332 results on '"Conti, Mauro"'
Search Results
2. Real or virtual: a video conferencing background manipulation-detection system
3. SPRITZ-PS: validation of synthetic face images using a large dataset of printed documents
4. Privacy-Preserving in Blockchain-based Federated Learning Systems
5. MADESANT: malware detection and severity analysis in industrial environments
6. Alpha Phi-Shing Fraternity: Phishing Assessment in a Higher Education Institution
7. Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities
8. RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things
9. XAITrafficIntell: Interpretable Cyber Threat Intelligence for Darknet Traffic Analysis
10. Temporal Dynamics of Coordinated Online Behavior: Stability, Archetypes, and Influence
11. Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing
12. OSTIS: A novel Organization-Specific Threat Intelligence System
13. Fingerprint membership and identity inference against generative adversarial networks
14. VAIDANSHH: Adaptive DDoS detection for heterogeneous hosts in vehicular environments
15. LFGurad: A Defense against Label Flipping Attack in Federated Learning for Vehicular Network
16. Privacy-preserving in Blockchain-based Federated Learning systems
17. PETRAK: A solution against DDoS attacks in vehicular networks
18. SYNTROPY: TCP SYN DDoS attack detection for Software Defined Network based on Rényi entropy
19. EDIT: A data inspection tool for smart contracts temporal behavior modeling and prediction
20. Authenticated Message-Exchange Protocol for Fog-Assisted Vehicular Cloud Computing
21. GREPHRO: Nature-inspired optimization duo for Internet-of-Things
22. Anonymous Federated Learning via Named-Data Networking
23. SPARQ: SYN Protection using Acyclic Redundancy check and Quartile range on P4 switches
24. HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN
25. Honey-list based authentication protocol for industrial IoT swarms
26. COUNT: Blockchain framework for resource accountability in e-healthcare
27. An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach
28. PIGNUS: A Deep Learning model for IDS in industrial internet-of-things
29. TANGO: A temporal spatial dynamic graph model for event prediction
30. Turning captchas against humanity: Captcha-based attacks in online social media
31. An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF
32. ICSSIM — A framework for building industrial control systems security testbeds
33. An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems
34. BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication
35. A survey on security and privacy issues of UAVs
36. Formal model for inter-component communication and its security in android
37. Secure over-the-air software update for connected vehicles
38. CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks
39. An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions
40. ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags
41. Obfuscation detection in Android applications using deep learning
42. A few-shot malware classification approach for unknown family recognition using malware feature visualization
43. DeBot: A deep learning-based model for bot detection in industrial internet-of-things
44. A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions
45. A survey on security challenges and solutions in the IOTA
46. Software defined network-based HTTP flooding attack defender
47. A survey and taxonomy of consensus protocols for blockchains
48. SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones
49. A machine learning-based approach to detect threats in bio-cyber DNA storage systems
50. Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.