Search

Your search keyword '"Conti, Mauro"' showing total 28 results
28 results on '"Conti, Mauro"'

Search Results

4. User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack.

5. On the feasibility of crawling-based attacks against recommender systems1.

6. On the feasibility of crawling-based attacks against recommender systems1.

8. DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things.

9. Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain.

10. AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller.

11. Blockchain-Enabled Secure Energy Trading With Verifiable Fairness in Industrial Internet of Things.

12. PermPair : Android Malware Detection Using Permission Pairs.

13. Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery.

14. ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System.

15. SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN.

16. Security and Privacy Analysis of National Science Foundation Future Internet Architectures.

17. MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things.

18. A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment.

19. Toward the Development of Secure Underwater Acoustic Networks.

20. Drone Path Planning for Secure Positioning and Secure Position Verification.

21. SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks.

22. Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks.

23. Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication.

24. Secure Data Aggregation in Wireless Sensor Networks.

25. Attestation-enabled secure and scalable routing protocol for IoT networks.

26. SYN‐Guard: An effective counter for SYN flooding attack in software‐defined networking.

27. CENSOR: Cloud‐enabled secure IoT architecture over SDN paradigm.

28. DeBot: A deep learning-based model for bot detection in industrial internet-of-things.

Catalog

Books, media, physical & digital resources