Savio Sciancalepore

Orcid: 0000-0003-0974-3639

According to our database1, Savio Sciancalepore authored at least 84 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy and Confidentiality Issues in Drone Operations: Challenges and Road Ahead.
IEEE Netw., November, 2024

Adversarial Machine Learning for Image-Based Radio Frequency Fingerprinting: Attacks and Defenses.
IEEE Commun. Mag., November, 2024

Jamming Detection in Low-BER Mobile Indoor Scenarios via Deep Learning.
IEEE Internet Things J., April, 2024

Selective Authenticated Pilot Location Disclosure for Remote ID-enabled Drones.
Proc. Priv. Enhancing Technol., 2024

ORION: Verification of drone trajectories via remote identification messages.
Future Gener. Comput. Syst., 2024

On the Reliability of Radio Frequency Fingerprinting.
CoRR, 2024

Obfuscated Location Disclosure for Remote ID Enabled Drones.
CoRR, 2024

Preventing Radio Fingerprinting through Friendly Jamming.
CoRR, 2024

MAG-PUFs: Authenticating IoT devices via electromagnetic physical unclonable functions and deep learning.
Comput. Secur., 2024

Watch Nearby! Privacy Analysis of the People Nearby Service of Telegram.
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024

SatPrint: Satellite Link Fingerprinting.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

Attacking Operational Technology Without Specialized Knowledge: The Unspecialized OT Threat Actor Profile.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

FadePrint - Satellite Spoofing Detection via Fading Fingerprinting.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

GhostBuster: Detecting Misbehaving Remote ID-Enabled Drones.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning.
IEEE Trans. Inf. Forensics Secur., 2023

PPCA - Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles.
IEEE Trans. Dependable Secur. Comput., 2023

A<sup>2</sup>RID - Anonymous Direct Authentication and Remote Identification of Commercial Drones.
IEEE Internet Things J., 2023

Challenges of Radio Frequency Fingerprinting: From Data Collection to Deployment.
CoRR, 2023

Early Jamming Detection in Mobile Indoor Scenarios via Deep Learning.
CoRR, 2023

Privacy-Preserving Multi-Party Access Control for Third-Party UAV Services.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

Jamming Detection in Power Line Communications Leveraging Deep Learning Techniques.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

David and Goliath: Asymmetric Advantage in MIoT.
Proceedings of the 6th International Conference on Advanced Communication Technologies and Networking, 2023

BloodHound: Early Detection and Identification of Jamming at the PHY-layer.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones.
Proceedings of the Annual Computer Security Applications Conference, 2023

The Day-After-Tomorrow: On the Performance of Radio Fingerprinting over Time.
Proceedings of the Annual Computer Security Applications Conference, 2023

ICSvertase: A Framework for Purpose-based Design and Classification of ICS Honeypots.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Auth-AIS: Secure, Flexible, and Backward-Compatible Authentication of Vessels AIS Broadcasts.
IEEE Trans. Dependable Secur. Comput., 2022

Road Traffic Poisoning of Navigation Apps: Threats and Countermeasures.
IEEE Secur. Priv., 2022

Noise2Weight: On detecting payload weight from drones acoustic emissions.
Future Gener. Comput. Syst., 2022

Hide and Seek - Preserving Location Privacy and Utility in the Remote Identification of Unmanned Aerial Vehicles.
CoRR, 2022

Satellite-based communications security: A survey of threats, solutions, and research challenges.
Comput. Networks, 2022

PARFAIT: Privacy-preserving, secure, and low-delay service access in fog-enabled IoT ecosystems.
Comput. Networks, 2022

GPS spoofing detection via crowd-sourced information for connected vehicles.
Comput. Networks, 2022

MAG-PUF - Authenticating IoT Devices via Magnetic Physical Unclonable Functions.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Federated Lab (FedLab): An Open-source Distributed Platform for Internet of Things (IoT) Research and Experimentation.
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022

MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT.
Proceedings of the Security and Privacy in Communication Networks, 2022

PICO: privacy-preserving access control in IoT scenarios through incomplete information.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

Jammer Localization in the Internet of Vehicles: Scenarios, Experiments, and Evaluation.
Proceedings of the 12th International Conference on the Internet of Things, 2022

FRACTAL: Single-Channel Multi-factor Transaction Authentication Through a Compromised Terminal.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

Context-Aware Drone Detection.
Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, 2022

PRM - Private Interference Discovery for IEEE 802.15 4 Networks.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles.
Proceedings of the Annual Computer Security Applications Conference, 2022

Privacy-Preserving Trajectory Matching on Autonomous Unmanned Aerial Vehicles.
Proceedings of the Annual Computer Security Applications Conference, 2022

Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location Tracing.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
MAGNETO: Fingerprinting USB Flash Drives via Unintentional Magnetic Emissions.
ACM Trans. Embed. Comput. Syst., 2021

SOS: Standard-Compliant and Packet Loss Tolerant Security Framework for ADS-B Communications.
IEEE Trans. Dependable Secur. Comput., 2021

Receivers location privacy in avionic crowdsourced networks: Issues and countermeasures.
J. Netw. Comput. Appl., 2021

PPRQ: Privacy-Preserving MAX/MIN Range Queries in IoT Networks.
IEEE Internet Things J., 2021

Short-Range Audio Channels Security: Survey of Mechanisms, Applications, and Research Challenges.
IEEE Commun. Surv. Tutorials, 2021

Modelling a Communication Channel under Jamming: Experimental Model and Applications.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Mitigating Energy Depletion Attacks in IoT via Random Time-Slotted Channel Access.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

ARID: Anonymous Remote IDentification of Unmanned Aerial Vehicles.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
A Privacy Risk Assessment Model for Medical Big Data Based on Adaptive Neuro-Fuzzy Theory.
Secur. Commun. Networks, 2020

LiKe: Lightweight Certificateless Key Agreement for Secure IoT Communications.
IEEE Internet Things J., 2020

Fridges on the Highway: Road Traffic Poisoning of Navigation Apps.
CoRR, 2020

Security in Energy Harvesting Networks: A Survey of Current Solutions and Research Challenges.
IEEE Commun. Surv. Tutorials, 2020

PiNcH: An effective, efficient, and robust solution to drone detection via network traffic analysis.
Comput. Networks, 2020

Vessels Cybersecurity: Issues, Challenges, and the Road Ahead.
IEEE Commun. Mag., 2020

BrokenStrokes: on the (in)security of wireless keyboards.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

GNSS spoofing detection via opportunistic IRIDIUM signals.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

SecureAIS - Securing Pairwise Vessels Communications.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Picking a Needle in a Haystack: Detecting Drones via Network Traffic Analysis.
CoRR, 2019

EXCHANge: Securing IoT via channel anonymity.
Comput. Commun., 2019

Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios.
IEEE Access, 2019

Detecting Drones Status via Encrypted Traffic Analysis.
Proceedings of the ACM Workshop on Wireless Security and Machine Learning, 2019

Drive me not: GPS spoofing detection via cellular network: (architectures, models, and experiments).
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Location Privacy Issues in the OpenSky Network Crowdsourcing Platform.
Proceedings of the Security and Privacy in Communication Networks, 2019

Reliability of ADS-B communications: novel insights based on an experimental assessment.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Edge and Fog Computing in Critical Infrastructures: Analysis, Security Threats, and Research Challenges.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

DRAKE: Distributed Relay-Assisted Key Establishment.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Position and Velocity Estimation of a Non-Cooperative Source From Asynchronous Packet Arrival Time Measurements.
IEEE Trans. Mob. Comput., 2018

Strength of Crowd (SOC) - Defeating a Reactive Jammer in IoT with Decoy Messages.
Sensors, 2018

On the Design of a Decentralized and Multiauthority Access Control Scheme in Federated and Cloud-Assisted Cyber-Physical Systems.
IEEE Internet Things J., 2018

SOS - Securing Open Skies.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

Multi-Domain Access Rights Composition in Federated IoT Platforms.
Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks, 2018

Shooting to the Stars: Secure Location Verification via Meteor Burst Communications.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Link-layer security in TSCH networks: effect on slot duration.
Trans. Emerg. Telecommun. Technol., 2017

Public Key Authentication and Key Agreement in IoT Devices With Minimal Airtime Consumption.
IEEE Embed. Syst. Lett., 2017

OAuth-IoT: An access control framework for the Internet of Things based on open standards.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

2016
Tracing a Linearly Moving Node From Asynchronous Time-of-Arrival Measurements.
IEEE Commun. Lett., 2016

LICITUS: A lightweight and standard compatible framework for securing layer-2 communications in the IoT.
Comput. Networks, 2016

Attribute-Based Access Control Scheme in Federated IoT Platforms.
Proceedings of the Interoperability and Open-Source Solutions for the Internet of Things, 2016

2015
Key Management Protocol with Implicit Certificates for IoT systems.
Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems, 2015

2014
On securing IEEE 802.15.4 networks through a standard compliant framework.
Proceedings of the Euro Med Telco Conference, 2014


  Loading...