Search

Your search keyword '"CONTI, MAURO"' showing total 386 results

Search Constraints

Start Over You searched for: Author "CONTI, MAURO" Remove constraint Author: "CONTI, MAURO" Publication Type eBooks Remove constraint Publication Type: eBooks
386 results on '"CONTI, MAURO"'

Search Results

1. RedactBuster: Entity Type Recognition from Redacted Documents

2. GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction

4. FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids

5. Acoustic Side-Channel Attacks on a Computer Mouse

6. One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection

7. DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network

8. X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices

9. HoneyEVSE: An Honeypot to Emulate Electric Vehicle Supply Equipments

11. Leveraging Social Networks for Mergers and Acquisitions Forecasting

12. If You’re Scanning This, It’s Too Late! A QR Code-Based Fuzzing Methodology to Identify Input Vulnerabilities in Mobile Apps

13. Twitter Bots Influence on the Russo-Ukrainian War During the 2022 Italian General Elections

15. Cryptocurrency Wallets: Assessment and Security

16. Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions

17. Analyzing Price Deviations in DeFi Oracles

18. We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads

19. EVExchange: A Relay Attack on Electric Vehicle Charging System

20. HolA: Holistic and Autonomous Attestation for IoT Networks

21. For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection

23. Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud

24. The Rise of ICS Malware: A Comparative Analysis

25. Secure Static Content Delivery for CDN Using Blockchain Technology

26. Malingering Scraper: A Novel Framework to Reconstruct Honest Profiles from Malingerer Psychopathological Tests

27. Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services

28. Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current Demand

29. SnakeGX: A Sneaky Attack Against SGX Enclaves

30. Crypto-Wills: Transferring Digital Assets by Maintaining Wills on the Blockchain

31. Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics

32. Detecting Covert Cryptomining Using HPC

33. PvP: Profiling Versus Player! Exploiting Gaming Data for Player Recognition

34. One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud

35. Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems

36. Your PIN Sounds Good! Augmentation of PIN Guessing Strategies via Audio Leakage

37. DE-auth of the Blue! Transparent De-authentication Using Bluetooth Low Energy Beacon

40. Emotional Valence Shifts and User Behavior on Twitter, Facebook, and YouTube

41. Malware Signature Generation Using Locality Sensitive Hashing

42. Secure Machine to Machine Communication in Industrial Internet of Things

43. The Online Identity Detection via Keyboard Dynamics

44. ChoKIFA: A New Detection and Mitigation Approach Against Interest Flooding Attacks in NDN

45. Lexical Mining of Malicious URLs for Classifying Android Malware

48. SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices

49. SILK-TV : Secret Information Leakage from Keystroke Timing Videos

50. Unraveling Reflection Induced Sensitive Leaks in Android Apps

Catalog

Books, media, physical & digital resources