR, 2022
CoRR, 2022
Hide and Seek - Preserving Location Privacy and Utility in the Remote Identification of Unmanned Aerial Vehicles.
CoRR, 2022
Vulnerability Analysis and Performance Enhancement of Authentication Protocol in Dynamic Wireless Power Transfer Systems.
CoRR, 2022
Unmanned Aerial Vehicles Meet Reflective Intelligent Surfaces to Improve Coverage and Secrecy.
CoRR, 2022
CoRR, 2022
CoRR, 2022
Computing, 2022
Comput. Secur., 2022
A few-shot malware classification approach for unknown family recognition using malware feature visualization.
Comput. Secur., 2022
An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions.
Comput. Secur., 2022
A machine learning-based approach to detect threats in bio-cyber DNA storage systems.
Comput. Commun., 2022
ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags.
Comput. Networks, 2022
A PLS-HECC-based device authentication and key agreement scheme for smart home networks.
Comput. Networks, 2022
SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones.
Comput. Networks, 2022
Comput. Networks, 2022
Comput. Electr. Eng., 2022
DeBot: A deep learning-based model for bot detection in industrial internet-of-things.
Comput. Electr. Eng., 2022
Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey.
IEEE Access, 2022
Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews.
IEEE Access, 2022
Proceedings of the WiseML@WiSec 2022: Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning, 2022
Proceedings of the WebSci '22: 14th ACM Web Science Conference 2022, Barcelona, Spain, June 26, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 43rd IEEE Security and Privacy, 2022
SWAP: Secure Warning Messages Authentication and Propagation in Internet of Vehicles.
Proceedings of the 30th International Conference on Software, 2022
VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks.
Proceedings of the 19th Annual IEEE International Conference on Sensing, 2022
What you see is not what you get: a man-in-the-middle attack applied to video channels.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2022
Should I Mine or Should I Break: On the Worthiness of Brute-Forcing Cryptocurrency Addresses.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the IEEE International Symposium on Measurements & Networking, 2022
Proceedings of the International Symposium on Networks, Computers and Communications, 2022
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the Information and Communications Security - 24th International Conference, 2022
Proceedings of the IEEE International Conference on Digital Health, 2022
Proceedings of the ICDCN '22: 23rd International Conference on Distributed Computing and Networking, Delhi, AA, India, January 4, 2022
Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection.
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the IEEE Intl. Conf. on Dependable, 2022
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022
Proceedings of the Cryptology and Network Security - 21st International Conference, 2022
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022
Proceedings of the 4th IEEE International Conference on Artificial Intelligence Circuits and Systems, 2022
SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning.
Proceedings of the Annual Computer Security Applications Conference, 2022
Proceedings of the Applied Cryptography and Network Security Workshops, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Editorial for the Special Issue on Sustainable Cyber Forensics and Threat Intelligence.
IEEE Trans. Sustain. Comput., 2021
IEEE Trans. Netw. Serv. Manag., 2021
IEEE Trans. Netw. Serv. Manag., 2021
Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain.
IEEE Trans. Netw. Serv. Manag., 2021
IEEE Trans. Netw. Serv. Manag., 2021
DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks.
IEEE Trans. Emerg. Top. Comput., 2021
Telecommun. Syst., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
Introduction to the Special Issue on Security and Privacy for Connected Cyber-physical Systems.
ACM Trans. Cyber Phys. Syst., 2021
A holistic approach to power efficiency in a clock offset based Intrusion Detection Systems for Controller Area Networks.
Pervasive Mob. Comput., 2021
J. Netw. Comput. Appl., 2021
Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps.
Int. J. Inf. Sec., 2021
ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN.
Int. J. Inf. Sec., 2021
Future Gener. Comput. Syst., 2021
Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications.
Future Gener. Comput. Syst., 2021
Future Gener. Comput. Syst., 2021
Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions.
Comput. Sci. Rev., 2021
A cross-domain qualitative meta-analysis of digital forensics: Research trends, challenges, and emerging topics.
CoRR, 2021
Do Not Deceive Your Employer with a Virtual Background: A Video Conferencing Manipulation-Detection System.
CoRR, 2021
IEEE Commun. Surv. Tutorials, 2021
IEEE Commun. Surv. Tutorials, 2021
BCHealth: A Novel Blockchain-based Privacy-Preserving Architecture for IoT Healthcare Applications.
Comput. Commun., 2021
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services.
Proceedings of the Security and Trust Management - 17th International Workshop, 2021
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021
Malingering Scraper: A Novel Framework to Reconstruct Honest Profiles from Malingerer Psychopathological Tests.
Proceedings of the Neural Information Processing - 28th International Conference, 2021
Proceedings of the ICDCN '21: International Conference on Distributed Computing and Networking, 2021
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021
Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current Demand.
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2021
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Proceedings of the CF '21: Computing Frontiers Conference, 2021
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
Proceedings of the Third International Conference on Blockchain Computing and Applications, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
Proceedings of the Applied Cryptography and Network Security, 2021
2020
TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks.
Wirel. Networks, 2020
IEEE Trans. Netw. Serv. Manag., 2020
DISPERSE: A Decentralized Architecture for Content Replication Resilient to Node Failures.
IEEE Trans. Netw. Serv. Manag., 2020
IEEE Trans. Netw. Sci. Eng., 2020
Blockchain-Enabled Secure Energy Trading With Verifiable Fairness in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Inf. Forensics Secur., 2020
Cryptomining Cannot Change Its Spots: Detecting Covert Cryptomining Using Magnetic Side-Channel.
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Emerg. Top. Comput., 2020
A Multilabel Fuzzy Relevance Clustering System for Malware Attack Attribution in the Edge Layer of Cyber-Physical Networks.
ACM Trans. Cyber Phys. Syst., 2020
IEEE Trans. Cloud Comput., 2020
Neural Comput. Appl., 2020
J. Netw. Comput. Appl., 2020
Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery.
IEEE Secur. Priv., 2020
Hum. centric Comput. Inf. Sci., 2020
Similarity-based Android malware detection using Hamming distance of static binary features.
Future Gener. Comput. Syst., 2020
ACM Comput. Surv., 2020
Sorry, Shodan is not Enough! Assessing ICS Security via IXP Network Traffic Analysis.
CoRR, 2020
IEEE Commun. Surv. Tutorials, 2020
Collective Remote Attestation at the Internet of Things Scale: State-of-the-Art and Future Challenges.
IEEE Commun. Surv. Tutorials, 2020
LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks.
Comput. Secur., 2020
Comput. Commun., 2020
Detection of algorithmically-generated domains: An adversarial machine learning approach.
Comput. Commun., 2020
Comput. Networks, 2020
Comput. Networks, 2020
TAMBUS: A novel authentication method through covert channels for securing industrial networks.
Comput. Networks, 2020
Can machine learning model with static features be fooled: an adversarial machine learning approach.
Clust. Comput., 2020
Ad Hoc Networks, 2020
Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements.
Adv. Comput., 2020
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Proceedings of the 2020 IEEE International Conference on Sensing, 2020
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
Proceedings of the Information Security - 23rd International Conference, 2020
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
Proceedings of the ICDCN 2020: 21st International Conference on Distributed Computing and Networking, 2020
STRIDE: Scalable and Secure Over-The-Air Software Update Scheme for Autonomous Vehicles.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
DE-auth of the Blue! Transparent De-authentication Using Bluetooth Low Energy Beacon.
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
Proceedings of the Working Notes of CLEF 2020, 2020
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020
Proof of Evolution: leveraging blockchain mining for a cooperative execution of Genetic Algorithms.
Proceedings of the IEEE International Conference on Blockchain, 2020
Reputation-based Trust: A robust mechanism for Dynamic Adaptive Streaming over Named Data Networking.
Proceedings of the 14th IEEE International Conference on Big Data Science and Engineering, 2020
Predicting Twitter Users' Political Orientation: An Application to the Italian Political Scenario.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2020
Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics.
Proceedings of the Advances in Human Factors in Cybersecurity, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
Proceedings of the Influence and Behavior Analysis in Social Networks and Social Media, 2019
LiMCA: an optimal clustering algorithm for lifetime maximization of internet of things.
Wirel. Networks, 2019
Wirel. Networks, 2019
J. Comput. Virol. Hacking Tech., 2019
IEEE Trans. Netw. Sci. Eng., 2019
ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System.
IEEE Trans. Ind. Informatics, 2019
IEEE Trans. Dependable Secur. Comput., 2019
Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 2.
IEEE Trans. Big Data, 2019
Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 1.
IEEE Trans. Big Data, 2019
FOCAN: A Fog-supported smart city network architecture for management of applications in the Internet of Everything environments.
J. Parallel Distributed Comput., 2019
J. Intell. Fuzzy Syst., 2019
J. Comput. Secur., 2019
AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones.
J. Inf. Secur. Appl., 2019
Int. J. Inf. Sec., 2019
SYN-Guard: An effective counter for SYN flooding attack in software-defined networking.
Int. J. Commun. Syst., 2019
A Novel FPGA Architecture and Protocol for the Self-attestation of Configurable Hardware.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
A machine learning based approach to detect malicious android apps using discriminant system calls.
Future Gener. Comput. Syst., 2019
SAND: Social-aware, network-failure resilient, and decentralized microblogging system.
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
CoRR, 2019
CoRR, 2019
Software defined service function chaining with failure consideration for fog computing.
Concurr. Comput. Pract. Exp., 2019
Concurr. Comput. Pract. Exp., 2019
Concurr. Comput. Pract. Exp., 2019
IEEE Commun. Surv. Tutorials, 2019
Efficient privacy preserving device authentication in WBANs for industrial e-health applications.
Comput. Secur., 2019
Joint failure recovery, fault prevention, and energy-efficient resource management for real-time SFC in fog-supported SDN.
Comput. Networks, 2019
Efficient physical intrusion detection in Internet of Things: A Node deployment approach.
Comput. Networks, 2019
Comput. Networks, 2019
Comput. Electr. Eng., 2019
Ad Hoc Networks, 2019
ChoKIFA: A New Detection and Mitigation Approach Against Interest Flooding Attacks in NDN.
Proceedings of the Wired/Wireless Internet Communications, 2019
Proceedings of the ACM Workshop on Wireless Security and Machine Learning, 2019
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019
Proceedings of the 1st Workshop on Machine Learning on Edge in Sensor Systems, 2019
Proceedings of the 6th International Conference on Software Defined Systems, 2019
Don't hesitate to share!: a novel IoT data protection scheme based on BGN cryptosystem.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Mind your wallet's privacy: identifying Bitcoin wallet apps and user's actions through network traffic analysis.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Evaluation of Machine Learning Algorithms for Anomaly Detection in Industrial Networks.
Proceedings of the 5th IEEE International Symposium on Measurements & Networking, 2019
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019
Proceedings of the IEEE INFOCOM 2019, 2019
TACAN: transmitter authentication through covert channels in controller area networks.
Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, 2019
DISC: A Novel Distributed On-Demand Clustering Protocol for Internet of Multimedia Things.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
On the Resilience of Network-based Moving Target Defense Techniques Against Host Profiling Attacks.
Proceedings of the 6th ACM Workshop on Moving Target Defense, 2019
An In-depth Look Into SDN Topology Discovery Mechanisms: Novel Attacks and Practical Countermeasures.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019
2018
Wirel. Networks, 2018
IEEE Trans. Smart Grid, 2018
IEEE Trans. Netw. Serv. Manag., 2018
A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment.
IEEE J. Biomed. Health Informatics, 2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Dependable Secur. Comput., 2018
OSSINT - Open Source Social Network Intelligence: An efficient and effective way to uncover "private" information in OSN profiles.
Online Soc. Networks Media, 2018
J. Ambient Intell. Humaniz. Comput., 2018
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks.
IEEE Internet Things J., 2018
Int. J. Commun. Syst., 2018
Future Gener. Comput. Syst., 2018
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring.
Future Gener. Comput. Syst., 2018
The insider on the outside: a novel system for the detection of information leakers in social networks.
Eur. J. Inf. Syst., 2018
ACM Comput. Surv., 2018
FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware.
CoRR, 2018
IEEE Commun. Surv. Tutorials, 2018
IEEE Commun. Surv. Tutorials, 2018
Security and Privacy Analysis of National Science Foundation Future Internet Architectures.
IEEE Commun. Surv. Tutorials, 2018
On the economic significance of ransomware campaigns: A Bitcoin transactions perspective.
Comput. Secur., 2018
Comput. Commun., 2018
Comput. Commun., 2018
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018
Proceedings of the 14th International Conference on Wireless and Mobile Computing, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 International Workshop on Secure Internet of Things, 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 4th IEEE International Forum on Research and Technology for Society and Industry, 2018
Proceedings of the 4th IEEE International Forum on Research and Technology for Society and Industry, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 16th ACM International Symposium on Mobility Management and Wireless Access, 2018
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018
Proceedings of the IEEE INFOCOM 2018, 2018
Proceedings of the Poster Proceedings of the 27th International Symposium on High-Performance Parallel and Distributed Computing, 2018
Proceedings of the Computer Security, 2018
Proceedings of the Computer Security, 2018
Spot the Difference: Your Bucket is Leaking : A Novel Methodology to Expose A/B Testing Effortlessly.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018
Leaky CPS: Inferring Cyber Information from Physical Properties (and the other way around).
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018
Proceedings of the From Database to Cyber Security, 2018
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018
2017
LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking.
IEEE/ACM Trans. Netw., 2017
ODIN: Obfuscation-Based Privacy-Preserving Consensus Algorithm for Decentralized Information Fusion in Smart Device Networks.
ACM Trans. Internet Techn., 2017
IEEE Trans. Netw. Serv. Manag., 2017
IEEE Trans. Mob. Comput., 2017
Pervasive Mob. Comput., 2017
Pervasive Mob. Comput., 2017
CoRR, 2017
IEEE Commun. Surv. Tutorials, 2017
Comput. Secur., 2017
Comput. Secur., 2017
Comput. Commun., 2017
IEEE Cloud Comput., 2017
DDoS victim service containment to minimize the internal collateral damages in cloud computing.
Comput. Electr. Eng., 2017
Ann. des Télécommunications, 2017
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017
It's always April fools' day!: On the difficulty of social network misinformation classification via propagation features.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017
Blocking intrusions at border using software defined-internet exchange point (SD-IXP).
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017
A Novel Distributed Fog-Based Networked Architecture to Preserve Energy in Fog Data Centers.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Proceedings of the 14th IEEE International Conference on Networking, Sensing and Control, 2017
Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy in Online Services.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the International Carnahan Conference on Security Technology, 2017
Proceedings of the 13th IEEE International Conference on Intelligent Computer Communication and Processing, 2017
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Proceedings of the 5th International Conference on Future Internet of Things and Cloud Workshops, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the Risks and Security of Internet and Systems, 2017
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017
Proceedings of the Computing Frontiers Conference, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
On the Influence of Emotional Valence Shifts on the Spread of Information in Social Networks.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
Proceedings of the Research Advances in Cloud Computing, 2017
Proceedings of the Research Advances in Cloud Computing, 2017
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
2016
Proceedings of the Recent Advances in Computational Intelligence in Defense and Security, 2016
Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks.
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
Proc. Priv. Enhancing Technol., 2016
IEEE Micro, 2016
Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions.
CoRR, 2016
Colluding browser extension attack on user privacy and its implication for web browsers.
Comput. Secur., 2016
Comput. Commun., 2016
Comput. Networks, 2016
Ad Hoc Networks, 2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
Adapting the System to Users Based on Implicit Data: Ethical Risks and Possible Solutions.
Proceedings of the Symbiotic Interaction, 2016
Proceedings of the 8th IFIP International Conference on New Technologies, 2016
Proceedings of the 8th IFIP International Conference on New Technologies, 2016
Proceedings of the 2016 International Conference on Computing, 2016
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016
AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016
On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Despicable me(ter): Anonymous and fine-grained metering data reporting with dishonest meters.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016
Proceedings of the Applied Cryptography and Network Security, 2016
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 2016
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016
2015
Proceedings of the Advanced Research in Data Privacy, 2015
Advances in Information Security 65, Springer, ISBN: 978-1-4939-3460-7, 2015
IEEE Trans. Serv. Comput., 2015
IEEE Trans. Parallel Distributed Syst., 2015
IEEE Trans. Inf. Forensics Secur., 2015
CoRR, 2015
IEEE Commun. Surv. Tutorials, 2015
Comput. Commun., 2015
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015
Impact of country-scale Internet disconnection on structured and social P2P overlays.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
You are AIRing too Much: Assessing the Privacy of Users in Crowdsourcing Environmental Data.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems, 2015
Proceedings of the Proceeding of the Seventh International Conference on Intelligent Human Computer Interaction, 2015
Proceedings of the IEEE International Conference on Communication, 2015
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015
Proceedings of the Enterprise Security - Second International Workshop, 2015
Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Security and Privacy in Cloud Computing via Obfuscation and Diversification: A Survey.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks.
Proceedings of the 10th ACM Symposium on Information, 2015
Revealing Censored Information Through Comments and Commenters in Online Social Networks.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2014
IEEE Trans. Serv. Comput., 2014
IEEE Trans. Intell. Transp. Syst., 2014
Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact.
IEEE Trans. Inf. Forensics Secur., 2014
IEEE Trans. Dependable Secur. Comput., 2014
J. Comput. Syst. Sci., 2014
IEEE Commun. Mag., 2014
Proceedings of the International Conference on Underwater Networks & Systems, Rome, Italy, November 12, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the Information Systems Security - 10th International Conference, 2014
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014
I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014
Proceedings of the Risks and Security of Internet and Systems, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Trans. Inf. Forensics Secur., 2013
Telecommun. Syst., 2013
IEEE Commun. Surv. Tutorials, 2013
A lightweight mechanism for detection of cache pollution attacks in Named Data Networking.
Comput. Networks, 2013
Proceedings of the IFIP Wireless Days, 2013
MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
MASS: An efficient and secure broadcast authentication scheme for resource constrained devices.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
2012
IEEE Trans. Inf. Forensics Secur., 2012
IEEE Trans. Inf. Forensics Secur., 2012
Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System (Transcript of Discussion).
Proceedings of the Security Protocols XX, 2012
Proceedings of the Security Protocols XX, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the Distributed Computing and Networking - 13th International Conference, 2012
Optimal Solutions for Pairing Services on Smartphones: A Strategy to Minimize Energy Consumption.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012
2011
IEEE Trans. Dependable Secur. Comput., 2011
Secur. Commun. Networks, 2011
CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection.
Int. J. Inf. Sec., 2011
"Who Counterfeited My Viagra?" Probabilistic Item Removal Detection via RFID Tag Cooperation.
EURASIP J. Wirel. Commun. Netw., 2011
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Proceedings of the Security Protocols XVIII, 2010
Censorship-Resilient Communications through Information Scattering (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010
Proceedings of the Security and Privacy in Communication Networks, 2010
The smallville effect: social ties make mobile networks more secure against node capture attack.
Proceedings of the 8th ACM International Workshop on Mobility Management & Wireless Access, 2010
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the Open Research Problems in Network Security, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
Security in Outsourced Storage: Efficiently Checking Integrity and Service Level Agreement Compliance.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Secur. Commun. Networks, 2009
EURASIP J. Wirel. Commun. Netw., 2009
Proceedings of the Wired/Wireless Internet Communications, 7th International Conference, 2009
Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN.
Proceedings of the Security and Privacy in Communication Networks, 2009
2008
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
2007
ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks.
Ad Hoc Networks, 2007
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks.
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2007
2006
Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN.
Proceedings of the IEEE International Conference on Systems, 2006
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006
1989
High-frequency fully differential filter using operational amplifiers without common-mode feedback.
IEEE J. Solid State Circuits, June, 1989