Stefano Guarino

Orcid: 0000-0002-1545-7711

According to our database1, Stefano Guarino authored at least 40 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Verified authors shape X/Twitter discursive communities.
CoRR, 2024

Scaling Expected Force: Efficient Identification of Key Nodes in Network-Based Epidemic Models.
Proceedings of the 32nd Euromicro International Conference on Parallel, 2024

2023
Seeking critical nodes in digraphs.
J. Comput. Sci., May, 2023


The Hidden-Degree Geometric Block Model.
Proceedings of the Complex Networks & Their Applications XII, 2023

2022
Onion under Microscope: An in-depth analysis of the Tor Web.
World Wide Web, 2022

The Fitness-Corrected Block Model, or how to create maximum-entropy data-driven spatial social networks.
CoRR, 2022

Epidemic risk assessment from geographic population density.
Appl. Netw. Sci., 2022

The Hyperbolic Geometric Block Model and Networks with Latent and Explicit Geometries.
Proceedings of the Complex Networks and Their Applications XI, 2022

2021
Information disorders during the COVID-19 infodemic: The case of Italian Facebook.
Online Soc. Networks Media, 2021

Inferring Urban Social Networks from Publicly Available Data.
Future Internet, 2021

Onion under Microscope: An in-depth analysis of the Tor network.
CoRR, 2021

Uncertainty assessment techniques for selective laser melting process control.
Proceedings of the IEEE International Workshop on Metrology for Industry 4.0 & IoT, 2021

A Model for Urban Social Networks.
Proceedings of the Computational Science - ICCS 2021, 2021

Epidemics in a Synthetic Urban Population with Multiple Levels of Mixing.
Proceedings of the Complex Networks & Their Applications X - Volume 2, Proceedings of the Tenth International Conference on Complex Networks and Their Applications COMPLEX NETWORKS 2021, Madrid, Spain, November 30, 2021

Data-Driven Simulation of Contagions in Public Venues.
Proceedings of the Annual Modeling and Simulation Conference, 2021

2020
Information disorders on Italian Facebook during COVID-19 infodemic.
CoRR, 2020

Characterizing networks of propaganda on twitter: a case study.
Appl. Netw. Sci., 2020

2019
Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search.
J. Cryptogr. Eng., 2019

Spiders like Onions: on the Network of Tor Hidden Services.
Proceedings of the World Wide Web Conference, 2019

Beyond Fact-Checking: Network Analysis Tools for Monitoring Disinformation in Social Media.
Proceedings of the Complex Networks and Their Applications VIII, 2019

Analysing the tor web with high performance graph algorithms.
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019

2018
Multi-word Structural Topic Modelling of ToR Drug Marketplaces.
Proceedings of the 12th IEEE International Conference on Semantic Computing, 2018

Traffic Data Classification for Police Activity.
Proceedings of the Foundations of Intelligent Systems - 24th International Symposium, 2018

2017
Exploring and Analyzing the Tor Hidden Services Graph.
ACM Trans. Web, 2017

Epidemic data survivability in Unattended Wireless Sensor Networks: New models and results.
J. Netw. Comput. Appl., 2017

Design, implementation and test of a flexible tor-oriented web mining toolkit.
Proceedings of the 7th International Conference on Web Intelligence, Mining and Semantics, 2017

Traffic Data: Exploratory Data Analysis with Apache Accumulo.
Proceedings of the Traffic Mining Applied to Police Activities, 2017

Unsupervised Classification of Routes and Plates from the Trap-2017 Dataset.
Proceedings of the Traffic Mining Applied to Police Activities, 2017

SLAP: Secure Lightweight Authentication Protocol for Resource-constrained Devices.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Cryptanalysis on GPUs with the Cube Attack: Design, Optimization and Performances Gains.
Proceedings of the 2017 International Conference on High Performance Computing & Simulation, 2017

A Novel GPU-Based Implementation of the Cube Attack - Preliminary Results Against Trivium.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Reliable and perfectly secret communication over the generalized Ozarow-Wyner's wire-tap channel.
Comput. Networks, 2016

2015
Provable Storage Medium for Data Storage Outsourcing.
IEEE Trans. Serv. Comput., 2015

2014
Security in wireless ad-hoc networks - A survey.
Comput. Commun., 2014

2013
Confidentiality and availability issues in Mobile Unattended Wireless Sensor Networks.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

Data confidentiality and availability via secret sharing and node mobility in UWSN.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2008
Fluidized bed coating of metal substrates by using high performance thermoplastic powders: Statistical approach and neural network modelling.
Eng. Appl. Artif. Intell., 2008

2007
Metal foams for structural applications: design and manufacturing.
Int. J. Comput. Integr. Manuf., 2007

Modelling of electrostatic fluidized bed (EFB) coating process using artificial neural networks.
Eng. Appl. Artif. Intell., 2007


  Loading...