Search

Your search keyword '"Conti, Mauro"' showing total 43 results

Search Constraints

Start Over You searched for: Author "Conti, Mauro" Remove constraint Author: "Conti, Mauro" Publication Year Range This year Remove constraint Publication Year Range: This year Publication Type Academic Journals Remove constraint Publication Type: Academic Journals Publication Type Reports Remove constraint Publication Type: Reports
43 results on '"Conti, Mauro"'

Search Results

1. EmoBack: Backdoor Attacks Against Speaker Identification Using Emotional Prosody

2. MoRSE: Bridging the Gap in Cybersecurity Expertise with Retrieval Augmented Generation

3. Obfuscated Location Disclosure for Remote ID Enabled Drones

4. Your Car Tells Me Where You Drove: A Novel Path Inference Attack via CAN Bus and OBD-II Data

5. Fingerprint Membership and Identity Inference Against Generative Adversarial Networks

6. SeCTIS: A Framework to Secure CTI Sharing

7. Deep Learning Fusion For Effective Malware Detection: Leveraging Visual Features

8. GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction

9. Work-in-Progress: Crash Course: Can (Under Attack) Autonomous Driving Beat Human Drivers?

10. Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments

11. Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of Language Models

12. Can LLMs Understand Computer Networks? Towards a Virtual System Administrator

13. RedactBuster: Entity Type Recognition from Redacted Documents

14. CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems

15. 'Are Adversarial Phishing Webpages a Threat in Reality?' Understanding the Users' Perception of Adversarial Webpages

16. FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids

17. Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead

18. Exploring Jamming and Hijacking Attacks for Micro Aerial Drones

19. Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks

20. Penetration Testing of 5G Core Network Web Technologies

21. Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices

22. A Survey on Decentralized Identifiers and Verifiable Credentials

23. 'All of Me': Mining Users' Attributes from their Public Spotify Playlists

24. A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols

25. Privacy-Preserving in Blockchain-based Federated Learning Systems

39. Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors Using Machine Learning.

40. Introduction to the Special Issue on Integrity of Multimedia and Multimodal Data in Internet of Things.

41. Temporal dynamics of coordinated online behavior: Stability, archetypes, and influence.

42. RANGO: A Novel Deep Learning Approach to Detect Drones Disguising from Video Surveillance Systems.

43. A comprehensive security and performance assessment of UAV authentication schemes.

Catalog

Books, media, physical & digital resources