387 results on '"Conti, Mauro"'
Search Results
2. RedactBuster: Entity Type Recognition from Redacted Documents
3. GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction
4. Threshold Signatures with Private Accountability via Secretly Designated Witnesses
5. FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids
6. Acoustic Side-Channel Attacks on a Computer Mouse
7. One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection
8. DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network
9. X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices
10. HoneyEVSE: An Honeypot to Emulate Electric Vehicle Supply Equipments
11. A Systematic Evaluation of Backdoor Attacks in Various Domains
12. Leveraging Social Networks for Mergers and Acquisitions Forecasting
13. If You’re Scanning This, It’s Too Late! A QR Code-Based Fuzzing Methodology to Identify Input Vulnerabilities in Mobile Apps
14. Twitter Bots Influence on the Russo-Ukrainian War During the 2022 Italian General Elections
15. Social Honeypot for Humans: Luring People Through Self-managed Instagram Pages
16. Cryptocurrency Wallets: Assessment and Security
17. Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions
18. Analyzing Price Deviations in DeFi Oracles
19. We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads
20. EVExchange: A Relay Attack on Electric Vehicle Charging System
21. HolA: Holistic and Autonomous Attestation for IoT Networks
22. For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection
23. Physical Layer Security Challenges and Solutions for Beyond 5G Fog Computing Networks
24. Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud
25. The Rise of ICS Malware: A Comparative Analysis
26. Secure Static Content Delivery for CDN Using Blockchain Technology
27. Malingering Scraper: A Novel Framework to Reconstruct Honest Profiles from Malingerer Psychopathological Tests
28. Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services
29. Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current Demand
30. SnakeGX: A Sneaky Attack Against SGX Enclaves
31. Crypto-Wills: Transferring Digital Assets by Maintaining Wills on the Blockchain
32. Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics
33. Detecting Covert Cryptomining Using HPC
34. PvP: Profiling Versus Player! Exploiting Gaming Data for Player Recognition
35. One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud
36. Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems
37. Your PIN Sounds Good! Augmentation of PIN Guessing Strategies via Audio Leakage
38. DE-auth of the Blue! Transparent De-authentication Using Bluetooth Low Energy Beacon
39. Cyber Threat Intelligence: Challenges and Opportunities
40. Investigating the Possibility of Data Leakage in Time of Live VM Migration
41. Emotional Valence Shifts and User Behavior on Twitter, Facebook, and YouTube
42. Malware Signature Generation Using Locality Sensitive Hashing
43. Secure Machine to Machine Communication in Industrial Internet of Things
44. The Online Identity Detection via Keyboard Dynamics
45. ChoKIFA: A New Detection and Mitigation Approach Against Interest Flooding Attacks in NDN
46. Lexical Mining of Malicious URLs for Classifying Android Malware
47. You Are How You Play: Authenticating Mobile Users via Game Playing
48. An ICN-Based Authentication Protocol for a Simplified LTE Architecture
49. SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices
50. SILK-TV : Secret Information Leakage from Keystroke Timing Videos
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.