Search

Your search keyword '"Conti, Mauro"' showing total 62 results
62 results on '"Conti, Mauro"'

Search Results

2. User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack.

3. Demystifying the Transferability of Adversarial Attacks in Computer Networks.

4. Virtual Influencers in Online Social Media.

5. DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things.

6. Effect of DIS Attack on 6TiSCH Network Formation.

7. SEnD: A Social Network Friendship Enhanced Decentralized System to Circumvent Censorships.

10. Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain.

11. TEL: Low-Latency Failover Traffic Engineering in Data Plane.

12. AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller.

14. Blockchain-Enabled Secure Energy Trading With Verifiable Fairness in Industrial Internet of Things.

16. BitProb: Probabilistic Bit Signatures for Accurate Application Identification.

17. SARA: Secure Asynchronous Remote Attestation for IoT Systems.

18. PermPair : Android Malware Detection Using Permission Pairs.

19. Cryptomining Cannot Change Its Spots: Detecting Covert Cryptomining Using Magnetic Side-Channel.

20. BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices.

21. Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery.

22. ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System.

26. SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN.

27. Advertising in the IoT Era: Vision and Challenges.

28. Security and Privacy Analysis of National Science Foundation Future Internet Architectures.

29. MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things.

30. A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment.

31. DELTA: Data Extraction and Logging Tool for Android.

32. Detecting Android Malware Leveraging Text Semantics of Network Flows.

33. Provably Secure Authenticated Key Agreement Scheme for Smart Grid.

34. Robust Smartphone App Identification via Encrypted Network Traffic Analysis.

35. Toward the Development of Secure Underwater Acoustic Networks.

37. Drone Path Planning for Secure Positioning and Secure Position Verification.

38. SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks.

39. LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking.

40. On the Feasibility of Attribute-Based Encryption on Internet of Things Devices.

42. Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks.

43. Analyzing Android Encrypted Network Traffic to Identify User Actions.

44. Employing Program Semantics for Malware Detection.

45. Provable Storage Medium for Data Storage Outsourcing.

46. Leveraging Parallel Communications for Minimizing Energy Consumption on Smartphones.

48. Smart health: A context-aware health paradigm within smart cities.

49. An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments.

50. Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication.

Catalog

Books, media, physical & digital resources