Search

Your search keyword '"Conti, Mauro"' showing total 464 results

Search Constraints

Start Over You searched for: Author "Conti, Mauro" Remove constraint Author: "Conti, Mauro" Publication Type Academic Journals Remove constraint Publication Type: Academic Journals Publication Type Periodicals Remove constraint Publication Type: Periodicals Publication Type Reports Remove constraint Publication Type: Reports
464 results on '"Conti, Mauro"'

Search Results

1. EmoBack: Backdoor Attacks Against Speaker Identification Using Emotional Prosody

2. MoRSE: Bridging the Gap in Cybersecurity Expertise with Retrieval Augmented Generation

3. Obfuscated Location Disclosure for Remote ID Enabled Drones

4. Your Car Tells Me Where You Drove: A Novel Path Inference Attack via CAN Bus and OBD-II Data

5. Fingerprint Membership and Identity Inference Against Generative Adversarial Networks

6. SeCTIS: A Framework to Secure CTI Sharing

7. Deep Learning Fusion For Effective Malware Detection: Leveraging Visual Features

8. GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction

9. Work-in-Progress: Crash Course: Can (Under Attack) Autonomous Driving Beat Human Drivers?

10. Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments

11. Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of Language Models

12. Can LLMs Understand Computer Networks? Towards a Virtual System Administrator

13. RedactBuster: Entity Type Recognition from Redacted Documents

14. CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems

15. 'Are Adversarial Phishing Webpages a Threat in Reality?' Understanding the Users' Perception of Adversarial Webpages

16. FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids

17. Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead

18. Exploring Jamming and Hijacking Attacks for Micro Aerial Drones

19. Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks

20. Penetration Testing of 5G Core Network Web Technologies

21. Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices

22. A Survey on Decentralized Identifiers and Verifiable Credentials

23. 'All of Me': Mining Users' Attributes from their Public Spotify Playlists

24. A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols

25. Privacy-Preserving in Blockchain-based Federated Learning Systems

26. DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles

27. Topology-Based Reconstruction Prevention for Decentralised Learning

28. Dr. Jekyll and Mr. Hyde: Two Faces of LLMs

32. Alpha Phi-Shing Fraternity: Phishing Assessment in a Higher Education Institution

33. NLP-Based Techniques for Cyber Threat Intelligence

34. Invisible Threats: Backdoor Attack in OCR Systems

35. AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation

36. De-authentication using Ambient Light Sensor

37. HoneyEVSE: An Honeypot to emulate Electric Vehicle Supply Equipments

38. Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication

41. Label Inference Attacks against Node-level Vertical Federated GNNs

42. EPUF: A Novel Scheme Based on Entropy Features of Latency-based DRAM PUFs Providing Lightweight Authentication in IoT Networks

43. Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks?

44. Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability

45. Twitter Bots Influence on the Russo-Ukrainian War During the 2022 Italian General Elections

46. When Authentication Is Not Enough: On the Security of Behavioral-Based Driver Authentication Systems

47. Turning Privacy-preserving Mechanisms against Federated Learning

48. Boosting Big Brother: Attacking Search Engines with Encodings

49. Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents

50. Social Honeypot for Humans: Luring People through Self-managed Instagram Pages

Catalog

Books, media, physical & digital resources