Search

Your search keyword '"CONTI, MAURO"' showing total 165 results

Search Constraints

Start Over You searched for: Author "CONTI, MAURO" Remove constraint Author: "CONTI, MAURO" Database arXiv Remove constraint Database: arXiv
165 results on '"CONTI, MAURO"'

Search Results

1. EmoBack: Backdoor Attacks Against Speaker Identification Using Emotional Prosody

2. MoRSE: Bridging the Gap in Cybersecurity Expertise with Retrieval Augmented Generation

3. Obfuscated Location Disclosure for Remote ID Enabled Drones

4. Your Car Tells Me Where You Drove: A Novel Path Inference Attack via CAN Bus and OBD-II Data

5. Fingerprint Membership and Identity Inference Against Generative Adversarial Networks

6. SeCTIS: A Framework to Secure CTI Sharing

7. Deep Learning Fusion For Effective Malware Detection: Leveraging Visual Features

8. GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction

9. Work-in-Progress: Crash Course: Can (Under Attack) Autonomous Driving Beat Human Drivers?

10. Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments

11. Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of Language Models

12. Can LLMs Understand Computer Networks? Towards a Virtual System Administrator

13. RedactBuster: Entity Type Recognition from Redacted Documents

14. CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems

15. 'Are Adversarial Phishing Webpages a Threat in Reality?' Understanding the Users' Perception of Adversarial Webpages

16. FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids

17. Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead

18. Exploring Jamming and Hijacking Attacks for Micro Aerial Drones

19. Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks

20. Penetration Testing of 5G Core Network Web Technologies

21. Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices

22. A Survey on Decentralized Identifiers and Verifiable Credentials

23. 'All of Me': Mining Users' Attributes from their Public Spotify Playlists

24. A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols

25. Privacy-Preserving in Blockchain-based Federated Learning Systems

26. DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles

27. Topology-Based Reconstruction Prevention for Decentralised Learning

28. Dr. Jekyll and Mr. Hyde: Two Faces of LLMs

29. NLP-Based Techniques for Cyber Threat Intelligence

30. Invisible Threats: Backdoor Attack in OCR Systems

31. AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation

32. De-authentication using Ambient Light Sensor

33. HoneyEVSE: An Honeypot to emulate Electric Vehicle Supply Equipments

34. Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication

35. Label Inference Attacks against Node-level Vertical Federated GNNs

36. EPUF: A Novel Scheme Based on Entropy Features of Latency-based DRAM PUFs Providing Lightweight Authentication in IoT Networks

37. Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks?

38. Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability

39. Twitter Bots Influence on the Russo-Ukrainian War During the 2022 Italian General Elections

40. When Authentication Is Not Enough: On the Security of Behavioral-Based Driver Authentication Systems

41. Turning Privacy-preserving Mechanisms against Federated Learning

42. Boosting Big Brother: Attacking Search Engines with Encodings

43. Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents

44. Social Honeypot for Humans: Luring People through Self-managed Instagram Pages

45. Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations

46. STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports

47. Cryptocurrency wallets: assessment and security

48. Beware of Pickpockets: A Practical Attack against Blocking Cards

49. SoK: A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification

50. Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms

Catalog

Books, media, physical & digital resources