144 results on '"Bella, Giampaolo"'
Search Results
2. Towards a semantic blockchain: A behaviouristic approach to modelling Ethereum
3. Blockchains Through Ontologies: The Case Study of the Ethereum ERC721 Standard in oasis
4. A behaviouristic semantic approach to blockchain-based e-commerce
5. Semantic Representation as a Key Enabler for Blockchain-Based Commerce
6. Car Drivers’ Privacy Concerns and Trust Perceptions
7. Towards Grammatical Tagging for the Legal Language of Cybersecurity
8. Protecting Voice-Controllable Devices Against Self-Issued Voice Commands
9. A Threat Model for Soft Privacy on Smart Cars
10. The ontology for agents, systems and integration of services: OASIS version 2$
11. You Overtrust Your Printer
12. You Already Used Formal Methods but Did Not Know It
13. PETIoT: PEnetration Testing the Internet of Things
14. Smart Bulbs Can Be Hacked to Hack into Your Household
15. How to Model Privacy Threats in the Automotive Domain
16. The AILA Methodology for Automated and Intelligent Likelihood Assignment in Risk Assessment
17. Evaluating the Fork-Awareness of Coverage-Guided Fuzzers
18. Designing and implementing an AUTOSAR-based Basic Software Module for enhanced security
19. Papyrus-Based Safety Analysis Automatization
20. Towards an Integrated Penetration Testing Environment for the CAN Protocol
21. Embedded fuzzing: a review of challenges, tools, and solutions
22. Invisible Security (Transcript of Discussion)
23. Invisible Security
24. Idea: A Unifying Theory for Evaluation Systems
25. Perceptions of Beauty in Security Ceremonies
26. Modelling human threats in security ceremonies1
27. ALEXA VERSUS ALEXA
28. Multi-service threats: Attacking and protecting network printers and VoIP phones alike
29. Session details: Theme: System software and security: SEC - computer security track
30. The AILA Methodology for Automated and Intelligent Likelihood Assignment
31. PETIoT: PEnetration Testing the Internet of Things
32. Vulnerability Assessment and Penetration Testing on IP camera
33. Security is Beautiful
34. A Secure Exam Protocol Without Trusted Parties
35. Privacy and modern cars through a dual lens
36. Virtually Perfect Democracy
37. The Challenges behind Independent Living Support Systems
38. SixPack: Abusing ABS to avoid Misbehavior detection in VANETs
39. Session details: Theme: System software and security: SEC - Computer security track
40. Attacking Each Other
41. Towards Verifying Voter Privacy through Unlinkability
42. A Socio-technical Understanding of TLS Certificate Validation
43. Layered Analysis of Security Ceremonies
44. Security Protocol Deployment Risk
45. Formal Analysis of the Genetic Toggle
46. Validating Security Protocols under the General Attacker
47. CINNAMON: A Module for AUTOSAR Secure Onboard Communication
48. VoIP Can Still Be Exploited - Badly
49. Session details: Theme: System software and security: SEC - Computer security track
50. Out to explore the cybersecurity planet
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.