14 results on '"Conti, Mauro"'
Search Results
2. Beyond the west: Revealing and bridging the gap between Western and Chinese phishing website detection
3. PIGNUS: A Deep Learning model for IDS in industrial internet-of-things
4. An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions
5. A few-shot malware classification approach for unknown family recognition using malware feature visualization
6. Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents
7. Vulnerabilities in Android webview objects: Still not the end!
8. LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks
9. Context-based Co-presence detection techniques: A survey
10. Efficient privacy preserving device authentication in WBANs for industrial e-health applications
11. On the economic significance of ransomware campaigns: A Bitcoin transactions perspective
12. Android inter-app communication threats and detection techniques
13. PIndroid: A novel Android malware detection system using ensemble learning methods
14. Colluding browser extension attack on user privacy and its implication for web browsers
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.