Search

Your search keyword '"CONTI, MAURO"' showing total 30 results

Search Constraints

Start Over You searched for: Author "CONTI, MAURO" Remove constraint Author: "CONTI, MAURO" Publication Type Magazines Remove constraint Publication Type: Magazines
30 results on '"CONTI, MAURO"'

Search Results

1. A Location-Aware and Healing Attestation Scheme for Air-Supported Internet of Vehicles

2. Anonymous, Secure, Traceable, and Efficient Decentralized Digital Forensics

3. Secure Source Identification Scheme for Revocable Instruction Sharing in Vehicle Platoon

4. A Sanitizable Access Control With Policy-Protection for Vehicular Social Networks

5. Enabling Low Sidelobe Secret Multicast Transmission for mmWave Communication: An Integrated Oblique Projection Approach

7. Dynamic Super Round-Based Distributed Task Scheduling for UAV Networks

8. Poisoning Bearer Context Migration in O-RAN 5G Network

9. Deep Neural Networks for Direction of Arrival Estimation of Multiple Targets With Sparse Prior for Line-of-Sight Scenarios

10. Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion

11. Nereus: Anonymous and Secure Ride-Hailing Service Based on Private Smart Contracts

12. Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems

13. SENECAN: Secure KEy DistributioN OvEr CAN Through Watermarking and Jamming

14. Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain

15. VAIDANSHH: Adaptive DDoS detection for heterogeneous hosts in vehicular environments

16. GREPHRO: Nature-inspired optimization duo for Internet-of-Things

17. Misinformation Detection on Social Media: Challenges and the Road Ahead

18. Privacy-Preserving Navigation Supporting Similar Queries in Vehicular Networks

19. A Cyber-Kill-Chain based taxonomy of crypto-ransomware features

20. Privacy-Aware Caching in Information-Centric Networking

21. Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks

22. Turning captchas against humanity: Captcha-based attacks in online social media

23. An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF

24. Detecting crypto-ransomware in IoT networks based on energy consumption footprint

25. OSSINT - Open Source Social Network Intelligence

26. eRIPP‐FS: Enforcing privacy and security in RFID

27. Privacy‐preserving robust data aggregation in wireless sensor networks

28. USB powered devices: A survey of side-channel threats and countermeasures

29. Metabolism of exogenous ganglioside GM1 in cultured cerebellar granule cells The fatty acid and sphingosine moieties formed during degradation are re-used for lipid biosynthesis

30. Deep and broad URL feature mining for android malware detection.

Catalog

Books, media, physical & digital resources