Search

Your search keyword '"Conti, Mauro"' showing total 55 results

Search Constraints

Start Over You searched for: Author "Conti, Mauro" Remove constraint Author: "Conti, Mauro" Publication Type Reports Remove constraint Publication Type: Reports
55 results on '"Conti, Mauro"'

Search Results

1. Virtual Influencers in Online Social Media.

2. On the feasibility of crawling-based attacks against recommender systems1.

3. TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks.

4. Lightweight solutions to counter DDoS attacks in software defined networking.

5. Obfuscation detection in Android applications using deep learning.

6. Leveraging Parallel Communications for Minimizing Energy Consumption on Smartphones.

7. HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN.

8. CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection.

9. Distributed data source verification in wireless sensor networks

10. Formal model for inter-component communication and its security in android.

11. RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things.

12. Temporal dynamics of coordinated online behavior: Stability, archetypes, and influence.

13. SYN‐Guard: An effective counter for SYN flooding attack in software‐defined networking.

14. RANGO: A Novel Deep Learning Approach to Detect Drones Disguising from Video Surveillance Systems.

15. Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps.

16. A comprehensive security and performance assessment of UAV authentication schemes.

17. LiMCA: an optimal clustering algorithm for lifetime maximization of internet of things.

18. MapReduce: an infrastructure review and research insights.

19. PILOT: Password and PIN information leakage from obfuscated typing videos1.

20. LISA: Lightweight context-aware IoT service architecture.

21. AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones.

22. Advertising in the IoT Era: Vision and Challenges.

23. Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey.

24. On the Feasibility of Attribute-Based Encryption on Internet of Things Devices.

25. MADESANT: malware detection and severity analysis in industrial environments.

26. Software defined network-based HTTP flooding attack defender.

27. COVID-19 infodemic on Facebook and containment measures in Italy, United Kingdom and New Zealand.

28. Smart health: A context-aware health paradigm within smart cities.

29. SFC-NIDS: a sustainable and explainable flow filtering based concept drift-driven security approach for network introspection.

30. ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN.

31. Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities.

32. Can machine learning model with static features be fooled: an adversarial machine learning approach.

33. A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions.

34. On defending against label flipping attacks on malware detection systems.

35. FOCAN: A Fog-supported smart city network architecture for management of applications in the Internet of Everything environments.

36. You click, I steal: analyzing and detecting click hijacking attacks in web pages.

37. Deep and broad URL feature mining for android malware detection.

38. A Survey on Homomorphic Encryption Schemes: Theory and Implementation.

39. Towards privacy preserving unstructured big data publishing.

40. Mobility-aware cross-layer routing for peer-to-peer networks.

41. TANGO: A temporal spatial dynamic graph model for event prediction.

42. Computational Intelligence Approaches for Energy Load Forecasting in Smart Energy Management Grids: State of the Art, Future Challenges, and Research Directions.

43. An efficient routing protocol for the QoS support of large-scale MANETs.

44. Enhancing QoE for video streaming in MANETs via multi-constraint routing.

45. Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study.

46. DDoS victim service containment to minimize the internal collateral damages in cloud computing.

47. Biometric Authentication Methods on Smartphones: A Survey.

48. CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks.

49. DeBot: A deep learning-based model for bot detection in industrial internet-of-things.

50. A survey and taxonomy of consensus protocols for blockchains.

Catalog

Books, media, physical & digital resources