Search

Your search keyword '"Conti, Mauro"' showing total 387 results

Search Constraints

Start Over You searched for: Author "Conti, Mauro" Remove constraint Author: "Conti, Mauro" Database Springer Nature eBooks Remove constraint Database: Springer Nature eBooks
387 results on '"Conti, Mauro"'

Search Results

1. Relation Extraction Techniques in Cyber Threat Intelligence

2. RedactBuster: Entity Type Recognition from Redacted Documents

3. GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction

5. FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids

6. Acoustic Side-Channel Attacks on a Computer Mouse

7. One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection

8. DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network

9. X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices

10. HoneyEVSE: An Honeypot to Emulate Electric Vehicle Supply Equipments

12. Leveraging Social Networks for Mergers and Acquisitions Forecasting

13. If You’re Scanning This, It’s Too Late! A QR Code-Based Fuzzing Methodology to Identify Input Vulnerabilities in Mobile Apps

14. Twitter Bots Influence on the Russo-Ukrainian War During the 2022 Italian General Elections

16. Cryptocurrency Wallets: Assessment and Security

17. Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions

18. Analyzing Price Deviations in DeFi Oracles

19. We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads

20. EVExchange: A Relay Attack on Electric Vehicle Charging System

21. HolA: Holistic and Autonomous Attestation for IoT Networks

22. For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection

24. Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud

25. The Rise of ICS Malware: A Comparative Analysis

26. Secure Static Content Delivery for CDN Using Blockchain Technology

27. Malingering Scraper: A Novel Framework to Reconstruct Honest Profiles from Malingerer Psychopathological Tests

28. Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services

29. Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current Demand

30. SnakeGX: A Sneaky Attack Against SGX Enclaves

31. Crypto-Wills: Transferring Digital Assets by Maintaining Wills on the Blockchain

32. Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics

33. Detecting Covert Cryptomining Using HPC

34. PvP: Profiling Versus Player! Exploiting Gaming Data for Player Recognition

35. One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud

36. Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems

37. Your PIN Sounds Good! Augmentation of PIN Guessing Strategies via Audio Leakage

38. DE-auth of the Blue! Transparent De-authentication Using Bluetooth Low Energy Beacon

41. Emotional Valence Shifts and User Behavior on Twitter, Facebook, and YouTube

42. Malware Signature Generation Using Locality Sensitive Hashing

43. Secure Machine to Machine Communication in Industrial Internet of Things

44. The Online Identity Detection via Keyboard Dynamics

45. ChoKIFA: A New Detection and Mitigation Approach Against Interest Flooding Attacks in NDN

46. Lexical Mining of Malicious URLs for Classifying Android Malware

49. SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices

50. SILK-TV : Secret Information Leakage from Keystroke Timing Videos

Catalog

Books, media, physical & digital resources