Search

Your search keyword '"CONTI, MAURO"' showing total 72 results

Search Constraints

Start Over You searched for: Author "CONTI, MAURO" Remove constraint Author: "CONTI, MAURO" Publisher springer nature Remove constraint Publisher: springer nature
72 results on '"CONTI, MAURO"'

Search Results

1. SPRITZ-PS: validation of synthetic face images using a large dataset of printed documents.

2. Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities.

3. RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things.

4. Authenticated Message-Exchange Protocol for Fog-Assisted Vehicular Cloud Computing.

5. HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN.

6. Formal model for inter-component communication and its security in android.

7. An SDN-based framework for QoS routing in internet of underwater things.

8. ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN.

9. Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps.

10. Can machine learning model with static features be fooled: an adversarial machine learning approach.

11. On defending against label flipping attacks on malware detection systems.

12. TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks.

13. LiMCA: an optimal clustering algorithm for lifetime maximization of internet of things.

14. MapReduce: an infrastructure review and research insights.

15. You click, I steal: analyzing and detecting click hijacking attacks in web pages.

16. Lightweight solutions to counter DDoS attacks in software defined networking.

17. Detecting crypto-ransomware in IoT networks based on energy consumption footprint.

18. Enhancing QoE for video streaming in MANETs via multi-constraint routing.

22. Service resizing for quick DDoS mitigation in cloud computing environment.

45. Event Handoff Unobservability in WSN.

46. CRePE: Context-Related Policy Enforcement for Android.

47. Time Warp: How Time Affects Privacy in LBSs.

48. CED2: Communication Efficient Disjointness Decision.

49. The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks.

50. Preserving privacy against external and internal threats in WSN data aggregation.

Catalog

Books, media, physical & digital resources