Mauro Conti
#114,685
Most Influential Person Now
Researcher
Mauro Conti's AcademicInfluence.com Rankings
Mauro Conticomputer-science Degrees
Computer Science
#4441
World Rank
#4679
Historical Rank
Network Security
#5
World Rank
#5
Historical Rank
Database
#1654
World Rank
#1734
Historical Rank

Download Badge
Computer Science
Mauro Conti's Degrees
- PhD Computer Science University of Padua
- Masters Computer Engineering University of Padua
- Bachelors Computer Engineering University of Padua
Similar Degrees You Can Earn
Why Is Mauro Conti Influential?
(Suggest an Edit or Addition)Mauro Conti's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- A Survey on Security and Privacy Issues of Bitcoin (2017) (677)
- A Survey on Homomorphic Encryption Schemes (2017) (577)
- Smart health: A context-aware health paradigm within smart cities (2014) (514)
- Android Security: A Survey of Issues, Malware Penetration, and Defenses (2015) (472)
- Internet of Things security and forensics: Challenges and opportunities (2018) (440)
- A Survey of Man In The Middle Attacks (2016) (373)
- A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks (2007) (287)
- CRePE: Context-Related Policy Enforcement for Android (2010) (270)
- Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks (2018) (254)
- FlowFence: Practical Data Protection for Emerging IoT Application Frameworks (2016) (242)
- Provably Secure Authenticated Key Agreement Scheme for Smart Grid (2018) (234)
- Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking (2013) (217)
- Detecting crypto-ransomware in IoT networks based on energy consumption footprint (2018) (217)
- Distributed Detection of Clone Attacks in Wireless Sensor Networks (2011) (214)
- Secure Data Aggregation in Wireless Sensor Networks (2012) (213)
- DDoS attacks in cloud computing: Issues, taxonomy, and future directions (2015) (211)
- Robust Smartphone App Identification via Encrypted Network Traffic Analysis (2017) (209)
- Analyzing Android Encrypted Network Traffic to Identify User Actions (2016) (205)
- AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic (2016) (199)
- FOCAN: A Fog-supported Smart City Network Architecture for Management of Applications in the Internet of Everything Environments (2017) (193)
- Peek-a-boo: i see your smart home activities, even encrypted! (2018) (174)
- Providing Source Location Privacy in Wireless Sensor Networks: A Survey (2013) (160)
- All You Need is "Love": Evading Hate Speech Detection (2018) (159)
- Computational intelligence approaches for energy load forecasting in smart energy management grids: state of the art, future challenges, and research directionsand Research Directions (2018) (158)
- Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks (2015) (144)
- A Survey on the Security of Stateful SDN Data Planes (2017) (143)
- PIndroid: A novel Android malware detection system using ensemble learning methods (2017) (140)
- Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact (2014) (135)
- Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call (2011) (133)
- A lightweight mechanism for detection of cache pollution attacks in Named Data Networking (2013) (130)
- I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics (2014) (128)
- SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks (2017) (127)
- SANA: Secure and Scalable Aggregate Network Attestation (2016) (123)
- Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey (2018) (119)
- Emergent properties: detection of the node-capture attack in mobile wireless sensor networks (2008) (116)
- A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring (2017) (109)
- A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment (2018) (107)
- Cache Privacy in Named-Data Networking (2013) (102)
- Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features (2019) (100)
- Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis (2014) (100)
- On the Feasibility of Attribute-Based Encryption on Internet of Things Devices (2016) (99)
- FakeBook: Detecting Fake Profiles in On-Line Social Networks (2012) (97)
- The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX (2018) (93)
- SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN (2018) (92)
- ANASTASIA: ANdroid mAlware detection using STatic analySIs of Applications (2016) (86)
- CRêPE: A System for Enforcing Fine-Grained Context-Related Policies on Android (2012) (85)
- Detecting Android Malware Leveraging Text Semantics of Network Flows (2017) (85)
- MOSES: supporting operation modes on smartphones (2012) (84)
- On the Economic Significance of Ransomware Campaigns: A Bitcoin Transactions Perspective (2018) (83)
- LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking (2017) (82)
- Employing Program Semantics for Malware Detection (2015) (82)
- RPiDS: Raspberry Pi IDS — A Fruitful Intrusion Detection System for IoT (2016) (80)
- On the Feasibility of Attribute-Based Encryption on Smartphone Devices (2015) (76)
- DDoS attacks in cloud computing: Collateral damage to non-targets (2016) (71)
- Advertising in the IoT Era: Vision and Challenges (2018) (70)
- Blockchain-Enabled Secure Energy Trading With Verifiable Fairness in Industrial Internet of Things (2020) (68)
- Security issues and challenges in V2X: A Survey (2020) (67)
- The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis (2017) (67)
- Cyber Threat Intelligence : Challenges and Opportunities (2018) (65)
- MOSES: Supporting and Enforcing Security Profiles on Smartphones (2014) (65)
- PermPair: Android Malware Detection Using Permission Pairs (2020) (65)
- IoT-enabled smart lighting systems for smart cities (2018) (64)
- High-frequency fully differential filter using operational amplifiers without common-mode feedback (1989) (64)
- Clone wars: Distributed detection of clone attacks in mobile WSNs (2014) (60)
- Privacy-preserving robust data aggregation in wireless sensor networks (2009) (60)
- SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT (2019) (59)
- RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. (2007) (58)
- LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks (2015) (57)
- Virtual private social networks (2011) (56)
- Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication (2014) (54)
- A smart health application and its related privacy issues (2016) (54)
- LISA: Lightweight context-aware IoT service architecture (2019) (53)
- "Who Counterfeited My Viagra?" Probabilistic Item Removal Detection via RFID Tag Cooperation (2011) (52)
- A New Secure Data Dissemination Model in Internet of Drones (2019) (52)
- Mobility and Cooperation to Thwart Node Capture Attacks in MANETs (2009) (50)
- RARE: Defeating side channels based on data-deduplication in cloud storage (2018) (50)
- A machine learning based approach to detect malicious android apps using discriminant system calls (2019) (50)
- Toward the Development of Secure Underwater Acoustic Networks (2017) (49)
- A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions (2019) (49)
- Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP (2016) (49)
- Drone Path Planning for Secure Positioning and Secure Position Verification (2017) (47)
- ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System (2019) (46)
- On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks (2016) (46)
- A Cyber-Kill-Chain based taxonomy of crypto-ransomware features (2019) (45)
- To NACK or Not to NACK? Negative Acknowledgments in Information-Centric Networking (2015) (45)
- Brain-Computer Interface applications: Security and privacy challenges (2015) (44)
- Secure underwater acoustic networks: Current and future research directions (2016) (44)
- Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation (2014) (43)
- An efficient routing protocol for the QoS support of large‐scale MANETs (2018) (43)
- FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment (2013) (42)
- Fitness Trackers: Fit for Health but Unfit for Security and Privacy (2017) (41)
- Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks (2018) (41)
- On defending against label flipping attacks on malware detection systems (2019) (41)
- AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones (2019) (40)
- ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks (2007) (40)
- Scheduling Distributed Energy Resource Operation and Daily Power Consumption for a Smart Building to Optimize Economic and Environmental Parameters (2018) (40)
- LEChain: A blockchain-based lawful evidence management scheme for digital forensics (2021) (39)
- Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models (2014) (39)
- Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN (2006) (39)
- Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions (2017) (39)
- An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments (2014) (38)
- Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks (2016) (37)
- A Survey on Software-Defined VANETs: Benefits, Challenges, and Future Directions (2019) (37)
- Secure over-the-air software updates in connected vehicles: A survey (2020) (37)
- A Survey on Industrial Control System Testbeds and Datasets for Security Research (2021) (36)
- TACAN: transmitter authentication through covert channels in controller area networks (2019) (36)
- Deep and broad URL feature mining for android malware detection (2020) (36)
- Security and design requirements for software-defined VANETs (2020) (34)
- Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study (2017) (34)
- Selfrando: Securing the Tor Browser against De-anonymization Exploits (2016) (34)
- Hybrid Static-Runtime Information Flow and Declassification Enforcement (2013) (34)
- Preserving privacy against external and internal threats in WSN data aggregation (2013) (34)
- Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit (2017) (34)
- Detecting ADS-B Spoofing Attacks Using Deep Neural Networks (2019) (33)
- SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things (2018) (33)
- EnergIoT: A solution to improve network lifetime of IoT devices (2017) (33)
- MITHYS: Mind The Hand You Shake - Protecting mobile devices from SSL usage vulnerabilities (2013) (32)
- REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks (2017) (32)
- Virtual private social networks and a facebook implementation (2013) (31)
- OnboardICNg: a Secure Protocol for On-boarding IoT Devices in ICN (2016) (31)
- LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks (2020) (31)
- No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices (2016) (31)
- Android inter-app communication threats and detection techniques (2016) (31)
- Robust access control framework for mobile cloud computing network (2015) (30)
- Privacy-Aware Caching in Information-Centric Networking (2019) (30)
- Service resizing for quick DDoS mitigation in cloud computing environment (2017) (30)
- A Novel Distributed Fog-Based Networked Architecture to Preserve Energy in Fog Data Centers (2017) (30)
- LiMCA: an optimal clustering algorithm for lifetime maximization of internet of things (2019) (29)
- Identifying Emotions in Social Media: Comparison of Word-Emotion Lexicons (2017) (29)
- Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking (2015) (29)
- Joint Failure Recovery, Fault Prevention, and Energy-efficient Resource Management for Real-time SFC in Fog-supported SDN (2018) (29)
- Lightweight solutions to counter DDoS attacks in software defined networking (2019) (29)
- Cyber Threat Intelligence (2018) (28)
- SARA: Secure Asynchronous Remote Attestation for IoT Systems (2020) (28)
- Covert lie detection using keyboard dynamics (2018) (28)
- A robust dynamic analysis system preventing SandBox detection by Android malware (2015) (28)
- It's always April fools' day!: On the difficulty of social network misinformation classification via propagation features (2017) (28)
- Analysis and classification of context-based malware behavior (2019) (28)
- Securely computing an approximate median in wireless sensor networks (2008) (27)
- BCHealth: A Novel Blockchain-based Privacy-Preserving Architecture for IoT Healthcare Applications (2021) (27)
- Time Warp: How Time Affects Privacy in LBSs (2010) (27)
- PADS: Practical Attestation for Highly Dynamic Swarm Topologies (2018) (27)
- Efficient privacy preserving device authentication in WBANs for industrial e-health applications (2019) (26)
- Privacy Aware Data Deduplication for Side Channel in Cloud Storage (2020) (26)
- Fog over virtualized IoT: new opportunity for context-aware networked applications and a case study (2017) (25)
- Mind The Plug! Laptop-User Recognition Through Power Consumption (2016) (25)
- A comprehensive and effective mechanism for DDoS detection in SDN (2017) (25)
- Biometric Authentication Methods on Smartphones: A Survey (2016) (25)
- CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery (2015) (25)
- Efficient Routing Protocol via Ant Colony Optimization (ACO) and Breadth First Search (BFS) (2014) (24)
- Attestation-enabled secure and scalable routing protocol for IoT networks (2020) (24)
- Improving Password Guessing via Representation Learning (2019) (24)
- Secure Message Delivery Games for Device-to-Device Communications (2014) (24)
- ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs (2016) (24)
- Windows Mobile LiveSD Forensics (2013) (23)
- Enhancing QoE for video streaming in MANETs via multi-constraint routing (2018) (23)
- An In-depth Look Into SDN Topology Discovery Mechanisms: Novel Attacks and Practical Countermeasures (2019) (23)
- Secure OTA Software Updates in Connected Vehicles: A survey (2019) (23)
- Security and Privacy Analysis of National Science Foundation Future Internet Architectures (2018) (23)
- DETONAR: Detection of Routing Attacks in RPL-Based IoT (2021) (22)
- Toward an Anonymous Process Mining (2015) (22)
- Distributed data source verification in wireless sensor networks (2009) (22)
- Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications (2021) (22)
- Mind your wallet's privacy: identifying Bitcoin wallet apps and user's actions through network traffic analysis (2019) (22)
- Deep and Broad Learning Based Detection of Android Malware via Network Traffic (2018) (22)
- Friend in the Middle (FiM): Tackling de-anonymization in social networks (2013) (22)
- RADIS: Remote Attestation of Distributed IoT Services (2018) (21)
- On the Influence of Emotional Valence Shifts on the Spread of Information in Social Networks (2017) (21)
- Can machine learning model with static features be fooled: an adversarial machine learning approach (2019) (21)
- A secure alert messaging system for safe driving (2014) (21)
- AndroTaint: An efficient android malware detection framework using dynamic taint analysis (2017) (21)
- Blockchain-Based Data Storage With Privacy and Authentication in Internet of Things (2022) (20)
- CENSOR: Cloud‐enabled secure IoT architecture over SDN paradigm (2018) (20)
- The smallville effect: social ties make mobile networks more secure against node capture attack (2009) (19)
- BlockAuth: BlockChain based distributed producer authentication in ICN (2019) (19)
- Wireless Sensor Replica Detection in Mobile Environments (2012) (19)
- Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions (2021) (19)
- Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks (2014) (19)
- DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks (2018) (19)
- Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions (2016) (19)
- Privacy-Preserving Navigation Supporting Similar Queries in Vehicular Networks (2022) (19)
- Can You Hear It?: Backdoor Attacks via Ultrasonic Triggers (2021) (18)
- Security and Privacy in Cloud Computing via Obfuscation and Diversification: A Survey (2015) (18)
- CREPUSCOLO: A collusion resistant privacy preserving location verification system (2013) (18)
- Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities (2019) (18)
- Collective Remote Attestation at the Internet of Things Scale: State-of-the-Art and Future Challenges (2020) (18)
- SHeLA: Scalable Heterogeneous Layered Attestation (2019) (18)
- The verifier bee: A path planner for drone-based secure location verification (2015) (18)
- Hand Drawn Optical Circuit Recognition (2017) (18)
- Events privacy in WSNs: A new model and its application (2011) (17)
- DDoS victim service containment to minimize the internal collateral damages in cloud computing (2017) (17)
- Despicable me(ter): Anonymous and fine-grained metering data reporting with dishonest meters (2016) (17)
- Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets (2018) (17)
- Covert ephemeral communication in named data networking (2013) (17)
- DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis (2016) (17)
- The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions (2019) (17)
- MapReduce: an infrastructure review and research insights (2019) (17)
- Fast multi-hop broadcast of alert messages in VANETs: An analytical model (2019) (16)
- A Multilabel Fuzzy Relevance Clustering System for Malware Attack Attribution in the Edge Layer of Cyber-Physical Networks (2020) (16)
- MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things (2018) (16)
- Secure cooperative channel establishment in wireless sensor networks (2006) (16)
- SoFA: A Spark-oriented Fog Architecture (2019) (16)
- Secure Wireless Sensor Networks (2015) (15)
- TextDroid: Semantics-based detection of mobile malware using network flows (2017) (15)
- Towards a realistic model for failure propagation in interdependent networks (2015) (15)
- Forensics Analysis of Android Mobile VoIP Apps (2017) (15)
- Evaluation of Machine Learning Algorithms for Anomaly Detection in Industrial Networks (2019) (15)
- Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain (2021) (15)
- A Realistic Model for Failure Propagation in Interdependent Cyber-Physical Systems (2020) (15)
- Emotional Valence Shifts and User Behavior on Twitter, Facebook, and YouTube (2018) (15)
- ODIN: Obfuscation-Based Privacy-Preserving Consensus Algorithm for Decentralized Information Fusion in Smart Device Networks (2016) (15)
- DELTA: Data Extraction and Logging Tool for Android (2016) (15)
- The impact of malicious nodes positioning on vehicular alert messaging system (2016) (15)
- Evaluating the High Frequency Behavior of the Modified Grounding Scheme in Wind Farms (2017) (14)
- EyeCloud: A BotCloud Detection System (2015) (14)
- You are AIRing too Much: Assessing the Privacy of Users in Crowdsourcing Environmental Data (2015) (14)
- Boten ELISA: A novel approach for botnet C&C in Online Social Networks (2015) (14)
- Blockchain Trilemma Solver Algorand has Dilemma over Undecidable Messages (2019) (14)
- Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for Android (2017) (13)
- The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks (2009) (13)
- Secure Wireless Sensor Networks: Threats and Solutions (2015) (13)
- The Cross-Evaluation of Machine Learning-Based Network Intrusion Detection Systems (2022) (13)
- Detecting Covert Cryptomining using HPC (2019) (13)
- Leveraging Blockchain to Enable Smart-Health Applications (2018) (13)
- Amplified Distributed Denial of Service Attack in Software Defined Networking (2016) (13)
- SILK-TV: Secret Information Leakage from Keystroke Timing Videos (2018) (13)
- Investigating Storage as a Service Cloud Platform: pCloud as a Case Study (2017) (13)
- 5G Security Challenges and Solutions: A Review by OSI Layers (2021) (13)
- Toward secure and efficient attestation for highly dynamic swarms: poster (2017) (12)
- Fake News Spreaders Profiling Through Behavioural Analysis (2020) (12)
- A survey on security challenges and solutions in the IOTA (2022) (12)
- TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks (2019) (12)
- Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain (2023) (12)
- A Host and Network Based Intrusion Detection for Android Smartphones (2016) (12)
- Demystifying the Transferability of Adversarial Attacks in Computer Networks (2021) (12)
- Efficient Classification of Android Malware in the wild using Robust Static Features (2016) (12)
- ELBA: Efficient Layer Based Routing Algorithm in SDN (2016) (12)
- Know Your Enemy: Stealth Configuration-Information Gathering in SDN (2016) (11)
- Truck platoon security: State-of-the-art and road ahead (2020) (11)
- Demonstrating the effectiveness of MOSES for separation of execution modes (2012) (11)
- FastRIPP: RFID Privacy Preserving protocol with Forward Secrecy and Fast Resynchronisation (2007) (11)
- Type Me the Truth!: Detecting Deceitful Users via Keystroke Dynamics (2017) (11)
- FlowMine: Android app analysis via data flow (2016) (11)
- SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks (2014) (11)
- Detection of algorithmically-generated domains: An adversarial machine learning approach (2020) (11)
- Malware Signature Generation Using Locality Sensitive Hashing (2019) (11)
- ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN (2020) (10)
- Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements (2020) (10)
- OASIS: Operational Access Sandboxes for Information Security (2014) (10)
- Software defined service function chaining with failure consideration for fog computing (2018) (10)
- Virtual Influencers in Online Social Media (2022) (10)
- Practical extensions to countermeasure DoS attacks in software defined networking (2017) (10)
- COIDS: A Clock Offset Based Intrusion Detection System for Controller Area Networks (2020) (10)
- A Survey on Security and Privacy Issues of UAVs (2021) (10)
- The Spread of Propaganda by Coordinated Communities on Social Media (2021) (10)
- BitProb: Probabilistic Bit Signatures for Accurate Application Identification (2020) (10)
- Revealing censored information through comments and commenters in online social networks (2015) (10)
- Efficient physical intrusion detection in Internet of Things: A Node deployment approach (2019) (10)
- A Novel Stealthy Attack to Gather SDN Configuration-Information (2020) (10)
- Platform Neutral Sandbox for Analyzing Malware and Resource Hogger Apps (2014) (10)
- Modeling Enlargement Attacks Against UWB Distance Bounding Protocols (2016) (10)
- VirtualFriendship: Hiding interactions on Online Social Networks (2014) (10)
- Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey (2022) (10)
- Secure median computation in wireless sensor networks (2009) (9)
- Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack (2021) (9)
- Cryptomining Cannot Change Its Spots: Detecting Covert Cryptomining Using Magnetic Side-Channel (2020) (9)
- ScaRR: Scalable Runtime Remote Attestation for Complex Systems (2018) (9)
- Colluding browser extension attack on user privacy and its implication for web browsers (2016) (9)
- SACHa: Self-Attestation of Configurable Hardware (2019) (9)
- Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks (2018) (9)
- Context-based Co-presence detection techniques: A survey (2020) (9)
- MimePot: a Model-based Honeypot for Industrial Control Networks (2019) (9)
- Impact of country-scale Internet disconnection on structured and social P2P overlays (2015) (9)
- AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller (2021) (8)
- ChoKIFA: A New Detection and Mitigation Approach Against Interest Flooding Attacks in NDN (2019) (8)
- Attack Resilient Underwater Networks Through Software Defined Networking (2014) (8)
- Environment-Reactive Malware Behavior: Detection and Categorization (2014) (8)
- Fair-RTT-DAS: A robust and efficient dynamic adaptive streaming over ICN (2018) (8)
- Contact Tracing Made Un-relay-able (2020) (8)
- Event Handoff Unobservability in WSN (2010) (8)
- ContextOS: A Context Aware Operating System for Mobile Devices (2013) (8)
- Towards privacy preserving unstructured big data publishing (2019) (8)
- A survey and taxonomy of consensus protocols for blockchains (2022) (8)
- An ICN-Based Authentication Protocol for a Simplified LTE Architecture (2017) (8)
- PILOT: Password and PIN Information Leakage from Obfuscated Typing Videos (2019) (8)
- Identification of Android malware using refined system calls (2019) (8)
- Private Blockchain in Industrial IoT (2020) (7)
- Secure topology maintenance and events collection in WSNs (2011) (7)
- Blocking intrusions at border using software defined-internet exchange point (SD-IXP) (2017) (7)
- PAKIT: Proactive Authentication and Key Agreement Protocol for Internet of Things (2019) (7)
- Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery (2020) (7)
- SAFE^d: Self-Attestation For Networks of Heterogeneous Embedded Devices (2019) (7)
- DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things (2021) (7)
- Leveraging Parallel Communications for Minimizing Energy Consumption on Smartphones (2015) (7)
- SPO: A Secure and Performance-aware Optimization for MapReduce Scheduling (2021) (7)
- MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers (2016) (7)
- FADEWICH: Fast Deauthentication Over the Wireless Channel (2016) (7)
- TRAP: Using Targeted ads to unveil Google personal profiles (2015) (7)
- Threat is in the Air: Machine Learning for Wireless Network Applications (2019) (7)
- Secure Verification of Location Claims on a Vehicular Safety Application (2013) (7)
- Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps (2020) (7)
- Mobility-aware cross-layer routing for peer-to-peer networks (2019) (7)
- eRIPP-FS: Enforcing privacy and security in RFID (2010) (7)
- An SDN-based framework for QoS routing in internet of underwater things (2021) (7)
- MiniV2G: An Electric Vehicle Charging Emulator (2021) (6)
- Verifiable and privacy-preserving fine-grained data-collection for smart metering (2015) (6)
- CrypSH: A Novel IoT Data Protection Scheme Based on BGN Cryptosystem (2021) (6)
- USB powered devices: A survey of side-channel threats and countermeasures (2021) (6)
- A robust multicast communication protocol for Low power and Lossy networks (2020) (6)
- Optimizing Message Ferry Scheduling in a DTN (2018) (6)
- Emergency Access Control Management Via Attribute Based Encrypted QR Codes (2018) (6)
- The Online Identity Detection via Keyboard Dynamics (2018) (6)
- QoE Degradation Attack in Dynamic Adaptive Streaming Over ICN (2018) (6)
- SYN‐Guard: An effective counter for SYN flooding attack in software‐defined networking (2019) (6)
- Your PIN Sounds Good! On The Feasibility of PIN Inference Through Audio Leakage (2019) (6)
- ODIN (2017) (6)
- A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions (2022) (6)
- User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack (2022) (6)
- An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework (2022) (6)
- KingFisher: an Industrial Security Framework based on Variational Autoencoders (2019) (6)
- The insider on the outside: a novel system for the detection of information leakers in social networks (2017) (6)
- Privacy Leakage Attacks in Browsers by Colluding Extensions (2014) (6)
- Distributed Services Attestation in IoT (2018) (6)
- SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices (2018) (6)
- EVExchange: A Relay Attack on Electric Vehicle Charging System (2022) (5)
- Trust and Trustworthy Computing (2015) (5)
- TAMBUS: A novel authentication method through covert channels for securing industrial networks (2020) (5)
- Location Traced Hybrid Detection of Node Replication Attack in Mobile Wireless Sensor Network (2020) (5)
- Sorry, Shodan is not Enough! Assessing ICS Security via IXP Network Traffic Analysis (2020) (5)
- Adapting the System to Users Based on Implicit Data: Ethical Risks and Possible Solutions (2016) (5)
- KingFisher (2019) (5)
- sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps (2017) (5)
- You click, I steal: analyzing and detecting click hijacking attacks in web pages (2018) (5)
- CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection (2011) (5)
- Preserving Smartphone Users' Anonymity in Cloudy Days (2013) (5)
- SnakeGX: A Sneaky Attack Against SGX Enclaves (2021) (5)
- Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents (2021) (5)
- Proof of Evolution: leveraging blockchain mining for a cooperative execution of Genetic Algorithms (2020) (5)
- TMaR: a two-stage MapReduce scheduler for heterogeneous environments (2020) (5)
- One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud (2020) (5)
- ASAINT: a spy App identification system based on network traffic (2020) (5)
- A Proactive Cache Privacy Attack on NDN (2020) (5)
- A few-shot malware classification approach for unknown family recognition using malware feature visualization (2022) (5)
- A threat model method for ICS malware: the TRISIS case (2021) (5)
- TEL: Low-Latency Failover Traffic Engineering in Data Plane (2020) (5)
- Reliable Group Communication Protocol for Internet of Things (2019) (5)
- Impact of security threats in vehicular alert messaging systems (2015) (5)
- Comparing the Impact of Social Media Regulations on News Consumption (2022) (5)
- A roaming-based denial of service attack on LTE networks: poster (2017) (5)
- DE-auth of the Blue! Transparent De-authentication Using Bluetooth Low Energy Beacon (2020) (5)
- A Statistical Analysis Framework for ICS Process Datasets (2020) (4)
- COVID-19 infodemic on Facebook and containment measures in Italy, United Kingdom and New Zealand (2022) (4)
- The position cheating attack on inter-vehicular online gaming (2018) (4)
- Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews (2021) (4)
- Detecting High-Quality GAN-Generated Face Images using Neural Networks (2022) (4)
- STRIDE: Scalable and Secure Over-The-Air Software Update Scheme for Autonomous Vehicles (2020) (4)
- SAND: Social-aware, network-failure resilient, and decentralized microblogging system (2019) (4)
- Wide-Scale Internet Disconnection: Impact and Recovery on Social-Based P2P Overlays (2019) (4)
- Anonymous end-to-end communications in adversarial mobile clouds (2017) (4)
- Optimal Solutions for Pairing Services on Smartphones: A Strategy to Minimize Energy Consumption (2012) (4)
- (Mis)Information Operations: An Integrated Perspective (2019) (4)
- Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks (2022) (4)
- Mascara: A Novel Attack Leveraging Android Virtualization (2020) (4)
- Analysis of Security in Modern Container Platforms (2017) (4)
- Smartphone and Laptop Frameworks for vehicular networking experimentation (2013) (4)
- A holistic approach to power efficiency in a clock offset based Intrusion Detection Systems for Controller Area Networks (2021) (4)
- Android App Collusion Threat and Mitigation Techniques (2016) (4)
- Dynamic Backdoors with Global Average Pooling (2022) (4)
- POSTER: An Intelligent Framework to Parallelize Hadoop Phases (2018) (4)
- UAVs Path Deviation Attacks: Survey and Research Challenges (2020) (4)
- Obfuscation and Diversification for Securing Cloud Computing (2015) (4)
- SoK: Secure Aggregation Based on Cryptographic Schemes for Federated Learning (2023) (4)
- Online Advertising Security: Issues, Taxonomy, and Future Directions (2020) (4)
- Investigating the Possibility of Data Leakage in Time of Live VM Migration (2018) (3)
- OSSINT - Open Source Social Network Intelligence An efficient and effective way to uncover "private" information in OSN profiles (2016) (3)
- Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems (2022) (3)
- A rare event. (1992) (3)
- A Survey on Context-based Co-presence Detection Techniques (2018) (3)
- Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 1 (2019) (3)
- CED2: Communication Efficient Disjointness Decision (2010) (3)
- Are We All in a Truman Show? Spotting Instagram Crowdturfing through Self-Training (2022) (3)
- On defending against label flipping attacks on malware detection systems (2020) (3)
- Your PIN Sounds Good! Augmentation of PIN Guessing Strategies via Audio Leakage (2020) (3)
- Provable Storage Medium for Data Storage Outsourcing (2015) (3)
- PvP: Profiling Versus Player! Exploiting Gaming Data for Player Recognition (2020) (3)
- GolfEngine: Network management system for software defined networking (2017) (3)
- Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current Demand (2021) (3)
- AMON: an Automaton MONitor for Industrial Cyber-Physical Security (2019) (3)
- Spot the Difference: Your Bucket is Leaking : A Novel Methodology to Expose A/B Testing Effortlessly (2018) (3)
- Feasibility of High Frequency Acoustic Imaging for Inspection of Containments: Phase II (1999) (3)
- ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags (2022) (3)
- Applications of Trusted Computing in Cloud Context (2017) (3)
- An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions (2022) (3)
- EVScout2.0: Electric Vehicle Profiling Through Charging Profile (2021) (3)
- Applied Cryptography and Network Security Workshops: ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19–22, 2020, Proceedings (2020) (3)
- Captcha Attack: Turning Captchas Against Humanity (2022) (3)
- Correction to: On defending against label flipping attacks on malware detection systems (2020) (3)
- A Novel Architecture for Cyber-Physical Security in Industrial Control Networks (2018) (3)
- Effect of DIS Attack on 6TiSCH Network Formation (2022) (3)
- Defeating Lattice-Based Data Hiding Code Via Decoding Security Hole (2021) (3)
- You Are How You Play: Authenticating Mobile Users via Game Playing (2017) (3)
- On the Resilience of Network-based Moving Target Defense Techniques Against Host Profiling Attacks (2019) (3)
- Detection of Information Leaks via Reflection in Android Apps (2017) (3)
- Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN (2009) (3)
- Secure Data Aggregation (2016) (2)
- AutoSec: Secure Automotive Data Transmission Scheme for In-Vehicle Networks (2022) (2)
- FADIA: fairness-driven collaborative remote attestation (2021) (2)
- ICN PATTA: ICN Privacy Attack Through Traffic Analysis (2021) (2)
- Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks (2010) (2)
- DeBot: A deep learning-based model for bot detection in industrial internet-of-things (2022) (2)
- Leaky CPS: Inferring Cyber Information from Physical Properties (and the other way around) (2018) (2)
- MASS: An efficient and secure broadcast authentication scheme for resource constrained devices (2013) (2)
- Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis (2021) (2)
- Label-Only Membership Inference Attack against Node-Level Graph Neural Networks (2022) (2)
- Unraveling Reflection Induced Sensitive Leaks in Android Apps (2017) (2)
- It’s a Matter of Style: Detecting Social Bots through Writing Style Consistency (2021) (2)
- You Surf so Strange Today: Anomaly Detection in Web Services via HMM and CTMC (2017) (2)
- A PLS-HECC-based device authentication and key agreement scheme for smart home networks (2022) (2)
- Spatial bloom filter in named data networking: a memory efficient solution (2020) (2)
- COTS Drone Detection using Video Streaming Characteristics (2020) (2)
- Do Not Deceive Your Employer with a Virtual Background: A Video Conferencing Manipulation-Detection System (2021) (2)
- Building Embedded Systems Like It's 1996 (2022) (2)
- Secure Machine to Machine Communication in Industrial Internet of Things (2019) (2)
- The Rise of ICS Malware: A Comparative Analysis (2021) (2)
- BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices (2020) (2)
- TACAN (2019) (2)
- Remote Attestation as a Service for IoT (2019) (2)
- Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems (2020) (2)
- Privacy-Friendly De-authentication with BLUFADE: Blurred Face Detection (2022) (2)
- Knocking on Tangle's Doors: Security Analysis of IOTA Ports (2021) (2)
- CyberWolf: assessing vulnerabilities of ICT-intensive financial markets (2020) (2)
- NC based DAS-NDN: Network Coding for robust Dynamic Adaptive Streaming over NDN (2020) (2)
- Vulnerabilities in Android webview objects: Still not the end! (2021) (2)
- Dynamic Super Round-Based Distributed Task Scheduling for UAV Networks (2023) (2)
- Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey (2022) (2)
- Formal model for inter-component communication and its security in android (2022) (2)
- SCARR: A Novel Scalable Runtime Remote Attestation (2018) (2)
- Skype & Type (2019) (2)
- You Can’t Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality (2022) (2)
- Nereus: Anonymous and Secure Ride-Hailing Service based on Private Smart Contracts (2022) (2)
- Unmanned Aerial Vehicles Meet Reflective Intelligent Surfaces to Improve Coverage and Secrecy (2022) (2)
- Privacy for 5G-Supported Vehicular Networks (2021) (2)
- Panorama: Real-time bird's eye view of an OpenFlow network (2017) (2)
- Ensuring information security by using Haskell's advanced type system (2017) (1)
- Predicting Twitter Users' Political Orientation: An Application to the Italian Political Scenario (2020) (1)
- Going In Style: Audio Backdoors Through Stylistic Transformations (2022) (1)
- Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization (2021) (1)
- We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads (2022) (1)
- AppHunter: Mobile Application Traffic Classification (2018) (1)
- Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain (2022) (1)
- Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms (2023) (1)
- Obfuscation detection in Android applications using deep learning (2022) (1)
- Secure Static Content Delivery for CDN Using Blockchain Technology (2021) (1)
- News consumption and social media regulations policy (2021) (1)
- Privacy for LBSs: On Using a Footprint Model to Face the Enemy (2015) (1)
- CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks (2022) (1)
- Extorsionware: Exploiting Smart Contract Vulnerabilities for Fun and Profit (2022) (1)
- SEnD: A Social Network Friendship Enhanced Decentralized System to Circumvent Censorships (2022) (1)
- Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization (2022) (1)
- Practical Exchange for Unique Digital Goods (2021) (1)
- CaT: Evaluating cloud-aided TLS for smartphone energy efficiency (2015) (1)
- Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand (2021) (1)
- Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location Tracing (2022) (1)
- A cross-domain qualitative meta-analysis of digital forensics: Research trends, challenges, and emerging topics (2021) (1)
- FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware (2018) (1)
- Security and Privacy Analysis of NSF Future Internet Architectures (2016) (1)
- Hide and Seek - Preserving Location Privacy and Utility in the Remote Identification of Unmanned Aerial Vehicles (2022) (1)
- Intelligent conditional collaborative private data sharing (2019) (1)
- Towards An Enhanced Reputation System for IOTA’s Coordicide (2021) (1)
- Covert Channel-Based Transmitter Authentication in Controller Area Networks (2019) (1)
- Time in privacy preserving LBSs: an overlooked dimension (2011) (1)
- Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System (2012) (1)
- Don't hesitate to share!: a novel IoT data protection scheme based on BGN cryptosystem (2019) (1)
- EqualNet: A Secure and Practical Defense for Long-term Network Topology Obfuscation (2022) (1)
- Security in Outsourced Storage: Efficiently Checking Integrity and Service Level Agreement Compliance (2010) (1)
- Anonymity in an Electronic Society: A Survey (2016) (1)
- Face the Truth: Interpretable Emotion Genuineness Detection (2022) (1)
- VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks (2022) (1)
- Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (2017) (1)
- Misinformation Detection on Social Media: Challenges and the Road Ahead (2022) (1)
- Attribute Inference Attacks in Online Multiplayer Video Games: A Case Study on DOTA2 (2022) (1)
- CoMon-DAS: A Framework for Efficient and Robust Dynamic Adaptive Streaming over NDN (2019) (1)
- Service resizing for quick DDoS mitigation in cloud computing environment (2016) (1)
- Crypto-Wills: Transferring Digital Assets by Maintaining Wills on the Blockchain (2019) (1)
- Symposium Programme (2018) (1)
- SENECAN: Secure KEy DistributioN OvEr CAN Through Watermarking and Jamming (2022) (1)
- Software defined network-based HTTP flooding attack defender (2022) (1)
- A collective response from food sovereignty scholars on the EU’s Farm to Fork Strategy (2020) (1)
- IaaS-Aided Access Control for Information-Centric IoT (2018) (1)
- DISC: A Novel Distributed On-Demand Clustering Protocol for Internet of Multimedia Things (2019) (1)
- Should I Mine or Should I Break: On the Worthiness of Brute-Forcing Cryptocurrency Addresses (2022) (1)
- SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones (2022) (1)
- Malingering Scraper: A Novel Framework to Reconstruct Honest Profiles from Malingerer Psychopathological Tests (2021) (1)
- Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy in Online Services (2017) (1)
- Cyber Forensics for CPS (2021) (1)
- On the Exploitation of Online SMS Receiving Services to Forge ID Verification (2019) (1)
- What you see is not what you get: a man-in-the-middle attack applied to video channels (2022) (0)
- SWAP: Secure Warning Messages Authentication and Propagation in Internet of Vehicles (2022) (0)
- Message from General Chairs and TPC Chairs (2020) (0)
- Identity-Based Authentication for On-Demand Charging of Electric Vehicles (2022) (0)
- Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey (2022) (0)
- Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion (2023) (0)
- You click, I steal: analyzing and detecting click hijacking attacks in web pages (2018) (0)
- PoSC: Combined Score for Consensus in Intemet-of-Things Applications (2022) (0)
- Intrusion Detection Framework for Invasive FPV Drones Using Video Streaming Characteristics (2023) (0)
- d user authentication process for access to a mobile user terminal and the corresponding mobile user terminal. (2010) (0)
- Do we need a holistic approach for the design of secure IoT systems? (2017) (0)
- Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents (2023) (0)
- POSTER: Toward a Secure and Scalable Attestation (2016) (0)
- Information Consumption and Social Response in a Segregated Environment: the Case of Gab (2020) (0)
- Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution (2023) (0)
- Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services (2021) (0)
- Welcome Message from the IoT-SECFOR Workshop Organizers (2018) (0)
- FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks (2022) (0)
- STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports (2023) (0)
- Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System (Transcript of Discussion) (2012) (0)
- SHeFU: Secure Hardware-Enabled Protocol for Firmware Updates (2020) (0)
- Detecting crypto-ransomware in IoT networks based on energy consumption footprint (2017) (0)
- An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF (2023) (0)
- SNIFFO: Security of networks and intelligence for field operations (2017) (0)
- PRaNA: PRNU-based Technique to Tell Real and Deepfake Videos Apart (2022) (0)
- TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks (2019) (0)
- DISPERSE: A Decentralized Architecture for Content Replication Resilient to Node Failures (2020) (0)
- On the Vulnerability of Data Points under Multiple Membership Inference Attacks and Target Models (2022) (0)
- Analyzing Price Deviations in DeFi Oracles (2022) (0)
- Boosting Big Brother: Attacking Search Engines with Encodings (2023) (0)
- ICSSIM — A framework for building industrial control systems security testbeds (2023) (0)
- On the Feasibility of Profiling Electric Vehicles through Charging Data (2022) (0)
- Reputation-based Trust: A robust mechanism for Dynamic Adaptive Streaming over Named Data Networking (2020) (0)
- Secure and Scalable routing protocol for Internet of Things (2019) (0)
- Message from the BITS 2019 General Chairs and TPC Chairs (2019) (0)
- Editorial: Special issue on trusted Cloud-Edges computations (2021) (0)
- ICSSIM-A Framework for Building Industrial Control Systems Security Simulation Testbeds (2022) (0)
- ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN (2020) (0)
- ALISI (2020) (0)
- Secure over-the-air software update for connected vehicles (2022) (0)
- TANGO: A Temporal Spatial Dynamic Graph Model for Event Prediction (2023) (0)
- Editorial for the Special Issue on Sustainable Cyber Forensics and Threat Intelligence (2021) (0)
- Message from the BITS 2018 General Chairs and TPC Chairs (2018) (0)
- Under the Hood of MARVEL (2022) (0)
- On the feasibility of crawling-based attacks against recommender systems (2021) (0)
- Fast Multi-party Private Set Operations in the Star Topology from Secure ANDs and ORs (2022) (0)
- SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning (2022) (0)
- Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey (2022) (0)
- Enhancing QoE for video streaming in MANETs via multi-constraint routing (2016) (0)
- SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks (2022) (0)
- A Privacy-Preserving Access Control Protocol for Consumer Flying Vehicles in Smart City Applications (2022) (0)
- Lexical Mining of Malicious URLs for Classifying Android Malware (2018) (0)
- HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN (2022) (0)
- The Impact of Covid-19 on Online Discussions: the Case Study of the Sanctioned Suicide Forum (2023) (0)
- Censorship-Resilient Communications through Information Scattering (Transcript of Discussion) (2010) (0)
- Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks (2022) (0)
- Eathentication: A Chewing-based Authentication Method (2020) (0)
- QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer (2022) (0)
- Security and Privacy in Cloud Computing via Obfuscation and Diversification: a Survey (2015) (0)
- MapReduce: an infrastructure review and research insights (2019) (0)
- ALISI: a lightweight identification system based on Iroha (2020) (0)
- Sim2Testbed Transfer: NDN Performance Evaluation (2022) (0)
- Side-channel attacks on mobile and IoT devices for Cyber-Physical systems (2022) (0)
- Conclusions and Future Works (2016) (0)
- Looking Through Walls: Inferring Scenes from Video-Surveillance Encrypted Traffic (2021) (0)
- Graph Encryption for Shortest Path Queries with k Unsorted Nodes (2022) (0)
- SILK-TV: S ecret I nformation L eakage from K eystroke T iming V ideos (2018) (0)
- Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions (2022) (0)
- Temporal Dynamics of Coordinated Online Behavior: Stability, Archetypes, and Influence (2023) (0)
- Cryptocurrency wallets: assessment and security (2023) (0)
- Real or Virtual: A Video Conferencing Background Manipulation-Detection System (2022) (0)
- Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part I (2020) (0)
- Deep Neural Networks for Direction of Arrival Estimation of Multiple Targets With Sparse Prior for Line-of-Sight Scenarios (2023) (0)
- BENIGREEN: Blockchain-based Energy-Efficient Privacy-Preserving Scheme for Green IoTs (2023) (0)
- Pair-Wise Key Establishment (2016) (0)
- Adaptive Intrusion Detection in Edge Computing Using Cerebellar Model Articulation Controller and Spline Fit (2023) (0)
- Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps (2020) (0)
- Guest Editorial Special Issue on Security and Forensics of Internet of Things: Problems and Solutions (2019) (0)
- MeLSeC: A Method for Lightweight and Secure Communication in Internet of Vehicles (2022) (0)
- Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders (2022) (0)
- C R ] 2 8 Ju n 20 13 MITHYS : Mind The Hand You Shake (2013) (0)
- Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations (2023) (0)
- Social Honeypot for Humans: Luring People through Self-managed Instagram Pages (2023) (0)
- ICSpot: A High-Interaction Honeypot for Industrial Control Systems (2022) (0)
- Oxygenator hollow fiber. (1988) (0)
- Can machine learning model with static features be fooled: an adversarial machine learning approach (2020) (0)
- HolA: Holistic and Autonomous Attestation for IoT Networks (2022) (0)
- Poisoning Bearer Context Migration in O-RAN 5G Network (2023) (0)
- Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 2 (2019) (0)
- An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems (2023) (0)
- Security and Trust Management: 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings (2019) (0)
- Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs (2023) (0)
- CyberWolf (2020) (0)
- Special issue on Trusted Cloud-Edges Computations (2020) (0)
- Secure Comparison Under Ideal/Real Simulation Paradigm (2018) (0)
- Hyperloop: A Cybersecurity Perspective (2022) (0)
- Food security and agricultural crises in a “financialized food regime” (2022) (0)
- A Machine Learning-based Approach to Detect Threats in Bio-Cyber DNA Storage Systems (2020) (0)
- Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part II (2020) (0)
- Privacy in Data Aggregation (2016) (0)
- A Novel Review Helpfulness Measure based on the User-Review-Item Paradigm (2023) (0)
- Introduction to the Special Issue on Security and Privacy for Connected Cyber-physical Systems (2020) (0)
- LiMCA: an optimal clustering algorithm for lifetime maximization of internet of things (2018) (0)
- Malicious MS Office documents dataset (2021) (0)
- Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics (2020) (0)
- AMON (2019) (0)
- CRiSIS 2013 : 8th International Conference on Risks and Security of Internet and Systems, 23-25 October 2013, La Rochelle, France (2013) (0)
- Contactless Authentication for Wearable Devices Using RFID (2022) (0)
- BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem (2022) (0)
- A Novel FPGA Architecture and Protocol for the Self-attestation of Configurable Hardware (2019) (0)
- For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection (2022) (0)
- ASAINT (2020) (0)
- POSTER : Toward a Secure and Scalable Attestation [ Extended Abstract ] (2016) (0)
- Lightweight solutions to counter DDoS attacks in software defined networking (2019) (0)
- FADIA (2021) (0)
- Versatile Cybersecurity (2018) (0)
- Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud (2022) (0)
- Beware of Pickpockets: A Practical Attack against Blocking Cards (2023) (0)
- Stopping Floods with Buckets: Attack and Countermeasure for IOTA Autopeering (2022) (0)
- Survey of DOS Defense Mechanisms (2015) (0)
- Face Recognition Systems: Are you sure they only consider your face? (2022) (0)
- SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage (2020) (0)
- Privacy-Preserving and Security in SDN-based IoT: A Survey (2023) (0)
- COIDS (2020) (0)
- POSTER (2018) (0)
- Censorship-Resilient Communications through Information Scattering (2010) (0)
- GATE and FENCE: Geo-Blocking Protocols for Named Data Networking (2018) (0)
- Vulnerability Analysis and Performance Enhancement of Authentication Protocol in Dynamic Wireless Power Transfer Systems (2022) (0)
This paper list is powered by the following services:
Other Resources About Mauro Conti
What Schools Are Affiliated With Mauro Conti?
Mauro Conti is affiliated with the following schools: