Search

Your search keyword '"Conti, Mauro"' showing total 464 results

Search Constraints

Start Over You searched for: Author "Conti, Mauro" Remove constraint Author: "Conti, Mauro" Publication Type Academic Journals Remove constraint Publication Type: Academic Journals Publication Type Reports Remove constraint Publication Type: Reports
464 results on '"Conti, Mauro"'

Search Results

51. Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations

52. STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports

53. Cryptocurrency wallets: assessment and security

54. Beware of Pickpockets: A Practical Attack against Blocking Cards

55. SoK: A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification

56. Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms

57. Temporal Dynamics of Coordinated Online Behavior: Stability, Archetypes, and Influence

58. Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs

59. Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders

60. Going In Style: Audio Backdoors Through Stylistic Transformations

61. On the Vulnerability of Data Points under Multiple Membership Inference Attacks and Target Models

62. ICSSIM-A Framework for Building Industrial Control Systems Security Simulation Testbeds

63. Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning

64. Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2

65. On the Feasibility of Profiling Electric Vehicles through Charging Data

66. Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks

67. You Can't Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality

68. Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization

69. Hyperloop: A Cybersecurity Perspective

70. Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey

71. Identity-Based Authentication for On-Demand Charging of Electric Vehicles

72. Label-Only Membership Inference Attack against Node-Level Graph Neural Networks

73. Are We All in a Truman Show? Spotting Instagram Crowdturfing through Self-Training

74. Hide and Seek -- Preserving Location Privacy and Utility in the Remote Identification of Unmanned Aerial Vehicles

75. QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer

76. VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks

77. FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks

78. Unmanned Aerial Vehicles Meet Reflective Intelligent Surfaces to Improve Coverage and Secrecy

79. An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework

80. Real or Virtual: A Video Conferencing Background Manipulation-Detection System

81. Extorsionware: Exploiting Smart Contract Vulnerabilities for Fun and Profit

82. Building Embedded Systems Like It's 1996

83. EVExchange: A Relay Attack on Electric Vehicle Charging System

84. The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems

85. Dynamic Backdoors with Global Average Pooling

86. Detecting High-Quality GAN-Generated Face Images using Neural Networks

87. Captcha Attack: Turning Captchas Against Humanity

91. Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand

92. Demystifying the Transferability of Adversarial Attacks in Computer Networks

93. A Survey on Security and Privacy Issues of UAVs

94. The Spread of Propaganda by Coordinated Communities on Social Media

97. Research trends, challenges, and emerging topics of digital forensics: A review of reviews

98. Can You Hear It? Backdoor Attacks via Ultrasonic Triggers

99. EVScout2.0: Electric Vehicle Profiling Through Charging Profile

100. Do Not Deceive Your Employer with a Virtual Background: A Video Conferencing Manipulation-Detection System

Catalog

Books, media, physical & digital resources