Search

Your search keyword '"CONTI, MAURO"' showing total 41 results

Search Constraints

Start Over You searched for: Author "CONTI, MAURO" Remove constraint Author: "CONTI, MAURO" Database Supplemental Index Remove constraint Database: Supplemental Index
41 results on '"CONTI, MAURO"'

Search Results

1. A Location-Aware and Healing Attestation Scheme for Air-Supported Internet of Vehicles

2. Anonymous, Secure, Traceable, and Efficient Decentralized Digital Forensics

3. Secure Source Identification Scheme for Revocable Instruction Sharing in Vehicle Platoon

4. A Sanitizable Access Control With Policy-Protection for Vehicular Social Networks

5. Enabling Low Sidelobe Secret Multicast Transmission for mmWave Communication: An Integrated Oblique Projection Approach

7. Dynamic Super Round-Based Distributed Task Scheduling for UAV Networks

8. Poisoning Bearer Context Migration in O-RAN 5G Network

9. Deep Neural Networks for Direction of Arrival Estimation of Multiple Targets With Sparse Prior for Line-of-Sight Scenarios

10. Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion

11. Nereus: Anonymous and Secure Ride-Hailing Service Based on Private Smart Contracts

12. Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems

13. SENECAN: Secure KEy DistributioN OvEr CAN Through Watermarking and Jamming

14. Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain

15. VAIDANSHH: Adaptive DDoS detection for heterogeneous hosts in vehicular environments

16. GREPHRO: Nature-inspired optimization duo for Internet-of-Things

17. Misinformation Detection on Social Media: Challenges and the Road Ahead

18. Privacy-Preserving Navigation Supporting Similar Queries in Vehicular Networks

19. A Cyber-Kill-Chain based taxonomy of crypto-ransomware features

20. Fast multi-hop broadcast of alert messages in VANETs: An analytical model.

21. EnergIoT: A solution to improve network lifetime of IoT devices.

22. Privacy-Aware Caching in Information-Centric Networking

23. Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks

24. BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication.

25. Turning captchas against humanity: Captcha-based attacks in online social media

26. An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF

27. Anonymous end-to-end communications in adversarial mobile clouds.

28. The impact of malicious nodes positioning on vehicular alert messaging system.

29. Detecting crypto-ransomware in IoT networks based on energy consumption footprint

30. OSSINT - Open Source Social Network Intelligence

31. Hand Drawn Optical Circuit Recognition.

32. Secure median computation in wireless sensor networks.

33. ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks.

34. A holistic approach to power efficiency in a clock offset based Intrusion Detection Systems for Controller Area Networks.

35. eRIPP‐FS: Enforcing privacy and security in RFID

36. Privacy‐preserving robust data aggregation in wireless sensor networks

37. Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions.

38. USB powered devices: A survey of side-channel threats and countermeasures

39. Attestation-enabled secure and scalable routing protocol for IoT networks.

40. Metabolism of exogenous ganglioside GM1 in cultured cerebellar granule cells The fatty acid and sphingosine moieties formed during degradation are re-used for lipid biosynthesis

41. Metabolism of exogenous ganglioside GM1 in cultured cerebellar granule cells The fatty acid and sphingosine moieties formed during degradation are re‐used for lipid biosynthesis

Catalog

Books, media, physical & digital resources